{"id":16587,"date":"2023-06-12T17:00:51","date_gmt":"2023-06-12T15:00:51","guid":{"rendered":"https:\/\/www.phoenixcapital.it\/cyber-tech-solutions\/"},"modified":"2023-11-08T12:27:32","modified_gmt":"2023-11-08T11:27:32","slug":"cyber-tech-solutions","status":"publish","type":"page","link":"https:\/\/www.phoenixcapital.it\/en\/cyber-tech-solutions\/","title":{"rendered":"Cyber &#038; Tech Solutions"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"16587\" class=\"elementor elementor-16587 elementor-10146\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"has_eae_slider elementor-element elementor-element-d80674c e-flex e-con-boxed e-con e-parent\" data-eae-slider=\"28538\" data-id=\"d80674c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"has_eae_slider elementor-element elementor-element-c9c04b3 e-con-full e-flex e-con e-parent\" data-eae-slider=\"75976\" data-id=\"c9c04b3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dcc5224 elementor-widget-tablet_extra__width-initial elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"dcc5224\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f18a511acba\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > Cyber &amp;<\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1dc7f4 elementor-widget__width-initial elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"b1dc7f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f18a511b70f\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h1 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h1\"  > Tech Solutions<\/h1>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"has_eae_slider elementor-element elementor-element-07670c4 e-con-full e-flex e-con e-parent\" data-eae-slider=\"71768\" data-id=\"07670c4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"has_eae_slider elementor-element elementor-element-ca2eb84 e-flex e-con-boxed e-con e-parent\" data-eae-slider=\"16728\" data-id=\"ca2eb84\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"has_eae_slider elementor-element elementor-element-30da1f3 e-con-full e-flex e-con e-parent\" data-eae-slider=\"58961\" data-id=\"30da1f3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8ce14c5 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"8ce14c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The Cyber \u200b\u200b&amp; Tech Solutions Division was launched in 2019 to provide the Italian market with 360-degree innovative technological solutions for corporate telecommunications, cyber security and Information and Communication Technology.<\/span><\/p><p><span style=\"font-weight: 400;\">In a regulatory and market framework that has become increasingly aware of the cyber danger, <strong>Phoenix Capital&#8217;s consultancy proposal in the field of cyber security and ICT<\/strong> consolidated thanks, above all, to the more than ten years of experience gained through the technological subsidiary <strong>Atlantis Next<\/strong>. The division, with high-level specialist partners, offers its services to companies, SMEs, insurance companies and banks.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c46708a elementor-widget elementor-widget-heading\" data-id=\"c46708a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our target<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7dbba0f elementor-widget elementor-widget-heading\" data-id=\"7dbba0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Who do we address our solutions to?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08229e6 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"08229e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Our proposal of cyber security solutions is aimed at medium-sized companies in the financial sector (Insurance Companies and Banks), but also at the world of SMEs for which Security is becoming a commodity.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"has_eae_slider elementor-element elementor-element-843ac58 e-flex e-con-boxed e-con e-parent\" data-eae-slider=\"28676\" data-id=\"843ac58\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-44054ec elementor-widget elementor-widget-heading\" data-id=\"44054ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9f228f elementor-widget elementor-widget-heading\" data-id=\"b9f228f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">cyber strategy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"has_eae_slider elementor-element elementor-element-3873c58 e-flex e-con-boxed e-con e-parent\" data-eae-slider=\"22761\" data-id=\"3873c58\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"has_eae_slider elementor-element elementor-element-1f301c6 e-con-full e-flex e-con e-parent\" data-eae-slider=\"80864\" data-id=\"1f301c6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d784a7 elementor-widget elementor-widget-text-editor\" data-id=\"1d784a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">We work on three areas: <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"has_eae_slider elementor-element elementor-element-5e9d22b e-con-full e-flex e-con e-parent\" data-eae-slider=\"5353\" data-id=\"5e9d22b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c5012f elementor-widget elementor-widget-text-editor\" data-id=\"3c5012f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Security Governance\u00a0<\/li><li>Security Operations<\/li><li>Security Services\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"has_eae_slider elementor-element elementor-element-888b6fe e-con-full e-flex e-con e-parent\" data-eae-slider=\"80835\" data-id=\"888b6fe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f3b6028 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"f3b6028\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">We first set up what we technically define as an &#8220;<strong>IT assessment<\/strong>&#8220;, then the launch of an operational road map to identify and share the specific needs of each customer: we map the IT infrastructure, the organizational model, the assets, the critical issues and the preparation of the users who use it.<\/span><\/p><p><span style=\"font-weight: 400;\">We prepare a &#8220;cyber risk exposure map&#8221;. We implement a well-defined action with respect to the objectives and priorities for the management of vulnerabilities, we define the interventions and the investment. We also think about training and &#8220;education&#8221; in awareness of danger, to orient the &#8220;human&#8221; behaviour of employees towards safety.<\/span><\/p><p><span style=\"font-weight: 400;\">We monitor the transformation and upgrade of systems thanks to a &#8220;control room&#8221; active 24 hours a day, 7 days a week, which is &#8220;adopted&#8221; and adapted to companies.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"has_eae_slider elementor-element elementor-element-3d491f8 e-flex e-con-boxed e-con e-parent\" data-eae-slider=\"12066\" data-id=\"3d491f8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ff90513 elementor-widget elementor-widget-heading\" data-id=\"ff90513\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c50be80 elementor-widget elementor-widget-heading\" data-id=\"c50be80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">TLC proposal<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"has_eae_slider elementor-element elementor-element-18b3ce4 e-flex e-con-boxed e-con e-parent\" data-eae-slider=\"78695\" data-id=\"18b3ce4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"has_eae_slider elementor-element elementor-element-d37b37e e-con-full e-flex e-con e-parent\" data-eae-slider=\"28293\" data-id=\"d37b37e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-239081d elementor-widget elementor-widget-text-editor\" data-id=\"239081d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Business partner of Fastweb, Phoenix offers a complete and integrated range of advanced TLC and ICT services, capable of satisfying the needs of all market segments: from large companies to SMEs, from start-ups to municipal companies.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"has_eae_slider elementor-element elementor-element-e854e23 e-con-full e-flex e-con e-parent\" data-eae-slider=\"27060\" data-id=\"e854e23\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-270ca5d elementor-widget elementor-widget-text-editor\" data-id=\"270ca5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">TLC<\/span><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><em><span style=\"font-weight: 400;\">Ultra-wide band<\/span><\/em><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><em><span style=\"font-weight: 400;\">Internet\/ Fixed\/ Mobile<\/span><\/em><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><em><span style=\"font-weight: 400;\">VoiP, switchboards, VPN, Streaming<\/span><\/em><\/li><\/ul><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">System Integration<\/span><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><em><span style=\"font-weight: 400;\">Architecture, Data Science<\/span><\/em><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><em><span style=\"font-weight: 400;\">Coding, System Operations<\/span><\/em><\/li><\/ul><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Solutions<\/span><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><i><span style=\"font-weight: 400;\">Mifid\/ IDD AI Profiler<\/span><\/i><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><i><span style=\"font-weight: 400;\">Core Insurance\u00a0<\/span><\/i><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber &amp; Tech Solutions The Cyber \u200b\u200b&amp; Tech Solutions Division was launched in 2019 to provide the Italian market with 360-degree innovative technological solutions for corporate telecommunications, cyber security and Information and Communication Technology. In a regulatory and market framework that has become increasingly aware of the cyber danger, Phoenix Capital&#8217;s consultancy proposal in the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":15671,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-16587","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.phoenixcapital.it\/en\/wp-json\/wp\/v2\/pages\/16587","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.phoenixcapital.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.phoenixcapital.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.phoenixcapital.it\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.phoenixcapital.it\/en\/wp-json\/wp\/v2\/comments?post=16587"}],"version-history":[{"count":6,"href":"https:\/\/www.phoenixcapital.it\/en\/wp-json\/wp\/v2\/pages\/16587\/revisions"}],"predecessor-version":[{"id":16697,"href":"https:\/\/www.phoenixcapital.it\/en\/wp-json\/wp\/v2\/pages\/16587\/revisions\/16697"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.phoenixcapital.it\/en\/wp-json\/wp\/v2\/media\/15671"}],"wp:attachment":[{"href":"https:\/\/www.phoenixcapital.it\/en\/wp-json\/wp\/v2\/media?parent=16587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}