{"id":801,"date":"2019-12-27T21:06:13","date_gmt":"2019-12-28T03:06:13","guid":{"rendered":"https:\/\/the7.io\/basic-business\/?post_type=dt_portfolio&#038;p=801"},"modified":"2021-04-09T18:35:00","modified_gmt":"2021-04-09T23:35:00","slug":"seguridad","status":"publish","type":"dt_portfolio","link":"https:\/\/security-networks.com.mx\/?dt_portfolio=seguridad","title":{"rendered":"Seguridad"},"content":{"rendered":"<p>[vc_row equal_height=\u00bbyes\u00bb content_placement=\u00bbtop\u00bb css=\u00bb.vc_custom_1580203700499{padding-bottom: 30px !important;}\u00bb][vc_column css=\u00bb.vc_custom_1580063873894{padding-bottom: 20px !important;}\u00bb]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91 figure,\n.gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91 .rollover,\n.gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91 img,\n.gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91 .gallery-rollover {\n  border-radius: 0px;\n}\n.gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91.enable-bg-rollover .gallery-rollover {\n  background: -webkit-linear-gradient();\n  background: linear-gradient();\n}\n.gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91.enable-bg-rollover.hover-scale figure .rollover:after {\n  background: -webkit-linear-gradient();\n  background: linear-gradient();\n}\n.gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91 .gallery-zoom-ico {\n  width: 44px;\n  height: 44px;\n  line-height: 44px;\n  border-radius: 100px;\n  margin: -22px 0 0 -22px;\n  border-width: 0px;\n  color: #ffffff;\n}\n.dt-icon-bg-on.gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91 .gallery-zoom-ico {\n  background: rgba(255,255,255,0.3);\n  box-shadow: none;\n}\n.gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91 .gallery-zoom-ico:before,\n.gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91 .gallery-zoom-ico span {\n  font-size: 32px;\n  line-height: 44px;\n  color: #ffffff;\n}\n.gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91:not(.resize-by-browser-width) .dt-css-grid {\n  grid-row-gap: 10px;\n  grid-column-gap: 10px;\n  grid-template-columns: repeat(auto-fill,minmax(,1fr));\n}\n.gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91:not(.resize-by-browser-width) .dt-css-grid .double-width {\n  grid-column: span 2;\n}\n.cssgridlegacy.no-cssgrid .gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91:not(.resize-by-browser-width) .dt-css-grid,\n.no-cssgridlegacy.no-cssgrid .gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91:not(.resize-by-browser-width) .dt-css-grid {\n  display: flex;\n  flex-flow: row wrap;\n  margin: -5px;\n}\n.cssgridlegacy.no-cssgrid .gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91:not(.resize-by-browser-width) .dt-css-grid .wf-cell,\n.no-cssgridlegacy.no-cssgrid .gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91:not(.resize-by-browser-width) .dt-css-grid .wf-cell {\n  flex: 1 0 ;\n  max-width: 100%;\n  padding: 5px;\n  box-sizing: border-box;\n}\n.gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91.resize-by-browser-width .dt-css-grid {\n  grid-template-columns: repeat(3,1fr);\n  grid-template-rows: auto;\n  grid-column-gap: 10px;\n  grid-row-gap: 10px;\n}\n.gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91.resize-by-browser-width .dt-css-grid .double-width {\n  grid-column: span 2;\n}\n.cssgridlegacy.no-cssgrid .gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91.resize-by-browser-width .dt-css-grid {\n  margin: -5px;\n}\n.cssgridlegacy.no-cssgrid .gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91.resize-by-browser-width .dt-css-grid .wf-cell {\n  width: 33.333333333333%;\n  padding: 5px;\n}\n.cssgridlegacy.no-cssgrid .gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91.resize-by-browser-width .dt-css-grid .wf-cell.double-width {\n  width: calc(33.333333333333%) * 2;\n}\n.gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91.resize-by-browser-width:not(.centered-layout-list):not(.content-bg-on) .dt-css-grid {\n  grid-row-gap: 10px - ;\n}\n@media screen and (max-width: 1199px) {\n  .gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91.resize-by-browser-width .dt-css-grid {\n    grid-template-columns: repeat(3,1fr);\n  }\n  .cssgridlegacy.no-cssgrid .gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91.resize-by-browser-width .dt-css-grid .wf-cell,\n  .no-cssgridlegacy.no-cssgrid .gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91.resize-by-browser-width .dt-css-grid .wf-cell {\n    width: 33.333333333333%;\n  }\n  .cssgridlegacy.no-cssgrid .gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91.resize-by-browser-width .dt-css-grid .wf-cell.double-width,\n  .no-cssgridlegacy.no-cssgrid .gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91.resize-by-browser-width .dt-css-grid .wf-cell.double-width {\n    width: calc(33.333333333333%)*2;\n  }\n}\n@media screen and (max-width: 991px) {\n  .gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91.resize-by-browser-width .dt-css-grid {\n    grid-template-columns: repeat(3,1fr);\n  }\n  .cssgridlegacy.no-cssgrid .gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91.resize-by-browser-width .dt-css-grid .wf-cell,\n  .no-cssgridlegacy.no-cssgrid .gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91.resize-by-browser-width .dt-css-grid .wf-cell {\n    width: 33.333333333333%;\n  }\n  .cssgridlegacy.no-cssgrid .gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91.resize-by-browser-width .dt-css-grid .wf-cell.double-width,\n  .no-cssgridlegacy.no-cssgrid .gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91.resize-by-browser-width .dt-css-grid .wf-cell.double-width {\n    width: calc(33.333333333333%)*2;\n  }\n}\n@media screen and (max-width: 767px) {\n  .gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91.resize-by-browser-width .dt-css-grid {\n    grid-template-columns: repeat(3,1fr);\n  }\n  .cssgridlegacy.no-cssgrid .gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91.resize-by-browser-width .dt-css-grid .wf-cell,\n  .no-cssgridlegacy.no-cssgrid .gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91.resize-by-browser-width .dt-css-grid .wf-cell {\n    width: 33.333333333333%;\n  }\n  .cssgridlegacy.no-cssgrid .gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91.resize-by-browser-width .dt-css-grid .wf-cell.double-width,\n  .no-cssgridlegacy.no-cssgrid .gallery-shortcode.gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91.resize-by-browser-width .dt-css-grid .wf-cell.double-width {\n    width: calc(33.333333333333%)*2;\n  }\n}\n<\/style><div class=\"gallery-shortcode dt-gallery-container gallery-masonry-shortcode-id-c5388f32b7936f6dcc9a6e1fba0f5d91 mode-grid jquery-filter dt-icon-bg-off dt-css-grid-wrap enable-bg-rollover resize-by-browser-width  hover-fade loading-effect-none description-on-hover\" data-padding=\"5px\" data-cur-page=\"1\" data-post-limit=\"-1\" data-pagination-mode=\"none\" data-desktop-columns-num=\"3\" data-v-tablet-columns-num=\"3\" data-h-tablet-columns-num=\"3\" data-phone-columns-num=\"3\" data-width=\"0px\" data-columns=\"0\"><div class=\"dt-css-grid\" ><div class=\"wf-cell\" data-post-id=\"3041\" data-date=\"2021-02-08T17:41:29-06:00\" data-name=\"Seguridad Security Networks\"><figure class=\"post visible\"><a href=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/security-networks-seguridad.jpg\" class=\"rollover dt-pswp-item layzr-bg\" data-large_image_width=\"1400\" data-large_image_height=\"1400\" data-dt-img-description=\"\" title=\"Seguridad Security Networks\"><img loading=\"lazy\" decoding=\"async\" class=\"preload-me iso-lazy-load\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%20323%20323&#39;%2F%3E\" data-src=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/security-networks-seguridad-323x323.jpg\" data-srcset=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/security-networks-seguridad-323x323.jpg 323w, https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/security-networks-seguridad-485x485.jpg 485w\" alt=\"Seguridad Security Networks\" width=\"323\" height=\"323\"  \/><span class=\"gallery-rollover\"><\/span><\/a><\/figure><\/div><div class=\"wf-cell\" data-post-id=\"3269\" data-date=\"2021-04-09T18:19:48-05:00\" data-name=\"Cisco Partner\"><figure class=\"post visible\"><a href=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/Cisco-Partner-logo.jpg\" class=\"rollover dt-pswp-item layzr-bg\" data-large_image_width=\"500\" data-large_image_height=\"500\" data-dt-img-description=\"\" title=\"Cisco Partner\"><img loading=\"lazy\" decoding=\"async\" class=\"preload-me iso-lazy-load\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%20323%20323&#39;%2F%3E\" data-src=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/Cisco-Partner-logo-323x323.jpg\" data-srcset=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/Cisco-Partner-logo-323x323.jpg 323w, https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/Cisco-Partner-logo-485x485.jpg 485w\" alt=\"Cisco Partner\" width=\"323\" height=\"323\"  \/><span class=\"gallery-rollover\"><\/span><\/a><\/figure><\/div><div class=\"wf-cell\" data-post-id=\"3037\" data-date=\"2021-02-08T17:36:42-06:00\" data-name=\"Seguridad Security Networks\"><figure class=\"post visible\"><a href=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/seguridad.jpg\" class=\"rollover dt-pswp-item layzr-bg\" data-large_image_width=\"1400\" data-large_image_height=\"1400\" data-dt-img-description=\"\" title=\"Seguridad Security Networks\"><img loading=\"lazy\" decoding=\"async\" class=\"preload-me iso-lazy-load\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%20323%20323&#39;%2F%3E\" data-src=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/seguridad-323x323.jpg\" data-srcset=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/seguridad-323x323.jpg 323w, https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/seguridad-485x485.jpg 485w\" alt=\"Seguridad Security Networks\" width=\"323\" height=\"323\"  \/><span class=\"gallery-rollover\"><\/span><\/a><\/figure><\/div><\/div><!-- iso-container|iso-grid --><\/div>[\/vc_column][\/vc_row][vc_row css=\u00bb.vc_custom_1580203751737{margin-bottom: -20px !important;}\u00bb][vc_column width=\u00bb5\/12&#8243; css=\u00bb.vc_custom_1580203840770{padding-bottom: 30px !important;}\u00bb offset=\u00bbvc_col-lg-4 vc_col-md-5&#8243;][vc_column_text css=\u00bb.vc_custom_1612826726216{padding-bottom: 30px !important;}\u00bb]<\/p>\n<h3><em>\u201cLas empresas deben proteger m\u00e1s que nunca la entrada a las infraestructuras digitales de sus compa\u00f1\u00edas, ya que cada vez los ataques son m\u00e1s sofisticados.\u201d<\/em> Gartner<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb7\/12&#8243; css=\u00bb.vc_custom_1580203834285{padding-bottom: 30px !important;}\u00bb offset=\u00bbvc_col-lg-8 vc_col-md-7&#8243;][vc_column_text css=\u00bb.vc_custom_1617992547595{padding-bottom: 25px !important;}\u00bb]<\/p>\n<h4>Monitoreo del Comportamiento de la Red, Centro de Datos y Nube<\/h4>\n<p>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1617992559949{padding-bottom: 30px !important;}\u00bb]Cisco Tetration Analytics es una plataforma dise\u00f1ada para ayudar a los clientes a tener una visibilidad completa de todo su Centro de Datos en tiempo real, tiene la capacidad de analizar miles de millones de datos por segundo, al incorporar una combinaci\u00f3n de sensores de telemetr\u00eda de hardware y\/o software, para luego analizar la informaci\u00f3n usando una combinaci\u00f3n de tecnolog\u00edas de \u00faltima generaci\u00f3n, big-data y t\u00e9cnicas de aprendizaje autom\u00e1tico o \u201cmachine learning\u201d basado en algoritmos.[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00bbphone-reverse-col\u00bb css=\u00bb.vc_custom_1617928980737{margin-bottom: 20px !important;}\u00bb][vc_column css=\u00bb.vc_custom_1617993214209{margin-top: 20px !important;padding-bottom: 30px !important;}\u00bb][vc_single_image image=\u00bb3203&#8243; img_size=\u00bb600&#215;85&#8243;][vc_empty_space][vc_column_text css=\u00bb.vc_custom_1617992638465{padding-bottom: 25px !important;}\u00bb]Tetration, es una herramienta de anal\u00edtica de hardware y software que ofrece un sistema de protecci\u00f3n de la carga de trabajo y ciberseguridad Cisco Systems. Se implementa en nubes p\u00fablicas de AWS o Azure para obtener informaci\u00f3n del comportamiento de las aplicaciones y los elementos de seguridad implementados en un Centro de Datos con el objetivo de garantizar que los sistemas de monitoreo tengan una visibilidad completa de toda informaci\u00f3n que se comparta en una o varias redes, as\u00ed como proteger a todos los usuarios, aplicaciones, datos, infraestructura inform\u00e1tica, m\u00e1quinas virtuales, tr\u00e1fico de red de una empresa, el almacenamiento y los sistemas de archivos que contienen datos corporativos, e incluso la actividad de los usuarios y empleados.[\/vc_column_text]<div class=\"standard-arrow list-divider bullet-top\"><ul>\n<li><b>An\u00e1lisis de las aplicaciones:<\/b> Entender qu\u00e9 aplicaciones son dependientes unas de otras a trav\u00e9s del centro de datos y dentro de la nube.<\/li>\n<li><b>Simulaci\u00f3n de pol\u00edticas y an\u00e1lisis de impacto:<\/b> Moverse de un esquema reactivo a uno proactivo. Tomando decisiones operativas m\u00e1s informadas y validando los efectos de las pol\u00edticas antes de ser implementadas, asegurando el servicio.<\/li>\n<li><b>An\u00e1lisis forense de flujo de red:<\/b> Realizar b\u00fasquedas en menos de un segundo, a trav\u00e9s de miles de millones de flujos usando el motor forense.<\/li>\n<li><b>Compliance Management:<\/b> Monitorear continuamente el comportamiento de la aplicaci\u00f3n, para r\u00e1pidamente identificar cualquier desviaci\u00f3n en los patrones de comunicaci\u00f3n.<\/li>\n<li><b>Recomendaciones autom\u00e1ticas de pol\u00edticas de listas blancas:<\/b> Moverse a un modelo de seguridad de confianza cero, basado en la comunicaci\u00f3n actual entre las aplicaciones.<\/li>\n<\/ul>\n<\/div>[\/vc_column][\/vc_row][vc_row el_class=\u00bbphone-reverse-col\u00bb css=\u00bb.vc_custom_1617928994903{margin-top: 20px !important;margin-bottom: 20px !important;}\u00bb][vc_column width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1617929126890{padding-bottom: 30px !important;}\u00bb]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.shortcode-single-image-wrap.shortcode-single-image-d780b25145dcd1682a278b33e8ee5e5d.enable-bg-rollover .rollover i,\n.shortcode-single-image-wrap.shortcode-single-image-d780b25145dcd1682a278b33e8ee5e5d.enable-bg-rollover .rollover-video i {\n  background: -webkit-linear-gradient();\n  background: linear-gradient();\n}\n.shortcode-single-image-wrap.shortcode-single-image-d780b25145dcd1682a278b33e8ee5e5d .rollover-icon {\n  font-size: 32px;\n  color: #ffffff;\n  min-width: 44px;\n  min-height: 44px;\n  line-height: 44px;\n  border-radius: 100px;\n  border-style: solid;\n  border-width: 0px;\n}\n.dt-icon-bg-on.shortcode-single-image-wrap.shortcode-single-image-d780b25145dcd1682a278b33e8ee5e5d .rollover-icon {\n  background: rgba(255,255,255,0.3);\n  box-shadow: none;\n}\n<\/style><div class=\"shortcode-single-image-wrap shortcode-single-image-d780b25145dcd1682a278b33e8ee5e5d alignnone  vc_custom_1618006927475 enable-bg-rollover dt-icon-bg-off\" ><div class=\"shortcode-single-image\"><div class=\"fancy-media-wrap  layzr-bg\" style=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"preload-me lazy-load\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%20500%20500&#39;%2F%3E\" data-src=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/cisco-umbrella-500x500-1.jpg\" data-srcset=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/cisco-umbrella-500x500-1.jpg 500w\" width=\"500\" height=\"500\"  data-dt-location=\"https:\/\/security-networks.com.mx\/?attachment_id=3216\" style=\"\" alt=\"Cisco Umbrella\" \/><\/div><\/div><\/div>[\/vc_column][vc_column width=\u00bb1\/2&#8243;][vc_column_text css=\u00bb.vc_custom_1617993439961{padding-bottom: 25px !important;}\u00bb]<\/p>\n<h4>Umbrella (Filtadro de URL\u00b4s)<\/h4>\n<p>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1617993461954{padding-bottom: 25px !important;}\u00bb]Umbrella proporciona la primera l\u00ednea de defensa contra las amenazas en Internet sin importar d\u00f3nde se encuentren los usuarios. Umbrella permite tener visibilidad completa de la actividad que se registra en Internet en todas las ubicaciones, dispositivos y usuarios, y detiene las amenazas antes de que lleguen a su red o endpoints.[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1617993470314{padding-bottom: 25px !important;}\u00bb]Como una plataforma abierta que se provee desde la nube, Umbrella se integra f\u00e1cilmente con sus soluciones de seguridad actuales y ofrece inteligencia alrededor de las amenazas existentes y emergentes. Con Umbrella usted puede detener oportunamente el phishing y las infecciones de malware, identificar m\u00e1s r\u00e1pidamente los dispositivos que ya han sido infectados y prevenir la sustracci\u00f3n de datos.[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1617993477944{padding-bottom: 25px !important;}\u00bb]<b>Cisco Umbrella<\/b> es el primer Secure Internet Gateway (SIG) del mercado <b>que<\/b> act\u00faa desde el Cloud. soluci\u00f3n basada en <b>la nube<\/b> y dise\u00f1ada para la protecci\u00f3n de los dispositivos que est\u00e1n tanto dentro como fuera de la <b>red corporativa.<\/b>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=\u00bb.vc_custom_1618006934730{margin-top: 40px !important;margin-bottom: 20px !important;}\u00bb][vc_column width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1618008367893{margin-top: 10px !important;}\u00bb][vc_column_text css=\u00bb.vc_custom_1617993486242{padding-bottom: 25px !important;}\u00bb]<\/p>\n<h4>Secure Email<\/h4>\n<p>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1617993495548{padding-bottom: 25px !important;}\u00bb]Las amenazas de correo electr\u00f3nico presentan desaf\u00edos de seguridad para todas las organizaciones.Cisco Secure Email es su defensa contra la suplantaci\u00f3n de identidad (phishing), los riesgos del correo electr\u00f3nico comercial (BEC), el malware y el ransomware. Brinda protecci\u00f3n contra malware sigiloso en adjuntos mientras la inteligencia de amenazas l\u00edder de la industria combate los enlaces maliciosos. Tambi\u00e9n ofrecemos capacidades para defensa contra la suplantaci\u00f3n de identidad (phishing), autenticaci\u00f3n de DMARC y protecci\u00f3n de la marca, y autenticaci\u00f3n de varios factores con Cisco Secure Access by Duo.<span class=\"Apple-converted-space\">\u00a0<\/span>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243;]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.shortcode-single-image-wrap.shortcode-single-image-97354f7e691a1ad7d25534d5cccf5f1f.enable-bg-rollover .rollover i,\n.shortcode-single-image-wrap.shortcode-single-image-97354f7e691a1ad7d25534d5cccf5f1f.enable-bg-rollover .rollover-video i {\n  background: -webkit-linear-gradient();\n  background: linear-gradient();\n}\n.shortcode-single-image-wrap.shortcode-single-image-97354f7e691a1ad7d25534d5cccf5f1f .rollover-icon {\n  font-size: 32px;\n  color: #ffffff;\n  min-width: 44px;\n  min-height: 44px;\n  line-height: 44px;\n  border-radius: 100px;\n  border-style: solid;\n  border-width: 0px;\n}\n.dt-icon-bg-on.shortcode-single-image-wrap.shortcode-single-image-97354f7e691a1ad7d25534d5cccf5f1f .rollover-icon {\n  background: rgba(255,255,255,0.3);\n  box-shadow: none;\n}\n<\/style><div class=\"shortcode-single-image-wrap shortcode-single-image-97354f7e691a1ad7d25534d5cccf5f1f alignnone  vc_custom_1618007809102 enable-bg-rollover dt-icon-bg-off\" ><div class=\"shortcode-single-image\"><div class=\"fancy-media-wrap  layzr-bg\" style=\"border-radius:30px;\"><img loading=\"lazy\" decoding=\"async\" class=\"preload-me lazy-load\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%20800%20500&#39;%2F%3E\" data-src=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/Seguridad-Security-Networks-800x500.jpg\" data-srcset=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/Seguridad-Security-Networks-800x500.jpg 800w, https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/Seguridad-Security-Networks-1000x625.jpg 1000w\" width=\"800\" height=\"500\"  data-dt-location=\"https:\/\/security-networks.com.mx\/?attachment_id=3219\" style=\"border-radius:30px;\" alt=\"Seguridad Security Networks\" \/><\/div><\/div><\/div>[\/vc_column][\/vc_row][vc_row css=\u00bb.vc_custom_1618007205923{margin-top: 40px !important;margin-bottom: 20px !important;}\u00bb][vc_column width=\u00bb1\/2&#8243;]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.shortcode-single-image-wrap.shortcode-single-image-3b49a6451072c41477da68089dda489b.enable-bg-rollover .rollover i,\n.shortcode-single-image-wrap.shortcode-single-image-3b49a6451072c41477da68089dda489b.enable-bg-rollover .rollover-video i {\n  background: -webkit-linear-gradient();\n  background: linear-gradient();\n}\n.shortcode-single-image-wrap.shortcode-single-image-3b49a6451072c41477da68089dda489b .rollover-icon {\n  font-size: 32px;\n  color: #ffffff;\n  min-width: 44px;\n  min-height: 44px;\n  line-height: 44px;\n  border-radius: 100px;\n  border-style: solid;\n  border-width: 0px;\n}\n.dt-icon-bg-on.shortcode-single-image-wrap.shortcode-single-image-3b49a6451072c41477da68089dda489b .rollover-icon {\n  background: rgba(255,255,255,0.3);\n  box-shadow: none;\n}\n<\/style><div class=\"shortcode-single-image-wrap shortcode-single-image-3b49a6451072c41477da68089dda489b alignnone  vc_custom_1618008330642 enable-bg-rollover dt-icon-bg-off\" ><div class=\"shortcode-single-image\"><div class=\"fancy-media-wrap  layzr-bg\" style=\"border-radius:30px;\"><img loading=\"lazy\" decoding=\"async\" class=\"preload-me lazy-load\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%20600%20400&#39;%2F%3E\" data-src=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/zero-trust-600x400.jpg\" data-srcset=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/zero-trust-600x400.jpg 600w, https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/zero-trust.jpg 1000w\" width=\"600\" height=\"400\"  data-dt-location=\"https:\/\/security-networks.com.mx\/?attachment_id=3239\" style=\"border-radius:30px;\" alt=\"Autentificaci\u00f3n Multifactor\" \/><\/div><\/div><\/div>[\/vc_column][vc_column width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1618008347009{margin-top: 10px !important;}\u00bb][vc_column_text css=\u00bb.vc_custom_1618008320054{padding-bottom: 25px !important;}\u00bb]<\/p>\n<h4>Autentificaci\u00f3n Multifactor<\/h4>\n<p>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1618007969055{padding-bottom: 25px !important;}\u00bb]<span class=\"Apple-converted-space\">\u00a0<\/span>La suplantaci\u00f3n de identidad o phishing son problemas graves, tanto para particulares como para empresas. Los ataques de phishing han aumentado en cantidad y sofisticaci\u00f3n en todo el mundo.<\/p>\n<p><a href=\"https:\/\/www.sccenlared.es\/cisco-duo-autenticacion-multifactor-mfa-con\/\" target=\"_blank\" rel=\"noopener\">Duo es un sistema de autenticaci\u00f3n de m\u00faltiple factor (MFA)<\/a> que proporciona seguridad Zero-Trust (confianza cero) a toda la plantilla de la organizaci\u00f3n. Gracias a esta soluci\u00f3n, una compa\u00f1\u00eda puede proteger todas las aplicaciones y la informaci\u00f3n confidencial. Verifica la identidad de todos los usuarios antes de otorgar acceso a aplicaciones y recursos corporativos y comprueba que tengan una identidad en la que se pueda confiar. Lo hace en segundos para proteger cualquier dispositivo de un acceso malintencionado.[\/vc_column_text][\/vc_column][vc_column css=\u00bb.vc_custom_1618007915187{margin-top: 20px !important;}\u00bb][vc_column_text css=\u00bb.vc_custom_1617993566199{padding-bottom: 25px !important;}\u00bb]El sistema permite obtener informaci\u00f3n detallada sobre cada tipo de dispositivo que navegue por las aplicaciones corporativas, en todas las plataformas.<\/p>\n<p>Verifica que todos los dispositivos que quieren acceder a las aplicaciones de la empresa, los corporativos y de propiedad personal, no est\u00e9n infectados. Lo hace a trav\u00e9s de una evaluaci\u00f3n y una supervisi\u00f3n sencilla y simple del dispositivo.[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1617930204893{padding-bottom: 25px !important;}\u00bb]Beneficios de los contenedores. En vez de virtualizar la pila de hardware como se hace con las m\u00e1quinas virtuales, los contenedores se virtualizan en el nivel del sistema operativo y se utilizan varios contenedores en ejecuci\u00f3n encima del kernel del sistema operativo directamente. Esto significa que los contenedores son mucho m\u00e1s ligeros: comparten el kernel del sistema operativo, se inician mucho m\u00e1s r\u00e1pido y utilizan una fracci\u00f3n de la memoria en comparaci\u00f3n con el inicio de un sistema operativo completo.<span class=\"Apple-converted-space\">\u00a0<\/span>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00bbphone-reverse-col\u00bb css=\u00bb.vc_custom_1618007927185{margin-top: 40px !important;margin-bottom: 20px !important;}\u00bb][vc_column width=\u00bb1\/2&#8243;][vc_column_text css=\u00bb.vc_custom_1617993583187{padding-bottom: 25px !important;}\u00bb]<\/p>\n<h4>Seguridad en la red perimetral<\/h4>\n<p>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1617993590064{padding-bottom: 25px !important;}\u00bb]El firewall de \u00faltima generaci\u00f3n Cisco FirepowerTM (NGFW) es el primer firewall de \u00faltima generaci\u00f3n centrado en las amenazas verdaderamente integrado del sector con administraci\u00f3n unificada. Ofrece visibilidad y control de aplicaciones (AVC), IPS de \u00faltima generaci\u00f3n (NGIPS) opcional de Firepower, protecci\u00f3n frente a malware avanzado (AMP) de Cisco\u00ae y filtrado de URL. Cisco Firepower NGFW ofrece protecci\u00f3n frente a amenazas avanzadas antes y despu\u00e9s de un ataque, as\u00ed como durante este.<span class=\"Apple-converted-space\">\u00a0<\/span>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1617993602696{padding-bottom: 25px !important;}\u00bb]Las soluciones Cisco FireSIGHT y Cisco FirePOWER estan enfocadas a la detecci\u00f3n temprana y contenci\u00f3n de amenazas en redes de organizaciones. Gracias a ellas, y en combinaci\u00f3n con otras soluciones de Cisco, es posible reducir el tiempo de detecci\u00f3n y respuesta a amenazas a unas pocas horas. Si a eso a\u00f1adimos las mejoras en prevenci\u00f3n de p\u00e9rdida de datos, reducci\u00f3n de tiempos de respuesta y cargas de trabajo, cumplimiento de normativas y ahorro econ\u00f3mico, vemos sin dudar la poderosa ayuda que ofrecen las soluciones Cisco.[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1617929126890{padding-bottom: 30px !important;}\u00bb]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.shortcode-single-image-wrap.shortcode-single-image-b9b126fd46a516cbf9d2ae98b2d28599.enable-bg-rollover .rollover i,\n.shortcode-single-image-wrap.shortcode-single-image-b9b126fd46a516cbf9d2ae98b2d28599.enable-bg-rollover .rollover-video i {\n  background: -webkit-linear-gradient();\n  background: linear-gradient();\n}\n.shortcode-single-image-wrap.shortcode-single-image-b9b126fd46a516cbf9d2ae98b2d28599 .rollover-icon {\n  font-size: 32px;\n  color: #ffffff;\n  min-width: 44px;\n  min-height: 44px;\n  line-height: 44px;\n  border-radius: 100px;\n  border-style: solid;\n  border-width: 0px;\n}\n.dt-icon-bg-on.shortcode-single-image-wrap.shortcode-single-image-b9b126fd46a516cbf9d2ae98b2d28599 .rollover-icon {\n  background: rgba(255,255,255,0.3);\n  box-shadow: none;\n}\n<\/style><div class=\"shortcode-single-image-wrap shortcode-single-image-b9b126fd46a516cbf9d2ae98b2d28599 alignnone  vc_custom_1618008513816 enable-bg-rollover dt-icon-bg-off\" ><div class=\"shortcode-single-image\"><div class=\"fancy-media-wrap  layzr-bg\" style=\"border-radius:30px;\"><img loading=\"lazy\" decoding=\"async\" class=\"preload-me lazy-load\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%20600%20500&#39;%2F%3E\" data-src=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/firewall-security-networks-600x500.jpg\" data-srcset=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/firewall-security-networks-600x500.jpg 600w, https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/firewall-security-networks-800x667.jpg 800w\" width=\"600\" height=\"500\"  data-dt-location=\"https:\/\/security-networks.com.mx\/?attachment_id=3243\" style=\"border-radius:30px;\" alt=\"Seguridad en la red perimetral\" \/><\/div><\/div><\/div>[\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2&#8243;]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.shortcode-single-image-wrap.shortcode-single-image-ce9269b22386722e4afa407b21e2b480.enable-bg-rollover .rollover i,\n.shortcode-single-image-wrap.shortcode-single-image-ce9269b22386722e4afa407b21e2b480.enable-bg-rollover .rollover-video i {\n  background: -webkit-linear-gradient();\n  background: linear-gradient();\n}\n.shortcode-single-image-wrap.shortcode-single-image-ce9269b22386722e4afa407b21e2b480 .rollover-icon {\n  font-size: 32px;\n  color: #ffffff;\n  min-width: 44px;\n  min-height: 44px;\n  line-height: 44px;\n  border-radius: 100px;\n  border-style: solid;\n  border-width: 0px;\n}\n.dt-icon-bg-on.shortcode-single-image-wrap.shortcode-single-image-ce9269b22386722e4afa407b21e2b480 .rollover-icon {\n  background: rgba(255,255,255,0.3);\n  box-shadow: none;\n}\n<\/style><div class=\"shortcode-single-image-wrap shortcode-single-image-ce9269b22386722e4afa407b21e2b480 alignnone  vc_custom_1618009931018 enable-bg-rollover dt-icon-bg-off\" ><div class=\"shortcode-single-image\"><div class=\"fancy-media-wrap  layzr-bg\" style=\"border-radius:30px;\"><img loading=\"lazy\" decoding=\"async\" class=\"preload-me lazy-load\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%20600%20400&#39;%2F%3E\" data-src=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/Seguridad-de-acceso-a-la-red-600x400.jpg\" data-srcset=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/Seguridad-de-acceso-a-la-red-600x400.jpg 600w, https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/Seguridad-de-acceso-a-la-red.jpg 1000w\" width=\"600\" height=\"400\"  data-dt-location=\"https:\/\/security-networks.com.mx\/?attachment_id=3245\" style=\"border-radius:30px;\" alt=\"Seguridad de acceso a la red\" \/><\/div><\/div><\/div>[\/vc_column][vc_column width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1618008890911{margin-top: 20px !important;}\u00bb][vc_column_text css=\u00bb.vc_custom_1618009845992{padding-bottom: 25px !important;}\u00bb]<\/p>\n<h4>Seguridad de acceso a la red<\/h4>\n<p>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1618009895720{padding-bottom: 25px !important;}\u00bb]Las soluciones de control de acceso a la red (NAC) admiten la visibilidad de red y la administraci\u00f3n de acceso mediante la aplicaci\u00f3n de pol\u00edticas en dispositivos y usuarios de la red corporativa. Un componente cr\u00edtico de cualquier estrategia de zero trust es la protecci\u00f3n del lugar de trabajo en que todo y todos se conectan. Cisco Identity Services Engine (ISE) permite un enfoque din\u00e1mico y automatizado para la aplicaci\u00f3n de pol\u00edticas que simplifica la entrega de un control de acceso a la red altamente seguro. ISE empodera el acceso definido por software y automatiza la segmentaci\u00f3n de la red dentro de los entornos de TI.[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=\u00bb.vc_custom_1618007697948{margin-top: 40px !important;}\u00bb][vc_column][vc_column_text css=\u00bb.vc_custom_1617929247119{padding-bottom: 25px !important;}\u00bb]<\/p>\n<h4>Beneficios:<\/h4>\n<p>[\/vc_column_text]<div class=\"standard-arrow list-divider bullet-top\"><ul>\n<li><b>Visibilidad<\/b>: Identifique qui\u00e9n, qu\u00e9, d\u00f3nde y c\u00f3mo se conectan los dispositivos y terminales. Observe profundamente los dispositivos a fin de garantizar el cumplimiento y limitar el riesgo con o sin agentes.<span class=\"Apple-converted-space\">\u00a0<\/span><\/li>\n<li><strong><a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/security\/identity-services-engine\/network-access-dynamic-visibility-aag.html\">Segmentaci\u00f3n<\/a> de la red<\/strong>: Impulse la productividad y reduzca su superficie de ataque.<\/li>\n<li><strong>Contenci\u00f3n Automatizada de amenazas:<\/strong> Elimine las amenazas de forma definitiva<\/li>\n<li><strong>Acceso Inal\u00e1mbrico Seguro, para usuarios temporales:<\/strong> F\u00e1cil incorporaci\u00f3n y aprovisionamiento.<\/li>\n<li><strong>Acceso por cable seguro:<\/strong>\u00a0Implementaci\u00f3n consistente de pol\u00edticas en conexiones<\/li>\n<li>Cumplimiento de los dispositivos. Descubra y corrija los dispositivos que ignoran la pol\u00edtica de seguridad.<\/li>\n<li><strong>Bring Your Own Device:<\/strong> Asegure todos los dispositivos de usuarios como, SmartPhones, IPAD\u00b4s , Tablets y cualquier dispositivo m\u00f3vil.<\/li>\n<li><b><\/b><b>La visibilidad y la segmentaci\u00f3n de la red ofrecen un ROI cuantificable.<\/b><\/li>\n<\/ul>\n<\/div>[\/vc_column][\/vc_row][vc_row el_class=\u00bbphone-reverse-col\u00bb css=\u00bb.vc_custom_1618007674727{margin-top: 40px !important;margin-bottom: 20px !important;}\u00bb][vc_column width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1617930329132{padding-top: 20px !important;}\u00bb][vc_column_text css=\u00bb.vc_custom_1617993881334{padding-bottom: 25px !important;}\u00bb]<\/p>\n<h4>CyberEye<\/h4>\n<p>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1618009001847{padding-bottom: 30px !important;}\u00bb]Este servicio analiza en tiempo real el comportamiento de los sistemas de la empresa y el uso que hacen de ellos, con el objetivo de detectar cualquier situaci\u00f3n sospechosa, bas\u00e1ndose su an\u00e1lisis en el uso de herramientas avanzadas, para mantenerse alerta y poder descubrir de forma inmediata cualquier posible comportamiento malicioso, evitando el robo<span class=\"Apple-converted-space\">\u00a0<\/span>p\u00e9rdida de datos sensibles y la filtraci\u00f3n.[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1618009636763{padding-bottom: 30px !important;}\u00bb]<strong>\u00bfA qui\u00e9n protegemos?<\/strong><\/p>\n<p>Usuario, Dispositivo, Aplicaciones y Datos e Infraestructura.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p><strong>\u00bfC\u00f3mo lo hacemos?<span class=\"Apple-converted-space\">\u00a0<\/span><\/strong>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243;]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.shortcode-single-image-wrap.shortcode-single-image-b9b6bac83d0267236c48f70672c49254.enable-bg-rollover .rollover i,\n.shortcode-single-image-wrap.shortcode-single-image-b9b6bac83d0267236c48f70672c49254.enable-bg-rollover .rollover-video i {\n  background: -webkit-linear-gradient();\n  background: linear-gradient();\n}\n.shortcode-single-image-wrap.shortcode-single-image-b9b6bac83d0267236c48f70672c49254 .rollover-icon {\n  font-size: 32px;\n  color: #ffffff;\n  min-width: 44px;\n  min-height: 44px;\n  line-height: 44px;\n  border-radius: 100px;\n  border-style: solid;\n  border-width: 0px;\n}\n.dt-icon-bg-on.shortcode-single-image-wrap.shortcode-single-image-b9b6bac83d0267236c48f70672c49254 .rollover-icon {\n  background: rgba(255,255,255,0.3);\n  box-shadow: none;\n}\n<\/style><div class=\"shortcode-single-image-wrap shortcode-single-image-b9b6bac83d0267236c48f70672c49254 alignnone  vc_custom_1618009181863 enable-bg-rollover dt-icon-bg-off\" ><div class=\"shortcode-single-image\"><div class=\"fancy-media-wrap  layzr-bg\" style=\"border-radius:30px;\"><img loading=\"lazy\" decoding=\"async\" class=\"preload-me lazy-load\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%20600%20400&#39;%2F%3E\" data-src=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/CyberEye-600x400.jpg\" data-srcset=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/CyberEye-600x400.jpg 600w, https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/CyberEye.jpg 1000w\" width=\"600\" height=\"400\"  data-dt-location=\"https:\/\/security-networks.com.mx\/?attachment_id=3251\" style=\"border-radius:30px;\" alt=\"CyberEye\" \/><\/div><\/div><\/div>[\/vc_column][\/vc_row][vc_row css=\u00bb.vc_custom_1618009947723{margin-top: 20px !important;margin-bottom: 20px !important;}\u00bb][vc_column width=\u00bb1\/2&#8243;]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.shortcode-single-image-wrap.shortcode-single-image-d21188ac308d0d010b09b62850cce9a1.enable-bg-rollover .rollover i,\n.shortcode-single-image-wrap.shortcode-single-image-d21188ac308d0d010b09b62850cce9a1.enable-bg-rollover .rollover-video i {\n  background: -webkit-linear-gradient();\n  background: linear-gradient();\n}\n.shortcode-single-image-wrap.shortcode-single-image-d21188ac308d0d010b09b62850cce9a1 .rollover-icon {\n  font-size: 32px;\n  color: #ffffff;\n  min-width: 44px;\n  min-height: 44px;\n  line-height: 44px;\n  border-radius: 100px;\n  border-style: solid;\n  border-width: 0px;\n}\n.dt-icon-bg-on.shortcode-single-image-wrap.shortcode-single-image-d21188ac308d0d010b09b62850cce9a1 .rollover-icon {\n  background: rgba(255,255,255,0.3);\n  box-shadow: none;\n}\n<\/style><div class=\"shortcode-single-image-wrap shortcode-single-image-d21188ac308d0d010b09b62850cce9a1 alignnone  vc_custom_1618011272771 enable-bg-rollover dt-icon-bg-off\" ><div class=\"shortcode-single-image\"><div class=\"fancy-media-wrap  layzr-bg\" style=\"border-radius:30px;\"><img loading=\"lazy\" decoding=\"async\" class=\"preload-me lazy-load\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%20600%20300&#39;%2F%3E\" data-src=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/Gestion-de-Vulnerabilidades-600x300.jpg\" data-srcset=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/Gestion-de-Vulnerabilidades-600x300.jpg 600w, https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/Gestion-de-Vulnerabilidades-1000x500.jpg 1000w\" width=\"600\" height=\"300\"  data-dt-location=\"https:\/\/security-networks.com.mx\/?attachment_id=3277\" style=\"border-radius:30px;\" alt=\"Gesti\u00f3n de Vulnerabilidades\" \/><\/div><\/div><\/div>[\/vc_column][vc_column width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1618010044991{margin-top: 40px !important;}\u00bb][vc_column_text css=\u00bb.vc_custom_1618009830251{padding-bottom: 25px !important;}\u00bb]<\/p>\n<h4>Gesti\u00f3n de Vulnerabilidades<\/h4>\n<p>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1618009874006{padding-bottom: 25px !important;}\u00bb]El servicio integral comprende auditorias de an\u00e1lisis de vulnerabilidades, pruebas de penetraci\u00f3n y de phishing en formato recurrente para avalar que las medidas de seguridad presentes sean efectivas y se encuentren actualizadas ante las amenazas cambiantes del entorno.[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=\u00bb.vc_custom_1618009953760{margin-top: 20px !important;margin-bottom: 20px !important;}\u00bb][vc_column width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1618010070113{margin-top: 60px !important;}\u00bb][vc_column_text css=\u00bb.vc_custom_1618009863688{padding-bottom: 25px !important;}\u00bb]<\/p>\n<h4>Auditor\u00edas de Plataformas de Software<\/h4>\n<p>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1618010009069{padding-bottom: 25px !important;}\u00bb]El servicio integral comprende el acompa\u00f1amiento del \u00abdesarrollo de c\u00f3digo seguro\u00bb durante todo el ciclo de vida de desarrollo, desde la capacitaci\u00f3n hasta la auditoria constante del Software desarrollado.[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243;]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.shortcode-single-image-wrap.shortcode-single-image-2b80c747bc3e4674f8a3982885f6a0dd.enable-bg-rollover .rollover i,\n.shortcode-single-image-wrap.shortcode-single-image-2b80c747bc3e4674f8a3982885f6a0dd.enable-bg-rollover .rollover-video i {\n  background: -webkit-linear-gradient();\n  background: linear-gradient();\n}\n.shortcode-single-image-wrap.shortcode-single-image-2b80c747bc3e4674f8a3982885f6a0dd .rollover-icon {\n  font-size: 32px;\n  color: #ffffff;\n  min-width: 44px;\n  min-height: 44px;\n  line-height: 44px;\n  border-radius: 100px;\n  border-style: solid;\n  border-width: 0px;\n}\n.dt-icon-bg-on.shortcode-single-image-wrap.shortcode-single-image-2b80c747bc3e4674f8a3982885f6a0dd .rollover-icon {\n  background: rgba(255,255,255,0.3);\n  box-shadow: none;\n}\n<\/style><div class=\"shortcode-single-image-wrap shortcode-single-image-2b80c747bc3e4674f8a3982885f6a0dd alignnone  vc_custom_1618010200235 enable-bg-rollover dt-icon-bg-off\" ><div class=\"shortcode-single-image\"><div class=\"fancy-media-wrap  layzr-bg\" style=\"border-radius:30px;\"><img loading=\"lazy\" decoding=\"async\" class=\"preload-me lazy-load\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%20600%20300&#39;%2F%3E\" data-src=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/Auditorias-de-Plataformas-de-Software-600x300.jpg\" data-srcset=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/Auditorias-de-Plataformas-de-Software-600x300.jpg 600w, https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/Auditorias-de-Plataformas-de-Software-1000x500.jpg 1000w\" width=\"600\" height=\"300\"  data-dt-location=\"https:\/\/security-networks.com.mx\/?attachment_id=3267\" style=\"border-radius:30px;\" alt=\"Auditor\u00edas de Plataformas de Software\" \/><\/div><\/div><\/div>[\/vc_column][\/vc_row][vc_row el_class=\u00bbphone-reverse-col\u00bb css=\u00bb.vc_custom_1618009958017{margin-top: 20px !important;margin-bottom: 20px !important;}\u00bb][vc_column width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1617929206199{padding-bottom: 30px !important;}\u00bb]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.shortcode-single-image-wrap.shortcode-single-image-c5ace3087f7fa396170263f7b5e13f56.enable-bg-rollover .rollover i,\n.shortcode-single-image-wrap.shortcode-single-image-c5ace3087f7fa396170263f7b5e13f56.enable-bg-rollover .rollover-video i {\n  background: -webkit-linear-gradient();\n  background: linear-gradient();\n}\n.shortcode-single-image-wrap.shortcode-single-image-c5ace3087f7fa396170263f7b5e13f56 .rollover-icon {\n  font-size: 32px;\n  color: #ffffff;\n  min-width: 44px;\n  min-height: 44px;\n  line-height: 44px;\n  border-radius: 100px;\n  border-style: solid;\n  border-width: 0px;\n}\n.dt-icon-bg-on.shortcode-single-image-wrap.shortcode-single-image-c5ace3087f7fa396170263f7b5e13f56 .rollover-icon {\n  background: rgba(255,255,255,0.3);\n  box-shadow: none;\n}\n<\/style><div class=\"shortcode-single-image-wrap shortcode-single-image-c5ace3087f7fa396170263f7b5e13f56 alignnone  vc_custom_1618011046608 enable-bg-rollover dt-icon-bg-off\" ><div class=\"shortcode-single-image\"><div class=\"fancy-media-wrap  layzr-bg\" style=\"border-radius:30px;\"><img loading=\"lazy\" decoding=\"async\" class=\"preload-me lazy-load\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%20600%20500&#39;%2F%3E\" data-src=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/Hackeo-Etico-600x500.jpg\" data-srcset=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/Hackeo-Etico-600x500.jpg 600w, https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/Hackeo-Etico-800x667.jpg 800w\" width=\"600\" height=\"500\"  data-dt-location=\"https:\/\/security-networks.com.mx\/?attachment_id=3275\" style=\"border-radius:30px;\" alt=\"Hackeo \u00c9tico\" \/><\/div><\/div><\/div>[\/vc_column][vc_column width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1618009648972{margin-top: 20px !important;}\u00bb][vc_column_text css=\u00bb.vc_custom_1618009515119{padding-bottom: 25px !important;}\u00bb]<\/p>\n<h4>Hackeo \u00c9tico<\/h4>\n<p>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1618009228364{padding-bottom: 30px !important;}\u00bb]<b><span class=\"Apple-converted-space\">\u00a0<\/span><\/b>Nuestras pr\u00e1cticas en hacking \u00e9tico est\u00e1n basadas en est\u00e1ndares de la industria reconocidos internacionalmente, principalmente aquellos asociados a OWASP, OSSTMM.<\/p>\n<p>Nuestras recomendaciones est\u00e1n orientadas, si bien a corregir vulnerabilidades t\u00e9cnicas, a implementar controles o mejorar la efectividad en los mismos.[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1618009239982{padding-bottom: 30px !important;}\u00bb]Las distintas fases que componen el servicio son:[\/vc_column_text]<div class=\"uavc-list-icon uavc-list-icon-wrapper ult-adjust-bottom-margin   \"><ul class=\"uavc-list\"><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-6272\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:20px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon none \"  style=\"color:#ff9e1a;font-size:32px;display:inline-block;\">\n\t<i class=\"fas fa-bullseye\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-6272 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\"><strong>Reconocimiento &#8211; Escaneo<\/strong><\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-1645\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:20px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon none \"  style=\"color:#ff9e1a;font-size:32px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-refresh-07\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-1645 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\"><strong>Explotaci\u00f3n<\/strong><\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-4716\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:20px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon none \"  style=\"color:#ff9e1a;font-size:32px;display:inline-block;\">\n\t<i class=\"icomoon-the7-font-the7-more-00\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-4716 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\"><strong>Post-Explotaci\u00f3n &#8211; Reporte<\/strong><\/span><\/div><\/li><\/ul><\/div>[\/vc_column][\/vc_row][vc_row css=\u00bb.vc_custom_1618007205923{margin-top: 40px !important;margin-bottom: 20px !important;}\u00bb][vc_column width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1618008347009{margin-top: 10px !important;}\u00bb][vc_column_text css=\u00bb.vc_custom_1618009687459{padding-bottom: 25px !important;}\u00bb]<\/p>\n<h4>Servicios de Seguridad Administrada<\/h4>\n<p>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1618009703475{padding-bottom: 30px !important;}\u00bb]Nuestros servicios de Seguridad Administrada incluye:[\/vc_column_text]<div class=\"standard-arrow list-divider bullet-top\"><ul>\n<li>Implementaci\u00f3n de tecnolog\u00edas de seguridad on site del Cliente (Perimetral, Acceso a la Red, Protecci\u00f3n de Usuarios), para la protecci\u00f3n de la informaci\u00f3n del cliente.<\/li>\n<li>Monitoreo de actividades sospechosas.<\/li>\n<li>Gesti\u00f3n de incidentes de Ciberseguridad.<\/li>\n<li>Creaci\u00f3n y administraci\u00f3n de reglas y filtros de seguridad.<\/li>\n<li>Gesti\u00f3n de control de cambios y configuraciones.<\/li>\n<li>Reportes peri\u00f3dicos de los eventos de Ciberseguridad encontrados.<\/li>\n<li><b><\/b><b>SLA Compliance.<\/b><\/li>\n<li><b><\/b><b>Certificaci\u00f3n ISO27001.<\/b><\/li>\n<\/ul>\n<\/div>[\/vc_column][vc_column width=\u00bb1\/2&#8243;]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.shortcode-single-image-wrap.shortcode-single-image-0c17a4417c80e06b4f3a3528758aa675.enable-bg-rollover .rollover i,\n.shortcode-single-image-wrap.shortcode-single-image-0c17a4417c80e06b4f3a3528758aa675.enable-bg-rollover .rollover-video i {\n  background: -webkit-linear-gradient();\n  background: linear-gradient();\n}\n.shortcode-single-image-wrap.shortcode-single-image-0c17a4417c80e06b4f3a3528758aa675 .rollover-icon {\n  font-size: 32px;\n  color: #ffffff;\n  min-width: 44px;\n  min-height: 44px;\n  line-height: 44px;\n  border-radius: 100px;\n  border-style: solid;\n  border-width: 0px;\n}\n.dt-icon-bg-on.shortcode-single-image-wrap.shortcode-single-image-0c17a4417c80e06b4f3a3528758aa675 .rollover-icon {\n  background: rgba(255,255,255,0.3);\n  box-shadow: none;\n}\n<\/style><div class=\"shortcode-single-image-wrap shortcode-single-image-0c17a4417c80e06b4f3a3528758aa675 alignnone  vc_custom_1618011314511 enable-bg-rollover dt-icon-bg-off\" ><div class=\"shortcode-single-image\"><div class=\"fancy-media-wrap  layzr-bg\" style=\"border-radius:30px;\"><img loading=\"lazy\" decoding=\"async\" class=\"preload-me lazy-load\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%20600%20560&#39;%2F%3E\" data-src=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/seguridad-gallery-600x560.jpg\" data-srcset=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/seguridad-gallery-600x560.jpg 600w, https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/seguridad-gallery-1200x1120.jpg 1200w\" width=\"600\" height=\"560\"  data-dt-location=\"https:\/\/security-networks.com.mx\/?attachment_id=3038\" style=\"border-radius:30px;\" alt=\"Seguridad Security Networks\" \/><\/div><\/div><\/div>[\/vc_column][\/vc_row][vc_row css=\u00bb.vc_custom_1618009767131{margin-top: 40px !important;}\u00bb][vc_column]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.shortcode-single-image-wrap.shortcode-single-image-a077af90b99670af5789473e5af7c315.enable-bg-rollover .rollover i,\n.shortcode-single-image-wrap.shortcode-single-image-a077af90b99670af5789473e5af7c315.enable-bg-rollover .rollover-video i {\n  background: -webkit-linear-gradient();\n  background: linear-gradient();\n}\n.shortcode-single-image-wrap.shortcode-single-image-a077af90b99670af5789473e5af7c315 .rollover-icon {\n  font-size: 32px;\n  color: #ffffff;\n  min-width: 44px;\n  min-height: 44px;\n  line-height: 44px;\n  border-radius: 100px;\n  border-style: solid;\n  border-width: 0px;\n}\n.dt-icon-bg-on.shortcode-single-image-wrap.shortcode-single-image-a077af90b99670af5789473e5af7c315 .rollover-icon {\n  background: rgba(255,255,255,0.3);\n  box-shadow: none;\n}\n<\/style><div class=\"shortcode-single-image-wrap shortcode-single-image-a077af90b99670af5789473e5af7c315 alignnone bounce animate-element  vc_custom_1618008153615 enable-bg-rollover dt-icon-bg-off quick-scale-img\" ><div class=\"shortcode-single-image\"><div class=\"fancy-media-wrap  layzr-bg\" style=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"preload-me lazy-load\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%201000%20456&#39;%2F%3E\" data-src=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/SECURITY_NETWORKS_SDN_SA_DE_CV_Advanced_Security_Architecture_Specialized_Partner_7_12_2020.jpg\" data-srcset=\"https:\/\/security-networks.com.mx\/wp-content\/uploads\/2019\/12\/SECURITY_NETWORKS_SDN_SA_DE_CV_Advanced_Security_Architecture_Specialized_Partner_7_12_2020.jpg 1000w\" width=\"1000\" height=\"456\"  data-dt-location=\"https:\/\/security-networks.com.mx\/?attachment_id=3223\" style=\"\" alt=\"\" \/><\/div><\/div><\/div>[\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cras pulvinar quis eleifend purus. In quis congue felis, sit amet mollis ligula.<\/p>\n","protected":false},"author":1,"featured_media":3041,"comment_status":"closed","ping_status":"closed","template":"","dt_portfolio_category":[46],"dt_portfolio_tags":[],"class_list":["post-801","dt_portfolio","type-dt_portfolio","status-publish","has-post-thumbnail","hentry","dt_portfolio_category-soluciones","dt_portfolio_category-46","description-off"],"_links":{"self":[{"href":"https:\/\/security-networks.com.mx\/index.php?rest_route=\/wp\/v2\/dt_portfolio\/801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/security-networks.com.mx\/index.php?rest_route=\/wp\/v2\/dt_portfolio"}],"about":[{"href":"https:\/\/security-networks.com.mx\/index.php?rest_route=\/wp\/v2\/types\/dt_portfolio"}],"author":[{"embeddable":true,"href":"https:\/\/security-networks.com.mx\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/security-networks.com.mx\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=801"}],"version-history":[{"count":67,"href":"https:\/\/security-networks.com.mx\/index.php?rest_route=\/wp\/v2\/dt_portfolio\/801\/revisions"}],"predecessor-version":[{"id":3279,"href":"https:\/\/security-networks.com.mx\/index.php?rest_route=\/wp\/v2\/dt_portfolio\/801\/revisions\/3279"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/security-networks.com.mx\/index.php?rest_route=\/wp\/v2\/media\/3041"}],"wp:attachment":[{"href":"https:\/\/security-networks.com.mx\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=801"}],"wp:term":[{"taxonomy":"dt_portfolio_category","embeddable":true,"href":"https:\/\/security-networks.com.mx\/index.php?rest_route=%2Fwp%2Fv2%2Fdt_portfolio_category&post=801"},{"taxonomy":"dt_portfolio_tags","embeddable":true,"href":"https:\/\/security-networks.com.mx\/index.php?rest_route=%2Fwp%2Fv2%2Fdt_portfolio_tags&post=801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}