{"id":53372,"date":"2025-06-20T13:07:31","date_gmt":"2025-06-20T13:07:31","guid":{"rendered":"https:\/\/www.edgenexus.io\/non-categorizzato\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/"},"modified":"2025-06-20T13:07:31","modified_gmt":"2025-06-20T13:07:31","slug":"la-vita-dopo-il-gateway-di-gestione-delle-minacce","status":"publish","type":"post","link":"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/","title":{"rendered":"La vita dopo il Gateway di gestione delle minacce"},"content":{"rendered":"<p><span class=\"multiline-text\">Il team di Microsoft Exchange ha pubblicato una buona notizia sulla fine del ciclo di vita del Threat Management Gateway (aka TMG). Sicuramente in edgeNEXUS stiamo riscontrando un interesse sempre maggiore per edgeNEXUS, in particolare come sostituto del Reverse Proxy \/ TMG, soprattutto perch\u00e9 fa parte intrinsecamente del nostro prodotto, consentendo ai nostri clienti di bilanciare il carico delle loro implementazioni di Exchange e di occuparsi dell&#8217;elemento Reverse Proxy senza richiedere ulteriori componenti aggiuntivi. <\/span><\/p>\n<blockquote><p>La vita in un mondo post TMG: \u00e8 cos\u00ec spaventosa come pensi?<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Il team di Microsoft Exchange ha pubblicato una buona notizia sulla fine del ciclo di vita del Threat Management Gateway (aka TMG). Sicuramente in edgeNEXUS stiamo riscontrando un interesse sempre maggiore per edgeNEXUS, in particolare come sostituto del Reverse Proxy \/ TMG, soprattutto perch\u00e9 fa parte intrinsecamente del nostro prodotto, consentendo ai nostri clienti di [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":34488,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[371],"tags":[],"class_list":["post-53372","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-it"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>La vita dopo il Gateway di gestione delle minacce - Edgenexus load balancers and Application Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Donna Toomey\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/\"},\"author\":{\"name\":\"Donna Toomey\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/dc553ff5b496630eb88bf2d9ee2b31ca\"},\"headline\":\"La vita dopo il Gateway di gestione delle minacce\",\"datePublished\":\"2025-06-20T13:07:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/\"},\"wordCount\":94,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2013-08-14-11-00-58-546-0876_5000x500.you_2D00_had_2D00_me_2D00_at_2D00_ehlo_5000x500.png\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/\",\"url\":\"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/\",\"name\":\"La vita dopo il Gateway di gestione delle minacce - Edgenexus load balancers and Application Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2013-08-14-11-00-58-546-0876_5000x500.you_2D00_had_2D00_me_2D00_at_2D00_ehlo_5000x500.png\",\"datePublished\":\"2025-06-20T13:07:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/#primaryimage\",\"url\":\"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2013-08-14-11-00-58-546-0876_5000x500.you_2D00_had_2D00_me_2D00_at_2D00_ehlo_5000x500.png\",\"contentUrl\":\"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2013-08-14-11-00-58-546-0876_5000x500.you_2D00_had_2D00_me_2D00_at_2D00_ehlo_5000x500.png\",\"width\":448,\"height\":84,\"caption\":\"The Exchange Team Blog\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.edgenexus.io\/it\/edgenexus-load-balancing-adc-waf-e-gslb\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La vita dopo il Gateway di gestione delle minacce\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#website\",\"url\":\"https:\/\/www.edgenexus.io\/zh-hans\/\",\"name\":\"Edgenexus load balancers and Application Security\",\"description\":\"Edgenexus Load Balancers, ADC and Web application Firewalls (WAF)\",\"publisher\":{\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#organization\"},\"alternateName\":\"Load balancers and Web application firewall\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.edgenexus.io\/zh-hans\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#organization\",\"name\":\"Edgenexus\",\"url\":\"https:\/\/www.edgenexus.io\/zh-hans\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2023\/09\/edgenexus-adc-sq-transparentAsset-7.png\",\"contentUrl\":\"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2023\/09\/edgenexus-adc-sq-transparentAsset-7.png\",\"width\":903,\"height\":921,\"caption\":\"Edgenexus\"},\"image\":{\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/edgenexusio\",\"https:\/\/x.com\/edgenexusio\",\"https:\/\/www.linkedin.com\/company\/edgenexus\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/dc553ff5b496630eb88bf2d9ee2b31ca\",\"name\":\"Donna Toomey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3d4a009f6c17add48ad6905e40aac5308c04c77cdcff0616649d6c31251d1955?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3d4a009f6c17add48ad6905e40aac5308c04c77cdcff0616649d6c31251d1955?s=96&d=identicon&r=g\",\"caption\":\"Donna Toomey\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"La vita dopo il Gateway di gestione delle minacce - Edgenexus load balancers and Application Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/","twitter_misc":{"Scritto da":"Donna Toomey"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/#article","isPartOf":{"@id":"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/"},"author":{"name":"Donna Toomey","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/dc553ff5b496630eb88bf2d9ee2b31ca"},"headline":"La vita dopo il Gateway di gestione delle minacce","datePublished":"2025-06-20T13:07:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/"},"wordCount":94,"commentCount":0,"publisher":{"@id":"https:\/\/www.edgenexus.io\/zh-hans\/#organization"},"image":{"@id":"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/#primaryimage"},"thumbnailUrl":"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2013-08-14-11-00-58-546-0876_5000x500.you_2D00_had_2D00_me_2D00_at_2D00_ehlo_5000x500.png","articleSection":["Blog"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/","url":"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/","name":"La vita dopo il Gateway di gestione delle minacce - Edgenexus load balancers and Application Security","isPartOf":{"@id":"https:\/\/www.edgenexus.io\/zh-hans\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/#primaryimage"},"image":{"@id":"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/#primaryimage"},"thumbnailUrl":"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2013-08-14-11-00-58-546-0876_5000x500.you_2D00_had_2D00_me_2D00_at_2D00_ehlo_5000x500.png","datePublished":"2025-06-20T13:07:31+00:00","breadcrumb":{"@id":"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/#primaryimage","url":"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2013-08-14-11-00-58-546-0876_5000x500.you_2D00_had_2D00_me_2D00_at_2D00_ehlo_5000x500.png","contentUrl":"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2013-08-14-11-00-58-546-0876_5000x500.you_2D00_had_2D00_me_2D00_at_2D00_ehlo_5000x500.png","width":448,"height":84,"caption":"The Exchange Team Blog"},{"@type":"BreadcrumbList","@id":"https:\/\/www.edgenexus.io\/it\/blog-it\/la-vita-dopo-il-gateway-di-gestione-delle-minacce\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.edgenexus.io\/it\/edgenexus-load-balancing-adc-waf-e-gslb\/"},{"@type":"ListItem","position":2,"name":"La vita dopo il Gateway di gestione delle minacce"}]},{"@type":"WebSite","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#website","url":"https:\/\/www.edgenexus.io\/zh-hans\/","name":"Edgenexus load balancers and Application Security","description":"Edgenexus Load Balancers, ADC and Web application Firewalls (WAF)","publisher":{"@id":"https:\/\/www.edgenexus.io\/zh-hans\/#organization"},"alternateName":"Load balancers and Web application firewall","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.edgenexus.io\/zh-hans\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#organization","name":"Edgenexus","url":"https:\/\/www.edgenexus.io\/zh-hans\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/logo\/image\/","url":"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2023\/09\/edgenexus-adc-sq-transparentAsset-7.png","contentUrl":"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2023\/09\/edgenexus-adc-sq-transparentAsset-7.png","width":903,"height":921,"caption":"Edgenexus"},"image":{"@id":"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/edgenexusio","https:\/\/x.com\/edgenexusio","https:\/\/www.linkedin.com\/company\/edgenexus\/"]},{"@type":"Person","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/dc553ff5b496630eb88bf2d9ee2b31ca","name":"Donna Toomey","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3d4a009f6c17add48ad6905e40aac5308c04c77cdcff0616649d6c31251d1955?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3d4a009f6c17add48ad6905e40aac5308c04c77cdcff0616649d6c31251d1955?s=96&d=identicon&r=g","caption":"Donna Toomey"}}]}},"_links":{"self":[{"href":"https:\/\/www.edgenexus.io\/it\/wp-json\/wp\/v2\/posts\/53372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.edgenexus.io\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.edgenexus.io\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.edgenexus.io\/it\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.edgenexus.io\/it\/wp-json\/wp\/v2\/comments?post=53372"}],"version-history":[{"count":0,"href":"https:\/\/www.edgenexus.io\/it\/wp-json\/wp\/v2\/posts\/53372\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.edgenexus.io\/it\/wp-json\/wp\/v2\/media\/34488"}],"wp:attachment":[{"href":"https:\/\/www.edgenexus.io\/it\/wp-json\/wp\/v2\/media?parent=53372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.edgenexus.io\/it\/wp-json\/wp\/v2\/categories?post=53372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.edgenexus.io\/it\/wp-json\/wp\/v2\/tags?post=53372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}