{"id":666,"date":"2025-10-24T15:53:49","date_gmt":"2025-10-24T13:53:49","guid":{"rendered":"https:\/\/internavigare.com\/sicurezza\/?page_id=666"},"modified":"2026-01-20T10:32:18","modified_gmt":"2026-01-20T09:32:18","slug":"controllo-accesso-logico","status":"publish","type":"page","link":"https:\/\/internavigare.com\/sicurezza\/controllo-accesso-logico\/","title":{"rendered":"Controllo Accesso Logico"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_section pix_over_visibility=&#8221;&#8221; css=&#8221;.vc_custom_1761301483527{padding-top: 0px !important;}&#8221;][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;35&#8243; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; pix_particles_check=&#8221;&#8221; responsive_css=&#8221;{&#8220;pix_res_sm_pt&#8220;:&#8220;50&#8220;,&#8220;pix_res_sm_pb&#8220;:&#8220;0&#8220;}&#8221; css=&#8221;.vc_custom_1761320695166{padding-top: 100px !important;padding-bottom: 80px !important;background-color: #FFFFFF !important;}&#8221; fade_in_intro=&#8221;694&#8243;][vc_column width=&#8221;1\/2&#8243;]<div id=\"el1759480788988-aa67635c-2230\" class=\"pix-el-text   w-100  \" ><p class=\"\"><p><strong>Soluzioni di controllo accesso logico per proteggere server, reti, applicativi e dati sensibili<\/strong>, garantendo che solo utenti autorizzati accedano ai sistemi informatici con autenticazione sicura e gestione centralizzata delle credenziali.<\/p>\n<\/p><\/div>[\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; pix_particles_check=&#8221;&#8221; css=&#8221;.vc_custom_1761301529763{padding-top: 70px !important;padding-bottom: 70px !important;}&#8221;][vc_column]<div id=\"el1761301168705-9247ab7a-122c\" class=\"pix-el-text   w-100  \" ><p class=\"\"><p><strong>Internavigare distribuisce, progetta e implementa soluzioni di controllo dell\u2019accesso logico<\/strong> che garantiscono un\u2019identificazione certa degli utenti, un\u2019autenticazione sicura e una gestione centralizzata delle credenziali. <strong>L\u2019obiettivo \u00e8 tutelare l\u2019integrit\u00e0 dei sistemi informativi e mantenere il pieno rispetto delle normative<\/strong> in materia di cybersecurity e privacy.<\/p>\n<\/p><\/div>[\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; pix_over_visibility=&#8221;&#8221; css=&#8221;.vc_custom_1761308918638{padding-top: 70px !important;padding-bottom: 70px !important;background-color: #FFFFFF !important;}&#8221;][vc_row pix_particles_check=&#8221;&#8221;][vc_column]<div id=\"pix-feature-1759480925627-b10abc92-8765\" class=\"pix-feature-el media \"><div class=\"pix-feature-icon pix-feature-icon-outer mr-3 mw-100 d-flex text-secondary \"   style=\"font-size:50px;width:50px;aspect-ratio:1\/1 !important;position:relative;line-height:50px;text-align:center;\"><svg class=\"pixfort-icon \" width=\"24\" height=\"24\"  data-name=\"Line\/pixfort-icon-layers-horizontal-6\" viewBox=\"2 2 20 20\"><path fill=\"none\" stroke=\"var(--pf-icon-color)\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"var(--pf-icon-stroke-width)\" d=\"M20.0006267,13.1629274 L13.6245539,15.9967376 C12.5902924,16.4564093 11.4097076,16.4564093 10.3754461,15.9967376 L3.99796233,13.1623003 L3.99796233,13.1623003 M20.0006267,17.1629274 L14.4368308,19.6357256 C12.8854387,20.3252332 11.1145613,20.3252332 9.5631692,19.6357256 L3.99796233,17.1623003 L3.99796233,17.1623003 M13.2871704,4.13016749 L19.1475447,6.91384527 C19.8958443,7.26928757 20.2143181,8.16404716 19.8588758,8.91234675 C19.7107133,9.22426768 19.4594657,9.47551534 19.1475447,9.62367778 L13.2871704,12.4073556 C12.4726652,12.7942455 11.5273348,12.7942455 10.7128296,12.4073556 L4.85245528,9.62367778 C4.10415569,9.26823548 3.78568194,8.37347589 4.14112424,7.6251763 C4.28928668,7.31325538 4.54053435,7.06200771 4.85245528,6.91384527 L10.7128296,4.13016749 C11.5273348,3.7432775 12.4726652,3.7432775 13.2871704,4.13016749 Z\"\/><\/svg><\/div><div class=\"media-body text-left\"><h4 class=\"pix-feature-title  font-weight-bold   text-heading-default  \" style=\"padding-top:7px;\"  >Soluzioni disponibili<\/h4><div class=\"pix-feature-content text-text-gray      \" style=\"padding-top:20px;\"  ><\/div><\/div><\/div><div id=\"el1759485248030-f28ebb2b-2e0e\" class=\"w-100 d-block \"><\/div>[\/vc_column][\/vc_row][vc_row gap=&#8221;35&#8243; pix_particles_check=&#8221;&#8221;][vc_column width=&#8221;1\/4&#8243;]<div id=\"pix-feature-1759484060657-f60433a0-4bdd\" class=\"pix-feature-el text-left \"><div class=\"feature_img position-relative \"   style=\"width:70px;height:auto;display:inline-block;position:relative;\"><img decoding=\"async\" style=\"width:70px;height:70px;\" class=\"pix-fit-contain  \" src=\"https:\/\/internavigare.com\/sicurezza\/wp-content\/uploads\/sites\/2\/2025\/10\/Pssword.png\" alt=\"Autenticazione sicura e controllo accesso logico (MFA)\"><\/div><h5 class=\"pix-feature-title  font-weight-bold   text-secondary \" style=\"padding-top:20px;\"  >Autenticazione sicura e controllo accesso logico (MFA)<\/h5><div class=\"pix-feature-content text-body-default      \" style=\"padding-top:20px;\"  >Combinazione di password, token, app mobile o riconoscimento biometrico per garantire che solo utenti verificati possano accedere ai sistemi aziendali.<\/div><\/div>[\/vc_column][vc_column width=&#8221;1\/4&#8243;]<div id=\"pix-feature-1759485422948-a595632d-decd\" class=\"pix-feature-el text-left \"><div class=\"feature_img position-relative \"   style=\"width:70px;height:auto;display:inline-block;position:relative;\"><img decoding=\"async\" style=\"width:70px;height:70px;\" class=\"pix-fit-contain  \" src=\"https:\/\/internavigare.com\/sicurezza\/wp-content\/uploads\/sites\/2\/2025\/10\/Users_1.png\" alt=\"Gestione centralizzata identit\u00e0 e accessi (IAM)\"><\/div><h5 class=\"pix-feature-title  font-weight-bold   text-secondary \" style=\"padding-top:20px;\"  >Gestione centralizzata identit\u00e0 e accessi (IAM)<\/h5><div class=\"pix-feature-content text-body-default      \" style=\"padding-top:20px;\"  >Piattaforme che permettono di amministrare ruoli, permessi e credenziali da un unico punto di controllo, semplificando la gestione IT e migliorando la sicurezza.<\/div><\/div>[\/vc_column][vc_column width=&#8221;1\/4&#8243;]<div id=\"pix-feature-1759485498753-45c154c3-57e7\" class=\"pix-feature-el text-left \"><div class=\"feature_img position-relative \"   style=\"width:70px;height:auto;display:inline-block;position:relative;\"><img decoding=\"async\" style=\"width:70px;height:70px;\" class=\"pix-fit-contain  \" src=\"https:\/\/internavigare.com\/sicurezza\/wp-content\/uploads\/sites\/2\/2025\/10\/Autenticazione.png\" alt=\"Single Sign\u2011On (SSO) per accesso logico semplificato\"><\/div><h5 class=\"pix-feature-title  font-weight-bold   text-secondary \" style=\"padding-top:20px;\"  >Single Sign\u2011On (SSO) per accesso logico semplificato<\/h5><div class=\"pix-feature-content text-body-default      \" style=\"padding-top:20px;\"  >Accesso unificato e sicuro a pi\u00f9 applicazioni aziendali tramite un\u2019unica autenticazione, riducendo la complessit\u00e0 per gli utenti e i rischi legati alla gestione delle password<\/div><\/div>[\/vc_column][vc_column width=&#8221;1\/4&#8243;]<div id=\"pix-feature-1759485514826-03083f84-465b\" class=\"pix-feature-el text-left \"><div class=\"feature_img position-relative \"   style=\"width:70px;height:auto;display:inline-block;position:relative;\"><img decoding=\"async\" style=\"width:70px;height:70px;\" class=\"pix-fit-contain  \" src=\"https:\/\/internavigare.com\/sicurezza\/wp-content\/uploads\/sites\/2\/2025\/10\/MonitoraggioAccessi1.png\" alt=\"Monitoraggio e audit del controllo accessi logico\"><\/div><h5 class=\"pix-feature-title  font-weight-bold   text-secondary \" style=\"padding-top:20px;\"  >Monitoraggio e audit del controllo accessi logico<\/h5><div class=\"pix-feature-content text-body-default      \" style=\"padding-top:20px;\"  >Registrazione e tracciamento di ogni operazione di login o modifica ai sistemi, con report automatici e avvisi in caso di comportamenti anomali o tentativi di intrusione.<\/div><\/div>[\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; pix_over_visibility=&#8221;&#8221; css=&#8221;.vc_custom_1761304397912{padding-top: 70px !important;padding-bottom: 70px !important;}&#8221;][vc_row gap=&#8221;35&#8243; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; pix_particles_check=&#8221;&#8221;][vc_column width=&#8221;1\/2&#8243;]<div id=\"pix-feature-1761301666767-a6583cfc-4c1b\" class=\"pix-feature-el text-left \"><div class=\"pix-feature-icon d-inline-block mw-100 text-secondary \"   style=\"aspect-ratio:1\/1 !important;position:relative;text-align:center;font-size:50px;line-height:50px;\"><svg class=\"pixfort-icon \" width=\"24\" height=\"24\"  data-name=\"Line\/pixfort-icon-scale-down-left-square-1\" viewBox=\"2 2 20 20\"><path fill=\"none\" stroke=\"var(--pf-icon-color)\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"var(--pf-icon-stroke-width)\" d=\"M3,10 L3,6 C3,4.34314575 4.34314575,3 6,3 L18,3 C19.6568542,3 21,4.34314575 21,6 L21,18 C21,19.6568542 19.6568542,21 18,21 L14,21 M5,13 L9,13 C10.1045695,13 11,13.8954305 11,15 L11,19 C11,20.1045695 10.1045695,21 9,21 L6,21 C4.34314575,21 3,19.6568542 3,18 L3,15 C3,13.8954305 3.8954305,13 5,13 Z M17,11 L13,11 L13,7 M13.5,10.5 L20,4\" transform=\"matrix(-1 0 0 1 24 0)\"\/><\/svg><\/div><h4 class=\"pix-feature-title  font-weight-bold   text-heading-default \" style=\"padding-top:25px;\"  >Integrazione con la sicurezza fisica<\/h4><div class=\"pix-feature-content text-text-gray      \" style=\"padding-top:20px;\"  ><\/div><\/div><div id=\"el1761301666798-f473a4a7-61bf\" class=\"w-100 d-block \"><\/div><div id=\"el1761301713692-364acdf2-f620\" class=\"pix-el-text m-0  w-100  \" ><p class=\"\"><p><strong>Le soluzioni di accesso logico si integrano perfettamente con i <a href=\"https:\/\/internavigare.com\/sicurezza\/controllo-accesso-fisico\/\">sistemi di controllo degli accessi fisici<\/a><\/strong> realizzati da Internavigare.<br \/>\nIn questo modo <strong>l\u2019identit\u00e0 di ogni utente \u00e8 verificata sia quando accede agli ambienti aziendali sia quando utilizza le infrastrutture digitali<\/strong>, creando un modello di sicurezza unificata basato su ruoli e autorizzazioni coerenti.<br \/>\nL\u2019integrazione consente di gestire in modo coordinato i profili di accesso, migliorare la protezione complessiva e ridurre il rischio di vulnerabilit\u00e0 interne.<\/p>\n<\/p><\/div>[\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div id=\"img-986575ce154e994580140277a0660684\" class=\"pix-img-element d-inline-block \"  ><div class=\"pix-img-el     text-left d-inline-block  w-100 rounded-10\"  ><img loading=\"lazy\" decoding=\"async\" width=\"1981\" height=\"1321\" src=\"https:\/\/internavigare.com\/sicurezza\/wp-content\/uploads\/sites\/2\/2025\/10\/DataProtection.jpg\" class=\"pix-img-elem rounded-10\" alt=\"controllo accesso logico\" srcset=\"https:\/\/internavigare.com\/sicurezza\/wp-content\/uploads\/sites\/2\/2025\/10\/DataProtection.jpg 1981w, https:\/\/internavigare.com\/sicurezza\/wp-content\/uploads\/sites\/2\/2025\/10\/DataProtection-300x200.jpg 300w, https:\/\/internavigare.com\/sicurezza\/wp-content\/uploads\/sites\/2\/2025\/10\/DataProtection-1024x683.jpg 1024w, https:\/\/internavigare.com\/sicurezza\/wp-content\/uploads\/sites\/2\/2025\/10\/DataProtection-768x512.jpg 768w, https:\/\/internavigare.com\/sicurezza\/wp-content\/uploads\/sites\/2\/2025\/10\/DataProtection-1536x1024.jpg 1536w\" sizes=\"auto, (max-width: 1981px) 100vw, 1981px\" \/><\/div><\/div>[\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; pix_over_visibility=&#8221;&#8221; css=&#8221;.vc_custom_1761312593529{padding-top: 70px !important;padding-bottom: 100px !important;background-color: #FFFFFF !important;}&#8221;][vc_row pix_particles_check=&#8221;&#8221;][vc_column]<div id=\"pix-feature-1761302955435-6617baf1-51e8\" class=\"pix-feature-el media \"><div class=\"pix-feature-icon pix-feature-icon-outer mr-3 mw-100 d-flex text-secondary \"   style=\"font-size:50px;width:50px;aspect-ratio:1\/1 !important;position:relative;line-height:50px;text-align:center;\"><svg class=\"pixfort-icon \" width=\"24\" height=\"24\"  data-name=\"Line\/pixfort-icon-user-circle-shield-1\" viewBox=\"2 2 20 20\"><path fill=\"none\" stroke=\"var(--pf-icon-color)\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"var(--pf-icon-stroke-width)\" d=\"M21,12 C21,7.02943725 16.9705627,3 12,3 C7.02943725,3 3,7.02943725 3,12 C3,16.9705627 7.02943725,21 12,21 C12.340261,21 12.6761117,20.9811176 13.0065615,20.9443435 M5.63686238,18.367264 C7.12663784,16.789088 9.24768372,16 12,16 C12.3352228,16 12.6610811,16.0117057 12.9775749,16.035117 M12,13 C13.6568542,13 15,11.6568542 15,10 C15,8.34314575 13.6568542,7 12,7 C10.3431458,7 9,8.34314575 9,10 C9,11.6568542 10.3431458,13 12,13 Z M18.047418,20.9075055 L16.446127,19.6957177 C16.1651242,19.483067 16,19.1510315 16,18.7986355 L16,15.7140557 C16,15.402234 16.1929384,15.1229422 16.4845809,15.012591 L18.2345809,14.3504288 C18.4056101,14.2857151 18.5943899,14.2857151 18.7654191,14.3504288 L20.5154191,15.012591 C20.8070616,15.1229422 21,15.402234 21,15.7140557 L21,18.7986355 C21,19.1510315 20.8348758,19.483067 20.553873,19.6957177 L18.952582,20.9075055 C18.684869,21.1100991 18.315131,21.1100991 18.047418,20.9075055 Z\"\/><\/svg><\/div><div class=\"media-body text-left\"><h4 class=\"pix-feature-title  font-weight-bold   text-heading-default  \" style=\"padding-top:7px;\"  >Esempi applicativi<\/h4><div class=\"pix-feature-content text-text-gray      \" style=\"padding-top:20px;\"  ><\/div><\/div><\/div><div id=\"el1761302955467-7055f83f-ef0c\" class=\"w-100 d-block \"><\/div>[\/vc_column][\/vc_row][vc_row gap=&#8221;35&#8243; pix_particles_check=&#8221;&#8221;][vc_column width=&#8221;1\/2&#8243;]<div id=\"pix-feature-1761302955540-feb06671-d673\" class=\"pix-feature-el media \"><div class=\"pix-feature-icon pix-feature-icon-outer mr-3 mw-100 d-flex text-secondary \"   style=\"font-size:30px;width:30px;aspect-ratio:1\/1 !important;position:relative;line-height:30px;text-align:center;\"><svg class=\"pixfort-icon \" width=\"24\" height=\"24\"  data-name=\"Line\/pixfort-icon-building-1\" viewBox=\"2 2 20 20\"><path fill=\"none\" stroke=\"var(--pf-icon-color)\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"var(--pf-icon-stroke-width)\" d=\"M11,21 L11,19 C11,18.4477153 11.4477153,18 12,18 C12.5522847,18 13,18.4477153 13,19 L13,21 L13,21 M5.20000005,3 L18.8,3 C19.4627417,3 20,3.53725832 20,4.20000005 L20,21 L20,21 L4,21 L4,4.20000005 C4,3.53725832 4.53725832,3 5.20000005,3 Z M7,6 L10,6 L10,9 L7,9 Z M14,6 L17,6 L17,9 L14,9 Z M7,12 L10,12 L10,15 L7,15 Z M14,12 L17,12 L17,15 L14,15 Z\"\/><\/svg><\/div><div class=\"media-body text-left\"><h5 class=\"pix-feature-title  font-weight-bold   text-secondary  \" style=\"padding-top:0px;\"  >Uffici e sedi aziendali<\/h5><div class=\"pix-feature-content text-body-default      \" style=\"padding-top:0px;\"  >gestione centralizzata degli account utente, con autenticazione a pi\u00f9 fattori per l\u2019accesso a software gestionali e archivi condivisi.<\/div><\/div><\/div><div id=\"el1761303889793-08936912-f61e\" class=\"w-100 d-block \"><\/div><div id=\"pix-feature-1761303467363-afb547c7-e575\" class=\"pix-feature-el media \"><div class=\"pix-feature-icon pix-feature-icon-outer mr-3 mw-100 d-flex text-secondary \"   style=\"font-size:30px;width:30px;aspect-ratio:1\/1 !important;position:relative;line-height:30px;text-align:center;\"><svg class=\"pixfort-icon \" width=\"24\" height=\"24\"  data-name=\"Line\/pixfort-icon-shield-2\" viewBox=\"2 2 20 20\"><path fill=\"none\" stroke=\"var(--pf-icon-color)\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"var(--pf-icon-stroke-width)\" d=\"M10.8375236,20.6696597 L6.25628542,17.3973467 C5.46789705,16.8342122 5,15.9249996 5,14.9561463 L5,6.90943839 C5,6.06421114 5.53134128,5.31023526 6.32732721,5.02595457 L11.3273272,3.24024028 C11.7623209,3.08488538 12.2376791,3.08488538 12.6726728,3.24024028 L17.6726728,5.02595457 C18.4686587,5.31023526 19,6.06421114 19,6.90943839 L19,14.9561463 C19,15.9249996 18.5321029,16.8342122 17.7437146,17.3973467 L13.1624764,20.6696597 C12.4670813,21.1663705 11.5329187,21.1663705 10.8375236,20.6696597 Z M12,3.14476998 L12,21.0307055\"\/><\/svg><\/div><div class=\"media-body text-left\"><h5 class=\"pix-feature-title  font-weight-bold   text-secondary  \" style=\"padding-top:0px;\"  >Pubbliche Amministrazioni<\/h5><div class=\"pix-feature-content text-body-default      \" style=\"padding-top:0px;\"  >controllo degli accessi ai portali interni e ai sistemi documentali tramite SPID, CIE o autenticazione forte.<\/div><\/div><\/div><div id=\"el1761303543046-2053c96c-b095\" class=\"w-100 d-block \"><\/div><div id=\"pix-feature-1761303888636-537908f2-a118\" class=\"pix-feature-el media \"><div class=\"pix-feature-icon pix-feature-icon-outer mr-3 mw-100 d-flex text-secondary \"   style=\"font-size:30px;width:30px;aspect-ratio:1\/1 !important;position:relative;line-height:30px;text-align:center;\"><svg class=\"pixfort-icon \" width=\"24\" height=\"24\"  data-name=\"Line\/pixfort-icon-person-doctor-1\" viewBox=\"2 2 20 20\"><path fill=\"none\" stroke=\"var(--pf-icon-color)\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"var(--pf-icon-stroke-width)\" d=\"M7.35941169,15.9574006 C8.74670769,15.2718791 10.3053841,15 12,15 C15.25,15 18,16 20,19 M9.31081639,6.03883119 C8.50556501,6.77055399 8,7.82623648 8,9 C8,11.209139 9.790861,13 12,13 C14.209139,13 16,11.209139 16,9 C16,7.83153718 15.4989909,6.7800913 14.7000748,6.04876435 M9.70000005,3 L14.3,3 C14.9627417,3 15.5,3.53725832 15.5,4.20000005 L15.5,6 L15.5,6 L8.5,6 L8.5,4.20000005 C8.5,3.53725832 9.03725832,3 9.70000005,3 Z M12,19 L12,21 M5,17 L5,17 L5,19 L7,19 L7,19 L5,19 L5,21 L5,21 L5,19 L3,19 L3,19 L5,19 L5,17 Z M8.99814988,15.364669 L12,19 L14.9942162,15.364669\"\/><\/svg><\/div><div class=\"media-body text-left\"><h5 class=\"pix-feature-title  font-weight-bold   text-secondary  \" style=\"padding-top:0px;\"  >Settore sanitario<\/h5><div class=\"pix-feature-content text-body-default      \" style=\"padding-top:0px;\"  >verifica sicura delle credenziali del personale per l\u2019accesso ai dati clinici e ai sistemi di refertazione, in conformit\u00e0 al GDPR.<\/div><\/div><\/div>[\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div id=\"pix-feature-1761304312875-a81ea11e-1c58\" class=\"pix-feature-el media \"><div class=\"pix-feature-icon pix-feature-icon-outer mr-3 mw-100 d-flex text-secondary \"   style=\"font-size:30px;width:30px;aspect-ratio:1\/1 !important;position:relative;line-height:30px;text-align:center;\"><svg class=\"pixfort-icon \" width=\"24\" height=\"24\"  data-name=\"Line\/pixfort-icon-gear-settings-1\" viewBox=\"2 2 20 20\"><path fill=\"none\" stroke=\"var(--pf-icon-color)\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"var(--pf-icon-stroke-width)\" d=\"M13,3 C13.5522847,3 14,3.44771525 14,4 L14.0006762,5.29007996 C15.0838528,5.61256888 16.0571291,6.19018802 16.8508137,6.95324602 L17.897835,6.34930062 C18.3761277,6.07315825 18.9877181,6.2370334 19.2638604,6.71532603 L20.2638604,8.44737684 C20.5400028,8.92566946 20.3761277,9.53725986 19.897835,9.81340224 L18.8242363,10.4343148 C18.9392513,10.9376997 19,11.4617555 19,12 C19,12.6407205 18.9139175,13.2613353 18.752687,13.85091 L19.897835,14.5120035 C20.3761277,14.7881459 20.5400028,15.3997363 20.2638604,15.8780289 L19.2638604,17.6100797 C18.9877181,18.0883723 18.3761277,18.2522475 17.897835,17.9761051 L16.6524686,17.2302549 C15.8971594,17.9026069 14.9952455,18.4138118 14.0006762,18.70992 L14,19.9982048 C14,20.5504895 13.5522847,20.9982048 13,20.9982048 L11,20.9982048 C10.4477153,20.9982048 10,20.5504895 10,19.9982048 L9.99995367,18.7101075 C9.01882442,18.4181018 8.12784508,17.9167789 7.37880118,17.2579245 L6.1160254,17.9761051 C5.63773278,18.2522475 5.02614237,18.0883723 4.75,17.6100797 L3.75,15.8780289 C3.47385763,15.3997363 3.63773278,14.7881459 4.1160254,14.5120035 L5.24922515,13.8578877 C5.0867632,13.2662327 5,12.6432487 5,12 C5,11.4589171 5.0613911,10.9321728 5.17758786,10.4263526 L4.1160254,9.81340224 C3.63773278,9.53725986 3.47385763,8.92566946 3.75,8.44737684 L4.75,6.71532603 C5.02614237,6.2370334 5.63773278,6.07315825 6.1160254,6.34930062 L7.15358114,6.94902439 C7.94661662,6.1879097 8.91852303,5.61175016 9.99995367,5.28989247 L10,4 C10,3.44771525 10.4477153,3 11,3 L13,3 Z M12,15 C13.6568542,15 15,13.6568542 15,12 C15,10.3431458 13.6568542,9 12,9 C10.3431458,9 9,10.3431458 9,12 C9,13.6568542 10.3431458,15 12,15 Z\"\/><\/svg><\/div><div class=\"media-body text-left\"><h5 class=\"pix-feature-title  font-weight-bold   text-secondary  \" style=\"padding-top:0px;\"  >Ambito industriale<\/h5><div class=\"pix-feature-content text-body-default      \" style=\"padding-top:0px;\"  >restrizione dell\u2019accesso a macchinari connessi e dispositivi IoT, garantendo che solo operatori qualificati possano interagire con i sistemi.<\/div><\/div><\/div><div id=\"el1761304310109-ee56a359-db7a\" class=\"w-100 d-block \"><\/div><div id=\"pix-feature-1761304294523-6146bc56-2367\" class=\"pix-feature-el media \"><div class=\"pix-feature-icon pix-feature-icon-outer mr-3 mw-100 d-flex text-secondary \"   style=\"font-size:30px;width:30px;aspect-ratio:1\/1 !important;position:relative;line-height:30px;text-align:center;\"><svg class=\"pixfort-icon \" width=\"24\" height=\"24\"  data-name=\"Line\/pixfort-icon-database-locked-1\" viewBox=\"2 2 20 20\"><path fill=\"none\" stroke=\"var(--pf-icon-color)\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"var(--pf-icon-stroke-width)\" d=\"M16.2,16.7222222 L19.8,16.7222222 C20.4627417,16.7222222 21,17.2594805 21,17.9222223 L21,19.8 C21,20.4627417 20.4627417,21 19.8,21 L16.2,21 C15.5372583,21 15,20.4627417 15,19.8 L15,17.9222223 C15,17.2594805 15.5372583,16.7222222 16.2,16.7222222 Z M16.2857143,16.7222222 L16.2857143,14.5555556 C16.2857143,13.6964459 17.0532261,13 18,13 C18.9467739,13 19.7142857,13.6964459 19.7142857,14.5555556 L19.7142857,16.7222222 M10,7 C13.8235098,7 17,6.1045695 17,5 C17,3.8954305 13.8235098,3 10,3 C6.17649019,3 3,3.8954305 3,5 C3,6.1045695 6.17649019,7 10,7 Z M3,19 C3,20.1045695 6.17649019,21 10,21 C10.7343732,21 11.4448778,20.9669675 12.1135916,20.9057652 M3,14.25 C3,15.3545695 6.17649019,16.25 10,16.25 C10.8682871,16.25 11.7032069,16.2038221 12.4751363,16.1195036 M3,9.75 C3,10.8545695 6.17649019,11.75 10,11.75 C13.8235098,11.75 17,10.8545695 17,9.75 M3,19 L3,5 M17,9.75 L17,5\"\/><\/svg><\/div><div class=\"media-body text-left\"><h5 class=\"pix-feature-title  font-weight-bold   text-secondary  \" style=\"padding-top:0px;\"  >Data center e infrastrutture IT<\/h5><div class=\"pix-feature-content text-body-default      \" style=\"padding-top:0px;\"  >tracciabilit\u00e0 completa degli accessi remoti e dei privilegi di amministratore, con registrazione automatica delle attivit\u00e0.<\/div><\/div><\/div>[\/vc_column][\/vc_row][\/vc_section]<\/div>","protected":false},"excerpt":{"rendered":"[vc_section pix_over_visibility=&#8221;&#8221; css=&#8221;.vc_custom_1761301483527{padding-top: 0px !important;}&#8221;][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;35&#8243; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; pix_particles_check=&#8221;&#8221; responsive_css=&#8221;{&#8220;pix_res_sm_pt&#8220;:&#8220;50&#8220;,&#8220;pix_res_sm_pb&#8220;:&#8220;0&#8220;}&#8221; css=&#8221;.vc_custom_1761320695166{padding-top: 100px !important;padding-bottom: 80px !important;background-color: #FFFFFF !important;}&#8221; fade_in_intro=&#8221;694&#8243;][vc_column width=&#8221;1\/2&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; pix_particles_check=&#8221;&#8221; css=&#8221;.vc_custom_1761301529763{padding-top: 70px !important;padding-bottom: 70px !important;}&#8221;][vc_column][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; pix_over_visibility=&#8221;&#8221; css=&#8221;.vc_custom_1761308918638{padding-top: 70px !important;padding-bottom: 70px !important;background-color: #FFFFFF !important;}&#8221;][vc_row pix_particles_check=&#8221;&#8221;][vc_column][\/vc_column][\/vc_row][vc_row gap=&#8221;35&#8243;&#8230;","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-666","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Controllo accesso logico | Sicurezza sistemi IT<\/title>\n<meta name=\"description\" content=\"Soluzioni di controllo accesso logico per proteggere reti, server e dati con identificazione sicura, gestione identit\u00e0, Single Sign\u2011On e monitoraggio accessi.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/internavigare.com\/sicurezza\/controllo-accesso-logico\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Controllo accesso logico | Sicurezza sistemi IT\" \/>\n<meta property=\"og:description\" content=\"Soluzioni di controllo accesso logico per proteggere reti, server e dati con identificazione sicura, gestione identit\u00e0, Single Sign\u2011On e monitoraggio accessi.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/internavigare.com\/sicurezza\/controllo-accesso-logico\/\" \/>\n<meta property=\"og:site_name\" content=\"Acceso Fisico e Logico\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/internavigaresrl\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-20T09:32:18+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/internavigare.com\\\/sicurezza\\\/controllo-accesso-logico\\\/\",\"url\":\"https:\\\/\\\/internavigare.com\\\/sicurezza\\\/controllo-accesso-logico\\\/\",\"name\":\"Controllo accesso logico | Sicurezza sistemi IT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/internavigare.com\\\/sicurezza\\\/#website\"},\"datePublished\":\"2025-10-24T13:53:49+00:00\",\"dateModified\":\"2026-01-20T09:32:18+00:00\",\"description\":\"Soluzioni di controllo accesso logico per proteggere reti, server e dati con identificazione sicura, gestione identit\u00e0, Single Sign\u2011On e monitoraggio accessi.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/internavigare.com\\\/sicurezza\\\/controllo-accesso-logico\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/internavigare.com\\\/sicurezza\\\/controllo-accesso-logico\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/internavigare.com\\\/sicurezza\\\/controllo-accesso-logico\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/internavigare.com\\\/sicurezza\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Controllo Accesso Logico\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/internavigare.com\\\/sicurezza\\\/#website\",\"url\":\"https:\\\/\\\/internavigare.com\\\/sicurezza\\\/\",\"name\":\"Acceso Fisico e Logico\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/internavigare.com\\\/sicurezza\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/internavigare.com\\\/sicurezza\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/internavigare.com\\\/sicurezza\\\/#organization\",\"name\":\"Internavigare Srl\",\"url\":\"https:\\\/\\\/internavigare.com\\\/sicurezza\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/internavigare.com\\\/sicurezza\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/internavigare.com\\\/sicurezza\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/10\\\/Internavigare_logo.png\",\"contentUrl\":\"https:\\\/\\\/internavigare.com\\\/sicurezza\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/10\\\/Internavigare_logo.png\",\"width\":767,\"height\":147,\"caption\":\"Internavigare Srl\"},\"image\":{\"@id\":\"https:\\\/\\\/internavigare.com\\\/sicurezza\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/internavigaresrl\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/internavigare-srl\",\"https:\\\/\\\/www.instagram.com\\\/internavigare\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Controllo accesso logico | Sicurezza sistemi IT","description":"Soluzioni di controllo accesso logico per proteggere reti, server e dati con identificazione sicura, gestione identit\u00e0, Single Sign\u2011On e monitoraggio accessi.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/internavigare.com\/sicurezza\/controllo-accesso-logico\/","og_locale":"it_IT","og_type":"article","og_title":"Controllo accesso logico | Sicurezza sistemi IT","og_description":"Soluzioni di controllo accesso logico per proteggere reti, server e dati con identificazione sicura, gestione identit\u00e0, Single Sign\u2011On e monitoraggio accessi.","og_url":"https:\/\/internavigare.com\/sicurezza\/controllo-accesso-logico\/","og_site_name":"Acceso Fisico e Logico","article_publisher":"https:\/\/www.facebook.com\/internavigaresrl","article_modified_time":"2026-01-20T09:32:18+00:00","twitter_card":"summary_large_image","twitter_misc":{"Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/internavigare.com\/sicurezza\/controllo-accesso-logico\/","url":"https:\/\/internavigare.com\/sicurezza\/controllo-accesso-logico\/","name":"Controllo accesso logico | Sicurezza sistemi IT","isPartOf":{"@id":"https:\/\/internavigare.com\/sicurezza\/#website"},"datePublished":"2025-10-24T13:53:49+00:00","dateModified":"2026-01-20T09:32:18+00:00","description":"Soluzioni di controllo accesso logico per proteggere reti, server e dati con identificazione sicura, gestione identit\u00e0, Single Sign\u2011On e monitoraggio accessi.","breadcrumb":{"@id":"https:\/\/internavigare.com\/sicurezza\/controllo-accesso-logico\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/internavigare.com\/sicurezza\/controllo-accesso-logico\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/internavigare.com\/sicurezza\/controllo-accesso-logico\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/internavigare.com\/sicurezza\/"},{"@type":"ListItem","position":2,"name":"Controllo Accesso Logico"}]},{"@type":"WebSite","@id":"https:\/\/internavigare.com\/sicurezza\/#website","url":"https:\/\/internavigare.com\/sicurezza\/","name":"Acceso Fisico e Logico","description":"","publisher":{"@id":"https:\/\/internavigare.com\/sicurezza\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/internavigare.com\/sicurezza\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/internavigare.com\/sicurezza\/#organization","name":"Internavigare Srl","url":"https:\/\/internavigare.com\/sicurezza\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/internavigare.com\/sicurezza\/#\/schema\/logo\/image\/","url":"https:\/\/internavigare.com\/sicurezza\/wp-content\/uploads\/sites\/2\/2025\/10\/Internavigare_logo.png","contentUrl":"https:\/\/internavigare.com\/sicurezza\/wp-content\/uploads\/sites\/2\/2025\/10\/Internavigare_logo.png","width":767,"height":147,"caption":"Internavigare Srl"},"image":{"@id":"https:\/\/internavigare.com\/sicurezza\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/internavigaresrl","https:\/\/www.linkedin.com\/company\/internavigare-srl","https:\/\/www.instagram.com\/internavigare\/"]}]}},"_links":{"self":[{"href":"https:\/\/internavigare.com\/sicurezza\/wp-json\/wp\/v2\/pages\/666","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/internavigare.com\/sicurezza\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/internavigare.com\/sicurezza\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/internavigare.com\/sicurezza\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/internavigare.com\/sicurezza\/wp-json\/wp\/v2\/comments?post=666"}],"version-history":[{"count":38,"href":"https:\/\/internavigare.com\/sicurezza\/wp-json\/wp\/v2\/pages\/666\/revisions"}],"predecessor-version":[{"id":819,"href":"https:\/\/internavigare.com\/sicurezza\/wp-json\/wp\/v2\/pages\/666\/revisions\/819"}],"wp:attachment":[{"href":"https:\/\/internavigare.com\/sicurezza\/wp-json\/wp\/v2\/media?parent=666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}