{"id":17352,"date":"2023-05-17T14:08:22","date_gmt":"2023-05-17T12:08:22","guid":{"rendered":"https:\/\/cyberoo.com\/va-pt\/"},"modified":"2024-11-22T18:35:29","modified_gmt":"2024-11-22T17:35:29","slug":"pruebas-de-penetracion-y-analisis-de-vulnerabilidades","status":"publish","type":"page","link":"https:\/\/cyberoo.com\/es\/pruebas-de-penetracion-y-analisis-de-vulnerabilidades\/","title":{"rendered":"Pruebas de Penetraci\u00f3n y An\u00e1lisis de Vulnerabilidades"},"content":{"rendered":"[vc_row type=\u00bbfull_width_background\u00bb full_screen_row_position=\u00bbmiddle\u00bb column_margin=\u00bbdefault\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb full_height=\u00bbyes\u00bb columns_placement=\u00bbbottom\u00bb video_bg=\u00bbuse_video\u00bb video_mp4=\u00bbhttps:\/\/cyberoo.com\/video\/CYBEROO-Compliance.mp4&#8243; background_video_loading=\u00bbdefault\u00bb scene_position=\u00bbcenter\u00bb text_color=\u00bbdark\u00bb text_align=\u00bbleft\u00bb row_border_radius=\u00bbnone\u00bb row_border_radius_applies=\u00bbbg\u00bb overflow=\u00bbvisible\u00bb enable_gradient=\u00bbtrue\u00bb color_overlay=\u00bbrgba(0,0,0,0.4)\u00bb color_overlay_2=\u00bb#000000&#8243; overlay_strength=\u00bb0.8&#8243; gradient_direction=\u00bbtop_to_bottom\u00bb shape_divider_position=\u00bbbottom\u00bb bg_image_animation=\u00bbzoom-out-slow\u00bb mobile_disable_bg_image_animation=\u00bbtrue\u00bb gradient_type=\u00bbdefault\u00bb shape_type=\u00bb\u00bb][vc_column column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb column_position=\u00bbdefault\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/1&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][split_line_heading animation_type=\u00bbline-reveal-by-space\u00bb font_style=\u00bbh1&#8243; line_reveal_by_space_text_effect=\u00bbdefault\u00bb content_alignment=\u00bbdefault\u00bb mobile_content_alignment=\u00bbinherit\u00bb link_target=\u00bb_self\u00bb text_content=\u00bbPruebas de Penetraci\u00f3n y An\u00e1lisis de Vulnerabilidades\u00bb][\/split_line_heading][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb20&#8243; custom_height_tablet=\u00bb0&#8243; custom_height_phone=\u00bb0&#8243;][vc_row_inner equal_height=\u00bbyes\u00bb content_placement=\u00bbbottom\u00bb column_margin=\u00bbdefault\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb text_align=\u00bbleft\u00bb row_position=\u00bbdefault\u00bb row_position_tablet=\u00bbinherit\u00bb row_position_phone=\u00bbinherit\u00bb overflow=\u00bbvisible\u00bb pointer_events=\u00bball\u00bb][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb3\/5&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][vc_column_text]\n<h6>Para defenderse eficazmente de los ataques, hay que pensar como un hacker criminal y utilizar sus estrategias en tu contra<\/h6>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb2\/5&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][nectar_cta btn_style=\u00bbnext-section\u00bb btn_type=\u00bbminimal-arrow\u00bb next_section_color=\u00bb#ffffff\u00bb alignment=\u00bbright\u00bb alignment_tablet=\u00bbdefault\u00bb alignment_phone=\u00bbdefault\u00bb display_tablet=\u00bbinherit\u00bb display_phone=\u00bbinherit\u00bb][\/vc_column_inner][\/vc_row_inner][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb80&#8243;][\/vc_column][\/vc_row][vc_row type=\u00bbfull_width_background\u00bb full_screen_row_position=\u00bbmiddle\u00bb column_margin=\u00bbcustom\u00bb column_margin_custom=\u00bb200px\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb scene_position=\u00bbcenter\u00bb top_padding=\u00bb100px\u00bb constrain_group_1=\u00bbyes\u00bb bottom_padding=\u00bb100px\u00bb top_padding_tablet=\u00bb80px\u00bb bottom_padding_tablet=\u00bb40px\u00bb top_padding_phone=\u00bb80px\u00bb bottom_padding_phone=\u00bb40px\u00bb text_color=\u00bbdark\u00bb text_align=\u00bbleft\u00bb row_border_radius=\u00bbnone\u00bb row_border_radius_applies=\u00bbbg\u00bb overflow=\u00bbvisible\u00bb overlay_strength=\u00bb0.3&#8243; gradient_direction=\u00bbleft_to_right\u00bb shape_divider_position=\u00bbbottom\u00bb bg_image_animation=\u00bbnone\u00bb gradient_type=\u00bbdefault\u00bb shape_type=\u00bb\u00bb][vc_column column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb column_position=\u00bbdefault\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/2&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][split_line_heading animation_type=\u00bbdefault\u00bb font_line_height=\u00bb1.1&#8243;]\n<h3>\u00bfTu empresa est\u00e1 a salvo de los ciberataques?<\/h3>\n[\/split_line_heading][vc_column_text]El riesgo de un ataque hacker forma parte de la vida digital de cada uno de nosotros y de todas las empresas. Pero cada vez es m\u00e1s dif\u00edcil para las empresas protegerse sin una planificaci\u00f3n de seguridad adecuada.<\/p>\n<p><strong>\u00ab\u00bfPOR QU\u00c9 DEBER\u00cdAN ATACARME?<\/strong><br \/>\n<strong>\u00a1NO SUCEDI\u00d3 NUNCA!\u00bb<\/strong><br \/>\nPensando as\u00ed, pones en riesgo tu empresa. La ciberdelincuencia afecta a todos indiscriminadamente y las empresas, al igual que las personas, son v\u00edctimas de ataques a diario.[\/vc_column_text][nectar_cta btn_style=\u00bbmaterial\u00bb heading_tag=\u00bbp\u00bb link_type=\u00bbregular\u00bb alignment=\u00bbleft\u00bb alignment_tablet=\u00bbdefault\u00bb alignment_phone=\u00bbdefault\u00bb display=\u00bbblock\u00bb display_tablet=\u00bbinherit\u00bb display_phone=\u00bbinherit\u00bb url=\u00bb#more\u00bb link_text=\u00bbDESCUBRE C\u00d3MO PROTEGERTE\u00bb][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb40&#8243; custom_height_phone=\u00bb30&#8243;][\/vc_column][vc_column column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb column_position=\u00bbdefault\u00bb el_class=\u00bbsmall-milestone-block\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/2&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb column_padding_type=\u00bbdefault\u00bb gradient_type=\u00bbdefault\u00bb][vc_row_inner column_margin=\u00bb60px\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb text_align=\u00bbleft\u00bb row_position=\u00bbdefault\u00bb row_position_tablet=\u00bbinherit\u00bb row_position_phone=\u00bbinherit\u00bb overflow=\u00bbvisible\u00bb pointer_events=\u00bball\u00bb][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/2&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][milestone heading_inherit=\u00bbh5&#8243; subject_padding=\u00bb0&#8243; color=\u00bbDefault\u00bb effect=\u00bbmotion_blur\u00bb milestone_alignment=\u00bbleft\u00bb number=\u00bb1 Mio\u00bb subject=\u00bbAtaques de spear phishing en 2022 en Italia, el 20% de los cuales con consecuencias importantes para las empresas afectadas.\u00bb number_font_size=\u00bb52&#8243;][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb40&#8243; custom_height_phone=\u00bb30&#8243;][\/vc_column_inner][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/2&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][milestone heading_inherit=\u00bbh5&#8243; subject_padding=\u00bb0&#8243; color=\u00bbDefault\u00bb effect=\u00bbmotion_blur\u00bb milestone_alignment=\u00bbleft\u00bb number=\u00bb73 %\u00bb subject=\u00bbIncidentes internos de seguridad causados por vulnerabilidades de software y acciones incorrectas de los usuarios.\u00bb number_font_size=\u00bb52&#8243;][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb40&#8243; custom_height_phone=\u00bb30&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner column_margin=\u00bb60px\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb text_align=\u00bbleft\u00bb row_position=\u00bbdefault\u00bb row_position_tablet=\u00bbinherit\u00bb row_position_phone=\u00bbinherit\u00bb overflow=\u00bbvisible\u00bb pointer_events=\u00bball\u00bb][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/2&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][milestone heading_inherit=\u00bbh4&#8243; subject_padding=\u00bb0&#8243; color=\u00bbDefault\u00bb effect=\u00bbmotion_blur\u00bb milestone_alignment=\u00bbleft\u00bb number=\u00bb+52 %\u00bb subject=\u00bbAumento de los ataques de phishing e ingenier\u00eda social en 2022 (frente a 2021).\u00bb number_font_size=\u00bb52&#8243;][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb40&#8243; custom_height_phone=\u00bb30&#8243;][\/vc_column_inner][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/2&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][milestone heading_inherit=\u00bbh4&#8243; subject_padding=\u00bb0&#8243; color=\u00bbDefault\u00bb effect=\u00bbmotion_blur\u00bb milestone_alignment=\u00bbleft\u00bb number=\u00bb+4,5 %\u00bb subject=\u00bbAumento de los ataques DDoS en el primer semestre de 2022 (frente al primer trimestre de 2021).\u00bb number_font_size=\u00bb52&#8243;][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb40&#8243; custom_height_phone=\u00bb30&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row type=\u00bbfull_width_background\u00bb full_screen_row_position=\u00bbmiddle\u00bb column_margin=\u00bbdefault\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb full_height=\u00bbyes\u00bb video_bg=\u00bbuse_video\u00bb video_mp4=\u00bbhttps:\/\/cyberoo.com\/video\/CYBEROO-concept.mp4&#8243; background_video_loading=\u00bbdefault\u00bb scene_position=\u00bbcenter\u00bb text_color=\u00bbdark\u00bb text_align=\u00bbleft\u00bb row_border_radius=\u00bbnone\u00bb row_border_radius_applies=\u00bbbg\u00bb overflow=\u00bbvisible\u00bb overlay_strength=\u00bb0.3&#8243; gradient_direction=\u00bbleft_to_right\u00bb shape_divider_position=\u00bbbottom\u00bb bg_image_animation=\u00bbnone\u00bb gradient_type=\u00bbdefault\u00bb shape_type=\u00bb\u00bb][vc_column column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb column_position=\u00bbdefault\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/1&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][vc_row_inner column_margin=\u00bb80px\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb text_align=\u00bbleft\u00bb row_position=\u00bbdefault\u00bb row_position_tablet=\u00bbinherit\u00bb row_position_phone=\u00bbinherit\u00bb overflow=\u00bbvisible\u00bb pointer_events=\u00bball\u00bb][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/3&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][split_line_heading animation_type=\u00bbline-reveal-by-space\u00bb font_style=\u00bbh2&#8243; line_reveal_by_space_text_effect=\u00bbdefault\u00bb content_alignment=\u00bbdefault\u00bb mobile_content_alignment=\u00bbinherit\u00bb link_target=\u00bb_self\u00bb font_line_height=\u00bb1.1&#8243; text_content=\u00bbSoluci\u00f3nes\u00bb][\/split_line_heading][vc_column_text]Es posible tener una visi\u00f3n m\u00e1s completa del estado de ciberriesgo de tu empresa gracias al servicio de Evaluaci\u00f3n de la seguridad, que incluye dos actividades diferentes de Seguridad Ofensiva o Red Team:<\/p>\n<p><strong>AN\u00c1LISIS DE VULNERABILIDADES<\/strong><br \/>\nEscaneo para identificar y detectar las vulnerabilidades de la infraestructura y de la red inform\u00e1tica.<\/p>\n<p><strong>PRUEBAS DE PENETRACI\u00d3N<\/strong><br \/>\nSimulaci\u00f3n real de un ataque por parte de un hacker \u00e9tico a un objetivo potencialmente vulnerable.[\/vc_column_text][\/vc_column_inner][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/3&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][\/vc_column_inner][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/3&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row type=\u00bbin_container\u00bb full_screen_row_position=\u00bbmiddle\u00bb column_margin=\u00bbdefault\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb scene_position=\u00bbcenter\u00bb text_color=\u00bblight\u00bb text_align=\u00bbleft\u00bb row_border_radius=\u00bbnone\u00bb row_border_radius_applies=\u00bbbg\u00bb overflow=\u00bbvisible\u00bb overlay_strength=\u00bb0.3&#8243; gradient_direction=\u00bbleft_to_right\u00bb shape_divider_position=\u00bbbottom\u00bb bg_image_animation=\u00bbnone\u00bb gradient_type=\u00bbdefault\u00bb shape_type=\u00bb\u00bb][vc_column column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb column_position=\u00bbdefault\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/1&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb60&#8243; custom_height_tablet=\u00bb60&#8243; custom_height_phone=\u00bb40&#8243;][vc_row_inner column_margin=\u00bb80px\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb text_align=\u00bbleft\u00bb row_position=\u00bbdefault\u00bb row_position_tablet=\u00bbinherit\u00bb row_position_phone=\u00bbinherit\u00bb overflow=\u00bbvisible\u00bb pointer_events=\u00bball\u00bb][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/3&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][split_line_heading animation_type=\u00bbline-reveal-by-space\u00bb font_style=\u00bbh3&#8243; line_reveal_by_space_text_effect=\u00bbdefault\u00bb content_alignment=\u00bbdefault\u00bb mobile_content_alignment=\u00bbinherit\u00bb link_target=\u00bb_self\u00bb font_line_height=\u00bb1.1&#8243; text_content=\u00bbAn\u00e1lisis de Vulnerabilidades\u00bb][\/split_line_heading][\/vc_column_inner][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/3&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb15&#8243;][vc_column_text]Garantiza una doble ventaja: permite que el cliente tenga una instant\u00e1nea del estado de exposici\u00f3n de sus sistemas internos y externos a todas las vulnerabilidades conocidas, adem\u00e1s verifica qu\u00e9 riesgos corre el cliente en caso de que se eludan las protecciones que tiene establecidas.[\/vc_column_text][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb15&#8243;][vc_column_text el_class=\u00bbnumero-cerchiato\u00bb]1[\/vc_column_text][vc_column_text el_class=\u00bbtitolo-numero\u00bb css=\u00bb.vc_custom_1718117866801{margin-top: 6px !important;margin-left: 55px !important;}\u00bb]<strong>80% DE ACTIVIDAD AUTOMATIZADA DE LOS SISTEMAS<\/strong><br \/>\nPara conocer los detalles de su configuraci\u00f3n y la posible presencia de vulnerabilidades.[\/vc_column_text][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb15&#8243;][vc_column_text el_class=\u00bbnumero-cerchiato\u00bb]2[\/vc_column_text][vc_column_text el_class=\u00bbtitolo-numero\u00bb css=\u00bb.vc_custom_1718117888591{margin-top: 6px !important;margin-left: 55px !important;}\u00bb]<strong>VISI\u00d3N MUY DETALLADA<\/strong><br \/>\nLas comprobaciones se realizan a corto plazo en un per\u00edmetro muy amplio.[\/vc_column_text][\/vc_column_inner][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/3&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb15&#8243;][vc_column_text el_class=\u00bbnumero-cerchiato\u00bb]3[\/vc_column_text][vc_column_text el_class=\u00bbtitolo-numero\u00bb css=\u00bb.vc_custom_1718117901510{margin-top: 6px !important;margin-left: 55px !important;}\u00bb]<strong>ACTIVIDAD HORIZONTAL<\/strong><br \/>\nIdentifica y clasifica el mayor n\u00famero posible de riesgos y vulnerabilidades en un gran n\u00famero de sistemas y dispositivos de la empresa.[\/vc_column_text][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb15&#8243;][vc_column_text el_class=\u00bbnumero-cerchiato\u00bb]4[\/vc_column_text][vc_column_text el_class=\u00bbtitolo-numero\u00bb css=\u00bb.vc_custom_1718117919919{margin-top: 6px !important;margin-left: 55px !important;}\u00bb]<strong>20% DE ACTIVIDAD MANUAL<\/strong><br \/>\nEl hacker \u00e9tico de CYBEROO comprueba los resultados producidos por el escaneo y realiza un an\u00e1lisis en profundidad y eliminaci\u00f3n de los falsos positivos.[\/vc_column_text][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb15&#8243;][vc_column_text el_class=\u00bbnumero-cerchiato\u00bb]5[\/vc_column_text][vc_column_text el_class=\u00bbtitolo-numero\u00bb css=\u00bb.vc_custom_1718117936670{margin-top: 6px !important;margin-left: 55px !important;}\u00bb]<strong>MODO \u00abSAFE CHECK\u00bb<\/strong><br \/>\nLa actividad tiene un impacto casi nulo en el funcionamiento de los sistemas analizados y puede detectar informaci\u00f3n vital para la seguridad de las empresas.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb120&#8243; custom_height_tablet=\u00bb80&#8243; custom_height_phone=\u00bb60&#8243;][\/vc_column][\/vc_row][vc_row type=\u00bbfull_width_background\u00bb full_screen_row_position=\u00bbmiddle\u00bb column_margin=\u00bb80px\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb scene_position=\u00bbcenter\u00bb text_color=\u00bblight\u00bb text_align=\u00bbleft\u00bb row_border_radius=\u00bbnone\u00bb row_border_radius_applies=\u00bbbg\u00bb overflow=\u00bbvisible\u00bb overlay_strength=\u00bb0.3&#8243; gradient_direction=\u00bbleft_to_right\u00bb shape_divider_position=\u00bbbottom\u00bb bg_image_animation=\u00bbnone\u00bb gradient_type=\u00bbdefault\u00bb shape_type=\u00bb\u00bb][vc_column column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb column_position=\u00bbdefault\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/2&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][vc_column_text]\n<h4>ENFOQUES<\/h4>\n[\/vc_column_text][vc_row_inner column_margin=\u00bb80px\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb text_align=\u00bbleft\u00bb row_position=\u00bbdefault\u00bb row_position_tablet=\u00bbinherit\u00bb row_position_phone=\u00bbinherit\u00bb overflow=\u00bbvisible\u00bb pointer_events=\u00bball\u00bb][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/2&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][vc_column_text]<strong>INTERNO<\/strong><br \/>\nEl an\u00e1lisis de la red interna se realizar\u00e1 in situ o mediante m\u00e1quina virtual en la infraestructura local del cliente, as\u00ed como en los servicios prestados en la red interna.[\/vc_column_text][\/vc_column_inner][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/2&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][vc_column_text]<strong>EXTERNO<\/strong><br \/>\nEl an\u00e1lisis en el per\u00edmetro externo consiste en la realizaci\u00f3n de una actividad destinada a identificar todas las vulnerabilidades presentes en los dispositivos y servicios expuestos en Internet relacionados con la red del cliente.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb80&#8243; custom_height_tablet=\u00bb60&#8243; custom_height_phone=\u00bb40&#8243;][\/vc_column][vc_column column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb column_position=\u00bbdefault\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/2&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][vc_column_text]\n<h4>METODOLOG\u00cdA APLICADA<\/h4>\n[\/vc_column_text][vc_column_text]\n<p class=\"p1\">La metodolog\u00eda adoptada para la actividad se denomina \u00abSafeCheck\u00bb y es conforme a la Open Source Security Testing Methodology Manual (OSSTMM) de ISECOM y a lo definido por el Open Web Application Security Project (OWASP) en materia de Evaluaci\u00f3n de la Seguridad.<\/p>\n<ul>\n<li>Utilizaci\u00f3n del indicador de riesgo calculado seg\u00fan el marco CVSS (Common Vulnerability Scoring System) de FIRST (Forum of Incident Response and Security Teams).<\/li>\n<li>Cuando es posible, el c\u00f3digo CVE (Common Vulnerabilities and Exposures) tambi\u00e9n aparece en la descripci\u00f3n de la vulnerabilidad.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=\u00bbin_container\u00bb full_screen_row_position=\u00bbmiddle\u00bb column_margin=\u00bbdefault\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb scene_position=\u00bbcenter\u00bb text_color=\u00bblight\u00bb text_align=\u00bbleft\u00bb row_border_radius=\u00bbnone\u00bb row_border_radius_applies=\u00bbbg\u00bb overflow=\u00bbvisible\u00bb overlay_strength=\u00bb0.3&#8243; gradient_direction=\u00bbleft_to_right\u00bb shape_divider_position=\u00bbbottom\u00bb bg_image_animation=\u00bbnone\u00bb gradient_type=\u00bbdefault\u00bb shape_type=\u00bb\u00bb][vc_column column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb column_position=\u00bbdefault\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/1&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb120&#8243; custom_height_tablet=\u00bb80&#8243; custom_height_phone=\u00bb80&#8243;][vc_row_inner column_margin=\u00bb80px\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb text_align=\u00bbleft\u00bb row_position=\u00bbdefault\u00bb row_position_tablet=\u00bbinherit\u00bb row_position_phone=\u00bbinherit\u00bb overflow=\u00bbvisible\u00bb pointer_events=\u00bball\u00bb][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/3&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][split_line_heading animation_type=\u00bbline-reveal-by-space\u00bb font_style=\u00bbh2&#8243; line_reveal_by_space_text_effect=\u00bbdefault\u00bb content_alignment=\u00bbdefault\u00bb mobile_content_alignment=\u00bbinherit\u00bb link_target=\u00bb_self\u00bb font_line_height=\u00bb1.1&#8243; text_content=\u00bbPruebas de Penetraci\u00f3n\u00bb][\/split_line_heading][\/vc_column_inner][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb2\/3&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb15&#8243;][vc_column_text]La Prueba de penetraci\u00f3n es un an\u00e1lisis exhaustivo de una aplicaci\u00f3n espec\u00edfica o servicio con el objetivo de identificar funcionalidades que, si son explotadas por un agente malicioso, podr\u00edan conducir a una violaci\u00f3n de seguridad.[\/vc_column_text][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb15&#8243;][vc_column_text el_class=\u00bbnumero-cerchiato\u00bb]1[\/vc_column_text][vc_column_text el_class=\u00bbtitolo-numero\u00bb css=\u00bb.vc_custom_1718118030959{margin-top: 6px !important;margin-left: 55px !important;}\u00bb]<strong>80% DE ACTIVIDAD MANUAL<\/strong><br \/>\nSe analiza el impacto de la exposici\u00f3n a vulnerabilidades que no pueden verificarse mediante software autom\u00e1ticos y, en particular, los resultados que se obtienen de la interacci\u00f3n simult\u00e1nea de cada vulnerabilidad.[\/vc_column_text][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb15&#8243;][vc_column_text el_class=\u00bbnumero-cerchiato\u00bb]2[\/vc_column_text][vc_column_text el_class=\u00bbtitolo-numero\u00bb css=\u00bb.vc_custom_1718118051396{margin-top: 6px !important;margin-left: 55px !important;}\u00bb]<strong>COMPETENCIAS DEL EQUIPO DE CIBERSEGURIDAD<\/strong><br \/>\nEl hacker \u00e9tico realiza aut\u00e9nticas simulaciones de intrusi\u00f3n en varios niveles, hipotetiza diferentes escenarios de ataque y combina t\u00e9cnicas manuales sofisticadas utilizando herramientas autom\u00e1ticas complejas.[\/vc_column_text][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb15&#8243;][vc_column_text el_class=\u00bbnumero-cerchiato\u00bb]3[\/vc_column_text][vc_column_text el_class=\u00bbtitolo-numero\u00bb css=\u00bb.vc_custom_1718118066814{margin-top: 6px !important;margin-left: 55px !important;}\u00bb]<strong>ACTIVIDAD VERTICAL<\/strong><br \/>\nSe concentra principalmente en servicios espec\u00edficos identificados con el cliente, analizando en profundidad y de forma precisa todas sus funcionalidades.[\/vc_column_text][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb15&#8243;][vc_column_text el_class=\u00bbnumero-cerchiato\u00bb]4[\/vc_column_text][vc_column_text el_class=\u00bbtitolo-numero\u00bb css=\u00bb.vc_custom_1718118078742{margin-top: 6px !important;margin-left: 55px !important;}\u00bb]<strong>PREVENCI\u00d3N<\/strong><br \/>\nPreviene incidentes de seguridad potencialmente destructivos, resolviendo y mitigando as\u00ed el riesgo de comprometer la seguridad.[\/vc_column_text][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb15&#8243;][\/vc_column_inner][\/vc_row_inner][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb120&#8243; custom_height_tablet=\u00bb80&#8243; custom_height_phone=\u00bb60&#8243;][\/vc_column][\/vc_row][vc_row type=\u00bbin_container\u00bb full_screen_row_position=\u00bbmiddle\u00bb column_margin=\u00bbdefault\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb scene_position=\u00bbcenter\u00bb text_color=\u00bblight\u00bb text_align=\u00bbleft\u00bb row_border_radius=\u00bbnone\u00bb row_border_radius_applies=\u00bbbg\u00bb overflow=\u00bbvisible\u00bb overlay_strength=\u00bb0.3&#8243; gradient_direction=\u00bbleft_to_right\u00bb shape_divider_position=\u00bbbottom\u00bb bg_image_animation=\u00bbnone\u00bb gradient_type=\u00bbdefault\u00bb shape_type=\u00bb\u00bb][vc_column column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb column_position=\u00bbdefault\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/1&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][vc_row_inner column_margin=\u00bb80px\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb text_align=\u00bbleft\u00bb row_position=\u00bbdefault\u00bb row_position_tablet=\u00bbinherit\u00bb row_position_phone=\u00bbinherit\u00bb overflow=\u00bbvisible\u00bb pointer_events=\u00bball\u00bb][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/3&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][split_line_heading animation_type=\u00bbdefault\u00bb font_line_height=\u00bb1.1&#8243;]\n<h2>Nuestras actividades de Pruebas de Penetraci\u00f3n<\/h2>\n[\/split_line_heading][\/vc_column_inner][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/3&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb15&#8243;][vc_column_text]<strong>WEB APPLICATION PENERATION TEST<\/strong><br \/>\nActividad destinada a identificar las vulnerabilidades en aplicaciones web que puede centrarse en todas las \u00e1reas de la aplicaci\u00f3n.<\/p>\n<p><strong>MOBILE PENETRATION TEST<\/strong><br \/>\nActividad destinada a probar la seguridad de las aplicaciones m\u00f3viles, de los servicios de backend y de los sistemas m\u00f3viles.<\/p>\n<p><strong>PT INFRAESTRUCTURAL<\/strong><br \/>\nActividad destinada a identificar vulnerabilidades en una infraestructura definida.<\/p>\n<p><strong>PT WIFI<\/strong><br \/>\nActividad destinada a comprobar la calidad de la configuraci\u00f3n de la red wifi con vistas a un posible ataque.[\/vc_column_text][\/vc_column_inner][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/3&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb15&#8243; custom_height_tablet=\u00bb0&#8243; custom_height_phone=\u00bb0&#8243;][vc_column_text]<strong>PT ENTORNOS SCADA\/OT<\/strong><br \/>\nActividad espec\u00edfica para entornos industriales y de producci\u00f3n, destinada a identificar todas las vulnerabilidades posibles con especial atenci\u00f3n a la continuidad operativa.<\/p>\n<p><strong>PT BLACK BOX<\/strong><br \/>\nLa actividad se realiza simulando un atacante que asecha la empresa y compromete la seguridad.<\/p>\n<p><strong>CODE REVIEW<\/strong><br \/>\nActividad destinada a identificar vulnerabilidades mediante el estudio directo del c\u00f3digo fuente de la aplicaci\u00f3n\/servicio analizado.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb90&#8243; custom_height_tablet=\u00bb80&#8243; custom_height_phone=\u00bb60&#8243;][\/vc_column][\/vc_row][vc_row type=\u00bbin_container\u00bb full_screen_row_position=\u00bbmiddle\u00bb column_margin=\u00bbdefault\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb scene_position=\u00bbcenter\u00bb text_color=\u00bblight\u00bb text_align=\u00bbleft\u00bb row_border_radius=\u00bbnone\u00bb row_border_radius_applies=\u00bbbg\u00bb overflow=\u00bbvisible\u00bb id=\u00bbmore\u00bb overlay_strength=\u00bb0.3&#8243; gradient_direction=\u00bbleft_to_right\u00bb shape_divider_position=\u00bbbottom\u00bb bg_image_animation=\u00bbnone\u00bb gradient_type=\u00bbdefault\u00bb shape_type=\u00bb\u00bb][vc_column column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb column_position=\u00bbdefault\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/1&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][vc_column_text css=\u00bb.vc_custom_1718118225233{margin-bottom: 0px !important;}\u00bb]\n<h4 class=\"p1\">BENEFICIOS<\/h4>\n[\/vc_column_text][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb0&#8243; custom_height_tablet=\u00bb0&#8243; custom_height_phone=\u00bb15&#8243;][carousel script=\u00bbflickity\u00bb flickity_formatting=\u00bbdefault\u00bb desktop_cols_flickity=\u00bb3&#8243; desktop_small_cols_flickity=\u00bb3&#8243; tablet_cols_flickity=\u00bb3&#8243; phone_cols_flickity=\u00bb2&#8243; flickity_controls=\u00bbtouch_total\u00bb flickity_touch_total_style=\u00bbdefault\u00bb flickity_touch_total_icon_color=\u00bblight\u00bb color=\u00bbdefault\u00bb flickity_overflow=\u00bbvisible\u00bb flickity_wrap_around=\u00bbno-wrap\u00bb flickity_spacing=\u00bb30px\u00bb flickity_column_vertical_alignment=\u00bbdefault\u00bb column_padding=\u00bb0&#8243; flickity_element_spacing=\u00bbdefault\u00bb border_radius=\u00bbnone\u00bb][item simple_slider_bg_image_position=\u00bbdefault\u00bb simple_slider_overlay_strength=\u00bb0.3&#8243; simple_slider_bg_image_loading=\u00bbdefault\u00bb id=\u00bb1732296865641-10&#8243; tab_id=\u00bb1732296865641-4&#8243; title=\u00bbItem\u00bb][vc_row_inner column_margin=\u00bbdefault\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb text_align=\u00bbleft\u00bb row_position=\u00bbdefault\u00bb row_position_tablet=\u00bbinherit\u00bb row_position_phone=\u00bbinherit\u00bb overflow=\u00bbvisible\u00bb pointer_events=\u00bball\u00bb][vc_column_inner column_padding=\u00bbpadding-7-percent\u00bb column_padding_tablet=\u00bbno-extra-padding\u00bb column_padding_phone=\u00bbno-extra-padding\u00bb column_padding_position=\u00bbright\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/1&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb column_padding_type=\u00bbdefault\u00bb gradient_type=\u00bbdefault\u00bb][image_with_animation image_url=\u00bb1020&#8243; image_size=\u00bbfull\u00bb animation_type=\u00bbentrance\u00bb animation=\u00bbNone\u00bb animation_movement_type=\u00bbtransform_y\u00bb hover_animation=\u00bbnone\u00bb alignment=\u00bb\u00bb border_radius=\u00bbnone\u00bb box_shadow=\u00bbnone\u00bb image_loading=\u00bbskip-lazy-load\u00bb max_width=\u00bbcustom\u00bb max_width_custom=\u00bb74&#8243;][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb10px\u00bb][vc_column_text]\n<h6 class=\"p1\">Concienciaci\u00f3n<\/h6>\n[\/vc_column_text][vc_column_text]\n<p class=\"p1\">Conocimiento del nivel de seguridad de los propios sistemas y la consiguiente oportunidad de reducir el nivel de riesgo hacia cero.<\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/item][item simple_slider_bg_image_position=\u00bbdefault\u00bb simple_slider_overlay_strength=\u00bb0.3&#8243; simple_slider_bg_image_loading=\u00bbdefault\u00bb id=\u00bb1732296865772-4&#8243; tab_id=\u00bb1732296865772-3&#8243; title=\u00bbItem\u00bb][vc_row_inner column_margin=\u00bbdefault\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb text_align=\u00bbleft\u00bb row_position=\u00bbdefault\u00bb row_position_tablet=\u00bbinherit\u00bb row_position_phone=\u00bbinherit\u00bb overflow=\u00bbvisible\u00bb pointer_events=\u00bball\u00bb][vc_column_inner column_padding=\u00bbpadding-7-percent\u00bb column_padding_tablet=\u00bbno-extra-padding\u00bb column_padding_phone=\u00bbno-extra-padding\u00bb column_padding_position=\u00bbright\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/1&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb column_padding_type=\u00bbdefault\u00bb gradient_type=\u00bbdefault\u00bb][image_with_animation image_url=\u00bb1022&#8243; image_size=\u00bbfull\u00bb animation_type=\u00bbentrance\u00bb animation=\u00bbNone\u00bb animation_movement_type=\u00bbtransform_y\u00bb hover_animation=\u00bbnone\u00bb alignment=\u00bb\u00bb border_radius=\u00bbnone\u00bb box_shadow=\u00bbnone\u00bb image_loading=\u00bbskip-lazy-load\u00bb max_width=\u00bbcustom\u00bb max_width_custom=\u00bb74px\u00bb][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb10px\u00bb][vc_column_text]\n<h6>Visi\u00f3n completa<\/h6>\n[\/vc_column_text][vc_column_text]\n<p class=\"p1\">Visi\u00f3n completa y detallada de la exposici\u00f3n del ciberriesgo que existe en el propio ecosistema TI.<\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/item][item simple_slider_bg_image_position=\u00bbdefault\u00bb simple_slider_overlay_strength=\u00bb0.3&#8243; simple_slider_bg_image_loading=\u00bbdefault\u00bb id=\u00bb1732296865839-10&#8243; tab_id=\u00bb1732296865839-6&#8243; title=\u00bbItem\u00bb][vc_row_inner column_margin=\u00bbdefault\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb text_align=\u00bbleft\u00bb row_position=\u00bbdefault\u00bb row_position_tablet=\u00bbinherit\u00bb row_position_phone=\u00bbinherit\u00bb overflow=\u00bbvisible\u00bb pointer_events=\u00bball\u00bb][vc_column_inner column_padding=\u00bbpadding-7-percent\u00bb column_padding_tablet=\u00bbno-extra-padding\u00bb column_padding_phone=\u00bbno-extra-padding\u00bb column_padding_position=\u00bbright\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/1&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb column_padding_type=\u00bbdefault\u00bb gradient_type=\u00bbdefault\u00bb][image_with_animation image_url=\u00bb1023&#8243; image_size=\u00bbfull\u00bb animation_type=\u00bbentrance\u00bb animation=\u00bbNone\u00bb animation_movement_type=\u00bbtransform_y\u00bb hover_animation=\u00bbnone\u00bb alignment=\u00bb\u00bb border_radius=\u00bbnone\u00bb box_shadow=\u00bbnone\u00bb image_loading=\u00bbskip-lazy-load\u00bb max_width=\u00bbcustom\u00bb max_width_custom=\u00bb74px\u00bb][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb10px\u00bb][vc_column_text]\n<h6>Prevenci\u00f3n<\/h6>\n[\/vc_column_text][vc_column_text]\n<p class=\"p1\">Es sumamente importante que una empresa descubra sus puntos d\u00e9biles con antelaci\u00f3n para luego tomar las contramedidas adecuadas.<\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/item][item simple_slider_bg_image_position=\u00bbdefault\u00bb simple_slider_overlay_strength=\u00bb0.3&#8243; simple_slider_bg_image_loading=\u00bbdefault\u00bb id=\u00bb1732296865900-7&#8243; tab_id=\u00bb1732296865901-5&#8243; title=\u00bbItem\u00bb][vc_row_inner column_margin=\u00bbdefault\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb text_align=\u00bbleft\u00bb row_position=\u00bbdefault\u00bb row_position_tablet=\u00bbinherit\u00bb row_position_phone=\u00bbinherit\u00bb overflow=\u00bbvisible\u00bb pointer_events=\u00bball\u00bb][vc_column_inner column_padding=\u00bbpadding-7-percent\u00bb column_padding_tablet=\u00bbno-extra-padding\u00bb column_padding_phone=\u00bbno-extra-padding\u00bb column_padding_position=\u00bbright\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/1&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb column_padding_type=\u00bbdefault\u00bb gradient_type=\u00bbdefault\u00bb][image_with_animation image_url=\u00bb1021&#8243; image_size=\u00bbfull\u00bb animation_type=\u00bbentrance\u00bb animation=\u00bbNone\u00bb animation_movement_type=\u00bbtransform_y\u00bb hover_animation=\u00bbnone\u00bb alignment=\u00bb\u00bb border_radius=\u00bbnone\u00bb box_shadow=\u00bbnone\u00bb image_loading=\u00bbskip-lazy-load\u00bb max_width=\u00bbcustom\u00bb max_width_custom=\u00bb74px\u00bb][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb10px\u00bb][vc_column_text]\n<h6>Continuidad<\/h6>\n[\/vc_column_text][vc_column_text]\n<p class=\"p1\">Con una protecci\u00f3n de alto nivel, se garantiza la continuidad operativa de la empresa y se reduce el peligro de p\u00e9rdidas econ\u00f3micas.<\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/item][\/carousel][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb90&#8243; custom_height_tablet=\u00bb80&#8243; custom_height_phone=\u00bb60&#8243;][\/vc_column][\/vc_row][vc_row type=\u00bbfull_width_background\u00bb full_screen_row_position=\u00bbmiddle\u00bb column_margin=\u00bbcustom\u00bb column_margin_custom=\u00bb200px\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb scene_position=\u00bbcenter\u00bb constrain_group_1=\u00bbyes\u00bb constrain_group_5=\u00bbyes\u00bb text_color=\u00bblight\u00bb text_align=\u00bbleft\u00bb row_border_radius=\u00bbnone\u00bb row_border_radius_applies=\u00bbbg\u00bb overflow=\u00bbvisible\u00bb overlay_strength=\u00bb0.3&#8243; gradient_direction=\u00bbleft_to_right\u00bb shape_divider_position=\u00bbbottom\u00bb bg_image_animation=\u00bbnone\u00bb gradient_type=\u00bbdefault\u00bb shape_type=\u00bb\u00bb][vc_column column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb column_position=\u00bbdefault\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/1&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][toggles style=\u00bbminimal\u00bb accordion=\u00bbtrue\u00bb accordion_starting_functionality=\u00bbclosed\u00bb][toggle color=\u00bbDefault\u00bb heading_tag=\u00bbdefault\u00bb heading_tag_functionality=\u00bbdefault\u00bb title=\u00bbCYBEROO VA\/PT STEPS\u00bb][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb40&#8243;][vc_row_inner column_margin=\u00bb80px\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb text_align=\u00bbleft\u00bb row_position=\u00bbdefault\u00bb row_position_tablet=\u00bbinherit\u00bb row_position_phone=\u00bbinherit\u00bb overflow=\u00bbvisible\u00bb pointer_events=\u00bball\u00bb][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/2&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb0&#8243; custom_height_tablet=\u00bb0&#8243; custom_height_phone=\u00bb0&#8243;][vc_column_text el_class=\u00bbnumero-cerchiato\u00bb]1[\/vc_column_text][vc_column_text el_class=\u00bbtitolo-numero\u00bb css=\u00bb.vc_custom_1718118295406{margin-top: 6px !important;margin-left: 55px !important;}\u00bb]Interacciones pre engagement[\/vc_column_text][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb15&#8243;][vc_column_text el_class=\u00bbnumero-cerchiato\u00bb]2[\/vc_column_text][vc_column_text el_class=\u00bbtitolo-numero\u00bb css=\u00bb.vc_custom_1718118301974{margin-top: 6px !important;margin-left: 55px !important;}\u00bb]Inteligencia de fuentes abiertas[\/vc_column_text][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb15&#8243;][vc_column_text el_class=\u00bbnumero-cerchiato\u00bb]3[\/vc_column_text][vc_column_text el_class=\u00bbtitolo-numero\u00bb css=\u00bb.vc_custom_1718118308735{margin-top: 6px !important;margin-left: 55px !important;}\u00bb]Modelado de amenazas e identificaci\u00f3n de vulnerabilidades[\/vc_column_text][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb15&#8243;][\/vc_column_inner][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/2&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb0&#8243; custom_height_tablet=\u00bb0&#8243; custom_height_phone=\u00bb0&#8243;][vc_column_text el_class=\u00bbnumero-cerchiato\u00bb]4[\/vc_column_text][vc_column_text el_class=\u00bbtitolo-numero\u00bb css=\u00bb.vc_custom_1718118314933{margin-top: 6px !important;margin-left: 55px !important;}\u00bb]Explotaci\u00f3n[\/vc_column_text][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb15&#8243;][vc_column_text el_class=\u00bbnumero-cerchiato\u00bb]5[\/vc_column_text][vc_column_text el_class=\u00bbtitolo-numero\u00bb css=\u00bb.vc_custom_1718118322221{margin-top: 6px !important;margin-left: 55px !important;}\u00bb]An\u00e1lisis y recomendaciones postexplotaci\u00f3n[\/vc_column_text][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb15&#8243;][vc_column_text el_class=\u00bbnumero-cerchiato\u00bb]6[\/vc_column_text][vc_column_text el_class=\u00bbtitolo-numero\u00bb css=\u00bb.vc_custom_1718118329248{margin-top: 6px !important;margin-left: 55px !important;}\u00bb]Elaboraci\u00f3n de informes[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb40&#8243;][\/toggle][toggle color=\u00bbDefault\u00bb heading_tag=\u00bbdefault\u00bb heading_tag_functionality=\u00bbdefault\u00bb title=\u00bb\u00bfPOR QU\u00c9 ELEGIR CYBEROO DOCETZ?\u00bb][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb40&#8243;][vc_row_inner column_margin=\u00bb90px\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb text_align=\u00bbleft\u00bb row_position=\u00bbdefault\u00bb row_position_tablet=\u00bbinherit\u00bb row_position_phone=\u00bbinherit\u00bb overflow=\u00bbvisible\u00bb pointer_events=\u00bball\u00bb][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/3&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][vc_column_text css=\u00bb.vc_custom_1718118347934{margin-bottom: 10px !important;}\u00bb]\n<h5>Personal altamente<br \/>\ncompetente<\/h5>\n[\/vc_column_text][vc_column_text]con conocimientos t\u00e9cnicos y una amplia experiencia en el sector de la ciberseguridad.[\/vc_column_text][\/vc_column_inner][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/3&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][vc_column_text css=\u00bb.vc_custom_1718118359058{margin-bottom: 10px !important;}\u00bb]\n<h5>Metodolog\u00eda anal\u00edtica<br \/>\ny exhaustiva<\/h5>\n[\/vc_column_text][vc_column_text]para identificar y evaluar con precisi\u00f3n los riesgos y las ciberamenazas.[\/vc_column_text][\/vc_column_inner][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb overflow=\u00bbvisible\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/3&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][vc_column_text css=\u00bb.vc_custom_1718118373622{margin-bottom: 10px !important;}\u00bb]\n<h5>Enfoque<br \/>\npersonalizado<\/h5>\n[\/vc_column_text][vc_column_text]a los requisitos espec\u00edficos del cliente, garantizando la m\u00e1xima calidad y fiabilidad del servicio.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb40&#8243;][\/toggle][\/toggles][divider line_type=\u00bbNo Line\u00bb custom_height=\u00bb100&#8243; custom_height_tablet=\u00bb80&#8243; custom_height_phone=\u00bb60&#8243;][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=\u00bbfull_width_background\u00bb full_screen_row_position=\u00bbmiddle\u00bb column_margin=\u00bbdefault\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb full_height=\u00bbyes\u00bb columns_placement=\u00bbbottom\u00bb video_bg=\u00bbuse_video\u00bb video_mp4=\u00bbhttps:\/\/cyberoo.com\/video\/CYBEROO-Compliance.mp4&#8243; background_video_loading=\u00bbdefault\u00bb scene_position=\u00bbcenter\u00bb text_color=\u00bbdark\u00bb text_align=\u00bbleft\u00bb row_border_radius=\u00bbnone\u00bb row_border_radius_applies=\u00bbbg\u00bb overflow=\u00bbvisible\u00bb enable_gradient=\u00bbtrue\u00bb color_overlay=\u00bbrgba(0,0,0,0.4)\u00bb color_overlay_2=\u00bb#000000&#8243; overlay_strength=\u00bb0.8&#8243; gradient_direction=\u00bbtop_to_bottom\u00bb shape_divider_position=\u00bbbottom\u00bb bg_image_animation=\u00bbzoom-out-slow\u00bb mobile_disable_bg_image_animation=\u00bbtrue\u00bb gradient_type=\u00bbdefault\u00bb shape_type=\u00bb\u00bb][vc_column column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-17352","page","type-page","status-publish"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Pruebas de Penetraci\u00f3n y An\u00e1lisis de Vulnerabilidades | Cyberoo<\/title>\n<meta name=\"description\" content=\"Para defenderse eficazmente de los ataques, hay que pensar como un hacker criminal y utilizar sus estrategias en tu contra\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberoo.com\/es\/pruebas-de-penetracion-y-analisis-de-vulnerabilidades\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pruebas de Penetraci\u00f3n y An\u00e1lisis de Vulnerabilidades | Cyberoo\" \/>\n<meta property=\"og:description\" content=\"Para defenderse eficazmente de los ataques, hay que pensar como un hacker criminal y utilizar sus estrategias en tu contra\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberoo.com\/es\/pruebas-de-penetracion-y-analisis-de-vulnerabilidades\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberoo\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-22T17:35:29+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CYBEROO_ITALIA\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"15 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberoo.com\/es\/pruebas-de-penetracion-y-analisis-de-vulnerabilidades\/\",\"url\":\"https:\/\/cyberoo.com\/es\/pruebas-de-penetracion-y-analisis-de-vulnerabilidades\/\",\"name\":\"Pruebas de Penetraci\u00f3n y An\u00e1lisis de Vulnerabilidades | Cyberoo\",\"isPartOf\":{\"@id\":\"https:\/\/cyberoo.com\/es\/#website\"},\"datePublished\":\"2023-05-17T12:08:22+00:00\",\"dateModified\":\"2024-11-22T17:35:29+00:00\",\"description\":\"Para defenderse eficazmente de los ataques, hay que pensar como un hacker criminal y utilizar sus estrategias en tu contra\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberoo.com\/es\/pruebas-de-penetracion-y-analisis-de-vulnerabilidades\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberoo.com\/es\/pruebas-de-penetracion-y-analisis-de-vulnerabilidades\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberoo.com\/es\/pruebas-de-penetracion-y-analisis-de-vulnerabilidades\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyberoo.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pruebas de Penetraci\u00f3n y An\u00e1lisis de Vulnerabilidades\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberoo.com\/es\/#website\",\"url\":\"https:\/\/cyberoo.com\/es\/\",\"name\":\"Cyberoo\",\"description\":\"Superheroes are always ready for action\",\"publisher\":{\"@id\":\"https:\/\/cyberoo.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberoo.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberoo.com\/es\/#organization\",\"name\":\"Cyberoo\",\"url\":\"https:\/\/cyberoo.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/cyberoo.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberoo.com\/wp-content\/uploads\/2023\/01\/CYBEROO-logo-dark.svg\",\"contentUrl\":\"https:\/\/cyberoo.com\/wp-content\/uploads\/2023\/01\/CYBEROO-logo-dark.svg\",\"width\":258,\"height\":38,\"caption\":\"Cyberoo\"},\"image\":{\"@id\":\"https:\/\/cyberoo.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CYBEROO_ITALIA\",\"https:\/\/it.linkedin.com\/company\/cyberoo-italia\",\"https:\/\/www.youtube.com\/channel\/UC7AwVDG9Ngdwohk_zPd25xQ\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pruebas de Penetraci\u00f3n y An\u00e1lisis de Vulnerabilidades | Cyberoo","description":"Para defenderse eficazmente de los ataques, hay que pensar como un hacker criminal y utilizar sus estrategias en tu contra","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberoo.com\/es\/pruebas-de-penetracion-y-analisis-de-vulnerabilidades\/","og_locale":"es_ES","og_type":"article","og_title":"Pruebas de Penetraci\u00f3n y An\u00e1lisis de Vulnerabilidades | Cyberoo","og_description":"Para defenderse eficazmente de los ataques, hay que pensar como un hacker criminal y utilizar sus estrategias en tu contra","og_url":"https:\/\/cyberoo.com\/es\/pruebas-de-penetracion-y-analisis-de-vulnerabilidades\/","og_site_name":"Cyberoo","article_modified_time":"2024-11-22T17:35:29+00:00","twitter_card":"summary_large_image","twitter_site":"@CYBEROO_ITALIA","twitter_misc":{"Tiempo de lectura":"15 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberoo.com\/es\/pruebas-de-penetracion-y-analisis-de-vulnerabilidades\/","url":"https:\/\/cyberoo.com\/es\/pruebas-de-penetracion-y-analisis-de-vulnerabilidades\/","name":"Pruebas de Penetraci\u00f3n y An\u00e1lisis de Vulnerabilidades | Cyberoo","isPartOf":{"@id":"https:\/\/cyberoo.com\/es\/#website"},"datePublished":"2023-05-17T12:08:22+00:00","dateModified":"2024-11-22T17:35:29+00:00","description":"Para defenderse eficazmente de los ataques, hay que pensar como un hacker criminal y utilizar sus estrategias en tu contra","breadcrumb":{"@id":"https:\/\/cyberoo.com\/es\/pruebas-de-penetracion-y-analisis-de-vulnerabilidades\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberoo.com\/es\/pruebas-de-penetracion-y-analisis-de-vulnerabilidades\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyberoo.com\/es\/pruebas-de-penetracion-y-analisis-de-vulnerabilidades\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberoo.com\/es\/"},{"@type":"ListItem","position":2,"name":"Pruebas de Penetraci\u00f3n y An\u00e1lisis de Vulnerabilidades"}]},{"@type":"WebSite","@id":"https:\/\/cyberoo.com\/es\/#website","url":"https:\/\/cyberoo.com\/es\/","name":"Cyberoo","description":"Superheroes are always ready for action","publisher":{"@id":"https:\/\/cyberoo.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberoo.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/cyberoo.com\/es\/#organization","name":"Cyberoo","url":"https:\/\/cyberoo.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/cyberoo.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/cyberoo.com\/wp-content\/uploads\/2023\/01\/CYBEROO-logo-dark.svg","contentUrl":"https:\/\/cyberoo.com\/wp-content\/uploads\/2023\/01\/CYBEROO-logo-dark.svg","width":258,"height":38,"caption":"Cyberoo"},"image":{"@id":"https:\/\/cyberoo.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CYBEROO_ITALIA","https:\/\/it.linkedin.com\/company\/cyberoo-italia","https:\/\/www.youtube.com\/channel\/UC7AwVDG9Ngdwohk_zPd25xQ"]}]}},"_links":{"self":[{"href":"https:\/\/cyberoo.com\/es\/wp-json\/wp\/v2\/pages\/17352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberoo.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberoo.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberoo.com\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberoo.com\/es\/wp-json\/wp\/v2\/comments?post=17352"}],"version-history":[{"count":5,"href":"https:\/\/cyberoo.com\/es\/wp-json\/wp\/v2\/pages\/17352\/revisions"}],"predecessor-version":[{"id":20506,"href":"https:\/\/cyberoo.com\/es\/wp-json\/wp\/v2\/pages\/17352\/revisions\/20506"}],"wp:attachment":[{"href":"https:\/\/cyberoo.com\/es\/wp-json\/wp\/v2\/media?parent=17352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}