{"id":11234,"date":"2022-07-14T11:15:07","date_gmt":"2022-07-14T09:15:07","guid":{"rendered":"https:\/\/www.intesys.it\/journal\/?p=11234"},"modified":"2023-11-27T09:35:55","modified_gmt":"2023-11-27T08:35:55","slug":"log-management-4-buoni-motivi-per-iniziare-ad-occuparsene","status":"publish","type":"post","link":"https:\/\/www.intesys.it\/journal\/information-technology\/log-management-4-buoni-motivi-per-iniziare-ad-occuparsene\/","title":{"rendered":"Log Management: 4 buoni motivi per iniziare a occuparsene"},"content":{"rendered":"<p><div id='wpig-contents' class='wpig-contents wpig-number-list wpig-no-hierarachy wpig-sidebar-widget wpig-style-1'><span class='wpig-headline'>Indice dei contenuti<\/span><!-- Table of Contents --><div id='wpig-table-of-content' class='wpig-table-of-content' ><ol><li class='stoc-log-management-una-vera-e-propria-necessita'><a href='#stoc-log-management-una-vera-e-propria-necessita'>Log Management, una vera e propria necessit\u00e0<\/a><\/li><li class='stoc-log-management-come-requisito-di-compliance'><a href='#stoc-log-management-come-requisito-di-compliance'>Log Management come requisito di compliance<\/a><\/li><li class='stoc-un-tassello-essenziale-della-sicurezza-informativa'><a href='#stoc-un-tassello-essenziale-della-sicurezza-informativa'>Un tassello essenziale della sicurezza informativa<\/a><\/li><li class='stoc-troubleshooting-e-performance-monitoring'><a href='#stoc-troubleshooting-e-performance-monitoring'>Troubleshooting e performance monitoring<\/a><\/li><li class='stoc-efficienza-dei-processi-e-innovazione'><a href='#stoc-efficienza-dei-processi-e-innovazione'>Efficienza dei processi e innovazione<\/a><\/li><\/ol><\/div><!-- END OF Table of Contents --><\/div><\/p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 id=\"stoc-acquisire-e-gestire-al-meglio-i-log-dei-propri-sistemi-informativi-log-management-e-unattivita-cui-nessuna-impresa-puo-sottrarsi-essa-infatti-non-risponde-soltanto-a-esigenze-di-conoscen\" class=\"wpig-heading\">Acquisire e gestire al meglio i log dei propri sistemi informativi (<a href=\"https:\/\/www.inetworking.it\/news\/enterprise-log-management-cosa-e\/\" target=\"_blank\" rel=\"noopener\">Log Management<\/a>) \u00e8 un\u2019attivit\u00e0 cui nessuna impresa pu\u00f2 sottrarsi. Essa, infatti, non risponde soltanto a esigenze di conoscenza e trasparenza, ma \u00e8 un requisito della conformit\u00e0 aziendale, della continuit\u00e0 del business e dell\u2019efficienza operativa.<\/h4>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h2 id=\"stoc-log-management-una-vera-e-propria-necessita\" class=\"wpig-heading\">Log Management, una vera e propria necessit\u00e0<\/h2>\n<p>Per un\u2019azienda, acquisire e <a href=\"https:\/\/www.inetworking.it\/news\/gestione-log-centralizzata\/\" target=\"_blank\" rel=\"noopener\">gestire i log in forma centralizzata<\/a> significa ottenere preziose informazioni su<strong> tutto ci\u00f2 che accade nei propri ambienti IT<\/strong>, con conseguente possibilit\u00e0 di controllo e di ottimizzazione.<\/p>\n<p>Tuttavia, prima ancora di ragionare in termini di opportunit\u00e0 e di considerarlo (giustamente) uno strumento di vantaggio competitivo, il <em>logging<\/em> \u00e8 un\u2019attivit\u00e0 che<strong> le imprese sono tenute a fare<\/strong> per essere conformi a svariate policy e regolamenti, per contrastare efficacemente le <a href=\"https:\/\/www.inetworking.it\/cybersecurity\/\" target=\"_blank\" rel=\"noopener\">minacce informatiche<\/a> ed evitare spiacevoli sorprese come perdite di dati, sanzioni, danni economici e reputazionali.<\/p>\n<p>Il tema \u00e8 complesso, e per questo non tutte le imprese stanno gestendo al meglio il proprio patrimonio informativo. <strong>Spesso mancano risorse adeguate e competenze specialistiche<\/strong>, oppure non \u00e8 chiaro quale sia il modo migliore per <a href=\"https:\/\/www.inetworking.it\/news\/log-management-approccio-end-to-end\/\" target=\"_blank\" rel=\"noopener\">approcciare i progetti e \u2018fare\u2019 Log Management<\/a>. Talvolta, emergono anche limiti di natura infrastrutturale, poich\u00e9 il<em> logging<\/em> comporta la <strong>gestione di grandi volumi di dati in tempo reale<\/strong>. Per tutti questi motivi, alcune imprese realizzano di <strong>doversi attrezzare per la gestione log <\/strong>a seguito di eventi come il mancato rilascio (o il rinnovo) di una certificazione ISO, un\u2019ispezione di <a href=\"https:\/\/www.inetworking.it\/news\/log-management-gdpr\/\" target=\"_blank\" rel=\"noopener\">conformit\u00e0 al GDPR<\/a>, un audit fallito o magari un data breach.<\/p>\n<p>Alla luce di queste informazioni, possiamo sintetizzare i motivi per approcciare al mondo della Gestione dei Log in 4 punti principali:[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;full_width_background&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; equal_height=&#8221;yes&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; advanced_gradient_angle=&#8221;0&#8243; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; shape_type=&#8221;&#8221; gradient_type=&#8221;default&#8221;][vc_column column_padding=&#8221;padding-3-percent&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;right&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; advanced_gradient_angle=&#8221;0&#8243; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; enable_animation=&#8221;true&#8221; animation=&#8221;fade-in-from-bottom&#8221; animation_easing=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; gradient_type=&#8221;default&#8221;][nectar_icon_list animate=&#8221;true&#8221; color=&#8221;Extra-Color-3&#8243; direction=&#8221;vertical&#8221; icon_size=&#8221;small&#8221; icon_style=&#8221;border&#8221;][nectar_icon_list_item icon_type=&#8221;numerical&#8221; text_full_html=&#8221;simple&#8221; title=&#8221;List Item&#8221; id=&#8221;1701074148001-3&#8243; tab_id=&#8221;1701074148002-8&#8243; header=&#8221;Compliance&#8221;][\/nectar_icon_list_item][nectar_icon_list_item icon_type=&#8221;numerical&#8221; text_full_html=&#8221;simple&#8221; title=&#8221;List Item&#8221; id=&#8221;1701074148023-4&#8243; tab_id=&#8221;1701074148024-0&#8243; header=&#8221;Sicurezza informativa&#8221;][\/nectar_icon_list_item][nectar_icon_list_item icon_type=&#8221;numerical&#8221; text_full_html=&#8221;simple&#8221; title=&#8221;List Item&#8221; id=&#8221;1701074148034-4&#8243; tab_id=&#8221;1701074148034-4&#8243; header=&#8221;Troubleshooting e performance monitoring&#8221;][\/nectar_icon_list_item][nectar_icon_list_item icon_type=&#8221;numerical&#8221; text_full_html=&#8221;simple&#8221; title=&#8221;List Item&#8221; id=&#8221;1701074148046-9&#8243; tab_id=&#8221;1701074148046-0&#8243; header=&#8221;Efficienza dei processi e innovazione&#8221;][\/nectar_icon_list_item][\/nectar_icon_list][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_gallery type=&#8221;flickity_static_height_style&#8221; images=&#8221;13143,13142&#8243; flickity_spacing=&#8221;default&#8221; flickity_controls=&#8221;next_prev_arrows_overlaid&#8221; flickity_overflow=&#8221;hidden&#8221; flickity_wrap_around=&#8221;wrap&#8221; flickity_autoplay=&#8221;true&#8221; flickity_box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; onclick=&#8221;link_image&#8221; img_size=&#8221;full&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; bg_color=&#8221;#f5333f&#8221; bg_image=&#8221;11247&#8243; bg_position=&#8221;right center&#8221; background_image_loading=&#8221;default&#8221; bg_repeat=&#8221;no-repeat&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;light&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; disable_element=&#8221;yes&#8221; color_overlay=&#8221;#000000&#8243; color_overlay_2=&#8221;#e1398c&#8221; advanced_gradient_angle=&#8221;0&#8243; overlay_strength=&#8221;0.5&#8243; gradient_direction=&#8221;left_t_to_right_b&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;fade-in&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;padding-4-percent&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;padding-5-percent&#8221; column_padding_position=&#8221;all&#8221; constrain_group_2=&#8221;yes&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; advanced_gradient_angle=&#8221;0&#8243; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; gradient_type=&#8221;default&#8221;][vc_row_inner content_placement=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/6&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][image_with_animation image_url=&#8221;10996&#8243; image_size=&#8221;full&#8221; animation_type=&#8221;entrance&#8221; animation=&#8221;None&#8221; animation_movement_type=&#8221;transform_y&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;custom&#8221; max_width_custom=&#8221;50%&#8221; max_width_custom_phone=&#8221;30%&#8221;][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; advanced_gradient_angle=&#8221;0&#8243; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;5\/6&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; gradient_type=&#8221;default&#8221;][vc_column_text]\n<h5 id=\"stoc-sicurezza-it\" class=\"wpig-heading\">SICUREZZA IT<\/h5>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_custom_heading text=&#8221;L&#8217;ABC del Log Management&#8221; font_container=&#8221;tag:h3|text_align:left|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][nectar_btn size=&#8221;medium&#8221; open_new_tab=&#8221;true&#8221; button_style=&#8221;regular&#8221; button_color_2=&#8221;Accent-Color&#8221; color_override=&#8221;#ffffff&#8221; solid_text_color_override=&#8221;#000000&#8243; icon_family=&#8221;none&#8221; text=&#8221;SCARICA LA NOSTRA GUIDA&#8221; margin_top=&#8221;30&#8243; url=&#8221;https:\/\/www.inetworking.it\/log-management-perche-e-importante\/&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h2 id=\"stoc-log-management-come-requisito-di-compliance\" class=\"wpig-heading\">Log Management come requisito di compliance<\/h2>\n<p>Come anticipato, diverse leggi e <a href=\"https:\/\/www.inetworking.it\/news\/log-management-gdpr\/\" target=\"_blank\" rel=\"noopener\">regolamenti <strong>impongono alle imprese la registrazione e la conservazione dei log<\/strong><\/a>. Questi, rafforzati da requisiti di completezza, verificabilit\u00e0 e inalterabilit\u00e0, sono elementi chiave della documentazione su cui si basano le procedure di audit. A titolo di esempio, citiamo:<\/p>\n<ul>\n<li><strong>Provvedimento Garante per la Protezione dei Dati Personali \u2013 27\/11\/2008<br \/>\n<\/strong><strong>A partire dal 2008<\/strong>, sulle imprese pende l\u2019obbligo di tracciare, registrare e conservare per almeno 6 mesi <strong>i dati di login, logout e i tentativi di login degli Amministratori di Sistema (ADS)<\/strong>. Le imprese sono tenute a rendere completi e inalterabili i log e, mediante gli stessi, a valutare almeno annualmente l\u2019operato degli ADS. In altri termini, le aziende <strong>devono dotarsi di un sistema di Log Management<\/strong> finalizzato a tracciare gli accessi degli ADS a sistemi e dispositivi;<\/li>\n<\/ul>\n<ul>\n<li><strong>GDPR, Regolamento (UE) 2016\/679<\/strong><strong><br \/>\n<\/strong>Il principio di accountability del GDPR ha introdotto l\u2019obbligo, per il titolare del trattamento dei dati, di <strong>dimostrare il rispetto delle sue stesse norme<\/strong>. Il GDPR pone quindi un doppio onere alle imprese: rispettare i suoi principi e predisporre <strong>sistemi adeguati a dimostrarne l\u2019osservanza<\/strong>. Questi non possono che essere i log file, dotati di caratteristiche di<strong> certezza, autenticit\u00e0 e immodificabilit\u00e0<\/strong>;<\/li>\n<\/ul>\n<ul>\n<li><strong>La normativa americana sul trattamento dei dati sanitari (HIPAA)<\/strong>;<\/li>\n<\/ul>\n<ul>\n<li><strong>Il Sarbanes-Oxley Act (SOX)<br \/>\n<\/strong>Il Sarbanes-Oxley Act ha affermato il principio della<em> Segregation of Duties<\/em> per la prevenzione dei conflitti di interesse in ambito aziendale ed \u00e8 stato ripreso anche dalla normativa italiana con la legge 262\/2005.<\/li>\n<\/ul>\n<p>A questi interventi normativi, e a molti altri, si sommano gli<strong> standard internazionali ad adesione volontaria<\/strong>, che certificano la disponibilit\u00e0 di asset, competenze e processi adeguati a porre in essere le best practice di settore, condizionando il vantaggio competitivo aziendale. Anche in questo caso, molti regolamenti impongono la registrazione e la conservazione dei log come <strong>requisito essenziale per acquisire e mantenere le certificazioni<\/strong>. Sotto questo profilo, segnaliamo:<\/p>\n<ul>\n<li><strong>Payment Card Industry Data Security Standard (PCI DSS)<\/strong>: \u00e8 lo standard internazionale di sicurezza per le aziende che gestiscono informazioni di pagamento (dati di Carte di Credito);<\/li>\n<\/ul>\n<ul>\n<li><strong>ISO 27001<\/strong>: si tratta dello standard internazionale per i sistemi di gestione della sicurezza delle informazioni. La certificazione ISO 27001 dimostra al mercato che l\u2019azienda \u00e8<strong> in grado di gestire in modo sicuro i dati propri e quelli dei clienti<\/strong> attraverso una miscela virtuosa di asset, processi e competenze allo stato dell\u2019arte.<\/li>\n<\/ul>\n<h2 id=\"stoc-un-tassello-essenziale-della-sicurezza-informativa\" class=\"wpig-heading\">Un tassello essenziale della sicurezza informativa<\/h2>\n<blockquote><p><em>Qualsiasi impresa, a prescindere dalla sua dimensione, deve adottare misure tecniche, organizzative e di awareness finalizzate a<strong> proteggersi dalle minacce interne ed esterne alla <a href=\"https:\/\/www.inetworking.it\/cybersecurity\/\" target=\"_blank\" rel=\"noopener\">sicurezza informatica<\/a><\/strong>.<\/em><\/p><\/blockquote>\n<p>L\u2019universo della sicurezza si sta orientando sempre di pi\u00f9 verso<strong> un approccio proattivo rispetto a minacce<\/strong> <strong>che cambiano e aumentano<\/strong> di giorno in giorno: questo approccio non sarebbe mai concretizzabile senza una piena trasparenza e <strong>visibilit\u00e0 su tutti gli eventi di sicurezza<\/strong> cui \u00e8 soggetto l\u2019ecosistema aziendale.<\/p>\n<p>Qualsiasi attivit\u00e0 anomala, di ogni genere, tipologia e natura, deve essere <strong>nota agli amministratori e agli specialisti di sicurezza<\/strong>; essa va poi arricchita e integrata con ulteriori informazioni al fine di <strong>definire un indice di rischio<\/strong> su cui prendere decisioni ponderate o attivare risposte automatizzate.<\/p>\n<p>In tal senso, il Log Management \u00e8 un<strong> layer essenziale di sicurezza<\/strong> su cui innestare attivit\u00e0 di monitoraggio continuo, costruire alert personalizzati e migliorare KPI come il Mean Time to Detect (MTTD) e Mean Time to Respond (MTTD). Infine, ma non per importanza, Log Management \u00e8 un<strong> requisito essenziale dell\u2019analisi forense<\/strong>.<\/p>\n<h2 id=\"stoc-troubleshooting-e-performance-monitoring\" class=\"wpig-heading\">Troubleshooting e performance monitoring<\/h2>\n<p>Mai come oggi, le infrastrutture informatiche e le applicazioni devono garantire <strong>prestazioni straordinarie in termini di reattivit\u00e0, resilienza, disponibilit\u00e0 e rapidit\u00e0 nell\u2019esecuzione delle richieste<\/strong>: la produttivit\u00e0 e la competitivit\u00e0 sul mercato, infatti, sono condizionate dalle <strong>performance dell\u2019intero ecosistema digitale<\/strong> nel quale opera l\u2019azienda.<\/p>\n<p>L\u2019acquisizione degli event log \u00e8 essenziale per <strong>rilevare le cause di criticit\u00e0 e di prestazioni non in linea con i requisiti e le aspettative aziendali<\/strong>. Il Log Management abilita il monitoraggio di componenti infrastrutturali come reti, apparati hardware e server, ma anche delle singole applicazioni, facendo confluire il tutto in messaggi e alert che <strong>indirizzano i tecnici verso le soluzioni pi\u00f9 efficaci.<\/strong> Senza un sistema di raccolta e analisi dei log come quello realizzato con la <a href=\"https:\/\/www.inetworking.it\/cybersecurity\/quielm-enterprise-log-management\/\" target=\"_blank\" rel=\"noopener\">soluzione QUIELM<\/a> di Intesys Networking grazie alla piattaforma <a href=\"https:\/\/www.elastic.co\/elastic-stack\" target=\"_blank\" rel=\"noopener\">Elastic Stack<\/a>, risalire alle cause di eventuali problematiche sarebbe proibitivo in termini di tempi e costi, e talvolta anche poco efficace.<\/p>\n<h2 id=\"stoc-efficienza-dei-processi-e-innovazione\" class=\"wpig-heading\">Efficienza dei processi e innovazione<\/h2>\n<p>Ormai, i processi di business sono digitalizzati e transitano nei sistemi informativi aziendali. L\u2019analisi dei log dei sistemi pu\u00f2 <strong>identificare eventuali inefficienze<\/strong>, dovute talvolta a processi non ben architettati o a un\u2019esecuzione non conforme alle policy aziendali. In questi casi, l\u2019analisi pu\u00f2 suggerire <strong>ipotesi di riprogettazione e ottimizzazione dei processi<\/strong>, facendo eventualmente uso dell\u2019automazione nei segmenti pi\u00f9 ripetitivi e di routine. Cos\u00ec facendo, uno strumento di conoscenza, sicurezza e compliance si trasforma in un driver di efficienza e di crescita aziendale.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][nectar_btn size=&#8221;large&#8221; open_new_tab=&#8221;true&#8221; button_style=&#8221;regular&#8221; button_color_2=&#8221;Accent-Color&#8221; color_override=&#8221;#0f33ce&#8221; solid_text_color_override=&#8221;#ffffff&#8221; icon_family=&#8221;none&#8221; url=&#8221;https:\/\/www.inetworking.it\/contattaci\/#form&#8221; text=&#8221;SEI INTERESSATO? CONTATTACI&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; disable_element=&#8221;yes&#8221; advanced_gradient_angle=&#8221;0&#8243; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221;&#8230;<\/p>\n","protected":false},"author":86,"featured_media":11247,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[27],"tags":[206,322,753,421,744],"class_list":{"0":"post-11234","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-information-technology","8":"tag-cybersecurity","9":"tag-gdpr","10":"tag-infrastruttura-it","11":"tag-log-management","12":"tag-troubleshooting"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Log Management: 4 buoni motivi per iniziare a occuparsene<\/title>\n<meta name=\"description\" content=\"Compliance, sicurezza e massima visibilit\u00e0 sugli ambienti IT: questi e altri buoni motivi per adottare un sistema di Log Management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intesys.it\/journal\/information-technology\/log-management-4-buoni-motivi-per-iniziare-ad-occuparsene\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Log Management: 4 buoni motivi per iniziare a occuparsene\" \/>\n<meta property=\"og:description\" content=\"Compliance, sicurezza e massima visibilit\u00e0 sugli ambienti IT: questi e altri buoni motivi per adottare un sistema di Log Management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intesys.it\/journal\/information-technology\/log-management-4-buoni-motivi-per-iniziare-ad-occuparsene\/\" \/>\n<meta property=\"og:site_name\" content=\"Intesys Journal\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-14T09:15:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-27T08:35:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2022\/07\/social_log-management.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mirko Spezie\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mirko Spezie\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/log-management-4-buoni-motivi-per-iniziare-ad-occuparsene\/\",\"url\":\"https:\/\/www.intesys.it\/journal\/information-technology\/log-management-4-buoni-motivi-per-iniziare-ad-occuparsene\/\",\"name\":\"Log Management: 4 buoni motivi per iniziare a occuparsene\",\"isPartOf\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/log-management-4-buoni-motivi-per-iniziare-ad-occuparsene\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/log-management-4-buoni-motivi-per-iniziare-ad-occuparsene\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2022\/07\/log-management.png\",\"datePublished\":\"2022-07-14T09:15:07+00:00\",\"dateModified\":\"2023-11-27T08:35:55+00:00\",\"author\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/e51a920cc61e20558c2844efee75fd4f\"},\"description\":\"Compliance, sicurezza e massima visibilit\u00e0 sugli ambienti IT: questi e altri buoni motivi per adottare un sistema di Log Management.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/log-management-4-buoni-motivi-per-iniziare-ad-occuparsene\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intesys.it\/journal\/information-technology\/log-management-4-buoni-motivi-per-iniziare-ad-occuparsene\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/log-management-4-buoni-motivi-per-iniziare-ad-occuparsene\/#primaryimage\",\"url\":\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2022\/07\/log-management.png\",\"contentUrl\":\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2022\/07\/log-management.png\",\"width\":1280,\"height\":960},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/log-management-4-buoni-motivi-per-iniziare-ad-occuparsene\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intesys.it\/journal\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Log Management: 4 buoni motivi per iniziare a occuparsene\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intesys.it\/journal\/#website\",\"url\":\"https:\/\/www.intesys.it\/journal\/\",\"name\":\"Intesys\",\"description\":\"Ogni settimana nuovi articoli dedicati al mondo della trasformazione digitale!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intesys.it\/journal\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/e51a920cc61e20558c2844efee75fd4f\",\"name\":\"Mirko Spezie\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a27b020ee05f852786c05d4e33e015dfb9bc47211ee41cebe410b796b3068bf7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a27b020ee05f852786c05d4e33e015dfb9bc47211ee41cebe410b796b3068bf7?s=96&d=mm&r=g\",\"caption\":\"Mirko Spezie\"},\"description\":\"Il suo primo amore \u00e8 stato un glorioso Olivetti 8086 nel lontano 1991. Mirko ha un'esperienza ventennale nella gestione e sviluppo di reti e sistemi a livello enterprise e la sua forte passione verso la cybersecurity ne completa il ruolo che ricopriva in Intesys.\",\"url\":\"https:\/\/www.intesys.it\/journal\/autore\/mirko-spezie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Log Management: 4 buoni motivi per iniziare a occuparsene","description":"Compliance, sicurezza e massima visibilit\u00e0 sugli ambienti IT: questi e altri buoni motivi per adottare un sistema di Log Management.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intesys.it\/journal\/information-technology\/log-management-4-buoni-motivi-per-iniziare-ad-occuparsene\/","og_locale":"it_IT","og_type":"article","og_title":"Log Management: 4 buoni motivi per iniziare a occuparsene","og_description":"Compliance, sicurezza e massima visibilit\u00e0 sugli ambienti IT: questi e altri buoni motivi per adottare un sistema di Log Management.","og_url":"https:\/\/www.intesys.it\/journal\/information-technology\/log-management-4-buoni-motivi-per-iniziare-ad-occuparsene\/","og_site_name":"Intesys Journal","article_published_time":"2022-07-14T09:15:07+00:00","article_modified_time":"2023-11-27T08:35:55+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2022\/07\/social_log-management.png","type":"image\/png"}],"author":"Mirko Spezie","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"Mirko Spezie","Tempo di lettura stimato":"9 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.intesys.it\/journal\/information-technology\/log-management-4-buoni-motivi-per-iniziare-ad-occuparsene\/","url":"https:\/\/www.intesys.it\/journal\/information-technology\/log-management-4-buoni-motivi-per-iniziare-ad-occuparsene\/","name":"Log Management: 4 buoni motivi per iniziare a occuparsene","isPartOf":{"@id":"https:\/\/www.intesys.it\/journal\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intesys.it\/journal\/information-technology\/log-management-4-buoni-motivi-per-iniziare-ad-occuparsene\/#primaryimage"},"image":{"@id":"https:\/\/www.intesys.it\/journal\/information-technology\/log-management-4-buoni-motivi-per-iniziare-ad-occuparsene\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2022\/07\/log-management.png","datePublished":"2022-07-14T09:15:07+00:00","dateModified":"2023-11-27T08:35:55+00:00","author":{"@id":"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/e51a920cc61e20558c2844efee75fd4f"},"description":"Compliance, sicurezza e massima visibilit\u00e0 sugli ambienti IT: questi e altri buoni motivi per adottare un sistema di Log Management.","breadcrumb":{"@id":"https:\/\/www.intesys.it\/journal\/information-technology\/log-management-4-buoni-motivi-per-iniziare-ad-occuparsene\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intesys.it\/journal\/information-technology\/log-management-4-buoni-motivi-per-iniziare-ad-occuparsene\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.intesys.it\/journal\/information-technology\/log-management-4-buoni-motivi-per-iniziare-ad-occuparsene\/#primaryimage","url":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2022\/07\/log-management.png","contentUrl":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2022\/07\/log-management.png","width":1280,"height":960},{"@type":"BreadcrumbList","@id":"https:\/\/www.intesys.it\/journal\/information-technology\/log-management-4-buoni-motivi-per-iniziare-ad-occuparsene\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intesys.it\/journal\/"},{"@type":"ListItem","position":2,"name":"Log Management: 4 buoni motivi per iniziare a occuparsene"}]},{"@type":"WebSite","@id":"https:\/\/www.intesys.it\/journal\/#website","url":"https:\/\/www.intesys.it\/journal\/","name":"Intesys","description":"Ogni settimana nuovi articoli dedicati al mondo della trasformazione digitale!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intesys.it\/journal\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/e51a920cc61e20558c2844efee75fd4f","name":"Mirko Spezie","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a27b020ee05f852786c05d4e33e015dfb9bc47211ee41cebe410b796b3068bf7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a27b020ee05f852786c05d4e33e015dfb9bc47211ee41cebe410b796b3068bf7?s=96&d=mm&r=g","caption":"Mirko Spezie"},"description":"Il suo primo amore \u00e8 stato un glorioso Olivetti 8086 nel lontano 1991. Mirko ha un'esperienza ventennale nella gestione e sviluppo di reti e sistemi a livello enterprise e la sua forte passione verso la cybersecurity ne completa il ruolo che ricopriva in Intesys.","url":"https:\/\/www.intesys.it\/journal\/autore\/mirko-spezie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts\/11234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/users\/86"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/comments?post=11234"}],"version-history":[{"count":11,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts\/11234\/revisions"}],"predecessor-version":[{"id":13150,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts\/11234\/revisions\/13150"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/media\/11247"}],"wp:attachment":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/media?parent=11234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/categories?post=11234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/tags?post=11234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}