{"id":2825,"date":"2024-09-05T15:30:56","date_gmt":"2024-09-05T14:30:56","guid":{"rendered":"https:\/\/forensic-security.com\/?page_id=2825"},"modified":"2024-09-05T15:34:15","modified_gmt":"2024-09-05T14:34:15","slug":"csirt","status":"publish","type":"page","link":"https:\/\/forensic-security.com\/en\/csirt\/","title":{"rendered":"Csirt"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2825\" class=\"elementor elementor-2825\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7898bb6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7898bb6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e246717\" data-id=\"e246717\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b761cf elementor-widget elementor-widget-heading\" data-id=\"4b761cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Servicios Gestionados de Ciberseguridad: SOC<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-211ad7c elementor-widget elementor-widget-heading\" data-id=\"211ad7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-xxl\">NUESTRO SOC<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2635823 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2635823\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-be1ceb4\" data-id=\"be1ceb4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ba65faf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ba65faf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ec9b0f0\" data-id=\"ec9b0f0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-65b483a elementor-widget elementor-widget-image\" data-id=\"65b483a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/proteccion.svg\" class=\"attachment-large size-large wp-image-1327\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5ae50d4\" data-id=\"5ae50d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ccf7d68 elementor-widget elementor-widget-text-editor\" data-id=\"ccf7d68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>El Centro de Operaciones de Seguridad de Forensics es el responsable de la monitorizaci\u00f3n, detecci\u00f3n e identificaci\u00f3n de problemas que afectan a la seguridad de la informaci\u00f3n. El objetivo de este centro es incrementar la protecci\u00f3n de la organizaci\u00f3n frente a ciberataques.<\/p><p>Nuestro centro de operaciones de seguridad ofrece un servicio diferenciador que combina inteligencia ante amenazas y una monitorizaci\u00f3n y de alertas de seguridad en modalidad de 24&#215;7.<\/p><p>Nuestro servicio de seguridad ofrece al cliente:<\/p><ul><li>Monitorizaci\u00f3n 24&#215;7 de sus infraestructuras cara a ciberataques.<\/li><li>Reduce el tiempo medio de resoluci\u00f3n de las amenazas.<\/li><li>Disminuye el impacto de los ciberataques.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d61311a elementor-section-content-top elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d61311a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f88810b\" data-id=\"f88810b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-26d9371 elementor-widget elementor-widget-heading\" data-id=\"26d9371\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Valor a\u00f1adido<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a753bd7 elementor-widget elementor-widget-text-editor\" data-id=\"a753bd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Despliegue liderado por el equipo especializado de Forensics<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-86f44f9 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"86f44f9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-inner-column elementor-element elementor-element-9192784\" data-id=\"9192784\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-057fb04 elementor-widget elementor-widget-text-editor\" data-id=\"057fb04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Alianzas con fabricantes que garantizan soporte de Nivel 3 y puntual apoyo a la implantaci\u00f3n<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7ab04ae\" data-id=\"7ab04ae\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-af1f980 elementor-widget elementor-widget-image\" data-id=\"af1f980\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/valor.svg\" class=\"attachment-large size-large wp-image-1681\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-923077e elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"923077e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6194f69\" data-id=\"6194f69\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d16c097 elementor-widget elementor-widget-image\" data-id=\"d16c097\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/alta-especializacion.svg\" class=\"attachment-large size-large wp-image-1682\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c739a2a\" data-id=\"c739a2a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-49868ae elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"49868ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Alta especializaci\u00f3n del equipo de trabajo<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c5f548a elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c5f548a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-579d47a\" data-id=\"579d47a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8ade0f5 elementor-widget elementor-widget-text-editor\" data-id=\"8ade0f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>M\u00faltiples fuentes de Threat Inteligence internas y por las diferentes alianzas de Forensics<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-119c6db\" data-id=\"119c6db\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a51b03f elementor-widget elementor-widget-image\" data-id=\"a51b03f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/threat-inteligence.svg\" class=\"attachment-large size-large wp-image-1683\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5e55600\" data-id=\"5e55600\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b76d83 elementor-widget elementor-widget-heading\" data-id=\"3b76d83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Externalizaci\u00f3n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bfea4fa elementor-widget elementor-widget-text-editor\" data-id=\"bfea4fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00bfPor que externalizar? Porque la ciberseguridad no es sencilla, no es el core de tu negocio y somos un equipo multidisciplinar especializado y organizado.<\/p>\n<p><strong>Capacidad<\/strong><br>Proveemos todos aquellos servicios de protecci\u00f3n de la Seguridad de la informaci\u00f3n, desde los m\u00e1s b\u00e1sicos (antivirus, antimalware) hasta los m\u00e1s complejos y en un formato 24&#215;7<\/p>\n<p><strong>Visi\u00f3n organizativa y de negocio<\/strong><br>Monitorizaci\u00f3n y vigilancia que ofrecen una mejora continua<\/p>\n<p><strong>Tecnolog\u00eda y flexibilidad<\/strong><br>Herramientas l\u00edderes en el Mercado \u201cas a service\u201d adaptadas a todas las necesidades.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-03495dd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"03495dd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6250f25\" data-id=\"6250f25\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b26e304 elementor-widget elementor-widget-heading\" data-id=\"b26e304\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">QU\u00c9 TE OFRECEMOS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e3bb117 elementor-section-stretched elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e3bb117\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-69e89a8\" data-id=\"69e89a8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5f6e385 elementor-widget elementor-widget-text-editor\" data-id=\"5f6e385\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>El Centro de operaciones de Ciberseguridad de Forensic &amp; Security es el responsable de la realizaci\u00f3n de las actividades de Seguridad Anal\u00edtica (detecci\u00f3n proactiva y en tiempo real de amenazas) que ponemos a disposici\u00f3n de nuestros clientes para la entrega de servicios de ciberseguridad.<\/p><p>Como servicios comunes a los servicios ofertados se incorporan los siguientes elementos clave:<\/p><ul><li>Servicio reactivo de detecci\u00f3n de amenazas\/incidentes de seguridad con notificaci\u00f3n en 24x7x365 para alertas cr\u00edticas.<\/li><li>Servicio proactivo de detecci\u00f3n de amenazas\/incidentes de seguridad con notificaci\u00f3n en 8&#215;5 para el resto de las alertas.<\/li><li>Informes peri\u00f3dicos con informaci\u00f3n de los incidentes detectados.<\/li><li>Informes de an\u00e1lisis de vulnerabilidades peri\u00f3dicos de la infraestructura del cliente.<\/li><\/ul><p>Nuestro Centro de Operaciones de Ciberseguridad ofrece un servicio reactivo y proactivo de detecci\u00f3n de amenazas\/incidentes nutri\u00e9ndonos de la informaci\u00f3n de eventos generada en la infraestructura del cliente.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b703154 elementor-widget elementor-widget-spacer\" data-id=\"b703154\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-c67f025\" data-id=\"c67f025\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a698fd5 elementor-widget elementor-widget-image\" data-id=\"a698fd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/12\/socplus1.svg\" class=\"attachment-full size-full wp-image-1995\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a323b38 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a323b38\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-19ffd23\" data-id=\"19ffd23\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-15436b3 elementor-widget elementor-widget-heading\" data-id=\"15436b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Servicio MDR<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6772a9 elementor-widget elementor-widget-text-editor\" data-id=\"b6772a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Capacidades: prevenci\u00f3n, detecci\u00f3n, investigaci\u00f3n y respuesta automatizada<\/li><li>Capa de protecci\u00f3n con tecnolog\u00eda EDR y NGAV:<ul><li>An\u00e1lisis basado en firmas<\/li><li>An\u00e1lisis de comportamiento: IA<\/li><li>Protecci\u00f3n frente a ataques FileLess<\/li><li>Protecci\u00f3n contra Ransomware<\/li><\/ul><\/li><li>Discriminaci\u00f3n de falsos positivos mediante an\u00e1lisis forense<\/li><li>Reparaci\u00f3n automatizada: contenci\u00f3n y desinfecci\u00f3n<\/li><li>Monitorizaci\u00f3n 24x7x365<\/li><li>An\u00e1lisis de vulnerabilidades peri\u00f3dicos de la infraestructura<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-dd0be44\" data-id=\"dd0be44\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0625dc2 elementor-widget elementor-widget-heading\" data-id=\"0625dc2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Servicio SOC<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4999e64 elementor-widget elementor-widget-text-editor\" data-id=\"4999e64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Capacidades: prevenci\u00f3n, detecci\u00f3n y investigaci\u00f3n<\/li><li>Despliegue de agente en cada endpoint<\/li><li>Recolecci\u00f3n y correlaci\u00f3n de eventos mediante tecnolog\u00eda SIEM<\/li><li>Integraci\u00f3n con m\u00faltiples fabricantes<\/li><li>Monitorizaci\u00f3n 24x7x365<\/li><li>An\u00e1lisis de vulnerabilidades peri\u00f3dicos de la infraestructura<\/li><li>Notificaci\u00f3n de alertas de seguridad<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-0a3acca\" data-id=\"0a3acca\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4cd3b05 elementor-widget elementor-widget-heading\" data-id=\"4cd3b05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SERVICIO SOC+<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ccbb3f elementor-widget elementor-widget-text-editor\" data-id=\"9ccbb3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>&nbsp;Incluye capacidades del servicio SOC y MDR<\/p>\n<ul>\n<li>Capacidades: prevenci\u00f3n, detecci\u00f3n, investigaci\u00f3n y respuesta automatizada<\/li>\n<li>Capa de protecci\u00f3n con tecnolog\u00eda EDR y NGAV<\/li>\n<li>Recolecci\u00f3n y correlaci\u00f3n de eventos mediante tecnolog\u00eda SIEM<\/li>\n<li>Monitorizaci\u00f3n 24x7x365<\/li>\n<li>An\u00e1lisis de vulnerabilidades peri\u00f3dicos de la infraestructura<\/li>\n<li>Servicio IR 365: hardware asistencia remota<\/li>\n<li>Opci\u00f3n a IR retainer<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f10c97b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f10c97b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3018529\" data-id=\"3018529\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1b0da7d elementor-widget elementor-widget-heading\" data-id=\"1b0da7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">COMO TE LO OFRECEMOS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2a44be6 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2a44be6\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b1dbcb8\" data-id=\"b1dbcb8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-476ead4 elementor-widget elementor-widget-spacer\" data-id=\"476ead4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d94ae1b elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d94ae1b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-0e217e7\" data-id=\"0e217e7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cc15a67 elementor-widget elementor-widget-heading\" data-id=\"cc15a67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Niveles del SOC<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-23ff184 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"23ff184\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b74f502\" data-id=\"b74f502\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-543760d elementor-widget elementor-widget-text-editor\" data-id=\"543760d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin-bottom: 10px;\">Los niveles del Centro de Operaciones<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-35f7830\" data-id=\"35f7830\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fe90831 elementor-widget elementor-widget-image\" data-id=\"fe90831\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"114\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/monigotes.png\" class=\"attachment-large size-large wp-image-1710\" alt=\"\" srcset=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/monigotes.png 600w, https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/monigotes-300x57.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-758e6eb elementor-widget elementor-widget-text-editor\" data-id=\"758e6eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0<\/p><p><strong>Nivel 1<\/strong>: Security Analyst<br \/>El equipo de recepci\u00f3n de alertas se encarga de clasificar las posibles alertas generadas, escalando al nivel 2 las m\u00e1s complejas.<strong><br \/><\/strong><\/p><p><strong>Nivel 2<\/strong>: Incident Responder<br \/>En este nivel se realizar\u00e1n las tareas de triaje y resoluci\u00f3n de las incidencias escaladas. El equipo de ciber analistas realizar\u00e1n tareas de investigaci\u00f3n sobre el incidente, reportando esta informaci\u00f3n a nivel 3 para cuestiones espec\u00edficas.<strong><br \/><\/strong><\/p><p><strong>Nivel 3<\/strong>: Security Expert<br \/>El equipo del nivel 3, an\u00e1lisis de expertos multidisciplinar en redes, cloud, endpoint, dar\u00e1n soporte al nivel 2 para la posible resoluci\u00f3n de las incidencias complejas de forma remota.<br \/><strong>SOC Manager<\/strong>: Gestor del Servicio<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e4c8564\" data-id=\"e4c8564\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8dc8c26 elementor-widget elementor-widget-heading\" data-id=\"8dc8c26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Procedimiento<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-276d831 elementor-widget elementor-widget-text-editor\" data-id=\"276d831\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Forensics ofrece un procedimiento de gesti\u00f3n integral de incidentes de seguridad.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8310f07 elementor-widget elementor-widget-image\" data-id=\"8310f07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/04\/procedure-1024x576.png\" class=\"attachment-large size-large wp-image-2738\" alt=\"\" srcset=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/04\/procedure-1024x576.png 1024w, https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/04\/procedure-300x169.png 300w, https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/04\/procedure-768x432.png 768w, https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/04\/procedure-1536x864.png 1536w, https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/04\/procedure.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3752b9f elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3752b9f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e5e9e64\" data-id=\"e5e9e64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7844d6b arrows-relative-to-box_area slider-layout_1 slider-tablet-default slider-mobile-default slide-h-position-center bullets-small-dot-stroke elementor-widget elementor-widget-the7_content_carousel\" data-id=\"7844d6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;widget_columns&quot;:3,&quot;widget_columns_tablet&quot;:2,&quot;widget_columns_mobile&quot;:1,&quot;gap_between_posts&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:30,&quot;sizes&quot;:[]},&quot;gap_between_posts_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;gap_between_posts_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"the7_content_carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"disable-arrows-hover-bg owl-carousel text-and-icon-carousel elementor-owl-carousel-call the7-elementor-widget the7_content_carousel-7844d6b quick-scale-img\" data-scroll-mode=\"1\" data-auto-height=\"false\" data-speed=\"600\" data-autoplay=\"false\" data-autoplay_speed=\"\"><div  class=\"dt-owl-item-wrap elements-hover\"  ><div class=\"dt-owl-item-inner \"><div  class=\"dt-owl-item-image layzr-bg img-css-resize-wrapper\"> <img decoding=\"async\" width=\"1\" height=\"1\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%200%200&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect the7-svg-image lazy lazy-load\" alt=\"\" style=\"--ratio: 0 \/ 0;\" data-src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/niveles-1.svg\" loading=\"eager\" \/><\/div><h4  class=\"dt-owl-item-heading\">NIVELES DE SEGURIDAD<\/h4><div class=\"dt-owl-item-description\">Definici\u00f3n de pol\u00edticas mas estrictas en funci\u00f3n de la criticidad de los activos definidos\n\nIdentificaci\u00f3n de recursos afectados y sus causas favoreciendo rendimientos<\/div><\/div><\/div><div  class=\"dt-owl-item-wrap elements-hover\"  ><div class=\"dt-owl-item-inner \"><div  class=\"dt-owl-item-image layzr-bg img-css-resize-wrapper\"> <img decoding=\"async\" width=\"1\" height=\"1\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%200%200&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect the7-svg-image lazy lazy-load\" alt=\"\" style=\"--ratio: 0 \/ 0;\" data-src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/amenazas.svg\" loading=\"eager\" \/><\/div><h4  class=\"dt-owl-item-heading\">CORRELACI\u00d3N DE INFORMACI\u00d3N<\/h4><div class=\"dt-owl-item-description\">Dispone de un gran n\u00famero de correlaciones y reglas por defecto basadas en las mejores pr\u00e1cticas.\n\nLogaritmos de detecci\u00f3n y aprendizaje autom\u00e1tico<\/div><\/div><\/div><div  class=\"dt-owl-item-wrap elements-hover\"  ><div class=\"dt-owl-item-inner \"><div  class=\"dt-owl-item-image layzr-bg img-css-resize-wrapper\"> <img decoding=\"async\" width=\"1\" height=\"1\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%200%200&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect the7-svg-image lazy lazy-load\" alt=\"\" style=\"--ratio: 0 \/ 0;\" data-src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/correlacion.svg\" loading=\"eager\" \/><\/div><h4  class=\"dt-owl-item-heading\">INTELIGENCIA DE AMENAZAS<\/h4><div class=\"dt-owl-item-description\">Fuentes privadas: originadas por analistas de malware.\nFuentes de inteligencia abiertas (OSINT).\nFuentes de inteligencia propias: informaci\u00f3n directamente de los propios atacantes mediante el uso\nde m\u00e1quinas se\u00f1uelo.<\/div><\/div><\/div><div  class=\"dt-owl-item-wrap elements-hover\"  ><div class=\"dt-owl-item-inner \"><div  class=\"dt-owl-item-image layzr-bg img-css-resize-wrapper\"> <img decoding=\"async\" width=\"1\" height=\"1\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%200%200&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect the7-svg-image lazy lazy-load\" alt=\"\" style=\"--ratio: 0 \/ 0;\" data-src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/deteccion.svg\" loading=\"eager\" \/><\/div><h4  class=\"dt-owl-item-heading\">DETECCI\u00d3N<\/h4><div class=\"dt-owl-item-description\">Se establecen reglas de umbrales, de comportamientos y anomal\u00edas en funci\u00f3n de la monitorizaci\u00f3n realizada y las correlaciones entre las mismas<\/div><\/div><\/div><\/div><div class=\"owl-nav disabled\"><div class=\"owl-prev\" role=\"button\" tabindex=\"0\" aria-label=\"Prev slide\"><i class=\"fas fa-chevron-left\"><\/i><\/div><div class=\"owl-next\" role=\"button\" tabindex=\"0\" aria-label=\"Next slide\"><i class=\"fas fa-chevron-right\"><\/i><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8de3026 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8de3026\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-95afc15\" data-id=\"95afc15\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4204022 elementor-widget elementor-widget-heading\" data-id=\"4204022\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CON QUE TE LO OFRECEMOS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-391f2c1 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"391f2c1\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a401df9\" data-id=\"a401df9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-98a9ec0 elementor-widget elementor-widget-heading\" data-id=\"98a9ec0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Endpoint Detection Response<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-66781c5 elementor-widget elementor-widget-text-editor\" data-id=\"66781c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La tecnolog\u00eda EDR (Endpoint Detection Response) protege los equipos e infraestructuras con herramientas de monitorizaci\u00f3n e inteligencia artificial y ofrece una respuesta r\u00e1pida y eficiente ante los riesgos y las amenazas m\u00e1s complejas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a55061 elementor-widget elementor-widget-image\" data-id=\"9a55061\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"488\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/04\/endpoint-1024x488.png\" class=\"attachment-large size-large wp-image-2741\" alt=\"\" srcset=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/04\/endpoint-1024x488.png 1024w, https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/04\/endpoint-300x143.png 300w, https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/04\/endpoint-768x366.png 768w, https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/04\/endpoint-1536x731.png 1536w, https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/04\/endpoint.png 1884w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-56d0540\" data-id=\"56d0540\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d65e19 elementor-widget elementor-widget-heading\" data-id=\"5d65e19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SIEM: Elastic Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-179a2c3 elementor-widget elementor-widget-text-editor\" data-id=\"179a2c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Elastic Security permite la detecci\u00f3n, investigaci\u00f3n y respuesta a las amenazas en constante evoluci\u00f3n permitiendo aumentar la visibilidad y el control de la infraestructura del cliente.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-456fa7f elementor-widget elementor-widget-image\" data-id=\"456fa7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/elastic.svg\" class=\"attachment-large size-large wp-image-1711\" alt=\"Elastic Security\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3c7a522 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3c7a522\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4390a91\" data-id=\"4390a91\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-574d593 elementor-widget elementor-widget-heading\" data-id=\"574d593\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Nuestras Integraciones<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb37d6b elementor-widget elementor-widget-text-editor\" data-id=\"cb37d6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Integraci\u00f3n con servicios desplegados en la organizaci\u00f3n, algunos de los mas comunes:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-096de65 elementor-widget elementor-widget-image\" data-id=\"096de65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"388\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/integraciones-1024x388.png\" class=\"attachment-large size-large wp-image-1713\" alt=\"\" srcset=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/integraciones-1024x388.png 1024w, https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/integraciones-300x114.png 300w, https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/integraciones-768x291.png 768w, https:\/\/forensic-security.com\/wp-content\/uploads\/2022\/11\/integraciones.png 1400w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6080536 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6080536\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9b3eabc\" data-id=\"9b3eabc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ab7891e elementor-widget elementor-widget-heading\" data-id=\"ab7891e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bf HABLAMOS ?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be32c2d elementor-widget elementor-widget-text-editor\" data-id=\"be32c2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>info@forensic-security.com<\/p><p><span class=\"w8qArf\">Tel\u00e9fonos<span class=\"eTVOZd\">:\u00a0 <\/span>881 28 99 18 &#8211; 91 937 99 30<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1a6efea elementor-section-content-space-between elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1a6efea\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-0d0b36f\" data-id=\"0d0b36f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-79c403f elementor-widget elementor-widget-image\" data-id=\"79c403f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/02\/CERTIFICADO-ENS-FORENSICSECURITY.pdf\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"164\" height=\"200\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/02\/rd-311-22.png\" class=\"attachment-full size-full wp-image-2447\" alt=\"\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-fe7a7a7\" data-id=\"fe7a7a7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c8f350 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"8c8f350\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/catalogo.incibe.es\/search\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"230\" height=\"228\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/02\/incibe.svg\" class=\"attachment-full size-full wp-image-2418\" alt=\"\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-540f006\" data-id=\"540f006\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5905fdb elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"5905fdb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/02\/27001-CAST-FORENSIC-SECURITY_signed-1.pdf\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"199\" height=\"200\" src=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/02\/iso27001.png\" class=\"attachment-full size-full wp-image-2448\" alt=\"\" srcset=\"https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/02\/iso27001.png 199w, https:\/\/forensic-security.com\/wp-content\/uploads\/2024\/02\/iso27001-150x150.png 150w\" sizes=\"(max-width: 199px) 100vw, 199px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":8,"featured_media":2655,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-2825","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/forensic-security.com\/en\/wp-json\/wp\/v2\/pages\/2825","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forensic-security.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/forensic-security.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/forensic-security.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/forensic-security.com\/en\/wp-json\/wp\/v2\/comments?post=2825"}],"version-history":[{"count":1,"href":"https:\/\/forensic-security.com\/en\/wp-json\/wp\/v2\/pages\/2825\/revisions"}],"predecessor-version":[{"id":2830,"href":"https:\/\/forensic-security.com\/en\/wp-json\/wp\/v2\/pages\/2825\/revisions\/2830"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forensic-security.com\/en\/wp-json\/wp\/v2\/media\/2655"}],"wp:attachment":[{"href":"https:\/\/forensic-security.com\/en\/wp-json\/wp\/v2\/media?parent=2825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}