[{"id":"ci_1a7afa0cf186e33bc83069266b40a84d0fc1d87eb3e07d64aa568112d34573f4","title":"Distribuzione sicura di MyQ X","path":"/it/security/1.0/secure-deployment","children":[{"id":"ci_0fed2b38e5c4e1aee3ce79fd7bfa7f2a9c5ff8679277d67a2f4d01b284f3d998","title":"MyQ X Central Server","path":"/it/security/1.0/myq-central-server","children":[{"id":"ci_aa85f903e47a31e6c9909742b2ef9d837ce86dae045e5a59d2ac3520d4db57fa","title":"Sicurezza della connessione","path":"/it/security/1.0/connection-security","children":[]},{"id":"ci_738463b629623c2285531281dee43608c57dd94c9d0eab497a648d7ece4f95cb","title":"Sicurezza dei dati","path":"/it/security/1.0/data-security","children":[]},{"id":"ci_e17051fb8f3595d92f5db1051301d919610d4e7b15bf7c139e1fb0ec0cd32110","title":"Ulteriori raccomandazioni","path":"/it/security/1.0/additional-recommendations","children":[]}]},{"id":"ci_ab30e48196c30e8c2aeac0b4c41929ac85fdd76fd570a0543dac170eff9f6467","title":"MyQ X Print Server","path":"/it/security/1.0/myq-print-server","children":[{"id":"ci_fbb465331cfa88e3f20207987c1aeedd3ee6062ca3c375f725bfb80c5b17b806","title":"PS Sicurezza della connessione","path":"/it/security/1.0/ps-connection-security","children":[]},{"id":"ci_a8c8ececd341f518a8241a3104a44952ba246a7c263f9f50c717e7e78f344ddc","title":"PS Sicurezza dei dati","path":"/it/security/1.0/ps-data-security","children":[]},{"id":"ci_d91f97bb9d75dada0b6d72d1ad52314597ea6ca6a922c4c3a1fbc044aa75f76c","title":"PS Raccomandazioni aggiuntive","path":"/it/security/1.0/ps-additional-recommendations","children":[]}]},{"id":"ci_07c0fa1b727f9f19a0f94ef8157fb38629ec1786b40a79060b45b0eafaafbd97","title":"Desktop Client MyQ X","path":"/it/security/1.0/myq-desktop-client","children":[]}]},{"id":"ci_1d6370ddbbba748e5b708879f56c9d9cd6c8adaa1ffd5a5e9069ac50386c075c","title":"Carta bianca sulla sicurezza di MyQ X","path":"/it/security/1.0/security-whitepaper","children":[{"id":"ci_9cb94e38e4a6b8144b5e1239b5184218ee0562fd736988004208740162ad9c71","title":"Miglioramenti chiave per la sicurezza in 10.2","path":"/it/security/1.0/key-security-improvements-in-10-2","children":[]},{"id":"ci_cf0e8fbca290fb2a77899090875dbccff16680707b6f7d3f0654cf63b0633d02","title":"Valore aziendale della gestione sicura della stampa","path":"/it/security/1.0/business-value-of-secure-print-management","children":[]},{"id":"ci_9087966c3106ec9983f4a193f89314de4d6204df6d3689ad0bb7f3d54ebf5c68","title":"Conformità","path":"/it/security/1.0/compliance","children":[]},{"id":"ci_6c2ac6c124f801326729d066665a3280a141e95b98dc8657ffe96cf32142d531","title":"Implementazione dell’architettura Zero Trust","path":"/it/security/1.0/zero-trust-architecture-implementation","children":[]},{"id":"ci_c4d5f5d8099853e1b7b14521040502e5d565cd681e1224a8d91fd1df38676d1d","title":"Gestione dell’identità e dell’accesso","path":"/it/security/1.0/identity-and-access-management","children":[]},{"id":"ci_8674cff80d0bfbee5d0959f92a27084f199e52ca8499d516471142966cefd3dd","title":"Sicurezza dell’infrastruttura","path":"/it/security/1.0/infrastructure-security","children":[]},{"id":"ci_2b663f0780e93a7f9cb5f1c9f61a653b8e502268b60665cc536495577f68b5fa","title":"Protezione e crittografia dei dati","path":"/it/security/1.0/data-protection-and-encryption","children":[]},{"id":"ci_86d766c3b4d897d2738b5b940a4490ce4ec0fe3921a079a8bb22c5e6a87006cc","title":"Flussi di lavoro di stampa sicuri","path":"/it/security/1.0/secure-printing-workflows","children":[]},{"id":"ci_65f9fcd72e27f428197988d869a2590ad8ba61e482608b06e029ca088f86bbd8","title":"Sicurezza dei dispositivi e della rete","path":"/it/security/1.0/device-and-network-security","children":[]},{"id":"ci_dc4fe5dbe24f3e9f1d9e0f5b07e76930a3fdf613a987f2ccb29de12f3359faed","title":"Audit e monitoraggio","path":"/it/security/1.0/audit-and-monitoring","children":[]},{"id":"ci_cf9ee0ee796d3d3f3cb4672929ad097ae19f5e0b3a31593c90ab2c48959f5188","title":"Risposta agli incidenti e recupero","path":"/it/security/1.0/incident-response-and-recovery","children":[]}]},{"id":"ci_425bb2fa4ef420c398771274be4ca7bfd2a29fbde56107b977b6294123bf7776","title":"MyQ X e NIS2","path":"/it/security/1.0/myq-x-and-nis2","children":[]},{"id":"ci_bde45463e9dd1b5975d78fc71f8be386142c4fc8bd538d13396a4450929375b5","title":"Distinta base del software","path":"/it/security/1.0/software-bill-of-materials","children":[]}]