{"id":81448,"date":"2022-11-03T17:04:10","date_gmt":"2022-11-03T16:04:10","guid":{"rendered":"https:\/\/www.v-valley.com\/solutions\/cloud\/cyber-security-cloud\/"},"modified":"2022-11-14T18:13:40","modified_gmt":"2022-11-14T17:13:40","slug":"cyber-security-cloud","status":"publish","type":"page","link":"https:\/\/www.v-valley.com\/en\/solutions\/cloud\/cyber-security-cloud\/","title":{"rendered":"Cyber Security Cloud"},"content":{"rendered":"\n<h2>\n\t\tPROTECTING BUSINESS PRODUCTIVITY AND OPERATIONAL FLEXIBILITY FOR YOUR CUSTOMERS\n\t<\/h2>\n\t<p>The Cyber Security offer available in the Esprinet Cloud Marketplace, adapts to the various business models (MSP, CSP) you intend to undertake and develop on your customers.\u00a0 Cyber Security solutions ensure high productivity and business continuity by protecting all devices, both fixed and mobile, used by employees. Today, it is increasingly important to prevent attacks on the security of corporate networks, thus avoiding damaging theft of your customers&#8217; data that would have a major economic impact on your organisation.<\/p>\n\t\t\t<a href=\"#form\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tCONTACT US\n\t\t\t\t\t<\/a>\n\t<p>Our Cyber Security partnerships offer the best protection by meeting the needs of companies of all sectors and sizes, solutions are available in different business models:<\/p>\n                        <a href=\"#MSP\">\n            <img decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/09\/ico-MSP.png\" alt=\"Managed Service Provider\" name=\"Managed Service Provider\"\/>\n            <\/a>\n                                                <a href=\"#MSP\">\n                <h4>Managed Service Provider<\/h4>\n                <\/a>\n                                                    <p>Cyber Security solutions for MSPs are adopted, delivered and controlled by an external provider, called a Managed Service Provider (or MSP), <u>which can be you<\/u>!<\/p>\n<p>Want to know more about MSP?<\/p>\n<p><a href=\"\/en\/solutions\/cloud\/#MSP\">GO TO THE INDEPTH INFORMATION<\/a><\/p>\n<p><a href=\"#endpoint\">END POINT PROTECTION<\/a><\/p>\n<p><a href=\"#infrastruttura\">INFRASTRUCTURE PROTECTION<\/a><\/p>\n         <!-- end vvly card item -->\n                        <a href=\"#MSP\">\n            <img decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/09\/ico-MSP-ready.png\" alt=\"Managed Service Provider - Ready to Sell\" name=\"Managed Service Provider - Ready to Sell\"\/>\n            <\/a>\n                                                <a href=\"#MSP\">\n                <h4>Managed Service Provider &#8211; Ready to Sell<\/h4>\n                <\/a>\n                                                    <p>Cyber Security solutions for MSPs already finished by an external vendor, which you can resell to your customers or purchase to complement the services you are already offering.<\/p>\n<p>Want to know more about MSP &#8211; READY TO SELL?<\/p>\n<p><a href=\"\/en\/solutions\/cloud\/#MSP\">GO TO THE INDEPTH INFORMATION<\/a><\/p>\n<p><a href=\"#ready\">READY-TO-SELL CYBER SECURITY SOLUTIONS<\/a><\/p>\n<p><a href=\"#endpoint\">END POINT PROTECTION<\/a><\/p>\n         <!-- end vvly card item -->\n                        <a href=\"#CSP\">\n            <img decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/09\/ico-CSP.png\" alt=\"Cloud Service Provider\" name=\"Cloud Service Provider\"\/>\n            <\/a>\n                                                <a href=\"#CSP\">\n                <h4>Cloud Service Provider<\/h4>\n                <\/a>\n                                                    <p>Cyber Security solutions for CSPs can be adopted by those who want to offer some pre-existing, configurable and remotely available components\/resources in the form of distributed cloud computing architecture &#8211; typically Infrastructure as a Service (IaaS), Software as a Service (SaaS) or Platform as a Service (PaaS) &#8211; to their customers.<\/p>\n<p>Want to know more about CSP?<\/p>\n<p><a href=\"\/en\/solutions\/cloud\/#CSP\">GO TO THE INDEPTH INFORMATION<\/a><\/p>\n<p><a href=\"#autenticazione\">MANAGEMENT OF AUTHENTICATION SYSTEMS <\/a><\/p>\n         <!-- end vvly card item -->\n             <!-- end vvly cards with icon -->\n <!-- end cards-with-icon-container -->\n<style>\n    .vvly-cards-with-icon-container .vvly-cards-with-icon .vvly-card-item {\n        width: calc(100% \/3);\n    }\n<\/style>\n<h3>\n\t\tLET&#8217;S CHOOSE TOGETHER THE IDEAL CYBER SECURITY SOLUTIONS FOR YOUR BUSINESS\n\t<\/h3>\n\t\t\t<a href=\"https:\/\/www.v-valley.com\/en\/solutions\/cyber-security\/\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tDISCOVER ON-PREMISE CYBER SECURITY\n\t\t\t\t\t<\/a>\n\t<a name=\"ready\"><\/a>\n<h3>\n\t\tREADY-TO-SELL SOLUTIONS\n\t<\/h3>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/10\/logo_trendmicro.gif\" alt=\"logo_trendmicro\" itemprop=\"image\" height=\"55\" width=\"140\" title=\"logo_trendmicro\" onerror=\"this.style.display='none'\"  \/>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/img-TrendAntimalware.jpeg\" alt=\"img-TrendAntimalware\" itemprop=\"image\" height=\"360\" width=\"360\" title=\"img-TrendAntimalware\" onerror=\"this.style.display='none'\"  \/>\n<h3>\n\t\tCYBERTEAM ANTIMALWARE\n\t<\/h3>\n\t<p>TURNKEY ANTI-MALWARE PROTECTION SERVICE FOR CLIENTS, SERVERS<\/p>\n\tProtection and Support Service based on the Trend Micro Worry Free Business Security Services solution.<br \/>\nReal turnkey anti-malware protection service for Client, Server, Mobile and E-mail &#8211; depending on the platform &#8211; for companies, institutions and organisations in the area.<br \/>\n100% SaaS solutions, with no need to install or manage on premise resources, zero maintenance and easy to deploy.\n\t<p><strong>Business model<\/strong><\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/icon-MSP-ready-blu.png\" alt=\"icon-MSP-ready-blu\" itemprop=\"image\" height=\"90\" width=\"90\" title=\"icon-MSP-ready-blu\" onerror=\"this.style.display='none'\"  \/>\n\t<h5>ADVANTAGES:<\/h5>\n\t<p> Turnkey service<\/p>\n\t<p> Protection for Client, Server, Mobile and Email<\/p>\n\t<p> Easy to distribute<\/p>\n\t<h4>Do you want to offer it to your customers?<\/h4>\n\t\t\t<a href=\"#form\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tCONTACT OUR TEAM\n\t\t\t\t\t<\/a>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/10\/logo_trendmicro.gif\" alt=\"logo_trendmicro\" itemprop=\"image\" height=\"55\" width=\"140\" title=\"logo_trendmicro\" onerror=\"this.style.display='none'\"  \/>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/TrendAntimalware.png\" alt=\"TrendAntimalware\" itemprop=\"image\" height=\"360\" width=\"360\" title=\"TrendAntimalware\" onerror=\"this.style.display='none'\"  \/>\n<h3>\n\t\tTREND MICRO WORRY FREE SERVICES\n\t<\/h3>\n\t<p>MACHINE LEARNING-BASED PROTECTION SERVICE<\/p>\n\t<p>Trend Micro\u2122 Worry-Free Services uses a combination of advanced threat protection techniques to eliminate security gaps in any user activity and any endpoint. It automatically learns, adapts and shares information about threats in the environment on an ongoing basis:<\/p>\n<ul>\n<li>Automatic detection and response against a growing variety of threats, including fileless and ransomware<\/li>\n<li>In-depth investigation capabilities and centralised visibility across the network using an advanced EDR toolset (optional Endpoint Sensor add-on)\n<\/li>\n<li>An all-in-one lightweight agent<\/li>\n<\/ul>\n\t<p><strong>Business model<\/strong><\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/icon-MSP-ready-blu.png\" alt=\"icon-MSP-ready-blu\" itemprop=\"image\" height=\"90\" width=\"90\" title=\"icon-MSP-ready-blu\" onerror=\"this.style.display='none'\"  \/>\n\t<h5>ADVANTAGES:<\/h5>\n\t<p>\u00a0Highly reliable machine learning, which analyses files before and during execution for more accurate detection<\/p>\n\t<p> More accurate detection of advanced malware, including fileless, cryptomining, ransomware and more<\/p>\n\t<p>\u00a0 Interference cancellation techniques, including censuses and lists of authorised users, applied at every level in order to reduce false positives<\/p>\n\t<p> Behavioural analysis with of scripts, injection, ransomware, memory and browser attacks<\/p>\n\t<h4>Do you want to offer it to your customers?<\/h4>\n\t\t\t<a href=\"#form\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tCONTACT OUR TEAM\n\t\t\t\t\t<\/a>\n\t<a name=\"infrastruttura\"><\/a>\n<h3>\n\t\tINFRASTRUCTURE PROTECTION\n\t<\/h3>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/10\/logo_sophos.gif\" alt=\"logo_sophos\" itemprop=\"image\" height=\"55\" width=\"140\" title=\"logo_sophos\" onerror=\"this.style.display='none'\"  \/>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/img-SophosCentral.jpeg\" alt=\"img-SophosCentral\" itemprop=\"image\" height=\"360\" width=\"360\" title=\"img-SophosCentral\" onerror=\"this.style.display='none'\"  \/>\n<h3>\n\t\tSOPHOS CENTRAL &#8211; SYNCHRONIZED SECURITY\n\t<\/h3>\n\t<p>BETTER SECURITY FOR MICROSOFT 365<\/p>\n\tSophos Central is a cloud-managed platform that combines all security needs in one extremely easy-to-use package.<br \/>\nIt provides advanced protection for the entire corporate network: endpoints, mobile devices, web, email, Wi-Fi, encryption, servers and network.<br \/>\nBeing a cloud-based solution, there is no need for upgrades, new servers or maintenance, plus there are significant time savings in terms of IT staff hours and maximum focus on corporate security.\n\t<p><strong>Business model<\/strong><\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/icon-MSP-blu.png\" alt=\"icon-MSP-blu\" itemprop=\"image\" height=\"90\" width=\"90\" title=\"icon-MSP-blu\" onerror=\"this.style.display='none'\"  \/>\n\t<h5>ADVANTAGES:<\/h5>\n\t<p>\u00a0Simple, cloud-based management<\/p>\n\t<p>\u00a0Synchronised security<\/p>\n\t<p> Continuity and security for mail<\/p>\n\t<h4>Do you want to offer it to your customers?<\/h4>\n\t\t\t<a href=\"#form\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tCONTACT OUR TEAM\n\t\t\t\t\t<\/a>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/logo_checkpoint.gif\" alt=\"logo_checkpoint\" itemprop=\"image\" height=\"55\" width=\"140\" title=\"logo_checkpoint\" onerror=\"this.style.display='none'\"  \/>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/CheckPoint.png\" alt=\"CheckPoint\" itemprop=\"image\" height=\"360\" width=\"360\" title=\"CheckPoint\" onerror=\"this.style.display='none'\"  \/>\n<h3>\n\t\tCHECK POINT HARMONY EMAIL &#038; COLLABORATION SUITE SECURITY\n\t<\/h3>\n\t<p>UNIFIED SECURITY FOR USERS, DEVICES AND ACCESS<\/p>\n\t<p>Comprehensive protection for Microsoft 365, Google Workspace and all collaboration and file sharing apps:<\/p>\n<ul>\n<li>Block advanced phishing, malware and ransomware attacks before the inbox<\/li>\n<li>Protects sensitive business data (DLP) from leaving the organisation<\/li>\n<li>Prevents account takeover and protects your users<\/li>\n<li>Protects all corporate communication lines, including Slack and Teams<\/li>\n<\/ul>\n\t<p><strong>Business model<\/strong><\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/icon-MSP-blu.png\" alt=\"icon-MSP-blu\" itemprop=\"image\" height=\"90\" width=\"90\" title=\"icon-MSP-blu\" onerror=\"this.style.display='none'\"  \/>\n\t<h5>ADVANTAGES:<\/h5>\n\t<p>\u00a0 Blocking sophisticated phishing attacks<\/p>\n\t<p>\u00a0Preventing account theft<\/p>\n\t<p>\u00a0Blocking malware without affecting productivity<\/p>\n\t<p> Protection for Office365 and GSuite<\/p>\n\t<h4>Do you want to offer it to your customers?<\/h4>\n\t\t\t<a href=\"#form\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tCONTACT OUR TEAM\n\t\t\t\t\t<\/a>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/08\/logo-eset-grande.png\" alt=\"logo-eset-grande\" itemprop=\"image\" height=\"54\" width=\"137\" title=\"logo-eset-grande\" onerror=\"this.style.display='none'\"  \/>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/img-ESET-ProtectAdvance.jpeg\" alt=\"img-ESET-ProtectAdvance\" itemprop=\"image\" height=\"360\" width=\"360\" title=\"img-ESET-ProtectAdvance\" onerror=\"this.style.display='none'\"  \/>\n<h3>\n\t\tESET PROTECT ADVANCED\n\t<\/h3>\n\t<p>PROTECTION FROM RANSOMWARE AND ZERO-DAY THREATS<\/p>\n\tESET Protect Advanced provides enhanced ransomware protection and a zero-day attack solution with sandboxing in the cloud.<br \/>\nIt is based on advanced technology involving machine learning and in-depth behavioural inspection.\n\t<p><strong>Business model<\/strong><\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/icon-MSP-blu.png\" alt=\"icon-MSP-blu\" itemprop=\"image\" height=\"90\" width=\"90\" title=\"icon-MSP-blu\" onerror=\"this.style.display='none'\"  \/>\n\t<h5>ADVANTAGES:<\/h5>\n\t<p>\u00a0Endpoint Security<\/p>\n\t<p>\u00a0File Server Security<\/p>\n\t<p>\u00a0Cloud-based sandbox analysis<\/p>\n\t<p>\u00a0 Full disc encryption<\/p>\n\t<h4>Do you want to offer it to your customers?<\/h4>\n\t\t\t<a href=\"#form\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tCONTACT OUR TEAM\n\t\t\t\t\t<\/a>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/10\/logo_trendmicro.gif\" alt=\"logo_trendmicro\" itemprop=\"image\" height=\"55\" width=\"140\" title=\"logo_trendmicro\" onerror=\"this.style.display='none'\"  \/>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/TrendMicroDeepSecurity.png\" alt=\"TrendMicroDeepSecurity\" itemprop=\"image\" height=\"360\" width=\"360\" title=\"TrendMicroDeepSecurity\" onerror=\"this.style.display='none'\"  \/>\n<h3>\n\t\tTREND MICRO DEEP SECURITY\n\t<\/h3>\n\t<p>UNIFIED SECURITY SOLUTION FOR THE HYBRID CLOUD<\/p>\n\tTrend Micro Deep Security software delivers comprehensive security in a single solution, built specifically for virtual, cloud and container environments.<br \/>\nDeep Security enables consistent security regardless of workload.<br \/>\nIt also provides a rich set of application programming interfaces (APIs) so that security can be automated and does not affect the productivity of work teams.\n\t<p><strong>Business model<\/strong><\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/icon-MSP-blu.png\" alt=\"icon-MSP-blu\" itemprop=\"image\" height=\"90\" width=\"90\" title=\"icon-MSP-blu\" onerror=\"this.style.display='none'\"  \/>\n\t<h5>ADVANTAGES:<\/h5>\n\t<p>\u00a0EDR functionality of server endpoints<\/p>\n\t<p>\u00a0 SIEM for advanced threat research<\/p>\n\t<p>\u00a0Comprehensive monitoring<\/p>\n\t<h4>Do you want to offer it to your customers?<\/h4>\n\t\t\t<a href=\"#form\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tCONTACT OUR TEAM\n\t\t\t\t\t<\/a>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/09\/Kaspersky-1.png\" alt=\"Kaspersky\" itemprop=\"image\" height=\"45\" width=\"169\" title=\"Kaspersky\" onerror=\"this.style.display='none'\"  \/>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/img-KasperskyHybridSecurityCloud.jpeg\" alt=\"img-KasperskyHybridSecurityCloud\" itemprop=\"image\" height=\"360\" width=\"360\" title=\"img-KasperskyHybridSecurityCloud\" onerror=\"this.style.display='none'\"  \/>\n<h3>\n\t\tKASPERSKY HYBRID CLOUD SECURITY\n\t<\/h3>\n\t<p>MULTI-LAYERED PROTECTION FOR MULTI-CLOUD ENVIRONMENTS<\/p>\n\tIt offers unified security for every stage or scenario of the transition to the Cloud.<br \/>\nSuitable for both Cloud migration and native Cloud scenarios, it protects physical and virtualised workloads running on-premises, in a data centre or in a public Cloud.<br \/>\nIt enables a secure transition to the Cloud, without compromising protection levels.<br \/>\nThe solution has features that guarantee the highest level of cybersecurity, protecting all workloads: physical, virtual or cloud-based.\n\t<p><strong>Business model<\/strong><\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/icon-MSP-blu.png\" alt=\"icon-MSP-blu\" itemprop=\"image\" height=\"90\" width=\"90\" title=\"icon-MSP-blu\" onerror=\"this.style.display='none'\"  \/>\n\t<h5>ADVANTAGES:<\/h5>\n\t<p>\u00a0Multi-level threat protection<\/p>\n\t<p>\u00a0Greater resilience<\/p>\n\t<p>\u00a0Unified management<\/p>\n\t<h4>Do you want to offer it to your customers?<\/h4>\n\t\t\t<a href=\"#form\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tCONTACT OUR TEAM\n\t\t\t\t\t<\/a>\n\t<a name=\"endpoint\"><\/a>\n<h3>\n\t\tEND POINT PROTECTION\n\t<\/h3>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/10\/logo_trendmicro.gif\" alt=\"logo_trendmicro\" itemprop=\"image\" height=\"55\" width=\"140\" title=\"logo_trendmicro\" onerror=\"this.style.display='none'\"  \/>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/09\/logo-microsoft.png\" alt=\"logo-microsoft\" itemprop=\"image\" height=\"43\" width=\"193\" title=\"logo-microsoft\" onerror=\"this.style.display='none'\"  \/>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/img-TrendMicrosoftMachineLearning.jpeg\" alt=\"img-TrendMicrosoftMachineLearning\" itemprop=\"image\" height=\"360\" width=\"360\" title=\"img-TrendMicrosoftMachineLearning\" onerror=\"this.style.display='none'\"  \/>\n<h3>\n\t\tTREND MICRO AND MICROSOFT 365\n\t<\/h3>\n\t<p>ADVANCED PROTECTION AGAINST EVOLVING THREATS<\/p>\n\tUsing advanced machine learning technology, the Trend Micro solution integrated with the Microsoft 365 cloud platform is able to block ransomware and thus offer a secure digital experience.<br \/>\nThe Trend Micro solution thus enriches the Microsoft Cloud Platform.\n\t<p><strong>Business model<\/strong><\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/icon-MSP-blu.png\" alt=\"icon-MSP-blu\" itemprop=\"image\" height=\"90\" width=\"90\" title=\"icon-MSP-blu\" onerror=\"this.style.display='none'\"  \/>\n\t<h5>ADVANTAGES:<\/h5>\n\t<p>\u00a0 Ransomware protection<\/p>\n\t<p>\u00a0 Protection against identity theft<\/p>\n\t<p>\u00a0Free diagnostics and malware removal<\/p>\n\t<p>\u00a0 +250 Mil blocked threats per day<\/p>\n\t<p>\u00a0 Advanced Machine Learning<\/p>\n\t<h4>Do you want to offer it to your customers?<\/h4>\n\t\t\t<a href=\"#form\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tCONTACT OUR TEAM\n\t\t\t\t\t<\/a>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/loco-barracuda.png\" alt=\"loco-barracuda\" itemprop=\"image\" height=\"55\" width=\"140\" title=\"loco-barracuda\" onerror=\"this.style.display='none'\"  \/>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/09\/logo-microsoft-1.png\" alt=\"logo-microsoft\" itemprop=\"image\" height=\"43\" width=\"193\" title=\"logo-microsoft\" onerror=\"this.style.display='none'\"  \/>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/BarracudaEssentialsMicrosoft365.png\" alt=\"BarracudaEssentialsMicrosoft365\" itemprop=\"image\" height=\"360\" width=\"360\" title=\"BarracudaEssentialsMicrosoft365\" onerror=\"this.style.display='none'\"  \/>\n<h3>\n\t\tBARRACUDA ESSENTIALS AND MICROSOFT 365\n\t<\/h3>\n\t<p>MORE SECURITY WITH BARRACUDA ESSENTIALS<\/p>\n\tBarracuda Essentials is Barracuda&#8217;s suite of cloud services designed to help organisations extend security and data protection capabilities in Microsoft 365 environments.<br \/>\nThe aim is to help end customers simplify and secure migration to Cloud environments, especially in the case of Microsoft 365 and Azure.<br \/>\nBarracuda Essentials provides the security, archiving, backup and recovery tools that organisations need for a successful Microsoft 365 deployment. Using Barracuda Essentials, IT administrators can gain greater visibility and control over the information in their organisation, thanks to a suite of cloud services that combines multi-layered security, storage and backup functions.\n\t<p><strong>Business model<\/strong><\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/icon-MSP-blu.png\" alt=\"icon-MSP-blu\" itemprop=\"image\" height=\"90\" width=\"90\" title=\"icon-MSP-blu\" onerror=\"this.style.display='none'\"  \/>\n\t<h5>ADVANTAGES:<\/h5>\n\t<p>\u00a0 Cloud Email Security<\/p>\n\t<p>\u00a0Cloud storage<\/p>\n\t<p> Cloud backup and recovery <\/p>\n\t<h4>Do you want to offer it to your customers?<\/h4>\n\t\t\t<a href=\"#form\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tCONTACT OUR TEAM\n\t\t\t\t\t<\/a>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/09\/Kaspersky-1.png\" alt=\"Kaspersky\" itemprop=\"image\" height=\"45\" width=\"169\" title=\"Kaspersky\" onerror=\"this.style.display='none'\"  \/>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/img-KasperskySecurityCloud.jpeg\" alt=\"img-KasperskySecurityCloud\" itemprop=\"image\" height=\"360\" width=\"360\" title=\"img-KasperskySecurityCloud\" onerror=\"this.style.display='none'\"  \/>\n<h3>\n\t\tKASPERSKY ENDPOINT SECURITY CLOUD\n\t<\/h3>\n\t<p>MAXIMUM FLEXIBILITY AND SECURITY<\/p>\n\t<p>Kaspersky Endpoint Security Cloud includes the classic set of computer security technologies, such as file, network and email traffic protection, firewall, network attack blocking, behaviour detection and exploit prevention. This solution provides companies with the flexibility to support the new employee mobility trend, offering protection for one PC or file server and for multiple mobile devices. Employees can thus continue to work in peace on different devices that can be Windows PCs, Macs, smartphones or tablets (with Android and iOS operating systems) and, at the same time, companies can be protected against cyber threats. Kaspersky Endpoint Security Cloud is a &#8216;user-friendly&#8217; solution: the simple and intuitive management console is available via a browser on laptops and mobile tablets. Protection begins immediately after the installation process. Pre-configured security profiles are automatically applied to any new devices added, saving IT administrators resources. If further fine-tuning is needed, administrators can create additional profiles manually or modify existing ones.<\/p>\n\t<p><strong>Business model<\/strong><\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/icon-MSP-blu.png\" alt=\"icon-MSP-blu\" itemprop=\"image\" height=\"90\" width=\"90\" title=\"icon-MSP-blu\" onerror=\"this.style.display='none'\"  \/>\n\t<h5>ADVANTAGES:<\/h5>\n\t<p>\u00a0Against file, web and mail threats<\/p>\n\t<p>\u00a0Protecting mobile devices<\/p>\n\t<p>\u00a0Maximum flexibility and scalability<\/p>\n\t<h4>Do you want to offer it to your customers?<\/h4>\n\t\t\t<a href=\"#form\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tCONTACT OUR TEAM\n\t\t\t\t\t<\/a>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/logo-kaspersky.png\" alt=\"logo-kaspersky\" itemprop=\"image\" height=\"45\" width=\"169\" title=\"logo-kaspersky\" onerror=\"this.style.display='none'\"  \/>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/09\/logo-microsoft-1.png\" alt=\"logo-microsoft\" itemprop=\"image\" height=\"43\" width=\"193\" title=\"logo-microsoft\" onerror=\"this.style.display='none'\"  \/>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/KasperskyEndpointSecurityCloud.png\" alt=\"KasperskyEndpointSecurityCloud\" itemprop=\"image\" height=\"360\" width=\"360\" title=\"KasperskyEndpointSecurityCloud\" onerror=\"this.style.display='none'\"  \/>\n<h3>\n\t\tKASPERSKY ENDPOINT SECURITY CLOUD PLUS\n\t<\/h3>\n\t<p>ADDS SECURITY FOR MICROSOFT OFFICE 365<\/p>\n\t<p>Kaspersky Endpoint Security Cloud Plus is a cloud-hosted solution for business protection that requires no additional software or hardware acquisition. It provides high protection for Windows desktops and servers, Mac OS workstations, Android and iOS smartphones and tablets thanks to predefined security policies developed by Kaspersky experts. It is available in monthly subscription mode to optimise costs. It is equipped with the Shadow IT discovery functionality that can detect unsafe sharing of corporate data in the cloud and check whether users spend a lot of time on social media and messaging tools. In addition, this version includes Kaspersky Security for Microsoft Office 365 to protect communications and collaboration on Office 365. It also allows users to block access to unnecessary or unauthorised cloud resources, keeping data safe and employees focused and productive.<\/p>\n\t<p><strong>Business model<\/strong><\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/icon-MSP-blu.png\" alt=\"icon-MSP-blu\" itemprop=\"image\" height=\"90\" width=\"90\" title=\"icon-MSP-blu\" onerror=\"this.style.display='none'\"  \/>\n\t<h5>ADVANTAGES:<\/h5>\n\t<p>\u00a0Against file, web and mail threats<\/p>\n\t<p>\u00a0 Protecting mobile devices<\/p>\n\t<p>\u00a0Maximum flexibility and scalability<\/p>\n\t<h4>Do you want to offer it to your customers?<\/h4>\n\t\t\t<a href=\"#form\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tCONTACT OUR TEAM\n\t\t\t\t\t<\/a>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/08\/logo-eset-grande.png\" alt=\"logo-eset-grande\" itemprop=\"image\" height=\"54\" width=\"137\" title=\"logo-eset-grande\" onerror=\"this.style.display='none'\"  \/>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/09\/logo-microsoft.png\" alt=\"logo-microsoft\" itemprop=\"image\" height=\"43\" width=\"193\" title=\"logo-microsoft\" onerror=\"this.style.display='none'\"  \/>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/img-ESET-CloudOfficeSecurity.jpeg\" alt=\"img-ESET-CloudOfficeSecurity\" itemprop=\"image\" height=\"360\" width=\"360\" title=\"img-ESET-CloudOfficeSecurity\" onerror=\"this.style.display='none'\"  \/>\n<h3>\n\t\tESET CLOUD OFFICE SECURITY\n\t<\/h3>\n\t<p>ADVANCED PROTECTION FOR MICROSOFT 365 APPLICATIONS<\/p>\n\t<p>ESET Cloud Office Security enables high levels of security for Cloud-based e-mail and storage services (Microsoft 365 Exchange Online and OneDrive) with a high level of protection based on proven anti-spam, anti-malware and anti-phishing technologies.<\/p>\n\t<p><strong>Business model<\/strong><\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/icon-MSP-blu.png\" alt=\"icon-MSP-blu\" itemprop=\"image\" height=\"90\" width=\"90\" title=\"icon-MSP-blu\" onerror=\"this.style.display='none'\"  \/>\n\t<h5>ADVANTAGES:<\/h5>\n\t<p>\u00a0Anti-spam<\/p>\n\t<p>\u00a0Anti-phishing<\/p>\n\t<p>\u00a0Anti-malware<\/p>\n\t<p>\u00a0Quarantine manager<\/p>\n\t<p>\u00a0Automatic protection<\/p>\n\t<p>\u00a0Timely notifications<\/p>\n\t<h4>Do you want to offer it to your customers?<\/h4>\n\t\t\t<a href=\"#form\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tCONTACT OUR TEAM\n\t\t\t\t\t<\/a>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/10\/logo_trendmicro.gif\" alt=\"logo_trendmicro\" itemprop=\"image\" height=\"55\" width=\"140\" title=\"logo_trendmicro\" onerror=\"this.style.display='none'\"  \/>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/TrendMicroWorryAdvance.png\" alt=\"TrendMicroWorryAdvance\" itemprop=\"image\" height=\"360\" width=\"360\" title=\"TrendMicroWorryAdvance\" onerror=\"this.style.display='none'\"  \/>\n<h3>\n\t\tTREND MICRO WORRY FREE SERVICES ADVANCED\n\t<\/h3>\n\t<p>MACHINE LEARNING-BASED PROTECTION SERVICE<\/p>\n\t<p>It is a service that blocks e-mail threats before they reach the network by detecting ransomware, BEC, credential phishing and advanced attacks.<\/p>\n\t<p><strong>Business model<\/strong><\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/icon-MSP-ready-blu.png\" alt=\"icon-MSP-ready-blu\" itemprop=\"image\" height=\"90\" width=\"90\" title=\"icon-MSP-ready-blu\" onerror=\"this.style.display='none'\"  \/>\n\t<h5>ADVANTAGES:<\/h5>\n\t<p>\u00a0Integration with vendor API<\/p>\n\t<p>Identifying zero-day and hidden threats<\/p>\n\t<p>\u00a0 E-mail archiving<\/p>\n\t<p>\u00a0AI or Machine Learning<\/p>\n\t<h4>Do you want to offer it to your customers?<\/h4>\n\t\t\t<a href=\"#form\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tCONTACT OUR TEAM\n\t\t\t\t\t<\/a>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/10\/logo_trendmicro.gif\" alt=\"logo_trendmicro\" itemprop=\"image\" height=\"55\" width=\"140\" title=\"logo_trendmicro\" onerror=\"this.style.display='none'\"  \/>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/img-TrendMicroWorry-FreeXDR.jpeg\" alt=\"img-TrendMicroWorry-FreeXDR\" itemprop=\"image\" height=\"360\" width=\"360\" title=\"img-TrendMicroWorry-FreeXDR\" onerror=\"this.style.display='none'\"  \/>\n<h3>\n\t\tTREND MICRO WORRY-FREE XDR\n\t<\/h3>\n\t<p>DETECTION AND RESPONSE FOR EMAIL, ENDPOINTS AND SERVERS<\/p>\n\tTrend Micro Worry-Free XDR combines Worry Free Services Advanced and Trend Micro Endpoint Sensor.<br \/>\nIt ensures automatic correlation of information from sensors collecting detection and activity data between endpoints and e-mails and advanced threat detection.\n\t<p><strong>Business model<\/strong><\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/icon-MSP-blu.png\" alt=\"icon-MSP-blu\" itemprop=\"image\" height=\"90\" width=\"90\" title=\"icon-MSP-blu\" onerror=\"this.style.display='none'\"  \/>\n\t<h5>ADVANTAGES:<\/h5>\n\t<p>\u00a0Advanced levels of endpoint and messaging protection<\/p>\n\t<p>\u00a0 Endpoint, email and server investigation capabilities<\/p>\n\t<p>\u00a0Single display, single console<\/p>\n\t<h4>Do you want to offer it to your customers?<\/h4>\n\t\t\t<a href=\"#form\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tCONTACT OUR TEAM\n\t\t\t\t\t<\/a>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/10\/logo_trendmicro.gif\" alt=\"logo_trendmicro\" itemprop=\"image\" height=\"55\" width=\"140\" title=\"logo_trendmicro\" onerror=\"this.style.display='none'\"  \/>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/TrendMicroManaged.png\" alt=\"TrendMicroManaged\" itemprop=\"image\" height=\"360\" width=\"360\" title=\"TrendMicroManaged\" onerror=\"this.style.display='none'\"  \/>\n<h3>\n\t\tTREND MICRO WORRY-FREE WITH CO-MANAGED XDR\n\t<\/h3>\n\t<p>SET-AND-FORGET SOLUTION<\/p>\n\tIncludes Worry-Free XDR and 24\u00d77 co-managed detection and response service for managed service providers.<br \/>\nIt helps providers contain threats to their customers, while relieving the burden on overburdened managed service providers.\n\t<p><strong>Business model<\/strong><\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/icon-MSP-blu.png\" alt=\"icon-MSP-blu\" itemprop=\"image\" height=\"90\" width=\"90\" title=\"icon-MSP-blu\" onerror=\"this.style.display='none'\"  \/>\n\t<h5>ADVANTAGES:<\/h5>\n\t<p>\u00a0 Automatic Endpoint &#038; Email Correlation<\/p>\n\t<p>\u00a0 Protects the entire customer base at once<\/p>\n\t<h4>Do you want to offer it to your customers?<\/h4>\n\t\t\t<a href=\"#form\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tCONTACT OUR TEAM\n\t\t\t\t\t<\/a>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/logo-kaspersky.png\" alt=\"logo-kaspersky\" itemprop=\"image\" height=\"45\" width=\"169\" title=\"logo-kaspersky\" onerror=\"this.style.display='none'\"  \/>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/img-KasperskyEDR.jpeg\" alt=\"img-KasperskyEDR\" itemprop=\"image\" height=\"360\" width=\"360\" title=\"img-KasperskyEDR\" onerror=\"this.style.display='none'\"  \/>\n<h3>\n\t\tKASPERSKY EDR OPTIMUM E ENDPOINT DETECTION AND RESPONSE\n\t<\/h3>\n\t<p>FOR ADVANCED DETECTION OF ELUSIVE THREATS<\/p>\n\t<p>It provides complete visibility over all endpoints in the corporate network, enabling automation of routine tasks to detect, prioritise, investigate and neutralise complex threats and APT-like attacks.<\/p>\n\t<p><strong>Business model<\/strong><\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/icon-MSP-blu.png\" alt=\"icon-MSP-blu\" itemprop=\"image\" height=\"90\" width=\"90\" title=\"icon-MSP-blu\" onerror=\"this.style.display='none'\"  \/>\n\t<h5>ADVANTAGES:<\/h5>\n\t<p>\u00a0Protection against advanced threats<\/p>\n\t<p>\u00a0 Saving with a simple and automatic tool<\/p>\n\t<p> Analysis of the true extent of threats on the entire network<\/p>\n\t<p>\u00a0Root cause identification<\/p>\n\t<p>\u00a0Avoidance of further damage thanks to automatic response<\/p>\n\t<h4>Do you want to offer it to your customers?<\/h4>\n\t\t\t<a href=\"#form\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tCONTACT OUR TEAM\n\t\t\t\t\t<\/a>\n\t<a name=\"autenticazione\"><\/a>\n<h3>\n\t\tMANAGEMENT OF AUTHENTICATION SYSTEMS\n\t<\/h3>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/09\/logo-microsoft.png\" alt=\"logo-microsoft\" itemprop=\"image\" height=\"43\" width=\"193\" title=\"logo-microsoft\" onerror=\"this.style.display='none'\"  \/>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/img-AzureActiveDirectory.jpeg\" alt=\"img-AzureActiveDirectory\" itemprop=\"image\" height=\"360\" width=\"360\" title=\"img-AzureActiveDirectory\" onerror=\"this.style.display='none'\"  \/>\n<h3>\n\t\tAZURE ACTIVE DIRECTORY\n\t<\/h3>\n\t<p>SYNCHRONISATION OF LOCAL DIRECTORIES AND SINGLE SIGN-ON ENABLEMENT<\/p>\n\t<p>The Azure Active Directory (Azure AD) identity management service for businesses offers Single Sign-On access and multi-factor authentication to protect users from 99.9 per cent of cyber attacks. Regardless of whether people are on-premises or working remotely, with Azure Active Directory you can offer seamless access to all apps to enable you to stay productive anywhere. In addition, it automates user lifecycle workflows and provisioning and saves time and resources through self-service management.<\/p>\n\t<p><strong>Business model<\/strong><\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/statics.v-valley.com\/prod\/2022\/11\/icon-CSP-blu.png\" alt=\"icon-CSP-blu\" itemprop=\"image\" height=\"90\" width=\"90\" title=\"icon-CSP-blu\" onerror=\"this.style.display='none'\"  \/>\n\t<h5>ADVANTAGES:<\/h5>\n\t<p>\u00a0Single Sign-On Functionality<\/p>\n\t<p>\u00a0Conditional Access and Multi-Factor Authentication<\/p>\n\t<p>\u00a0More secure interaction between internal and external users<\/p>\n\t<p>\u00a0Easy integration of identity<\/p>\n\t<h4>Do you want to offer it to your customers?<\/h4>\n\t\t\t<a href=\"#form\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tCONTACT OUR TEAM\n\t\t\t\t\t<\/a>\n\t<a name=\"form\"><\/a>\n<h2>\n\t\tFILL IN THE FORM\n\t<\/h2>\n\t<p>You will be contacted by our team to find out how to accelerate your business<\/p>\n\t<form method=\"post\" enctype=\"multipart\/form-data\" id=\"vfbp-form-8\" class=\"vfbp-form\"><div style=\"display:none;\"><label for=\"vfbp-EMAIL-AN8fuQyoDLXem\">If you are human, leave this field blank.<\/label><input size=\"25\" autocomplete=\"off\" type=\"text\" name=\"vfbp-EMAIL-AN8fuQyoDLXem\" value=\"\" id=\"\"><\/div><input type=\"hidden\" name=\"_vfb-timestamp-8\" value=\"1775470365\" id=\"\"><input type=\"hidden\" name=\"_vfb-form-id\" value=\"8\" id=\"\"><div class=\"vfb-col-12 vfb-fieldType-instructions\" id=\"vfbField79\"><div class=\"vfb-form-group\"><label for=\"vfb-field-79\" class=\"vfb-control-label\"><b>Required information:<\/b><\/label><div class=\"\"><\/div><\/div><\/div><div class=\"vfb-clearfix\"><\/div><div class=\"vfb-col-6 vfb-fieldType-text\" id=\"vfbField80\"><div class=\"vfb-form-group\"><label for=\"vfb-field-80\" class=\"vfb-control-label\">Name and surname <span class=\"vfb-required-asterisk\">*<\/span><\/label><div><input id=\"vfb-field-80\" class=\"vfb-form-control\" placeholder=\"\" required=\"required\" type=\"text\" name=\"vfb-field-80\" value=\"\"><\/div><\/div><\/div><div class=\"vfb-col-6 vfb-fieldType-text\" id=\"vfbField81\"><div class=\"vfb-form-group\"><label for=\"vfb-field-81\" class=\"vfb-control-label\">Business name <span class=\"vfb-required-asterisk\">*<\/span><\/label><div><input id=\"vfb-field-81\" class=\"vfb-form-control\" placeholder=\"\" required=\"required\" type=\"text\" name=\"vfb-field-81\" value=\"\"><\/div><\/div><\/div><div class=\"vfb-clearfix\"><\/div><div class=\"vfb-col-6 vfb-fieldType-phone\" id=\"vfbField82\"><div class=\"vfb-form-group\"><label for=\"vfb-field-82\" class=\"vfb-control-label\">Phone <span class=\"vfb-required-asterisk\">*<\/span><\/label><div><input id=\"vfb-field-82\" class=\"vfb-form-control vfb-intl-phone\" placeholder=\"\" required=\"required\" data-default-country=\"it\" data-number-type=\"MOBILE\" data-hide-flags=\"1\" data-national-mode=\"1\" data-auto-hide-dial-code=\"1\" type=\"tel\" name=\"vfb-field-82\" value=\"\"><\/div><\/div><\/div><div class=\"vfb-col-6 vfb-fieldType-email\" id=\"vfbField83\"><div class=\"vfb-form-group\"><label for=\"vfb-field-83\" class=\"vfb-control-label\">e-Mail <span class=\"vfb-required-asterisk\">*<\/span><\/label><div><input id=\"vfb-field-83\" class=\"vfb-form-control\" placeholder=\"\" required=\"required\" type=\"email\" name=\"vfb-field-83\" value=\"\"><\/div><\/div><\/div><div class=\"vfb-clearfix\"><\/div><div class=\"vfb-col-12 vfb-fieldType-instructions\" id=\"vfbField84\"><div class=\"vfb-form-group\"><label for=\"vfb-field-84\" class=\"vfb-control-label\"><b>Optional information:<\/b><\/label><div class=\"\"><\/div><\/div><\/div><div class=\"vfb-clearfix\"><\/div><div class=\"vfb-col-6 vfb-fieldType-text\" id=\"vfbField85\"><div class=\"vfb-form-group\"><label for=\"vfb-field-85\" class=\"vfb-control-label\">VAT number<\/label><div><input id=\"vfb-field-85\" class=\"vfb-form-control\" placeholder=\"\" type=\"text\" name=\"vfb-field-85\" value=\"\"><\/div><\/div><\/div><div class=\"vfb-col-6 vfb-fieldType-text\" id=\"vfbField86\"><div class=\"vfb-form-group\"><label for=\"vfb-field-86\" class=\"vfb-control-label\">Customer number V-Valley<\/label><div><input id=\"vfb-field-86\" class=\"vfb-form-control\" placeholder=\"\" type=\"text\" name=\"vfb-field-86\" value=\"\"><\/div><\/div><\/div><div class=\"vfb-clearfix\"><\/div><div class=\"vfb-col-12 vfb-fieldType-text\" id=\"vfbField87\"><div class=\"vfb-form-group\"><label for=\"vfb-field-87\" class=\"vfb-control-label\">Business role<\/label><div><input id=\"vfb-field-87\" class=\"vfb-form-control\" placeholder=\"\" type=\"text\" name=\"vfb-field-87\" value=\"\"><\/div><\/div><\/div><div class=\"vfb-clearfix\"><\/div><div class=\"vfb-col-12 vfb-fieldType-textarea\" id=\"vfbField88\"><div class=\"vfb-form-group\"><label for=\"vfb-field-88\" class=\"vfb-control-label\">Notes field<\/label><div><textarea id=\"vfb-field-88\" class=\"vfb-form-control\" placeholder=\"Specify in this field the brand for which you want to receive information.\" rows=\"3\" name=\"vfb-field-88\" cols=\"50\"><\/textarea><\/div><\/div><\/div><div class=\"vfb-clearfix\"><\/div><div class=\"vfb-col-12 vfb-fieldType-instructions\" id=\"vfbField89\"><div class=\"vfb-form-group\"><label for=\"vfb-field-89\" class=\"vfb-control-label\">Disclosure<\/label><div class=\"\"><p><div class=\"fl-builder-content fl-builder-content-384698 fl-builder-template fl-builder-module-template fl-builder-global-templates-locked\" data-post-id=\"384698\"><div class=\"fl-module fl-module-rich-text fl-node-sp46f9odxjng\" data-node=\"sp46f9odxjng\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>Dear User, we inform you that by submitting such form we would like to collect your personal data to get in contact with you regarding the interest you showed. You will be reached out by a specialist of the companies V-Valley S.r.l. (Data Controller) through phone and\/or e-mail. Your data won\u2019t be disclosed to third parties either won\u2019t be subject to any release, they will be stored by V-Valley S.r.l. for a maximum period of 12 months, without prejudice to possible ask for their deletion before such deadline.<br \/>\nYou can always reach V-Valley S.r.l. for any further clarification by writing to the e-mail address\u00a0<a href=\"mailto:privacy@v-valley.com\">privacy@v-valley.com<\/a><br \/>\nFor further information regarding the personal data processing carried out by V-Valley S.r.l., please consult the\u00a0<a href=\"https:\/\/policies.esprinet.com\/en\/esprinet\/privacy\" target=\"_blank\" rel=\"noopener\">Privacy Policy.<\/a><\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div><\/p>\n<\/div><\/div><\/div><div class=\"vfb-clearfix\"><\/div><div class=\"vfb-col-12 vfb-fieldType-captcha\" id=\"vfbField90\"><div class=\"vfb-form-group\"><label for=\"vfb-field-90\" class=\"vfb-control-label\">Captcha <span class=\"vfb-required-asterisk\">*<\/span><\/label><div><div class=\"g-recaptcha\" data-sitekey=\"6Lf1ytsiAAAAAEG8JxJHgJzU7R8dykbVhqQAbadd\"><\/div><input type=\"hidden\" name=\"_vfb_recaptcha_enabled\" value=\"1\" id=\"\"><div class=\"vfb-has-error\" id=\"vfb-recaptcha-error\"><span class=\"vfb-help-block\">reCAPTCHA is required.<\/span><\/div><\/div><\/div><\/div><div class=\"vfb-clearfix\"><\/div><div class=\"vfb-col-12 vfb-fieldType-submit\" id=\"vfbField91\"><button id=\"vfb-field-91\" class=\" btn btn-primary\" placeholder=\"\" type=\"submit\" name=\"_vfb-submit\">Send<\/button><\/div><div class=\"vfb-clearfix\"><\/div><\/form>\n\n","protected":false},"excerpt":{"rendered":"<p>The combination of Cyber \u200b\u200bSecurity and Cloud Computing makes it possible to guarantee the security of corporate data through dedicated cloud solutions.<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":81290,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/template-single-solution.php","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-81448","1":"page","2":"type-page","3":"status-publish","5":"entry"},"acf":[],"_links":{"self":[{"href":"https:\/\/www.v-valley.com\/en\/wp-json\/wp\/v2\/pages\/81448","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.v-valley.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.v-valley.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.v-valley.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.v-valley.com\/en\/wp-json\/wp\/v2\/comments?post=81448"}],"version-history":[{"count":0,"href":"https:\/\/www.v-valley.com\/en\/wp-json\/wp\/v2\/pages\/81448\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.v-valley.com\/en\/wp-json\/wp\/v2\/pages\/81290"}],"wp:attachment":[{"href":"https:\/\/www.v-valley.com\/en\/wp-json\/wp\/v2\/media?parent=81448"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}