{"id":5020,"date":"2025-11-28T14:32:17","date_gmt":"2025-11-28T14:32:17","guid":{"rendered":"https:\/\/cyber-bee.it\/alleanza-veeam-sophos-con-cyber-bee-al-centro-della-cyber-resilience\/"},"modified":"2026-03-19T14:27:34","modified_gmt":"2026-03-19T14:27:34","slug":"alleanza-veeam-sophos-con-cyber-bee-al-centro-della-cyber-resilience","status":"publish","type":"post","link":"https:\/\/cyber-bee.it\/en\/alleanza-veeam-sophos-con-cyber-bee-al-centro-della-cyber-resilience\/","title":{"rendered":"Alleanza Veeam &#8211; Sophos, con Cyber-Bee al centro della cyber resilience"},"content":{"rendered":"<div class=\"erp-sidecar:h-fit erp-sidecar:pb-0 mx-auto h-full\">\n<div class=\"relative border-subtlest ring-subtlest divide-subtlest bg-base\">\n<div class=\"erp-sidecar:min-h-[var(--sidecar-content-height)] erp-mobile-sidecar:min-h-[var(--mobile-sidecar-content-height)] min-h-[var(--page-content-height)]\">\n<div class=\"pt-[var(--thread-visual-spacing)] md:pt-lg pb-[var(--thread-visual-spacing)] px-[var(--thread-visual-spacing)] border-subtlest ring-subtlest divide-subtlest bg-transparent\">\n<div class=\"isolate mx-auto max-w-threadContentWidth\">\n<div class=\"mx-auto max-w-threadContentWidth\">\n<div class=\"relative\">\n<div class=\"gap-y-md mt-md flex flex-col\">\n<div class=\"gap-y-lg flex flex-col first:mt-0\">\n<div class=\"border-subtlest ring-subtlest divide-subtlest bg-transparent\">\n<div class=\"gap-y-md flex flex-col\">\n<div class=\"relative font-sans text-base text-foreground selection:bg-super\/50 selection:text-foreground dark:selection:bg-super\/10 dark:selection:text-super\">\n<div class=\"min-w-0 break-words [word-break:break-word]\">\n<div id=\"markdown-content-3\" class=\"gap-y-md after:clear-both after:block after:content-['']\" dir=\"auto\">\n<div class=\"relative\">\n<div class=\"prose dark:prose-invert inline leading-relaxed break-words min-w-0 [word-break:break-word] prose-strong:font-medium [&amp;_&gt;*:first-child]:mt-0\" style=\"box-sizing: border-box; border-width: 0px; border-style: solid; border-color: oklch(0.3039 0.04 213.679993 \/ 0.16); scrollbar-width: initial; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgb(59 130 246 \/ .5); --tw-ring-offset-shadow: 0 0 #0000; --tw-ring-shadow: 0 0 #0000; --tw-shadow: 0 0 #0000; --tw-shadow-colored: 0 0 #0000; color: oklch(0.3039 0.04 213.679993); max-width: 65ch; --tw-prose-body: oklch(30.39% .04 213.68); --tw-prose-headings: oklch(30.39% .04 213.68); --tw-prose-lead: oklch(30.39% .04 213.68); --tw-prose-links: oklch(30.39% .04 213.68); --tw-prose-bold: oklch(30.39% .04 213.68); --tw-prose-counters: oklch(30.39% .04 213.68 \/ .75); --tw-prose-bullets: oklch(30.39% .04 213.68 \/ .75); --tw-prose-hr: oklch(30.39% .04 213.68 \/ .16); --tw-prose-quotes: oklch(30.39% .04 213.68); --tw-prose-quote-borders: oklch(30.39% .04 213.68 \/ .16); --tw-prose-captions: oklch(30.39% .04 213.68 \/ .75); --tw-prose-kbd: #111827; --tw-prose-kbd-shadows: 17 24 39; --tw-prose-code: oklch(30.39% .04 213.68); --tw-prose-pre-code: oklch(30.39% .04 213.68); --tw-prose-pre-bg: oklch(96.28% .007 106.52); --tw-prose-th-borders: oklch(30.39% .04 213.68 \/ .16); --tw-prose-td-borders: oklch(30.39% .04 213.68 \/ .16); --tw-prose-invert-body: oklch(92.96% .007 106.53); --tw-prose-invert-headings: oklch(92.96% .007 106.53); --tw-prose-invert-lead: oklch(92.96% .007 106.53); --tw-prose-invert-links: oklch(92.96% .007 106.53); --tw-prose-invert-bold: oklch(92.96% .007 106.53); --tw-prose-invert-counters: oklch(30.39% .04 213.68 \/ .75); --tw-prose-invert-bullets: oklch(30.39% .04 213.68 \/ .75); --tw-prose-invert-hr: oklch(30.39% .04 213.68 \/ .16); --tw-prose-invert-quotes: oklch(92.96% .007 106.53); --tw-prose-invert-quote-borders: oklch(30.39% .04 213.68 \/ .16); --tw-prose-invert-captions: oklch(92.96% .007 106.53); --tw-prose-invert-kbd: #fff; --tw-prose-invert-kbd-shadows: 255 255 255; --tw-prose-invert-code: oklch(92.96% .007 106.53); --tw-prose-invert-pre-code: oklch(92.96% .007 106.53); --tw-prose-invert-pre-bg: oklch(96.28% .007 106.52); --tw-prose-invert-th-borders: oklch(30.39% .04 213.68 \/ .16); --tw-prose-invert-td-borders: oklch(30.39% .04 213.68 \/ .16); font-size: 1rem; line-height: 1.625; display: inline; min-width: 0px; overflow-wrap: break-word; word-break: break-word;\">\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Il 18 novembre a Roma <strong>Cyber-Bee<\/strong> ha riunito intorno allo stesso tavolo <strong>Veeam<\/strong> e <strong>Sophos<\/strong> per una round table dedicata a un tema chiave: come mettere davvero a sistema protezione del dato e sicurezza digitale per garantire continuit\u00e0 operativa alle imprese. Un confronto a pi\u00f9 voci che ha coinvolto <strong>Giovanni Giovannelli,<\/strong> Sales Engineer di Sophos, <strong>Alessio Di Benedetto <\/strong>Country Manager di Veeam e <strong>Luca Gabrielli<\/strong>, CEO di Cyber-Bee, in qualit\u00e0 di system integrator, per raccontare casi reali, approcci progettuali e modelli di servizio orientati alla cyber resilience.\u200b<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Dal lato Sophos, l\u2019attenzione \u00e8 stata posta sulla capacit\u00e0 di rilevare e bloccare tempestivamente gli attacchi, grazie a tecnologie evolute e a un SOC gestito che lavora 24\/7 per intercettare le minacce prima che impattino sul business. Veeam ha portato il punto di vista della data resilience, mostrando come backup immutabili, automazione dei processi di recovery e integrazione con la detection permettano di ripartire rapidamente anche in scenari di attacco complessi.\u200b<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Nel mezzo c\u2019\u00e8 Cyber-Bee, che integra questi mondi in architetture coerenti, servizi gestiti e percorsi di consulenza pensati per la realt\u00e0 concreta delle aziende italiane. Dalla progettazione di soluzioni end-to-end alla gestione operativa e alla formazione, il valore sta nella capacit\u00e0 di orchestrare le migliori tecnologie per costruire un ecosistema di sicurezza unificato, dove detection, protezione del dato e recovery lavorano insieme a supporto del business.\u200b<\/p>\n<p>Clicca <a href=\"https:\/\/inno3.it\/2025\/11\/28\/alleanza-veeam-e-sophos-con-cyberbee-nel-mezzo\/\">qui<\/a> per scoprire tutti i dettagli e i punti di vista emersi durante la round table leggendo l\u2019articolo completo su Inno3.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Il 18 novembre a Roma Cyber-Bee ha riunito intorno allo stesso tavolo Veeam e Sophos per una round table dedicata a un tema chiave: come mettere davvero a sistema protezione del dato e sicurezza digitale per garantire continuit\u00e0 operativa alle imprese. Un confronto a pi\u00f9 voci che ha coinvolto Giovanni Giovannelli, Sales Engineer di Sophos, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":4995,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[43],"tags":[45],"class_list":["post-5020","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-en","tag-evidence2"],"acf":[],"_links":{"self":[{"href":"https:\/\/cyber-bee.it\/en\/wp-json\/wp\/v2\/posts\/5020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-bee.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-bee.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-bee.it\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-bee.it\/en\/wp-json\/wp\/v2\/comments?post=5020"}],"version-history":[{"count":1,"href":"https:\/\/cyber-bee.it\/en\/wp-json\/wp\/v2\/posts\/5020\/revisions"}],"predecessor-version":[{"id":5021,"href":"https:\/\/cyber-bee.it\/en\/wp-json\/wp\/v2\/posts\/5020\/revisions\/5021"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyber-bee.it\/en\/wp-json\/wp\/v2\/media\/4995"}],"wp:attachment":[{"href":"https:\/\/cyber-bee.it\/en\/wp-json\/wp\/v2\/media?parent=5020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-bee.it\/en\/wp-json\/wp\/v2\/categories?post=5020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-bee.it\/en\/wp-json\/wp\/v2\/tags?post=5020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}