{"id":2681,"date":"2022-11-17T18:15:30","date_gmt":"2022-11-17T17:15:30","guid":{"rendered":"https:\/\/forensic-security.com\/?page_id=2681"},"modified":"2026-01-16T18:32:19","modified_gmt":"2026-01-16T17:32:19","slug":"soc","status":"publish","type":"page","link":"https:\/\/forensic-security.com\/en\/soc\/","title":{"rendered":"Managed Cybersecurity Services: SOC"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2681\" class=\"elementor elementor-2681\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7898bb6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7898bb6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e246717\" data-id=\"e246717\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b761cf elementor-widget elementor-widget-heading\" data-id=\"4b761cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Managed Cybersecurity Services: SOC<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-211ad7c elementor-widget elementor-widget-heading\" data-id=\"211ad7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-xxl\">OUR SOC<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2635823 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2635823\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-be1ceb4\" data-id=\"be1ceb4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ba65faf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ba65faf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ec9b0f0\" data-id=\"ec9b0f0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-65b483a elementor-widget elementor-widget-image\" data-id=\"65b483a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/proteccion.svg\" class=\"attachment-large size-large wp-image-1327\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5ae50d4\" data-id=\"5ae50d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ccf7d68 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"ccf7d68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Forensics Security Operations Center (SOC) is responsible for monitoring, detecting, and identifying issues affecting information security. The goal of this center is to enhance the organization\u2019s protection against cyberattacks.<\/p><p>Our security operations center offers a differentiated service that combines threat intelligence with 24\/7 security surveillance and monitoring.<\/p><p>Our security service provides our clients with:<\/p><ul><li>24\/7 cyberattack monitoring of their infrastructures\u00a0<\/li><li>Reduction of the average threat resolution time.<\/li><li>Mitigation of the impact of cyberattacks.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d61311a elementor-section-content-top elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d61311a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f88810b\" data-id=\"f88810b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-26d9371 elementor-widget elementor-widget-heading\" data-id=\"26d9371\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Added Value<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a753bd7 elementor-widget elementor-widget-text-editor\" data-id=\"a753bd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Deployment led by Forensics&#8217; specialized team<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-86f44f9 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"86f44f9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-inner-column elementor-element elementor-element-9192784\" data-id=\"9192784\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-057fb04 elementor-widget elementor-widget-text-editor\" data-id=\"057fb04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin: 0in; text-align: justify;\"><span style=\"font-size: 9.0pt; font-family: 'Helvetica Neue';\">Partnerships with manufacturers guaranteeing Level 3 support and punctual assistance with implementation.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7ab04ae\" data-id=\"7ab04ae\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-af1f980 elementor-widget elementor-widget-image\" data-id=\"af1f980\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/valor.svg\" class=\"attachment-large size-large wp-image-1681\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-923077e elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"923077e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6194f69\" data-id=\"6194f69\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d16c097 elementor-widget elementor-widget-image\" data-id=\"d16c097\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/alta-especializacion.svg\" class=\"attachment-large size-large wp-image-1682\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c739a2a\" data-id=\"c739a2a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-49868ae elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"49868ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tHigh specialization of the work team\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c5f548a elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c5f548a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-579d47a\" data-id=\"579d47a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8ade0f5 elementor-widget elementor-widget-text-editor\" data-id=\"8ade0f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tMultiple sources of Threat Intelligence both internal and through Forensics&#8217; various partnerships.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-119c6db\" data-id=\"119c6db\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a51b03f elementor-widget elementor-widget-image\" data-id=\"a51b03f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/threat-inteligence.svg\" class=\"attachment-large size-large wp-image-1683\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5e55600\" data-id=\"5e55600\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b76d83 elementor-widget elementor-widget-heading\" data-id=\"3b76d83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Outsourcing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bfea4fa elementor-widget elementor-widget-text-editor\" data-id=\"bfea4fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Why outsource? Because cybersecurity is not simple, it is not the core of your business and we are a specialized and organized multidisciplinary team.<\/p><p><strong>Capacity:<\/strong><br \/>We provide information security protection services, from the most basic (antivirus, antimalware) to the most complex and in a 24\/7 format.<\/p><p><strong>Organizational and Business Vision:<\/strong><br \/>Monitoring and surveillance offering continuous improvement and best practise.<\/p><p><strong>Technology and Flexibility:<\/strong><br \/>Market-leading tools adapted to all needs &#8220;as a service&#8221;.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-03495dd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"03495dd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6250f25\" data-id=\"6250f25\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b26e304 elementor-widget elementor-widget-heading\" data-id=\"b26e304\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">WHAT  WE OFFER YOU?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e3bb117 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e3bb117\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-69e89a8\" data-id=\"69e89a8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5f6e385 elementor-widget elementor-widget-text-editor\" data-id=\"5f6e385\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Forensic &amp; Security&#8217;s Cybersecurity Operations Center is responsible for performing the Analytical Security activities (proactive and real-time threat detection) that we make available to our clients for the delivery of cybersecurity services.<\/p><p>The following key elements are incorporated as common services to the services offered:<\/p><ul><li>Reactive threat\/security incident detection service with 24\/7\/365 notification for critical alerts.<\/li><li>Proactive security threat\/incident detection service with 8\/5 notification for the rest of the alerts.<\/li><li>Periodic reports with information on detected incidents.<\/li><li>Periodic vulnerability analysis reports of our client&#8217;s infrastructure.<\/li><\/ul><p>Our Cybersecurity Operations Center offers a reactive and proactive threat\/incident detection service based on event information generated in the client&#8217;s infrastructure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b703154 elementor-widget elementor-widget-spacer\" data-id=\"b703154\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-c67f025\" data-id=\"c67f025\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a698fd5 elementor-widget elementor-widget-image\" data-id=\"a698fd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"167\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/04\/soc-plus-300x167.png\" class=\"attachment-medium size-medium wp-image-2744\" alt=\"\" srcset=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/04\/soc-plus-300x167.png 300w, https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/04\/soc-plus-1024x570.png 1024w, https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/04\/soc-plus-768x428.png 768w, https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/04\/soc-plus-1536x855.png 1536w, https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/04\/soc-plus.png 1611w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a323b38 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a323b38\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-19ffd23\" data-id=\"19ffd23\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-15436b3 elementor-widget elementor-widget-heading\" data-id=\"15436b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">MDR Service<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6772a9 elementor-widget elementor-widget-text-editor\" data-id=\"b6772a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Capabilities: prevention, detection, investigation, and automated response.<\/li><li>Protection layer with EDR and NGAV technology:<ul><li>Signature-based analysis<\/li><li>Behavioral analysis: AI<\/li><li>Protection against FileLess attacks<\/li><li>Protection against Ransomware<\/li><\/ul><\/li><li>False positive discrimination through forensic analysis<\/li><li>Automated remediation: containment and disinfection<\/li><li>24\/7\/365 monitoring<\/li><li>Periodic vulnerability scanning of infrastructures<\/li><li>\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-dd0be44\" data-id=\"dd0be44\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0625dc2 elementor-widget elementor-widget-heading\" data-id=\"0625dc2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SOC Service<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4999e64 elementor-widget elementor-widget-text-editor\" data-id=\"4999e64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Capabilities: prevention, detection and investigation<\/li><li>Agent deployment at each endpoint<\/li><li>Event collection and correlation using SIEM technology<\/li><li>Multi-vendor integration<\/li><li>24\/7\/365 monitoring<\/li><li>Periodic vulnerability scanning of infrastructures<\/li><li>Security alert notification<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-0a3acca\" data-id=\"0a3acca\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4cd3b05 elementor-widget elementor-widget-heading\" data-id=\"4cd3b05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SOC+ Service<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ccbb3f elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"9ccbb3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Includes SOC and MDR service capabilities<\/p><ul><li>Capabilities: prevention, detection, investigation and automated response<\/li><li>Protection layer with EDR and NGAV technology<\/li><li>Event collection and correlation using SIEM technology<\/li><li>24\/7\/365 monitoring<\/li><li>Periodic vulnerability analysis of infrastructures<\/li><li>IR 365 service: hardware remote assistance<\/li><li>IR retainer option<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f10c97b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f10c97b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3018529\" data-id=\"3018529\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1b0da7d elementor-widget elementor-widget-heading\" data-id=\"1b0da7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">HOW IS IT PROVIDED?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2a44be6 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2a44be6\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b1dbcb8\" data-id=\"b1dbcb8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-476ead4 elementor-widget elementor-widget-spacer\" data-id=\"476ead4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d94ae1b elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d94ae1b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-0e217e7\" data-id=\"0e217e7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cc15a67 elementor-widget elementor-widget-heading\" data-id=\"cc15a67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SOC levels<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-23ff184 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"23ff184\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b74f502\" data-id=\"b74f502\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-543760d elementor-widget elementor-widget-text-editor\" data-id=\"543760d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe levels of the Operations Center.\n\n\n\n\n\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-35f7830\" data-id=\"35f7830\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fe90831 elementor-widget elementor-widget-image\" data-id=\"fe90831\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"114\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/monigotes.png\" class=\"attachment-large size-large wp-image-1710\" alt=\"\" srcset=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/monigotes.png 600w, https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/monigotes-300x57.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-758e6eb elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"758e6eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Level 1<\/strong>: Security Analyst<br \/>The alert reception team is in charge of classifying the possible alerts generated, escalating the most complex ones to level 2.<br \/><strong>Level 2<\/strong>: Incident Responder<br \/>At this level, the tasks of triage and resolution of escalated incidents will be performed. The team of cyber analysts will perform investigation tasks on the incidents, reporting this information to level 3 for specific issues.<br \/><strong>Level 3<\/strong>: Security Expert<br \/>The level 3 team, multidisciplinary experts in network, cloud, endpoint analysis, will support level 2 for the possible resolution of complex incidents remotely.<br \/>SOC Manager: Service Manager<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e4c8564\" data-id=\"e4c8564\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8dc8c26 elementor-widget elementor-widget-heading\" data-id=\"8dc8c26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Procedure<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-276d831 elementor-widget elementor-widget-text-editor\" data-id=\"276d831\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tForensics offers a comprehensive security incident management procedure.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8310f07 elementor-widget elementor-widget-image\" data-id=\"8310f07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/04\/procedure1.svg\" class=\"attachment-large size-large wp-image-2801\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3752b9f elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3752b9f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e5e9e64\" data-id=\"e5e9e64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7844d6b arrows-relative-to-box_area slider-layout_1 slider-tablet-default slider-mobile-default slide-h-position-center bullets-small-dot-stroke elementor-widget elementor-widget-the7_content_carousel\" data-id=\"7844d6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;widget_columns&quot;:3,&quot;widget_columns_tablet&quot;:2,&quot;widget_columns_mobile&quot;:1,&quot;gap_between_posts&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:30,&quot;sizes&quot;:[]},&quot;gap_between_posts_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;gap_between_posts_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"the7_content_carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"disable-arrows-hover-bg owl-carousel text-and-icon-carousel elementor-owl-carousel-call the7-elementor-widget the7_content_carousel-7844d6b quick-scale-img\" data-scroll-mode=\"1\" data-auto-height=\"false\" data-speed=\"600\" data-autoplay=\"false\" data-autoplay_speed=\"\"><div  class=\"dt-owl-item-wrap elements-hover\"  ><div class=\"dt-owl-item-inner \"><div  class=\"dt-owl-item-image layzr-bg img-css-resize-wrapper\"> <img decoding=\"async\" width=\"1\" height=\"1\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%200%200&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect the7-svg-image lazy lazy-load\" alt=\"\" style=\"--ratio: 0 \/ 0;\" data-src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/niveles-1.svg\" loading=\"eager\" \/><\/div><h4  class=\"dt-owl-item-heading\">SECURITY LEVELS<\/h4><div class=\"dt-owl-item-description\">Definition of stricter policies based on the criticality of defined assets.\n\nIdentification of affected resources and their causes, promoting efficiency.<\/div><\/div><\/div><div  class=\"dt-owl-item-wrap elements-hover\"  ><div class=\"dt-owl-item-inner \"><div  class=\"dt-owl-item-image layzr-bg img-css-resize-wrapper\"> <img decoding=\"async\" width=\"1\" height=\"1\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%200%200&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect the7-svg-image lazy lazy-load\" alt=\"\" style=\"--ratio: 0 \/ 0;\" data-src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/amenazas.svg\" loading=\"eager\" \/><\/div><h4  class=\"dt-owl-item-heading\">INFORMATION CORRELATION<\/h4><div class=\"dt-owl-item-description\">It has a large number of correlations and default rules based on best practices.\n\nDetection algorithms and machine learning<\/div><\/div><\/div><div  class=\"dt-owl-item-wrap elements-hover\"  ><div class=\"dt-owl-item-inner \"><div  class=\"dt-owl-item-image layzr-bg img-css-resize-wrapper\"> <img decoding=\"async\" width=\"1\" height=\"1\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%200%200&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect the7-svg-image lazy lazy-load\" alt=\"\" style=\"--ratio: 0 \/ 0;\" data-src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/correlacion.svg\" loading=\"eager\" \/><\/div><h4  class=\"dt-owl-item-heading\">THREAT INTELLIGENCE<\/h4><div class=\"dt-owl-item-description\">Private sources: originated by malware analysts.\nOpen Source Intelligence (OSINT) sources.\nOwn intelligence sources: information directly from attackers through the use of honeypots.<\/div><\/div><\/div><div  class=\"dt-owl-item-wrap elements-hover\"  ><div class=\"dt-owl-item-inner \"><div  class=\"dt-owl-item-image layzr-bg img-css-resize-wrapper\"> <img decoding=\"async\" width=\"1\" height=\"1\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%200%200&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect the7-svg-image lazy lazy-load\" alt=\"\" style=\"--ratio: 0 \/ 0;\" data-src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/deteccion.svg\" loading=\"eager\" \/><\/div><h4  class=\"dt-owl-item-heading\">DETECTION<\/h4><div class=\"dt-owl-item-description\">Threshold, behavior, and anomaly rules are established based on the monitoring conducted and the correlations between them.<\/div><\/div><\/div><\/div><div class=\"owl-nav disabled\"><div class=\"owl-prev\" role=\"button\" tabindex=\"0\" aria-label=\"Prev slide\"><i class=\"fas fa-chevron-left\"><\/i><\/div><div class=\"owl-next\" role=\"button\" tabindex=\"0\" aria-label=\"Next slide\"><i class=\"fas fa-chevron-right\"><\/i><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8de3026 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8de3026\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-95afc15\" data-id=\"95afc15\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4204022 elementor-widget elementor-widget-heading\" data-id=\"4204022\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">WHAT WE OFFER IT WITH<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-391f2c1 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"391f2c1\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a401df9\" data-id=\"a401df9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-98a9ec0 elementor-widget elementor-widget-heading\" data-id=\"98a9ec0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Endpoint Detection Response<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-66781c5 elementor-widget elementor-widget-text-editor\" data-id=\"66781c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Elastic Security enables detection, investigation and response to constantly evolving threats, allowing increased visibility and control of the customer&#8217;s infrastructure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a55061 elementor-widget elementor-widget-image\" data-id=\"9a55061\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/04\/EDR-technologie.svg\" class=\"attachment-large size-large wp-image-2803\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-56d0540\" data-id=\"56d0540\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d65e19 elementor-widget elementor-widget-heading\" data-id=\"5d65e19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SIEM: Elastic Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-179a2c3 elementor-widget elementor-widget-text-editor\" data-id=\"179a2c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Elastic Security enables detection, investigation and response to constantly evolving threats, allowing increased visibility and control of the customer&#8217;s infrastructure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-456fa7f elementor-widget elementor-widget-image\" data-id=\"456fa7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/elastic.svg\" class=\"attachment-large size-large wp-image-1711\" alt=\"Elastic Security\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3c7a522 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3c7a522\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4390a91\" data-id=\"4390a91\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-574d593 elementor-widget elementor-widget-heading\" data-id=\"574d593\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our integrations<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb37d6b elementor-widget elementor-widget-text-editor\" data-id=\"cb37d6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">Integration with services deployed in the organization, here are some of the most common ones:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-096de65 elementor-widget elementor-widget-image\" data-id=\"096de65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"388\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/integraciones-1024x388.png\" class=\"attachment-large size-large wp-image-1713\" alt=\"\" srcset=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/integraciones-1024x388.png 1024w, https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/integraciones-300x114.png 300w, https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/integraciones-768x291.png 768w, https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/integraciones.png 1400w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6080536 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6080536\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9b3eabc\" data-id=\"9b3eabc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ab7891e elementor-widget elementor-widget-heading\" data-id=\"ab7891e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">WANNA TALK?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be32c2d elementor-widget elementor-widget-text-editor\" data-id=\"be32c2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>info@forensic-security.com<\/p><p><span class=\"w8qArf\">Phones<span class=\"eTVOZd\">:\u00a0 +34 <\/span>881 28 99 18 &#8211; +34 91 005 35 14<br \/><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1a6efea elementor-section-content-space-between elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1a6efea\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-0d0b36f\" data-id=\"0d0b36f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-79c403f elementor-widget elementor-widget-image\" data-id=\"79c403f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2026\/01\/CERTIFICADO-ENS-FORENSICSECURITY-ALTA_signed.pdf\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"925\" height=\"1125\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2026\/01\/distintivo_ens_certificacion_ALTA_RD311-2022.png\" class=\"attachment-full size-full wp-image-3043\" alt=\"\" srcset=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2026\/01\/distintivo_ens_certificacion_ALTA_RD311-2022.png 925w, https:\/\/forensic-security.com\/wp-content\/uploads\/2026\/01\/distintivo_ens_certificacion_ALTA_RD311-2022-247x300.png 247w, https:\/\/forensic-security.com\/wp-content\/uploads\/2026\/01\/distintivo_ens_certificacion_ALTA_RD311-2022-842x1024.png 842w, https:\/\/forensic-security.com\/wp-content\/uploads\/2026\/01\/distintivo_ens_certificacion_ALTA_RD311-2022-768x934.png 768w\" sizes=\"(max-width: 925px) 100vw, 925px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-fe7a7a7\" data-id=\"fe7a7a7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c8f350 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"8c8f350\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/catalogo.incibe.es\/search\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"230\" height=\"228\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/02\/incibe.svg\" class=\"attachment-full size-full wp-image-2418\" alt=\"\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-540f006\" data-id=\"540f006\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5905fdb elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"5905fdb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/02\/27001-CAST-FORENSIC-SECURITY_signed-1.pdf\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"199\" height=\"200\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/02\/iso27001.png\" class=\"attachment-full size-full wp-image-2448\" alt=\"\" srcset=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/02\/iso27001.png 199w, https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/02\/iso27001-150x150.png 150w\" sizes=\"(max-width: 199px) 100vw, 199px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Managed Cybersecurity Services: SOC OUR SOC The Forensics Security Operations Center (SOC) is responsible for monitoring, detecting, and identifying issues affecting information security. The goal of this center is to enhance the organization\u2019s protection against cyberattacks. Our security operations center offers a differentiated service that combines threat intelligence with 24\/7 security surveillance and monitoring. Our&hellip;<\/p>\n","protected":false},"author":8,"featured_media":2655,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-2681","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/forensic-security.com\/en\/wp-json\/wp\/v2\/pages\/2681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forensic-security.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/forensic-security.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/forensic-security.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/forensic-security.com\/en\/wp-json\/wp\/v2\/comments?post=2681"}],"version-history":[{"count":8,"href":"https:\/\/forensic-security.com\/en\/wp-json\/wp\/v2\/pages\/2681\/revisions"}],"predecessor-version":[{"id":3061,"href":"https:\/\/forensic-security.com\/en\/wp-json\/wp\/v2\/pages\/2681\/revisions\/3061"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forensic-security.com\/en\/wp-json\/wp\/v2\/media\/2655"}],"wp:attachment":[{"href":"https:\/\/forensic-security.com\/en\/wp-json\/wp\/v2\/media?parent=2681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}