{"id":11424,"date":"2017-02-17T11:41:28","date_gmt":"2017-02-17T10:41:28","guid":{"rendered":"https:\/\/www.retarus.com\/it\/project\/use-case-detection-of-malware-with-retarus-patient-zero-detection\/"},"modified":"2024-05-27T11:58:35","modified_gmt":"2024-05-27T09:58:35","slug":"use-case-detection-of-malware-with-retarus-patient-zero-detection","status":"publish","type":"post","link":"https:\/\/www.retarus.com\/it\/use-case-detection-of-malware-with-retarus-patient-zero-detection\/","title":{"rendered":"Postdelivery Protection con Retarus Patient Zero Detection"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"Se il malware entra nel sistema, diventa fondamentale limitare i danni che pu\u00f2 causare. Solo identificando i destinatari dei messaggi infetti, i cosiddetti pazienti zero, \u00e8 possibile adottare misure tempestive…","protected":false},"author":36,"featured_media":31825,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"[et_pb_section fb_built=\"1\" inner_shadow=\"on\" fullwidth=\"on\" custom_padding_last_edited=\"on|desktop\" module_class=\"ret-bg-bottom\" _builder_version=\"3.22\" background_color=\"#ffffff\" background_image=\"https:\/\/www.retarus.com\/wp-content\/uploads\/2017\/11\/patient-zero-detection.jpg\" custom_padding_tablet=\"50px|0|50px|0\" custom_padding_phone=\"\"][et_pb_fullwidth_header background_overlay_color=\"rgba(0,0,0,0.24)\" _builder_version=\"3.17.6\" background_color=\"rgba(255, 255, 255, 0)\" max_width_tablet=\"50px\" button_one_text_size__hover_enabled=\"off\" button_one_text_size__hover=\"null\" button_two_text_size__hover_enabled=\"off\" button_two_text_size__hover=\"null\" button_one_text_color__hover_enabled=\"off\" button_one_text_color__hover=\"null\" button_two_text_color__hover_enabled=\"off\" button_two_text_color__hover=\"null\" button_one_border_width__hover_enabled=\"off\" button_one_border_width__hover=\"null\" button_two_border_width__hover_enabled=\"off\" button_two_border_width__hover=\"null\" button_one_border_color__hover_enabled=\"off\" button_one_border_color__hover=\"null\" button_two_border_color__hover_enabled=\"off\" button_two_border_color__hover=\"null\" button_one_border_radius__hover_enabled=\"off\" button_one_border_radius__hover=\"null\" button_two_border_radius__hover_enabled=\"off\" button_two_border_radius__hover=\"null\" button_one_letter_spacing__hover_enabled=\"off\" button_one_letter_spacing__hover=\"null\" button_two_letter_spacing__hover_enabled=\"off\" button_two_letter_spacing__hover=\"null\" button_one_bg_color__hover_enabled=\"off\" button_one_bg_color__hover=\"null\" button_two_bg_color__hover_enabled=\"off\" button_two_bg_color__hover=\"null\"]
Secondo Kaspersky, il danno economico medio dovuto a un attacco informatico contro una grande azienda \u00e8 di 861.000 dollari.<\/p>\r\n[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\" module_class=\"ret_valign\" _builder_version=\"3.25\" custom_padding=\"30px|30px|30px|0px\" custom_padding__hover=\"|||\"][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" custom_padding_last_edited=\"on|desktop\" module_id=\"scenarios\" module_class=\"cc-seccomp\" _builder_version=\"3.22\" background_color=\"#ffffff\" custom_padding_tablet=\"50px|0|50px|0\" custom_padding_phone=\"\" custom_css_main_element=\"padding: 70px 0 100px 0 !important;\"][et_pb_row _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Weitere Szenarien\" _builder_version=\"3.27.4\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\" text_orientation=\"center\" border_style=\"solid\"]<\/a>\r\nAltri scenari<\/h2>\r\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" padding_mobile=\"off\" column_padding_mobile=\"on\" _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_blurb title=\"Crittografia sicura\" url=\"\/project\/use-case-professional-communication-with-retarus-webexpress\/\" image=\"https:\/\/www.retarus.com\/wp-content\/uploads\/2018\/01\/encryption-of-sensitive-patients-data.jpg\" _builder_version=\"3.29.3\" background_color=\"#ffffff\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\" text_orientation=\"center\" max_width_tablet=\"50px\" animation=\"off\" custom_css_main_element=\"box-shadow: 0px 17px 50px -26px rgba(68,68,68,1);||padding: 13px;\" border_color_all=\"#eff1f5\" use_border_color=\"on\"]I dati sensibili non devono cadere nelle mani sbagliate. Con Retarus Email Encryption<\/strong> le aziende possono proteggere la riservatezza delle comunicazioni e applicare senza problemi le leggi vigenti sulla riservatezza dei dati.\r\n\u00a0\r\nProtezione dei dati sensibili dei pazienti<\/a>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_blurb title=\"Quarantena intelligente delle e-mail\" image=\"https:\/\/www.retarus.com\/wp-content\/uploads\/2017\/11\/quarantaene.jpg\" _builder_version=\"3.29.3\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\" text_orientation=\"center\" max_width_tablet=\"50px\" custom_margin=\"0px|||\" custom_margin_tablet=\"50px|||\" custom_margin_phone=\"\" custom_margin_last_edited=\"on|desktop\" animation=\"off\" custom_css_main_element=\"box-shadow: 0px 17px 50px -26px rgba(68,68,68,1);||padding: 13px;\" border_color_all=\"#eff1f5\" use_border_color=\"on\"]I digest delle e-mail offrono alle aziende una rapida panoramica di tutti i messaggi contenenti virus e spam che sono stati filtrati. Gli utenti possono recuperare immediatamente e direttamente dalla quarantena le e-mail classificate come spam, senza dover accedere al portale. Per garantire la massima protezione, quando questi messaggi vengono scaricati, viene nuovamente fatto un controllo antivirus.\r\n\u00a0\r\nQuarantena e-mail<\/a>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_blurb title=\"Attachment Blocker\" image=\"https:\/\/www.retarus.com\/wp-content\/uploads\/2017\/11\/attachment.jpg\" _builder_version=\"3.29.3\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\" text_orientation=\"center\" max_width_tablet=\"50px\" custom_margin=\"0px|||\" custom_margin_tablet=\"50px|||\" custom_margin_phone=\"\" custom_margin_last_edited=\"on|phone\" animation=\"off\" custom_css_main_element=\"box-shadow: 0px 17px 50px -26px rgba(68,68,68,1);||padding: 13px;\" border_color_all=\"#eff1f5\" use_border_color=\"on\"]Con Retarus Attachment Blocker<\/strong> le aziende possono dotare le loro infrastrutture di una sicurezza ancora maggiore contro gli attacchi malware. Questa funzione impedisce agli utenti di ricevere tutti i formati di allegati che l\u2019amministratore classifica come non affidabili.\r\n\u00a0\r\nRetarus Attachment Blocker<\/a>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" custom_padding_last_edited=\"on|desktop\" module_id=\"callback\" module_class=\"ret_marginBottom_-50 cc-seccomp ret_on-colored-bg\" _builder_version=\"3.22\" background_color=\"#e6eaed\" custom_padding_tablet=\"50px|0|50px|0\" custom_padding_phone=\"\" custom_css_main_element=\"padding: 70px 0 100px 0 !important;\"][et_pb_row _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"We are here for you\" _builder_version=\"3.27.4\" header_text_align=\"center\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\" text_orientation=\"center\" max_width=\"70%\" module_alignment=\"center\" custom_padding=\"||40px|\" custom_padding_tablet=\"\" custom_padding_phone=\"\" custom_padding_last_edited=\"on|desktop\"][content type=\"contblock\" name=\"we-are-here\"]\r\n[\/et_pb_text][et_pb_text admin_label=\"Contact form\" _builder_version=\"3.27.4\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\" text_orientation=\"center\" max_width=\"70%\" module_alignment=\"center\" z_index_tablet=\"500\" text_text_shadow_horizontal_length_tablet=\"0px\" text_text_shadow_vertical_length_tablet=\"0px\" text_text_shadow_blur_strength_tablet=\"1px\" link_text_shadow_horizontal_length_tablet=\"0px\" link_text_shadow_vertical_length_tablet=\"0px\" link_text_shadow_blur_strength_tablet=\"1px\" ul_text_shadow_horizontal_length_tablet=\"0px\" ul_text_shadow_vertical_length_tablet=\"0px\" ul_text_shadow_blur_strength_tablet=\"1px\" ol_text_shadow_horizontal_length_tablet=\"0px\" ol_text_shadow_vertical_length_tablet=\"0px\" ol_text_shadow_blur_strength_tablet=\"1px\" quote_text_shadow_horizontal_length_tablet=\"0px\" quote_text_shadow_vertical_length_tablet=\"0px\" quote_text_shadow_blur_strength_tablet=\"1px\" header_text_shadow_horizontal_length_tablet=\"0px\" header_text_shadow_vertical_length_tablet=\"0px\" header_text_shadow_blur_strength_tablet=\"1px\" header_2_text_shadow_horizontal_length_tablet=\"0px\" header_2_text_shadow_vertical_length_tablet=\"0px\" header_2_text_shadow_blur_strength_tablet=\"1px\" header_3_text_shadow_horizontal_length_tablet=\"0px\" header_3_text_shadow_vertical_length_tablet=\"0px\" header_3_text_shadow_blur_strength_tablet=\"1px\" header_4_text_shadow_horizontal_length_tablet=\"0px\" header_4_text_shadow_vertical_length_tablet=\"0px\" header_4_text_shadow_blur_strength_tablet=\"1px\" header_5_text_shadow_horizontal_length_tablet=\"0px\" header_5_text_shadow_vertical_length_tablet=\"0px\" header_5_text_shadow_blur_strength_tablet=\"1px\" header_6_text_shadow_horizontal_length_tablet=\"0px\" header_6_text_shadow_vertical_length_tablet=\"0px\" header_6_text_shadow_blur_strength_tablet=\"1px\" box_shadow_horizontal_tablet=\"0px\" box_shadow_vertical_tablet=\"0px\" box_shadow_blur_tablet=\"40px\" box_shadow_spread_tablet=\"0px\" use_border_color=\"off\"][gravityform id=\"24\" title=\"false\" description=\"false\" ajax=\"true\"]\r\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]","_et_gb_content_width":"","footnotes":""},"categories":[3101,2,3081],"tags":[],"dipi_cpt_category":[],"class_list":["post-11424","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-email-security","category-security","category-use-case"],"acf":[],"yoast_head":"\n