	
{"id":1545,"date":"2024-05-26T17:55:19","date_gmt":"2024-05-26T15:55:19","guid":{"rendered":"http:\/\/localhost\/delo2.it\/?p=1545"},"modified":"2024-09-19T10:19:22","modified_gmt":"2024-09-19T08:19:22","slug":"network-observability-security-2","status":"publish","type":"post","link":"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/","title":{"rendered":"Network Visibility &amp; Cybersecurity"},"content":{"rendered":"<div  class=\"tpgb-wrap-8a79_1545   tpgb-anim-dur-normal tpgb-view-animation\" data-animationSetting='{&quot;anime&quot;:{&quot;md&quot;:&quot;fadeIn&quot;,&quot;sm&quot;:&quot;&quot;,&quot;xs&quot;:&quot;&quot;}}'  ><div class=\"tpgb-pro-paragraph tpgb-block-8a79_1545 \"><div class=\"pro-paragraph-inner \"><p>La crescente e costante complessit\u00e0 delle reti, le tecnologie sempre pi\u00f9 innovative, la trasformazione digitale in atto e la crescita esponenziale dei dati di traffico sono tutti fattori che richiedono un approccio pi\u00f9 sofisticato e proattivo alla gestione delle reti e nell\u2019affrontare e risolvere i problemi.<\/p><\/div><\/div><\/div>\n\n<div  class=\"tpgb-wrap-11fe_1545   tpgb-anim-dur-normal tpgb-view-animation\" data-animationSetting='{&quot;anime&quot;:{&quot;md&quot;:&quot;fadeIn&quot;,&quot;sm&quot;:&quot;&quot;,&quot;xs&quot;:&quot;&quot;}}'  ><div class=\"tpgb-pro-paragraph tpgb-block-11fe_1545 \"><div class=\"pro-paragraph-inner \"><p>Non basta raccogliere dei dati di traffico, ma \u00e8 fondamentale essere in grado di analizzarli in modo efficace per identificare eventuali anomalie, problemi di prestazioni, attacchi informatici o altri eventi significativi che possono influenzare le prestazioni o la sicurezza della rete. Questo processo pu\u00f2 coinvolgere l&#8217;uso di tecniche di analisi dei dati, come l&#8217;apprendimento automatico (ML), l&#8217;intelligenza artificiale (IA) e l&#8217;analisi dei pattern.<\/p><\/div><\/div><\/div>\n\n<div  class=\"tpgb-wrap-8275_1545   tpgb-anim-dur-normal tpgb-view-animation\" data-animationSetting='{&quot;anime&quot;:{&quot;md&quot;:&quot;fadeIn&quot;,&quot;sm&quot;:&quot;&quot;,&quot;xs&quot;:&quot;&quot;}}'  ><div class=\"tpgb-pro-paragraph tpgb-block-8275_1545 \"><div class=\"pro-paragraph-inner \"><p>Le soluzioni di <strong>NETWORK VISIBILITY &amp; CYBERSECURITY <\/strong>delle reti, dedicate alle organizzazioni <strong>Telco e Large-Medium Enterprise,<\/strong> sono in grado di raccogliere, elaborare e analizzare dati provenienti da router, switch, firewall, server, applicazioni e flussi di traffico, al fine di ottenere una visione completa e accurata delle prestazioni, della sicurezza e della disponibilit\u00e0 della rete.<\/p><\/div><\/div><\/div>\n\n<div  class=\"tpgb-wrap-629a_1545   tpgb-anim-dur-normal tpgb-view-animation\" data-animationSetting='{&quot;anime&quot;:{&quot;md&quot;:&quot;fadeIn&quot;,&quot;sm&quot;:&quot;&quot;,&quot;xs&quot;:&quot;&quot;}}'  ><div class=\"tpgb-pro-paragraph tpgb-block-629a_1545 \"><div class=\"pro-paragraph-inner \"><p>In definitiva, queste tecnologie sono una componente essenziale nella gestione delle reti Telecom e informatiche moderne in grado di:<\/p><\/div><\/div><\/div>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div  class=\"tpgb-wrap-8505_1545   tpgb-anim-dur-normal tpgb-view-animation\" data-animationSetting='{&quot;anime&quot;:{&quot;md&quot;:&quot;fadeIn&quot;,&quot;sm&quot;:&quot;&quot;,&quot;xs&quot;:&quot;&quot;}}'  ><div class=\"tpgb-pro-paragraph tpgb-block-8505_1545 \"><div class=\"pro-paragraph-inner \"><h5>In definitiva, queste tecnologie sono una componente essenziale nella gestione<br>delle reti Telecom e informatiche moderne in grado di:<\/h5><\/div><\/div><\/div>\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div  class=\"tpgb-wrap-798b_1545   tpgb-anim-dur-normal tpgb-view-animation\" data-animationSetting='{&quot;anime&quot;:{&quot;md&quot;:&quot;fadeIn&quot;,&quot;sm&quot;:&quot;&quot;,&quot;xs&quot;:&quot;&quot;}}'  ><div class=\"tpgb-infobox tpgb-relative-block tpgb-trans-linear tpgb-block-798b_1545  info-box-style-1 \" ><div class=\"post-inner-loop \"><div class=\"info-box-inner tpgb-trans-linear tpgb_cnt_hvr_effect tpgb-relative-block tp-info-nc cnt_hvr_\"><div class=\"info-box-bg-box tpgb-trans-linear \"><div class=\"service-media text-left \"><div class=\"m-r-16 style-1  \"><div class=\"info-icon-content\"><div class=\"service-icon-wrap tpgb-trans-linear\"><span class=\"service-icon tpgb-trans-linear  icon-none\"><i class=\"fas fa-chevron-circle-right\"><\/i><\/span><\/div><\/div><\/div><div class=\"service-content\"><div class=\"service-title tpgb-trans-linear\"><strong>Identificare<\/strong> i problemi prima che abbiamo un impatto sugli utenti<\/div><div class=\"service-desc tpgb-trans-linear\"><\/div><\/div><\/div><\/div><div class=\"infobox-overlay-color tpgb-trans-linear\"><\/div><\/div><\/div><\/div><\/div>\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div  class=\"tpgb-wrap-b916_1545   tpgb-anim-dur-normal tpgb-view-animation\" data-animationSetting='{&quot;anime&quot;:{&quot;md&quot;:&quot;fadeIn&quot;,&quot;sm&quot;:&quot;&quot;,&quot;xs&quot;:&quot;&quot;}}'  ><div class=\"tpgb-infobox tpgb-relative-block tpgb-trans-linear tpgb-block-b916_1545  info-box-style-1 \" ><div class=\"post-inner-loop \"><div class=\"info-box-inner tpgb-trans-linear tpgb_cnt_hvr_effect tpgb-relative-block tp-info-nc cnt_hvr_\"><div class=\"info-box-bg-box tpgb-trans-linear \"><div class=\"service-media text-left \"><div class=\"m-r-16 style-1  \"><div class=\"info-icon-content\"><div class=\"service-icon-wrap tpgb-trans-linear\"><span class=\"service-icon tpgb-trans-linear  icon-none\"><i class=\"fas fa-chevron-circle-right\"><\/i><\/span><\/div><\/div><\/div><div class=\"service-content\"><div class=\"service-title tpgb-trans-linear\"><strong>Controllare<\/strong> le performance delle applicazioni critiche e la conformit\u00e0 alle normative vigenti<\/div><div class=\"service-desc tpgb-trans-linear\"><\/div><\/div><\/div><\/div><div class=\"infobox-overlay-color tpgb-trans-linear\"><\/div><\/div><\/div><\/div><\/div>\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div  class=\"tpgb-wrap-c31c_1545   tpgb-anim-dur-normal tpgb-view-animation\" data-animationSetting='{&quot;anime&quot;:{&quot;md&quot;:&quot;fadeIn&quot;,&quot;sm&quot;:&quot;&quot;,&quot;xs&quot;:&quot;&quot;}}'  ><div class=\"tpgb-infobox tpgb-relative-block tpgb-trans-linear tpgb-block-c31c_1545  info-box-style-1 \" ><div class=\"post-inner-loop \"><div class=\"info-box-inner tpgb-trans-linear tpgb_cnt_hvr_effect tpgb-relative-block tp-info-nc cnt_hvr_\"><div class=\"info-box-bg-box tpgb-trans-linear \"><div class=\"service-media text-left \"><div class=\"m-r-16 style-1  \"><div class=\"info-icon-content\"><div class=\"service-icon-wrap tpgb-trans-linear\"><span class=\"service-icon tpgb-trans-linear  icon-none\"><i class=\"fas fa-chevron-circle-right\"><\/i><\/span><\/div><\/div><\/div><div class=\"service-content\"><div class=\"service-title tpgb-trans-linear\"><strong>Semplificare<\/strong> gli interventi sulle reti<\/div><div class=\"service-desc tpgb-trans-linear\"><\/div><\/div><\/div><\/div><div class=\"infobox-overlay-color tpgb-trans-linear\"><\/div><\/div><\/div><\/div><\/div>\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div  class=\"tpgb-wrap-f21c_1545   tpgb-anim-dur-normal tpgb-view-animation\" data-animationSetting='{&quot;anime&quot;:{&quot;md&quot;:&quot;fadeIn&quot;,&quot;sm&quot;:&quot;&quot;,&quot;xs&quot;:&quot;&quot;}}'  ><div class=\"tpgb-infobox tpgb-relative-block tpgb-trans-linear tpgb-block-f21c_1545  info-box-style-1 \" ><div class=\"post-inner-loop \"><div class=\"info-box-inner tpgb-trans-linear tpgb_cnt_hvr_effect tpgb-relative-block tp-info-nc cnt_hvr_\"><div class=\"info-box-bg-box tpgb-trans-linear \"><div class=\"service-media text-left \"><div class=\"m-r-16 style-1  \"><div class=\"info-icon-content\"><div class=\"service-icon-wrap tpgb-trans-linear\"><span class=\"service-icon tpgb-trans-linear  icon-none\"><i class=\"fas fa-chevron-circle-right\"><\/i><\/span><\/div><\/div><\/div><div class=\"service-content\"><div class=\"service-title tpgb-trans-linear\"><strong>Rilevare e prevenire<\/strong> attacchi informatici, intrusioni e violazioni della sicurezza, proteggendo cos\u00ec i dati sensibili e le risorse aziendali<\/div><div class=\"service-desc tpgb-trans-linear\"><\/div><\/div><\/div><\/div><div class=\"infobox-overlay-color tpgb-trans-linear\"><\/div><\/div><\/div><\/div><\/div>\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div  class=\"tpgb-wrap-9272_1545   tpgb-anim-dur-normal tpgb-view-animation\" data-animationSetting='{&quot;anime&quot;:{&quot;md&quot;:&quot;fadeIn&quot;,&quot;sm&quot;:&quot;&quot;,&quot;xs&quot;:&quot;&quot;}}'  ><div class=\"tpgb-infobox tpgb-relative-block tpgb-trans-linear tpgb-block-9272_1545  info-box-style-1 \" ><div class=\"post-inner-loop \"><div class=\"info-box-inner tpgb-trans-linear tpgb_cnt_hvr_effect tpgb-relative-block tp-info-nc cnt_hvr_\"><div class=\"info-box-bg-box tpgb-trans-linear \"><div class=\"service-media text-left \"><div class=\"m-r-16 style-1  \"><div class=\"info-icon-content\"><div class=\"service-icon-wrap tpgb-trans-linear\"><span class=\"service-icon tpgb-trans-linear  icon-none\"><i class=\"fas fa-chevron-circle-right\"><\/i><\/span><\/div><\/div><\/div><div class=\"service-content\"><div class=\"service-title tpgb-trans-linear\"><strong>Ottimizzare<\/strong> le prestazioni dei branch offices e delle applicazioni cloud<\/div><div class=\"service-desc tpgb-trans-linear\"><\/div><\/div><\/div><\/div><div class=\"infobox-overlay-color tpgb-trans-linear\"><\/div><\/div><\/div><\/div><\/div>\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div  class=\"tpgb-wrap-dfb9_1545   tpgb-anim-dur-normal tpgb-view-animation\" data-animationSetting='{&quot;anime&quot;:{&quot;md&quot;:&quot;fadeIn&quot;,&quot;sm&quot;:&quot;&quot;,&quot;xs&quot;:&quot;&quot;}}'  ><div class=\"tpgb-infobox tpgb-relative-block tpgb-trans-linear tpgb-block-dfb9_1545  info-box-style-1 \" ><div class=\"post-inner-loop \"><div class=\"info-box-inner tpgb-trans-linear tpgb_cnt_hvr_effect tpgb-relative-block tp-info-nc cnt_hvr_\"><div class=\"info-box-bg-box tpgb-trans-linear \"><div class=\"service-media text-left \"><div class=\"m-r-16 style-1  \"><div class=\"info-icon-content\"><div class=\"service-icon-wrap tpgb-trans-linear\"><span class=\"service-icon tpgb-trans-linear  icon-none\"><i class=\"fas fa-chevron-circle-right\"><\/i><\/span><\/div><\/div><\/div><div class=\"service-content\"><div class=\"service-title tpgb-trans-linear\"><strong>Incrementare<\/strong> la produttivit\u00e0 dello smart working<\/div><div class=\"service-desc tpgb-trans-linear\"><\/div><\/div><\/div><\/div><div class=\"infobox-overlay-color tpgb-trans-linear\"><\/div><\/div><\/div><\/div><\/div>\n\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-cover\" style=\"min-height:216px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-accent-2-background-color has-background-dim-40 has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1435\" class=\"wp-block-cover__image-background wp-image-5979\" alt=\"\" src=\"http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/iot-1-scaled.jpg\" data-object-fit=\"cover\" srcset=\"http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/iot-1-scaled.jpg 2560w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/iot-1-300x168.jpg 300w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/iot-1-1024x574.jpg 1024w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/iot-1-768x430.jpg 768w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/iot-1-1536x861.jpg 1536w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/iot-1-2048x1148.jpg 2048w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/iot-1-500x280.jpg 500w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/iot-1-800x448.jpg 800w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/iot-1-1280x717.jpg 1280w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/iot-1-1920x1076.jpg 1920w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/iot-1-535x300.jpg 535w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\"><div class=\"tpgb-pro-paragraph tpgb-block-486c_1545 \"><h4 class=\"pro-heading-inner\"><strong><strong>Network Visibility<\/strong><\/strong> &amp; Cybersecurity<\/h4><div class=\"pro-paragraph-inner \"><div>La complessit\u00e0 delle architetture ICT \u00e8 cresciuta esponenzialmente negli ultimi anni, e mantenere la visibilit\u00e0 e il controllo \u00e8 diventata una sfida in piena regola. <\/div><\/div><\/div>\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50\"><a class=\"wp-block-button__link wp-element-button\" href=\"http:\/\/www.delo.it\/index.php\/2024\/07\/24\/network-visibility\/\">SCOPRI DI PI\u00d9<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-cover\" style=\"min-height:216px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-accent-2-background-color has-background-dim-0 has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"525\" height=\"179\" class=\"wp-block-cover__image-background wp-image-4254\" alt=\"\" src=\"http:\/\/www.delo.it\/wp-content\/uploads\/2024\/06\/box2.jpg\" data-object-fit=\"cover\" srcset=\"http:\/\/www.delo.it\/wp-content\/uploads\/2024\/06\/box2.jpg 525w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/06\/box2-300x102.jpg 300w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/06\/box2-500x170.jpg 500w\" sizes=\"auto, (max-width: 525px) 100vw, 525px\" \/><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\"><div class=\"tpgb-pro-paragraph tpgb-block-77e8_1545 \"><h4 class=\"pro-heading-inner\"><strong>Performance Monitoring<\/strong><\/h4><div class=\"pro-paragraph-inner \"><div>In un moderno Datacenter le PDU sono essenziali per distribuire l&#8217;energia elettrica a pi\u00f9 dispositivi, quali server e apparecchiature di rete. <a href=\"http:\/\/www.delo.it\/index.php\/2024\/06\/24\/pdu-power-distribution-units-per-la-gestione-efficiente-dei-rack\/\" data-type=\"post\" data-id=\"4449\"><br><\/a><\/div><\/div><\/div>\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50\"><a class=\"wp-block-button__link wp-element-button\" href=\"http:\/\/www.delo.it\/index.php\/2024\/06\/26\/performance-monitoring\/\">SCOPRI DI PI\u00d9<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-cover articoli_datacenter\" style=\"min-height:216px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-accent-2-background-color has-background-dim-30 has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1707\" class=\"wp-block-cover__image-background wp-image-4896\" alt=\"\" src=\"http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/rpa-concept-with-blurry-hand-touching-screen-scaled.jpg\" data-object-fit=\"cover\" srcset=\"http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/rpa-concept-with-blurry-hand-touching-screen-scaled.jpg 2560w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/rpa-concept-with-blurry-hand-touching-screen-300x200.jpg 300w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/rpa-concept-with-blurry-hand-touching-screen-1024x683.jpg 1024w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/rpa-concept-with-blurry-hand-touching-screen-768x512.jpg 768w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/rpa-concept-with-blurry-hand-touching-screen-1536x1024.jpg 1536w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/rpa-concept-with-blurry-hand-touching-screen-2048x1366.jpg 2048w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/rpa-concept-with-blurry-hand-touching-screen-500x333.jpg 500w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/rpa-concept-with-blurry-hand-touching-screen-800x534.jpg 800w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/rpa-concept-with-blurry-hand-touching-screen-1280x854.jpg 1280w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/rpa-concept-with-blurry-hand-touching-screen-1920x1281.jpg 1920w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/rpa-concept-with-blurry-hand-touching-screen-450x300.jpg 450w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\"><div class=\"tpgb-pro-paragraph tpgb-block-1fee_1545 \"><h4 class=\"pro-heading-inner\"><strong><strong>Network Automation<\/strong><\/strong><\/h4><div class=\"pro-paragraph-inner \"><div>Il principale obiettivo di un sistema di Network Automation \u00e8 di gestire le attivit\u00e0 in un ambiente di rete e di servizi sempre pi\u00f9 complesso cercando di evitare errori umani.<\/div><\/div><\/div>\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50\"><a class=\"wp-block-button__link wp-element-button\" href=\"http:\/\/www.delo.it\/index.php\/2024\/06\/26\/network-automation\/\">SCOPRI DI PI\u00d9<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-cover articoli_datacenter\" style=\"min-height:216px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-accent-2-background-color has-background-dim-30 has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1097\" class=\"wp-block-cover__image-background wp-image-7516\" alt=\"\" src=\"http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/NetworkInventory-scaled.jpg\" data-object-fit=\"cover\" srcset=\"http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/NetworkInventory-scaled.jpg 2560w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/NetworkInventory-300x129.jpg 300w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/NetworkInventory-1024x439.jpg 1024w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/NetworkInventory-768x329.jpg 768w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/NetworkInventory-1536x658.jpg 1536w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/NetworkInventory-2048x878.jpg 2048w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/NetworkInventory-500x214.jpg 500w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/NetworkInventory-800x343.jpg 800w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/NetworkInventory-1280x549.jpg 1280w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/NetworkInventory-1920x823.jpg 1920w, http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/NetworkInventory-607x260.jpg 607w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\"><div class=\"tpgb-pro-paragraph tpgb-block-84ce_1545 \"><h4 class=\"pro-heading-inner\"><strong>Network Inventory e Capacity Planning<\/strong><\/h4><div class=\"pro-paragraph-inner \"><div>Con una gestione accurata dell\u2019Inventory di rete e una pianificazione della capacit\u00e0 ben strutturata, una rete aziendale sar\u00e0 in grado di funzionare in modo efficiente.<\/div><\/div><\/div>\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50\"><a class=\"wp-block-button__link wp-element-button\" href=\"http:\/\/www.delo.it\/index.php\/2024\/06\/26\/network-inventory-e-capacity-planning\/\">SCOPRI DI PI\u00d9<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":7372,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"tpgb_global_settings":"","footnotes":""},"categories":[58],"tags":[],"class_list":["post-1545","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-solution"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Network Visibility &amp; Cybersecurity - Delo<\/title>\r\n<meta name=\"description\" content=\"La crescente e costante complessit\u00e0 delle reti, le tecnologie sempre pi\u00f9 innovative, la trasformazione digitale in atto e la crescita esponenziale dei dati di traffico sono tutti fattori che richiedono un approccio pi\u00f9 sofisticato e proattivo alla gestione delle reti e nell\u2019affrontare e risolvere i problemi.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/\" \/>\r\n<meta property=\"og:locale\" content=\"it_IT\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Network Visibility &amp; Cybersecurity - Delo\" \/>\r\n<meta property=\"og:description\" content=\"La crescente e costante complessit\u00e0 delle reti, le tecnologie sempre pi\u00f9 innovative, la trasformazione digitale in atto e la crescita esponenziale dei dati di traffico sono tutti fattori che richiedono un approccio pi\u00f9 sofisticato e proattivo alla gestione delle reti e nell\u2019affrontare e risolvere i problemi.\" \/>\r\n<meta property=\"og:url\" content=\"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Delo\" \/>\r\n<meta property=\"article:published_time\" content=\"2024-05-26T15:55:19+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2024-09-19T08:19:22+00:00\" \/>\r\n<meta property=\"og:image\" content=\"http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/cyber-security-scaled.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\r\n\t<meta property=\"og:image:height\" content=\"1435\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"author\" content=\"delo2\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"delo2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuti\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/#article\",\"isPartOf\":{\"@id\":\"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/\"},\"author\":{\"name\":\"delo2\",\"@id\":\"https:\/\/www.delo.it\/#\/schema\/person\/6ffdedaab364b87412d8ab0a6023ae43\"},\"headline\":\"Network Visibility &amp; Cybersecurity\",\"datePublished\":\"2024-05-26T15:55:19+00:00\",\"dateModified\":\"2024-09-19T08:19:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/\"},\"wordCount\":495,\"publisher\":{\"@id\":\"https:\/\/www.delo.it\/#organization\"},\"image\":{\"@id\":\"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/cyber-security-scaled.jpg\",\"articleSection\":[\"Business Solution\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/\",\"url\":\"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/\",\"name\":\"Network Visibility &amp; Cybersecurity - Delo\",\"isPartOf\":{\"@id\":\"https:\/\/www.delo.it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/#primaryimage\"},\"image\":{\"@id\":\"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/cyber-security-scaled.jpg\",\"datePublished\":\"2024-05-26T15:55:19+00:00\",\"dateModified\":\"2024-09-19T08:19:22+00:00\",\"description\":\"La crescente e costante complessit\u00e0 delle reti, le tecnologie sempre pi\u00f9 innovative, la trasformazione digitale in atto e la crescita esponenziale dei dati di traffico sono tutti fattori che richiedono un approccio pi\u00f9 sofisticato e proattivo alla gestione delle reti e nell\u2019affrontare e risolvere i problemi.\",\"breadcrumb\":{\"@id\":\"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/#primaryimage\",\"url\":\"http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/cyber-security-scaled.jpg\",\"contentUrl\":\"http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/cyber-security-scaled.jpg\",\"width\":2560,\"height\":1435,\"caption\":\"3D rendering, orange gradient shield surrounded by circuit board lines and digital padlock icon on dark background, front view angle, isometric. The style of the game interface design features elements such as data technology, cyber security or online protection concept. High resolution, sharp focus, studio lighting with soft contrast for digital illustration --ar 16:9 Job ID: 45613c7e-d721-418d-9bce-d467fc19af1f\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.delo.it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network Visibility &amp; Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.delo.it\/#website\",\"url\":\"https:\/\/www.delo.it\/\",\"name\":\"DELO Instruments\",\"description\":\"delo\",\"publisher\":{\"@id\":\"https:\/\/www.delo.it\/#organization\"},\"alternateName\":\"delo\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.delo.it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.delo.it\/#organization\",\"name\":\"Delo Instruments\",\"alternateName\":\"delo\",\"url\":\"https:\/\/www.delo.it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.delo.it\/#\/schema\/logo\/image\/\",\"url\":\"http:\/\/localhost\/delo2.it\/wp-content\/uploads\/2024\/06\/cropped-logo_delo-scaled-1.jpg\",\"contentUrl\":\"http:\/\/localhost\/delo2.it\/wp-content\/uploads\/2024\/06\/cropped-logo_delo-scaled-1.jpg\",\"width\":2560,\"height\":267,\"caption\":\"Delo Instruments\"},\"image\":{\"@id\":\"https:\/\/www.delo.it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/it.linkedin.com\/company\/delo-instruments\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.delo.it\/#\/schema\/person\/6ffdedaab364b87412d8ab0a6023ae43\",\"name\":\"delo2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.delo.it\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/005336b332594817c84ecd228104477037693ec41ad3816cdf67232ed414d2da?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/005336b332594817c84ecd228104477037693ec41ad3816cdf67232ed414d2da?s=96&d=mm&r=g\",\"caption\":\"delo2\"},\"sameAs\":[\"http:\/\/localhost\/delo2.it\"],\"url\":\"http:\/\/www.delo.it\/index.php\/author\/delo2\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Network Visibility &amp; Cybersecurity - Delo","description":"La crescente e costante complessit\u00e0 delle reti, le tecnologie sempre pi\u00f9 innovative, la trasformazione digitale in atto e la crescita esponenziale dei dati di traffico sono tutti fattori che richiedono un approccio pi\u00f9 sofisticato e proattivo alla gestione delle reti e nell\u2019affrontare e risolvere i problemi.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/","og_locale":"it_IT","og_type":"article","og_title":"Network Visibility &amp; Cybersecurity - Delo","og_description":"La crescente e costante complessit\u00e0 delle reti, le tecnologie sempre pi\u00f9 innovative, la trasformazione digitale in atto e la crescita esponenziale dei dati di traffico sono tutti fattori che richiedono un approccio pi\u00f9 sofisticato e proattivo alla gestione delle reti e nell\u2019affrontare e risolvere i problemi.","og_url":"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/","og_site_name":"Delo","article_published_time":"2024-05-26T15:55:19+00:00","article_modified_time":"2024-09-19T08:19:22+00:00","og_image":[{"width":2560,"height":1435,"url":"http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/cyber-security-scaled.jpg","type":"image\/jpeg"}],"author":"delo2","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"delo2","Tempo di lettura stimato":"4 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/#article","isPartOf":{"@id":"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/"},"author":{"name":"delo2","@id":"https:\/\/www.delo.it\/#\/schema\/person\/6ffdedaab364b87412d8ab0a6023ae43"},"headline":"Network Visibility &amp; Cybersecurity","datePublished":"2024-05-26T15:55:19+00:00","dateModified":"2024-09-19T08:19:22+00:00","mainEntityOfPage":{"@id":"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/"},"wordCount":495,"publisher":{"@id":"https:\/\/www.delo.it\/#organization"},"image":{"@id":"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/#primaryimage"},"thumbnailUrl":"http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/cyber-security-scaled.jpg","articleSection":["Business Solution"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/","url":"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/","name":"Network Visibility &amp; Cybersecurity - Delo","isPartOf":{"@id":"https:\/\/www.delo.it\/#website"},"primaryImageOfPage":{"@id":"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/#primaryimage"},"image":{"@id":"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/#primaryimage"},"thumbnailUrl":"http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/cyber-security-scaled.jpg","datePublished":"2024-05-26T15:55:19+00:00","dateModified":"2024-09-19T08:19:22+00:00","description":"La crescente e costante complessit\u00e0 delle reti, le tecnologie sempre pi\u00f9 innovative, la trasformazione digitale in atto e la crescita esponenziale dei dati di traffico sono tutti fattori che richiedono un approccio pi\u00f9 sofisticato e proattivo alla gestione delle reti e nell\u2019affrontare e risolvere i problemi.","breadcrumb":{"@id":"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/#primaryimage","url":"http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/cyber-security-scaled.jpg","contentUrl":"http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/cyber-security-scaled.jpg","width":2560,"height":1435,"caption":"3D rendering, orange gradient shield surrounded by circuit board lines and digital padlock icon on dark background, front view angle, isometric. The style of the game interface design features elements such as data technology, cyber security or online protection concept. High resolution, sharp focus, studio lighting with soft contrast for digital illustration --ar 16:9 Job ID: 45613c7e-d721-418d-9bce-d467fc19af1f"},{"@type":"BreadcrumbList","@id":"http:\/\/www.delo.it\/index.php\/2024\/05\/26\/network-observability-security-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.delo.it\/"},{"@type":"ListItem","position":2,"name":"Network Visibility &amp; Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.delo.it\/#website","url":"https:\/\/www.delo.it\/","name":"DELO Instruments","description":"delo","publisher":{"@id":"https:\/\/www.delo.it\/#organization"},"alternateName":"delo","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.delo.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.delo.it\/#organization","name":"Delo Instruments","alternateName":"delo","url":"https:\/\/www.delo.it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.delo.it\/#\/schema\/logo\/image\/","url":"http:\/\/localhost\/delo2.it\/wp-content\/uploads\/2024\/06\/cropped-logo_delo-scaled-1.jpg","contentUrl":"http:\/\/localhost\/delo2.it\/wp-content\/uploads\/2024\/06\/cropped-logo_delo-scaled-1.jpg","width":2560,"height":267,"caption":"Delo Instruments"},"image":{"@id":"https:\/\/www.delo.it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/it.linkedin.com\/company\/delo-instruments"]},{"@type":"Person","@id":"https:\/\/www.delo.it\/#\/schema\/person\/6ffdedaab364b87412d8ab0a6023ae43","name":"delo2","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.delo.it\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/005336b332594817c84ecd228104477037693ec41ad3816cdf67232ed414d2da?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/005336b332594817c84ecd228104477037693ec41ad3816cdf67232ed414d2da?s=96&d=mm&r=g","caption":"delo2"},"sameAs":["http:\/\/localhost\/delo2.it"],"url":"http:\/\/www.delo.it\/index.php\/author\/delo2\/"}]}},"tpgb_featured_images":{"full":["http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/cyber-security-scaled.jpg",2560,1435,false],"tp-image-grid":["http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/cyber-security-700x700.jpg",700,700,true],"thumbnail":["http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/cyber-security-150x150.jpg",150,150,true],"medium":["http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/cyber-security-300x168.jpg",300,168,true],"medium_large":["http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/cyber-security-768x430.jpg",768,430,true],"large":["http:\/\/www.delo.it\/wp-content\/uploads\/2024\/05\/cyber-security-1024x574.jpg",1024,574,true],"default":"http:\/\/www.delo.it\/wp-content\/plugins\/the-plus-addons-for-block-editor\/assets\/images\/tpgb-placeholder.jpg"},"tpgb_post_meta_info":{"get_date":"26 Maggio 2024","category_list":{"category":[{"term_id":58,"name":"Business Solution","slug":"business-solution","term_group":0,"term_taxonomy_id":58,"taxonomy":"category","description":"","parent":0,"count":6,"filter":"raw"}],"post_tag":false,"post_format":false},"author_name":"delo2","author_url":"http:\/\/www.delo.it\/index.php\/author\/delo2\/","author_email":"selecreative@gmail.com","author_website":"http:\/\/localhost\/delo2.it","author_description":"","author_facebook":"","author_twitter":"","author_instagram":"","author_role":["administrator"],"author_firstname":"","author_lastname":"","user_login":"delo2","author_avatar":"<img alt='' src='https:\/\/secure.gravatar.com\/avatar\/005336b332594817c84ecd228104477037693ec41ad3816cdf67232ed414d2da?s=200&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/005336b332594817c84ecd228104477037693ec41ad3816cdf67232ed414d2da?s=400&#038;d=mm&#038;r=g 2x' class='avatar avatar-200 photo' height='200' width='200' loading='lazy' decoding='async'\/>","author_avatar_url":"https:\/\/secure.gravatar.com\/avatar\/005336b332594817c84ecd228104477037693ec41ad3816cdf67232ed414d2da?s=96&d=mm&r=g","comment_count":0,"post_likes":0,"post_views":0},"tpgb_post_category":{"category":"<a href=\"http:\/\/www.delo.it\/index.php\/category\/business-solution\/\" alt=\"Business Solution\" class=\"category-business-solution\">Business Solution<\/a> "},"_links":{"self":[{"href":"http:\/\/www.delo.it\/index.php\/wp-json\/wp\/v2\/posts\/1545","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.delo.it\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.delo.it\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.delo.it\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.delo.it\/index.php\/wp-json\/wp\/v2\/comments?post=1545"}],"version-history":[{"count":89,"href":"http:\/\/www.delo.it\/index.php\/wp-json\/wp\/v2\/posts\/1545\/revisions"}],"predecessor-version":[{"id":7801,"href":"http:\/\/www.delo.it\/index.php\/wp-json\/wp\/v2\/posts\/1545\/revisions\/7801"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.delo.it\/index.php\/wp-json\/wp\/v2\/media\/7372"}],"wp:attachment":[{"href":"http:\/\/www.delo.it\/index.php\/wp-json\/wp\/v2\/media?parent=1545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.delo.it\/index.php\/wp-json\/wp\/v2\/categories?post=1545"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.delo.it\/index.php\/wp-json\/wp\/v2\/tags?post=1545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}