{"id":4136,"date":"2026-02-13T11:16:26","date_gmt":"2026-02-13T11:16:26","guid":{"rendered":"https:\/\/lecs.cyberevolution.it\/?page_id=4136"},"modified":"2026-03-23T15:14:10","modified_gmt":"2026-03-23T14:14:10","slug":"lecs-embedded-cybersecurity-ot","status":"publish","type":"page","link":"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-embedded-cybersecurity-ot\/","title":{"rendered":"Embedded"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"4136\" class=\"elementor elementor-4136\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4348fcc e-flex e-con-boxed e-con e-parent\" data-id=\"4348fcc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;video&quot;,&quot;background_video_link&quot;:&quot;https:\\\/\\\/lecs.io\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/lecs-embedded-video.mp4&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-background-video-container elementor-hidden-mobile\">\n\t\t\t\t\t\t\t<video class=\"elementor-background-video-hosted\" role=\"presentation\" autoplay muted playsinline loop><\/video>\n\t\t\t\t\t<\/div>\t\t<div class=\"elementor-element elementor-element-e9e356d elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"e9e356d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">La protezione nativa per macchinari industriali, OEM e sistemi OT embedded<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b874f62 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"b874f62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pensato per costruttori di macchine, OEM e ambienti industriali evoluti, LECS Embedded aggiunge un livello di difesa cyber-fisica capace di rilevare anomalie, tracciare eventi critici e supportare la continuit\u00e0 operativa fin dalla progettazione del sistema.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a882dc4 button-lecs e-transform elementor-widget elementor-widget-button\" data-id=\"a882dc4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_translateX_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:-5,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_hover_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#embedded\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"1351\" height=\"1351\" viewBox=\"0 0 1351 1351\" fill=\"none\"><path d=\"M675.5 3.15081e-05C1048.57 4.78154e-05 1351 302.432 1351 675.5C1351 1048.57 1048.57 1351 675.5 1351C302.432 1351 1.32197e-05 1048.57 2.9527e-05 675.5C4.58344e-05 302.432 302.432 1.52008e-05 675.5 3.15081e-05Z\" fill=\"black\"><\/path><path d=\"M816.229 534.791L816.229 816.249L534.77 816.249\" stroke=\"white\" stroke-width=\"56.2917\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M534.77 534.791L816.229 816.249\" stroke=\"white\" stroke-width=\"56.2917\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">SCOPRI COME PROTEGGE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7e72551 e-flex e-con-boxed e-con e-parent\" data-id=\"7e72551\" data-element_type=\"container\" data-e-type=\"container\" id=\"embedded\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b6f142b e-con-full e-flex e-con e-child\" data-id=\"b6f142b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-c690463 e-con-full e-flex e-con e-child\" data-id=\"c690463\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-97d328f elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-lottie\" data-id=\"97d328f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;source_json&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/lecs.io\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/lecs-the-limit-of-traditional-defense.json&quot;,&quot;id&quot;:6925,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;&quot;,&quot;source&quot;:&quot;library&quot;},&quot;lazyload&quot;:&quot;yes&quot;,&quot;source&quot;:&quot;media_file&quot;,&quot;caption_source&quot;:&quot;none&quot;,&quot;link_to&quot;:&quot;none&quot;,&quot;trigger&quot;:&quot;arriving_to_viewport&quot;,&quot;viewport&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;play_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]},&quot;start_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;end_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:100,&quot;sizes&quot;:[]},&quot;renderer&quot;:&quot;svg&quot;}\" data-widget_type=\"lottie.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"e-lottie__container\"><div class=\"e-lottie__animation\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f60662 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"0f60662\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Perch\u00e9 la sicurezza IT tradizionale non protegge i tuoi macchinari<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ad3fa5 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"2ad3fa5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Molti dispositivi OT e Industrial IoT non sono progettati per ospitare software di protezione tradizionale. PLC, HMI, sensori, controllori e sistemi embedded lavorano con vincoli stringenti di stabilit\u00e0, continuit\u00e0 e compatibilit\u00e0.<\/p><p data-start=\"2192\" data-end=\"2631\">Quando un attacco colpisce questi ambienti, il danno non resta confinato al perimetro informatico:\u00a0<\/p><ul><li data-start=\"2192\" data-end=\"2631\">pu\u00f2 tradursi in fermo impianto<\/li><li data-start=\"2192\" data-end=\"2631\">alterazione dei processi<\/li><li data-start=\"2192\" data-end=\"2631\">perdita di dati di macchina\u00a0<\/li><li data-start=\"2192\" data-end=\"2631\">rischio operativo per produzione e operatori<\/li><\/ul><p data-start=\"2192\" data-end=\"2631\">\u00a0<\/p><p data-start=\"2192\" data-end=\"2631\">Nel manifatturiero, la convergenza IT\/OT, la presenza di sistemi legacy, la scarsa segmentazione e la crescita delle minacce rendono questo scenario ancora pi\u00f9 critico.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f86635c button-lecs e-transform elementor-invisible elementor-widget elementor-widget-button\" data-id=\"f86635c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_translateX_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:-5,&quot;sizes&quot;:[]},&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_transform_translateX_effect_hover_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/lecs.io\/it\/contatti\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"1351\" height=\"1351\" viewBox=\"0 0 1351 1351\" fill=\"none\"><path d=\"M0 675.5C0 302.432 302.432 0 675.5 0C1048.57 0 1351 302.432 1351 675.5C1351 1048.57 1048.57 1351 675.5 1351C302.432 1351 0 1048.57 0 675.5Z\" fill=\"black\"><\/path><path d=\"M534.791 534.772H816.249V816.231\" stroke=\"white\" stroke-width=\"56.2917\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M534.791 816.231L816.249 534.772\" stroke=\"white\" stroke-width=\"56.2917\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">RICHIEDI INFORMAZIONI<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1d1a8b9 e-con-full e-flex e-con e-child\" data-id=\"1d1a8b9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-15cbfb7 e-con-full e-flex e-con e-child\" data-id=\"15cbfb7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-0d721aa e-con-full e-flex e-con e-child\" data-id=\"0d721aa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dbb826e elementor-pagination-type-bullets elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-n-carousel\" data-id=\"dbb826e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;carousel_items&quot;:[{&quot;slide_title&quot;:&quot;Slide #1&quot;,&quot;_id&quot;:&quot;49edc48&quot;},{&quot;slide_title&quot;:&quot;Slide #2&quot;,&quot;_id&quot;:&quot;8f327ef&quot;},{&quot;slide_title&quot;:&quot;Slide #3&quot;,&quot;_id&quot;:&quot;2b3865c&quot;}],&quot;slides_to_show_tablet&quot;:&quot;2&quot;,&quot;slides_to_show_mobile&quot;:&quot;1&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;offset_sides&quot;:&quot;none&quot;,&quot;arrows&quot;:&quot;yes&quot;,&quot;pagination&quot;:&quot;bullets&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;image_spacing_custom_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-carousel swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Carosello\" dir=\"ltr\">\n\t\t\t<div class=\"swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"1\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 di 3\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-caf5935 e-flex e-con-boxed e-con e-child\" data-id=\"caf5935\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2dcf454 e-con-full neon e-flex e-con e-child\" data-id=\"2dcf454\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b3f25f0 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"b3f25f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Incompatibilit\u00e0 del Software<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0fa15d0 elementor-widget elementor-widget-text-editor\" data-id=\"0fa15d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>I macchinari 4.0 e i dispositivi IoT sono spesso &#8220;scatole chiuse&#8221; prive di sistemi operativi standard.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"2\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 di 3\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-250d146 e-flex e-con-boxed e-con e-child\" data-id=\"250d146\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-11d9525 e-con-full neon e-flex e-con e-child\" data-id=\"11d9525\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7f5bb04 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"7f5bb04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">attacchi<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3327d47 elementor-widget elementor-widget-text-editor\" data-id=\"3327d47\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Un attacco OT pu\u00f2 avere effetti fisici, produttivi ed economici.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"3\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 di 3\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2eb65b9 e-flex e-con-boxed e-con e-child\" data-id=\"2eb65b9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f399153 e-con-full neon e-flex e-con e-child\" data-id=\"f399153\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c7c8b6f elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"c7c8b6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Intervento non immediato<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a03e93 elementor-widget elementor-widget-text-editor\" data-id=\"6a03e93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La continuit\u00e0 operativa deve restare prioritaria in ogni scelta di sicurezza.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\" aria-label=\"Precedente\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\" aria-label=\"Successivo\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f8bc073 gradient-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"f8bc073\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7b517b5 e-con-full e-flex e-con e-child\" data-id=\"7b517b5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-71cff81 e-con-full e-flex e-con e-child\" data-id=\"71cff81\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-4b3142a e-con-full e-flex e-con e-child\" data-id=\"4b3142a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b93bad4 lottie elementor-hidden-tablet elementor-hidden-mobile elementor-align-center elementor-widget elementor-widget-lottie\" data-id=\"b93bad4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;source_json&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/lecs.io\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/lecs-cybersecurity-for-4.0-industry-1.json&quot;,&quot;id&quot;:6930,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;&quot;,&quot;source&quot;:&quot;library&quot;},&quot;source&quot;:&quot;media_file&quot;,&quot;caption_source&quot;:&quot;none&quot;,&quot;link_to&quot;:&quot;none&quot;,&quot;trigger&quot;:&quot;arriving_to_viewport&quot;,&quot;viewport&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;play_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]},&quot;start_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;end_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:100,&quot;sizes&quot;:[]},&quot;renderer&quot;:&quot;svg&quot;}\" data-widget_type=\"lottie.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"e-lottie__container\"><div class=\"e-lottie__animation\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dab94e4 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"dab94e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">L\u2019intelligenza al servizio della continuit\u00e0 industriale.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cfafeb5 e-con-full e-flex e-con e-child\" data-id=\"cfafeb5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-a6f8055 e-con-full e-flex e-con e-child\" data-id=\"a6f8055\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e76663 e-con-full e-flex e-con e-child\" data-id=\"3e76663\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c18e0e9 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"c18e0e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">LECS Embedded: cybersecurity integrata nella macchina<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad58feb elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"ad58feb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>LECS Embedded \u00e8 il modulo della piattaforma LECS progettato per essere integrato nei macchinari di nuova generazione e EOL. Raccoglie informazioni di dettaglio dai sistemi di bordo, osserva il comportamento della macchina e aggiunge un livello di protezione pensato per ambienti OT dove affidabilit\u00e0, velocit\u00e0 e stabilit\u00e0 non sono negoziabili.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9e125d3 e-con-full e-flex e-con e-child\" data-id=\"9e125d3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-339f7b6 e-con-full e-flex e-con e-child\" data-id=\"339f7b6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d20731 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"1d20731\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Benefici chiave<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d8b580a elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"d8b580a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Protezione nativa della macchina<\/li><li data-start=\"3984\" data-end=\"4133\">Integra la sicurezza direttamente nell\u2019architettura del macchinario, con una visibilit\u00e0 pi\u00f9 profonda su comandi PLC, HMI, sensori e flussi operativi<\/li><li data-section-id=\"zh8s4w\" data-start=\"4135\" data-end=\"4180\">Maggiore dettaglio, meno zone cieche<\/li><li data-start=\"4181\" data-end=\"4345\">Raccoglie log e segnali di dettaglio difficili da ottenere con approcci solo perimetrali, migliorando la capacit\u00e0 di rilevare anomalie e comportamenti non coerenti.<\/li><li data-section-id=\"1arrnrm\" data-start=\"4347\" data-end=\"4393\">Difesa senza impatto sulla produzione<\/li><li data-section-id=\"ikf0u3\" data-start=\"4568\" data-end=\"4610\">Continuit\u00e0 operativa e resilienza<\/li><li data-start=\"4611\" data-end=\"4760\">Riduce il rischio che un\u2019anomalia cyber si trasformi in un problema di processo, in un fermo macchina o in una perdita di controllo su asset critici.<\/li><li data-section-id=\"bkc3qy\" data-start=\"4762\" data-end=\"4819\">Tracciabilit\u00e0 utile anche per compliance e audit<\/li><li data-start=\"4820\" data-end=\"5027\">La piattaforma LECS include log degli eventi e notarizzazione utile a supportare tracciabilit\u00e0, auditabilit\u00e0 e percorsi di conformit\u00e0 su framework come IEC 62443 e NIS2 e CRA<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-88640eb e-con-full e-flex e-con e-child\" data-id=\"88640eb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d8e4a5a e-flex e-con-boxed e-con e-parent\" data-id=\"d8e4a5a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-db33ff2 e-con-full e-flex e-con e-child\" data-id=\"db33ff2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-93abaf4 lottie elementor-align-center elementor-widget elementor-widget-lottie\" data-id=\"93abaf4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;source_json&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/lecs.io\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/lecs-operational-efficiency.json&quot;,&quot;id&quot;:6897,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;&quot;,&quot;source&quot;:&quot;library&quot;},&quot;source&quot;:&quot;media_file&quot;,&quot;caption_source&quot;:&quot;none&quot;,&quot;link_to&quot;:&quot;none&quot;,&quot;trigger&quot;:&quot;arriving_to_viewport&quot;,&quot;viewport&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;play_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]},&quot;start_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;end_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:100,&quot;sizes&quot;:[]},&quot;renderer&quot;:&quot;svg&quot;}\" data-widget_type=\"lottie.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"e-lottie__container\"><div class=\"e-lottie__animation\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1eb4fce elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"1eb4fce\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Tecnologia e certezza operativa.<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57b9183 button-lecs e-transform elementor-invisible elementor-widget elementor-widget-button\" data-id=\"57b9183\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_translateX_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:-5,&quot;sizes&quot;:[]},&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_transform_translateX_effect_hover_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/lecs.io\/it\/programma-partner-cyber-security\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"1351\" height=\"1351\" viewBox=\"0 0 1351 1351\" fill=\"none\"><path d=\"M0 675.5C0 302.432 302.432 0 675.5 0C1048.57 0 1351 302.432 1351 675.5C1351 1048.57 1048.57 1351 675.5 1351C302.432 1351 0 1048.57 0 675.5Z\" fill=\"black\"><\/path><path d=\"M534.791 534.772H816.249V816.231\" stroke=\"white\" stroke-width=\"56.2917\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M534.791 816.231L816.249 534.772\" stroke=\"white\" stroke-width=\"56.2917\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">DIVENTA PARTNER<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0ce0bde e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"0ce0bde\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bcb329a elementor-pagination-type-bullets elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-n-carousel\" data-id=\"bcb329a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;carousel_items&quot;:[{&quot;slide_title&quot;:&quot;Slide #1&quot;,&quot;_id&quot;:&quot;f013cac&quot;},{&quot;slide_title&quot;:&quot;Slide #2&quot;,&quot;_id&quot;:&quot;7ed6b6f&quot;},{&quot;slide_title&quot;:&quot;Slide #3&quot;,&quot;_id&quot;:&quot;886cdbf&quot;},{&quot;slide_title&quot;:&quot;Slide #3&quot;,&quot;_id&quot;:&quot;e7ffb84&quot;}],&quot;slides_to_show&quot;:&quot;4&quot;,&quot;slides_to_show_tablet&quot;:&quot;2&quot;,&quot;slides_to_show_mobile&quot;:&quot;1&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;arrows&quot;:&quot;yes&quot;,&quot;pagination&quot;:&quot;bullets&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;image_spacing_custom_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-carousel swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Carosello\" dir=\"ltr\">\n\t\t\t<div class=\"swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"1\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 di 4\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8f4d5b3 e-flex e-con-boxed e-con e-child\" data-id=\"8f4d5b3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e6da021 e-con-full hover-element card-animation-background  e-flex e-con e-child\" data-id=\"e6da021\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f05a113 elementor-widget elementor-widget-html\" data-id=\"f05a113\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"hover-effect-element\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-49237a8 e-con-full e-flex e-con e-child\" data-id=\"49237a8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3f3f3b5 elementor-widget elementor-widget-heading\" data-id=\"3f3f3b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Analisi industriale, risposta concreta<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9c6086b e-con-full e-flex e-con e-child\" data-id=\"9c6086b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-06cfb05 elementor-widget elementor-widget-text-editor\" data-id=\"06cfb05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>LECS Embedded nasce per ambienti in cui la sola segnalazione non basta. Serve visibilit\u00e0 tecnica, capacit\u00e0 di interpretazione del contesto macchina e una risposta coerente con la continuit\u00e0 del processo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"2\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 di 4\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e6c3c92 e-flex e-con-boxed e-con e-child\" data-id=\"e6c3c92\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-53abad1 e-con-full hover-element card-animation-background  e-flex e-con e-child\" data-id=\"53abad1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e9c6c8 elementor-widget elementor-widget-html\" data-id=\"3e9c6c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"hover-effect-element\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5539bd3 e-con-full e-flex e-con e-child\" data-id=\"5539bd3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0772ede elementor-widget elementor-widget-heading\" data-id=\"0772ede\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deep OT <br>Visibility<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9d0e701 e-con-full e-flex e-con e-child\" data-id=\"9d0e701\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6031c06 elementor-widget elementor-widget-text-editor\" data-id=\"6031c06\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Osserva traffico, eventi e interazioni tra componenti critici della macchina, contribuendo a rilevare precocemente anomalie su protocolli, comandi e comportamenti operativi.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"3\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 di 4\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4017ab0 e-flex e-con-boxed e-con e-child\" data-id=\"4017ab0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c58cd13 e-con-full hover-element card-animation-background  e-flex e-con e-child\" data-id=\"c58cd13\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-58c9311 elementor-widget elementor-widget-html\" data-id=\"58c9311\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"hover-effect-element\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-273a072 e-con-full e-flex e-con e-child\" data-id=\"273a072\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a9ad2d2 elementor-widget elementor-widget-heading\" data-id=\"a9ad2d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Notarizzazione<br> Blockchain<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2fd2e55 e-con-full e-flex e-con e-child\" data-id=\"2fd2e55\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a952227 elementor-widget elementor-widget-text-editor\" data-id=\"a952227\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Registra ogni evento critico e comando di protocollo su tecnologia Blockchain privata. Garantisce l&#8217;integrit\u00e0 dei dati per audit di conformit\u00e0 IEC 62443, NIS2, GDPR e CRA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"4\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 di 4\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6d1affe e-flex e-con-boxed e-con e-child\" data-id=\"6d1affe\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-15219b1 e-con-full hover-element card-animation-background  e-flex e-con e-child\" data-id=\"15219b1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-80feb7c elementor-widget elementor-widget-html\" data-id=\"80feb7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"hover-effect-element\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b507b99 e-con-full e-flex e-con e-child\" data-id=\"b507b99\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4b32552 elementor-widget elementor-widget-heading\" data-id=\"4b32552\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Monitoraggio <br>continuo<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-230e10e e-con-full e-flex e-con e-child\" data-id=\"230e10e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e7450de elementor-widget elementor-widget-text-editor\" data-id=\"e7450de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Estende al livello macchina la logica LECS di monitoraggio 24\/7, con attenzione a reti OT\/SCADA, asset industriali e segnali che spesso restano invisibili agli strumenti IT tradizionali.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\" aria-label=\"Precedente\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\" aria-label=\"Successivo\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bac60a6 e-flex e-con-boxed e-con e-parent\" data-id=\"bac60a6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-dc35623 e-con-full e-flex e-con e-child\" data-id=\"dc35623\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7383c2d elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"7383c2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Pensato per OEM, costruttori di macchine e industria connessa<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a063c20 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"a063c20\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nessuna modifica al software di macchina, nessuna interruzione dei cicli produttivi, installazione possibile su macchinari EOL.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-189a1e2 button-lecs e-transform elementor-invisible elementor-widget elementor-widget-button\" data-id=\"189a1e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_translateX_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:-5,&quot;sizes&quot;:[]},&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_transform_translateX_effect_hover_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"1351\" height=\"1351\" viewBox=\"0 0 1351 1351\" fill=\"none\"><path d=\"M0 675.5C0 302.432 302.432 0 675.5 0C1048.57 0 1351 302.432 1351 675.5C1351 1048.57 1048.57 1351 675.5 1351C302.432 1351 0 1048.57 0 675.5Z\" fill=\"black\"><\/path><path d=\"M534.791 534.772H816.249V816.231\" stroke=\"white\" stroke-width=\"56.2917\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M534.791 816.231L816.249 534.772\" stroke=\"white\" stroke-width=\"56.2917\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">APPROFONDISCI LA GAMMA PLATFORM<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-04c3a31 e-con-full e-flex e-con e-child\" data-id=\"04c3a31\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-049795e elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"049795e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">La sicurezza invisibile che abilita l'industria 4.0.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c0d091 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"7c0d091\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Un ecosistema tecnologico progettato per garantire la resilienza dei macchinari e la protezione dei dati.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-235b0ad elementor-widget elementor-widget-n-accordion\" data-id=\"235b0ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-3700\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-3700\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> LECS Embedded richiede software da installare sul macchinario? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3700\" class=\"elementor-element elementor-element-22ad711 e-con-full e-flex e-con e-child\" data-id=\"22ad711\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-794c771 elementor-widget elementor-widget-text-editor\" data-id=\"794c771\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>LECS Embedded \u00e8 progettato per integrarsi nella macchina in modo nativo, riducendo al minimo l\u2019impatto sull\u2019operativit\u00e0 e preservando la stabilit\u00e0 dei sistemi industriali. L\u2019obiettivo non \u00e8 aggiungere complessit\u00e0, ma aumentare il livello di controllo e protezione.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-3701\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-3701\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Qual \u00e8 il vantaggio rispetto a una protezione solo di rete? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3701\" class=\"elementor-element elementor-element-b944cd4 e-con-full e-flex e-con e-child\" data-id=\"b944cd4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-efef695 elementor-widget elementor-widget-text-editor\" data-id=\"efef695\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Una protezione solo perimetrale non sempre vede ci\u00f2 che accade nel dettaglio del singolo macchinario. LECS Embedded porta la sicurezza pi\u00f9 vicino ai componenti critici e offre una visibilit\u00e0 pi\u00f9 granulare su eventi, logiche e anomalie<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-3702\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-3702\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> \u00c8 adatto anche a contesti industriali complessi? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3702\" class=\"elementor-element elementor-element-1c39163 e-con-full e-flex e-con e-child\" data-id=\"1c39163\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f5ef407 elementor-widget elementor-widget-text-editor\" data-id=\"f5ef407\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>S\u00ec. L\u2019architettura LECS \u00e8 pensata per ambienti OT, SCADA e supply chain critiche, con focus su continuit\u00e0 operativa, integrazione e monitoraggio costante.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-3703\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-3703\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Supporta esigenze di compliance? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3703\" class=\"elementor-element elementor-element-c4cb79d e-con-full e-flex e-con e-child\" data-id=\"c4cb79d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fae44b9 elementor-widget elementor-widget-text-editor\" data-id=\"fae44b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>S\u00ec. La raccolta e tracciabilit\u00e0 dei log, insieme alla visibilit\u00e0 sugli eventi, aiutano il percorso di conformit\u00e0 e auditabilit\u00e0 richiesto in molti contesti industriali regolati.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>La protezione nativa per macchinari industriali, OEM e sistemi OT embedded Pensato per costruttori di macchine, OEM e ambienti industriali evoluti, LECS Embedded aggiunge un livello di difesa cyber-fisica capace di rilevare anomalie, tracciare eventi critici e supportare la continuit\u00e0 operativa fin dalla progettazione del sistema. SCOPRI COME PROTEGGE Perch\u00e9 la sicurezza IT tradizionale non [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":7285,"parent":2131,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4136","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity OT | Protezione Nativa LECS Embedded- LECS<\/title>\n<meta name=\"description\" content=\"Scopri la Cybersecurity OT di LECS Embedded. Protezione nativa per machinery, device senza OS e sistemi SCADA senza fermi produzione.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-embedded-cybersecurity-ot\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity OT | Protezione Nativa LECS Embedded- LECS\" \/>\n<meta property=\"og:description\" content=\"Scopri la Cybersecurity OT di LECS Embedded. Protezione nativa per machinery, device senza OS e sistemi SCADA senza fermi produzione.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-embedded-cybersecurity-ot\/\" \/>\n<meta property=\"og:site_name\" content=\"LECS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Lecs.Cyber.Sec\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-23T14:14:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/lecs-tecnologia-ndr.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-embedded-cybersecurity-ot\/\",\"url\":\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-embedded-cybersecurity-ot\/\",\"name\":\"Cybersecurity OT | Protezione Nativa LECS Embedded- LECS\",\"isPartOf\":{\"@id\":\"https:\/\/lecs.io\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-embedded-cybersecurity-ot\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-embedded-cybersecurity-ot\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/lecs-tecnologia-ndr.jpg\",\"datePublished\":\"2026-02-13T11:16:26+00:00\",\"dateModified\":\"2026-03-23T14:14:10+00:00\",\"description\":\"Scopri la Cybersecurity OT di LECS Embedded. Protezione nativa per machinery, device senza OS e sistemi SCADA senza fermi produzione.\",\"breadcrumb\":{\"@id\":\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-embedded-cybersecurity-ot\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-embedded-cybersecurity-ot\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-embedded-cybersecurity-ot\/#primaryimage\",\"url\":\"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/lecs-tecnologia-ndr.jpg\",\"contentUrl\":\"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/lecs-tecnologia-ndr.jpg\",\"width\":1200,\"height\":630,\"caption\":\"LECS: Protezione intelligente e automatica per il futuro digitale.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-embedded-cybersecurity-ot\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/lecs.io\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lecs Platform\",\"item\":\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Embedded\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lecs.io\/it\/#website\",\"url\":\"https:\/\/lecs.io\/it\/\",\"name\":\"LECS\",\"description\":\"Protect your future today\",\"publisher\":{\"@id\":\"https:\/\/lecs.io\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/lecs.io\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/lecs.io\/it\/#organization\",\"name\":\"LECS\",\"alternateName\":\"Protect your future today\",\"url\":\"https:\/\/lecs.io\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/lecs.io\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/logo-lecs.png\",\"contentUrl\":\"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/logo-lecs.png\",\"width\":1200,\"height\":675,\"caption\":\"LECS\"},\"image\":{\"@id\":\"https:\/\/lecs.io\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Lecs.Cyber.Sec\/\",\"https:\/\/it.linkedin.com\/company\/lecs-security\",\"https:\/\/www.instagram.com\/lecs_security\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity OT | Protezione Nativa LECS Embedded- LECS","description":"Scopri la Cybersecurity OT di LECS Embedded. Protezione nativa per machinery, device senza OS e sistemi SCADA senza fermi produzione.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-embedded-cybersecurity-ot\/","og_locale":"it_IT","og_type":"article","og_title":"Cybersecurity OT | Protezione Nativa LECS Embedded- LECS","og_description":"Scopri la Cybersecurity OT di LECS Embedded. Protezione nativa per machinery, device senza OS e sistemi SCADA senza fermi produzione.","og_url":"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-embedded-cybersecurity-ot\/","og_site_name":"LECS","article_publisher":"https:\/\/www.facebook.com\/Lecs.Cyber.Sec\/","article_modified_time":"2026-03-23T14:14:10+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/lecs-tecnologia-ndr.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Tempo di lettura stimato":"6 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-embedded-cybersecurity-ot\/","url":"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-embedded-cybersecurity-ot\/","name":"Cybersecurity OT | Protezione Nativa LECS Embedded- LECS","isPartOf":{"@id":"https:\/\/lecs.io\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-embedded-cybersecurity-ot\/#primaryimage"},"image":{"@id":"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-embedded-cybersecurity-ot\/#primaryimage"},"thumbnailUrl":"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/lecs-tecnologia-ndr.jpg","datePublished":"2026-02-13T11:16:26+00:00","dateModified":"2026-03-23T14:14:10+00:00","description":"Scopri la Cybersecurity OT di LECS Embedded. Protezione nativa per machinery, device senza OS e sistemi SCADA senza fermi produzione.","breadcrumb":{"@id":"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-embedded-cybersecurity-ot\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-embedded-cybersecurity-ot\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-embedded-cybersecurity-ot\/#primaryimage","url":"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/lecs-tecnologia-ndr.jpg","contentUrl":"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/lecs-tecnologia-ndr.jpg","width":1200,"height":630,"caption":"LECS: Protezione intelligente e automatica per il futuro digitale."},{"@type":"BreadcrumbList","@id":"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-embedded-cybersecurity-ot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/lecs.io\/it\/"},{"@type":"ListItem","position":2,"name":"Lecs Platform","item":"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/"},{"@type":"ListItem","position":3,"name":"Embedded"}]},{"@type":"WebSite","@id":"https:\/\/lecs.io\/it\/#website","url":"https:\/\/lecs.io\/it\/","name":"LECS","description":"Protect your future today","publisher":{"@id":"https:\/\/lecs.io\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lecs.io\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/lecs.io\/it\/#organization","name":"LECS","alternateName":"Protect your future today","url":"https:\/\/lecs.io\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/lecs.io\/it\/#\/schema\/logo\/image\/","url":"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/logo-lecs.png","contentUrl":"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/logo-lecs.png","width":1200,"height":675,"caption":"LECS"},"image":{"@id":"https:\/\/lecs.io\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Lecs.Cyber.Sec\/","https:\/\/it.linkedin.com\/company\/lecs-security","https:\/\/www.instagram.com\/lecs_security\/"]}]}},"_links":{"self":[{"href":"https:\/\/lecs.io\/it\/wp-json\/wp\/v2\/pages\/4136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lecs.io\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/lecs.io\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/lecs.io\/it\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/lecs.io\/it\/wp-json\/wp\/v2\/comments?post=4136"}],"version-history":[{"count":112,"href":"https:\/\/lecs.io\/it\/wp-json\/wp\/v2\/pages\/4136\/revisions"}],"predecessor-version":[{"id":7436,"href":"https:\/\/lecs.io\/it\/wp-json\/wp\/v2\/pages\/4136\/revisions\/7436"}],"up":[{"embeddable":true,"href":"https:\/\/lecs.io\/it\/wp-json\/wp\/v2\/pages\/2131"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lecs.io\/it\/wp-json\/wp\/v2\/media\/7285"}],"wp:attachment":[{"href":"https:\/\/lecs.io\/it\/wp-json\/wp\/v2\/media?parent=4136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}