{"id":3093,"date":"2021-10-25T10:28:47","date_gmt":"2021-10-25T15:28:47","guid":{"rendered":"https:\/\/www.tecnosys.com.pe\/?page_id=3093"},"modified":"2022-10-14T15:10:07","modified_gmt":"2022-10-14T20:10:07","slug":"ciberseguridad","status":"publish","type":"page","link":"https:\/\/www.tecnosys.com.pe\/ciberseguridad","title":{"rendered":"Ciberseguridad"},"content":{"rendered":"

[et_pb_section fb_built=”1″ admin_label=”Header” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#001930 0%|#003a42 100%” background_color_gradient_start=”#001930″ background_color_gradient_end=”#003a42″ background_image=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/07\/cyber-security-17.png” parallax=”on” custom_padding=”2vw||18px|||” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ z_index=”1″ custom_padding=”20px||6px|||” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font=”||||||||” header_font=”Aclonica|700|on||||||” header_text_align=”center” header_font_size=”48px” background_layout=”dark” custom_margin=”2px|||||” header_font_size_tablet=”54px” header_font_size_phone=”32px” header_font_size_last_edited=”on|desktop” header_text_shadow_style=”preset4″ header_text_shadow_color=”#000000″ locked=”off” global_colors_info=”{}”]<\/p>\n

La nueva era de la Ciberseguridad<\/h1>\n

[\/et_pb_text][et_pb_text _builder_version=”4.16″ text_font=”Aclonica|700|on||||||” text_text_color=”gcid-b71abcf8-7110-40fe-a597-3e7b0dc87d7a” text_font_size=”17px” text_line_height=”1.8em” text_orientation=”center” background_layout=”dark” custom_margin=”||26px|||” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” text_text_shadow_style=”preset4″ text_text_shadow_color=”#000000″ locked=”off” global_colors_info=”{%22gcid-b71abcf8-7110-40fe-a597-3e7b0dc87d7a%22:%91%22text_text_color%22%93}”]<\/p>\n

En Tecnosys, somos conscientes que la ciberseguridad evoluciona constantemente, por eso nosotros tambi\u00e9n estamos evolucionando siempre en nuestros servicios para brindarles las mejores plataformas de seguridad a nuestros clientes.<\/p>\n

[\/et_pb_text][et_pb_button button_url=”https:\/\/api.whatsapp.com\/send?phone=+51998127821&text=Hola,%20me%20gustar\u00eda%20recibir%20asesor\u00eda%20y%20mayor%20informaci\u00f3n%20de%20las%20soluciones%20de%20Ciberseguridad%20″ url_new_window=”on” button_text=”Solicita Asesor\u00eda” button_alignment=”center” _builder_version=”4.16″ _module_preset=”default” custom_button=”on” button_text_size=”33px” button_text_color=”gcid-b71abcf8-7110-40fe-a597-3e7b0dc87d7a” button_bg_color=”RGBA(0,0,0,0)” button_border_radius=”30px” button_font=”|700|on||||||” button_text_shadow_style=”preset4″ button_text_shadow_color=”#000000″ global_colors_info=”{%22gcid-b71abcf8-7110-40fe-a597-3e7b0dc87d7a%22:%91%22button_text_color%22%93}”][\/et_pb_button][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/10\/illu-carto.svg” title_text=”illu-carto” align=”center” _builder_version=”4.16″ _module_preset=”default” height=”330px” animation_style=”slide” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” background_color=”#000000″ background_enable_image=”off” custom_padding=”20px||17px|||” global_colors_info=”{}”][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ _builder_version=”4.16″ _module_preset=”default” custom_padding=”||0px|||” global_colors_info=”{}”][et_pb_column type=”1_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb image=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/10\/sophos-logo.svg” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb image=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/10\/fortinet_white.webp” content_max_width=”185px” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb image=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/10\/white_kaspersky.webp” content_max_width=”159px” _builder_version=”4.16″ _module_preset=”default” min_height=”37.9px” custom_margin=”-4px|||||” custom_padding=”||0px|||” global_colors_info=”{}”][\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb image=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/10\/sigla_bd_white.svg” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” custom_padding=”52px||25px|||” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ _module_preset=”default” custom_margin=”6px|auto|4px|auto||” custom_padding=”||14px|||” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” header_font=”Aclonica|700|on||||||” header_text_align=”center” header_2_font=”Aclonica|700|on||||||” header_2_text_align=”center” header_2_font_size=”34px” global_colors_info=”{}”]<\/p>\n

\u00bf Qu\u00e9 es la Ciberseguridad?<\/h2>\n

[\/et_pb_text][et_pb_text _builder_version=”4.16″ _module_preset=”default” text_font=”|700|on||||||” text_font_size=”21px” text_orientation=”center” global_colors_info=”{}”]<\/p>\n

La ciberseguridad se refiere a las t\u00e9cnicas preventivas que se utilizan para proteger la integridad de las redes, los programas y los datos contra ataques o accesos no autorizados.<\/span><\/span><\/span><\/span><\/span><\/p>\n

[\/et_pb_text][et_pb_image src=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/10\/illu-integrity.svg” title_text=”illu-integrity” _builder_version=”4.16″ _module_preset=”default” animation_style=”fade” global_colors_info=”{}”][\/et_pb_image][et_pb_text _builder_version=”4.16″ _module_preset=”default” text_font=”Aclonica|700|on||||||” text_font_size=”21px” text_orientation=”center” global_colors_info=”{}”]<\/p>\n

En esencia, la ciberseguridad implica proteger la informaci\u00f3n y los sistemas de las ciberamenazas.<\/p>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” text_font=”|700|on||||||” text_font_size=”21px” text_orientation=”center” global_colors_info=”{}”]<\/p>\n

Las amenazas cibern\u00e9ticas adoptan muchas formas, como ataques a aplicaciones, malware, ransomware, phishing y kits de explotaci\u00f3n. Los avances tecnol\u00f3gicos recientes han abierto nuevas posibilidades para la ciberseguridad, pero desafortunadamente, los adversarios tambi\u00e9n se han beneficiado de estos avances.<\/p>\n

[\/et_pb_text][et_pb_blurb image=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/10\/cybersecurity-services.svg” _builder_version=”4.16″ _module_preset=”default” custom_margin=”||16px|||” animation_style=”fade” global_colors_info=”{}”][\/et_pb_blurb][et_pb_text _builder_version=”4.16″ _module_preset=”default” text_font=”|700|on||||||” text_font_size=”21px” text_orientation=”center” custom_padding=”||10px|||” global_colors_info=”{}”]<\/p>\n

Los art\u00edculos incluidos en esta secci\u00f3n proporcionan una comprensi\u00f3n fundamental de m\u00faltiples componentes de la ciberseguridad, como las plataformas de seguridad de pr\u00f3xima generaci\u00f3n, el aprendizaje autom\u00e1tico, la automatizaci\u00f3n y el modelo Zero Trust.<\/span><\/span><\/span><\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” background_enable_color=”off” use_background_color_gradient=”on” background_color_gradient_stops=”#0c590c 0%|#183672 100%” background_color_gradient_start=”#0c590c” background_color_gradient_end=”#183672″ custom_margin=”-6px|||||” custom_padding=”16px||33px|||” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_margin=”8px|auto||auto||” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” header_2_font=”Aclonica|700|on||||||” header_2_text_align=”center” header_2_text_color=”gcid-b71abcf8-7110-40fe-a597-3e7b0dc87d7a” header_2_font_size=”36px” global_colors_info=”{%22gcid-b71abcf8-7110-40fe-a597-3e7b0dc87d7a%22:%91%22header_2_text_color%22%93}”]<\/p>\n

\u00bfQu\u00e9 es una arquitectura Zero Trust?<\/span><\/span><\/span><\/h2>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ _module_preset=”default” custom_margin=”-19px|auto|4px|auto||” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” text_font=”|700|on||||||” text_text_color=”gcid-b71abcf8-7110-40fe-a597-3e7b0dc87d7a” text_font_size=”21px” text_orientation=”center” custom_margin=”-18px|||||” global_colors_info=”{%22gcid-b71abcf8-7110-40fe-a597-3e7b0dc87d7a%22:%91%22text_text_color%22%93}”]<\/p>\n

Zero Trust se ha convertido en una de las \u00faltimas palabras de moda en ciberseguridad.<\/span><\/span> Es imperativo comprender qu\u00e9 es Zero Trust y qu\u00e9 no es Zero Trust.<\/span><\/span><\/span><\/p>\n

<\/span><\/span><\/span><\/p>\n

Zero Trust es una iniciativa estrat\u00e9gica que ayuda a prevenir violaciones de datos exitosas al eliminar el concepto de confianza de la arquitectura de red de una organizaci\u00f3n.<\/span> Enraizado en el principio de “nunca confiar, verificar siempre”, Zero Trust est\u00e1 dise\u00f1ado para proteger los entornos digitales modernos aprovechando la segmentaci\u00f3n de la red, evitando el movimiento lateral, proporcionando prevenci\u00f3n de amenazas de Capa 7 y simplificando el control granular de acceso de los usuarios.<\/span> <\/span><\/span><\/span><\/p>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/10\/illu-monitoring.svg” title_text=”illu-monitoring” align=”center” _builder_version=”4.16″ _module_preset=”default” animation_style=”bounce” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_margin=”25px|auto|9px|auto||” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/10\/control-access.png” title_text=”control-access” align=”center” _builder_version=”4.16″ _module_preset=”default” custom_margin=”||50px|||” animation_style=”bounce” global_colors_info=”{}”][\/et_pb_image][et_pb_text _builder_version=”4.16″ _module_preset=”default” header_3_font=”Aclonica|700|on||||||” header_3_text_align=”center” header_3_text_color=”#7CDA24″ header_3_font_size=”26px” global_colors_info=”{}”]<\/p>\n

Una arquitectura de confianza cero
<\/span><\/span><\/span><\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=”4.16″ _module_preset=”default” text_font=”|700|on||||||” text_text_color=”gcid-b71abcf8-7110-40fe-a597-3e7b0dc87d7a” text_font_size=”21px” text_orientation=”center” custom_margin=”||37px|||” global_colors_info=”{%22gcid-b71abcf8-7110-40fe-a597-3e7b0dc87d7a%22:%91%22text_text_color%22%93}”]<\/p>\n

Zero Trust, identifica una “superficie protegida”. La superficie de protecci\u00f3n est\u00e1 formada por los datos, activos, aplicaciones y servicios m\u00e1s importantes y valiosos de la red: DAAS, para abreviar. Las superficies protegidas son \u00fanicas para cada organizaci\u00f3n. Debido a que contiene solo lo m\u00e1s cr\u00edtico para las operaciones de una organizaci\u00f3n, la superficie de protecci\u00f3n es \u00f3rdenes de magnitud m\u00e1s peque\u00f1a que la superficie de ataque y siempre se puede conocer.<\/span><\/span><\/span><\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” custom_margin=”||5px|||” custom_padding=”26px||9px|||” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ _module_preset=”default” custom_margin=”-6px|auto|12px|auto||” custom_padding=”21px||2px|||” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/10\/illu-cybervigilance.svg” title_text=”illu-cybervigilance” align=”center” _builder_version=”4.16″ _module_preset=”default” max_width=”70%” module_alignment=”center” animation_style=”flip” global_colors_info=”{}”][\/et_pb_image][et_pb_text _builder_version=”4.16″ _module_preset=”default” text_font=”Aclonica|700|on||||||” text_font_size=”21px” text_orientation=”center” custom_margin=”||21px|||” text_font_size_tablet=”21px” text_font_size_phone=”17px” text_font_size_last_edited=”on|phone” global_colors_info=”{}”]<\/p>\n

Con su superficie de protecci\u00f3n identificada, puede identificar c\u00f3mo se mueve el tr\u00e1fico en la organizaci\u00f3n en relaci\u00f3n con la superficie de protecci\u00f3n. Comprender qui\u00e9nes son los usuarios, qu\u00e9 aplicaciones est\u00e1n usando y c\u00f3mo se conectan es la \u00fanica forma de determinar y hacer cumplir la pol\u00edtica que garantiza el acceso seguro a sus datos. Una vez que comprenda las interdependencias entre el DAAS, la infraestructura, los servicios y los usuarios, debe colocar los controles lo m\u00e1s cerca posible de la superficie de protecci\u00f3n, creando un microper\u00edmetro a su alrededor.
<\/span><\/span><\/span><\/p>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” text_font=”Aclonica|700|on||||||” text_font_size=”21px” text_orientation=”center” custom_margin=”||21px|||” text_font_size_tablet=”21px” text_font_size_phone=”17px” text_font_size_last_edited=”on|phone” global_colors_info=”{}”]<\/p>\n

Este microper\u00edmetro se mueve con la superficie de protecci\u00f3n, donde sea que vaya. Puede crear un microper\u00edmetro implementando una puerta de enlace de segmentaci\u00f3n, m\u00e1s com\u00fanmente conocida como firewall de pr\u00f3xima generaci\u00f3n, para garantizar que solo el tr\u00e1fico conocido y permitido o las aplicaciones leg\u00edtimas tengan acceso a la superficie protegida.<\/span><\/span><\/span><\/p>\n

[\/et_pb_text][et_pb_image src=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/10\/cyber-security-04-1.png” title_text=”cyber-security-04-1″ align=”center” _builder_version=”4.16″ _module_preset=”default” max_width=”70%” module_alignment=”center” animation_style=”flip” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” custom_padding=”18px||27px|||” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_padding=”||42px|||” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” header_3_font=”Aclonica|700|on||||||” header_3_text_align=”center” header_3_text_color=”#0C71C3″ header_3_font_size=”46px” header_3_font_size_tablet=”46px” header_3_font_size_phone=”27px” header_3_font_size_last_edited=”on|phone” global_colors_info=”{}”]<\/p>\n

Conoce m\u00e1s acerca de la confianza cero con Sophos. Descarga la gu\u00eda pdf\u00a0 que tenemos para ti donde el tema principal es “La confianza cero desmitificada”<\/h3>\n

[\/et_pb_text][et_pb_image src=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/10\/sophos-zerotrust.png” title_text=”sophos-zerotrust” align=”center” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][et_pb_button button_url=”https:\/\/secure2.sophos.com\/es-es\/medialibrary\/Gated-Assets\/white-papers\/sophos-demystifying-zero-trust-wp.pdf” url_new_window=”on” button_text=”Descarga la Gu\u00eda de Sophos Zero Trust” button_alignment=”center” _builder_version=”4.16″ _module_preset=”default” custom_button=”on” button_text_size=”22px” button_border_width=”3px” button_border_radius=”30px” button_font=”|700|on||||||” animation_style=”bounce” animation_duration=”800ms” animation_repeat=”loop” global_colors_info=”{}”][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” background_color=”#000000″ custom_padding=”34px|||||” global_colors_info=”{}”][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ _builder_version=”4.16″ _module_preset=”default” custom_margin=”-4px|auto||auto||” custom_padding=”10px||0px|||” global_colors_info=”{}”][et_pb_column type=”1_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb image=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/10\/cyber-security-icon-28.png” content_max_width=”100px” icon_placement_tablet=”” icon_placement_phone=”top” icon_placement_last_edited=”on|phone” icon_alignment_tablet=”” icon_alignment_phone=”right” icon_alignment_last_edited=”on|phone” content_max_width_tablet=”100px” content_max_width_phone=”50px” content_max_width_last_edited=”on|phone” _builder_version=”4.16″ _module_preset=”default” image_icon_custom_padding_last_edited=”on|phone” custom_margin=”||||false|false” custom_padding=”||||false|false” border_width_all_image_last_edited=”on|phone” global_colors_info=”{}” custom_padding__hover_enabled=”off|desktop”][\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb image=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/10\/cyber-security-icon-36.png” content_max_width=”100px” icon_placement_tablet=”” icon_placement_phone=”top” icon_placement_last_edited=”on|phone” icon_alignment_tablet=”” icon_alignment_phone=”right” icon_alignment_last_edited=”on|phone” content_max_width_tablet=”100px” content_max_width_phone=”50px” content_max_width_last_edited=”on|phone” _builder_version=”4.16″ _module_preset=”default” image_icon_custom_padding_last_edited=”on|phone” custom_margin=”||||false|false” custom_margin_tablet=”||||false|false” custom_margin_phone=”-30px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”||||false|false” border_width_all_image_last_edited=”on|phone” global_colors_info=”{}” custom_padding__hover_enabled=”off|desktop”][\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb image=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/10\/cyber-security-icon-20.png” content_max_width=”100px” icon_placement_tablet=”” icon_placement_phone=”top” icon_placement_last_edited=”on|phone” icon_alignment_tablet=”” icon_alignment_phone=”right” icon_alignment_last_edited=”on|phone” content_max_width_tablet=”100px” content_max_width_phone=”50px” content_max_width_last_edited=”on|phone” _builder_version=”4.16″ _module_preset=”default” image_icon_custom_padding_last_edited=”on|phone” custom_margin=”||||false|false” custom_margin_tablet=”||||false|false” custom_margin_phone=”-30px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”||||false|false” border_width_all_image_last_edited=”on|phone” global_colors_info=”{}” custom_padding__hover_enabled=”off|desktop”][\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb image=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/10\/cyber-security-icon-12.png” content_max_width=”100px” icon_placement_tablet=”” icon_placement_phone=”top” icon_placement_last_edited=”on|phone” icon_alignment_tablet=”” icon_alignment_phone=”right” icon_alignment_last_edited=”on|phone” content_max_width_tablet=”100px” content_max_width_phone=”50px” content_max_width_last_edited=”on|phone” _builder_version=”4.16″ _module_preset=”default” image_icon_custom_padding_last_edited=”on|phone” custom_margin=”||||false|false” custom_margin_tablet=”||||false|false” custom_margin_phone=”-30px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”||||false|false” border_width_all_image_last_edited=”on|phone” global_colors_info=”{}” custom_padding__hover_enabled=”off|desktop”][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.16″ _module_preset=”default” width=”100%” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/10\/sophos-central-enroll.png” title_text=”sophos-central-enroll” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][et_pb_text _builder_version=”4.16″ _module_preset=”default” text_text_color=”gcid-b71abcf8-7110-40fe-a597-3e7b0dc87d7a” header_3_font=”Aclonica|700|on||||||” header_3_text_align=”center” header_3_text_color=”gcid-b71abcf8-7110-40fe-a597-3e7b0dc87d7a” header_3_font_size=”27px” global_colors_info=”{%22gcid-b71abcf8-7110-40fe-a597-3e7b0dc87d7a%22:%91%22text_text_color%22,%22header_3_text_color%22%93}”]<\/p>\n

Conoce m\u00e1s acerca de Sophos y sus Productos<\/h3>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”4.16″ _module_preset=”default” custom_padding=”29px|||||” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Endpoint Intercept X” url=”https:\/\/www.sophos.com\/es-es\/products\/endpoint-antivirus.aspx” url_new_window=”on” image=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/10\/banner-sophos.jpg” _builder_version=”4.16″ _module_preset=”default” header_font=”Aclonica|700|on||||||” header_text_align=”center” header_text_color=”gcid-b71abcf8-7110-40fe-a597-3e7b0dc87d7a” header_font_size=”20px” custom_margin=”96px|||||” global_colors_info=”{%22gcid-b71abcf8-7110-40fe-a597-3e7b0dc87d7a%22:%91%22header_text_color%22%93}”][\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Protege la Nube” image=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/10\/cloud-header-graphic.png” _builder_version=”4.16″ _module_preset=”default” header_font=”Aclonica|700|on||||||” header_text_align=”center” header_text_color=”gcid-b71abcf8-7110-40fe-a597-3e7b0dc87d7a” custom_margin=”35px|||||” link_option_url=”https:\/\/www.sophos.com\/es-es\/solutions\/public-cloud.aspx” link_option_url_new_window=”on” image_max_width__hover_enabled=”off|desktop” global_colors_info=”{%22gcid-b71abcf8-7110-40fe-a597-3e7b0dc87d7a%22:%91%22header_text_color%22%93}” image_icon_width__hover_enabled=”off|desktop”][\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Sophos Firewall XGS” image=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/10\/banner-image-sophos.png” _builder_version=”4.16″ _module_preset=”default” header_font=”Aclonica|700|on||||||” header_text_align=”center” header_text_color=”gcid-b71abcf8-7110-40fe-a597-3e7b0dc87d7a” header_font_size=”20px” link_option_url=”https:\/\/www.sophos.com\/es-es\/products\/next-gen-firewall.aspx” link_option_url_new_window=”on” global_colors_info=”{%22gcid-b71abcf8-7110-40fe-a597-3e7b0dc87d7a%22:%91%22header_text_color%22%93}”][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” custom_padding=”34px|||||” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_padding=”23px||8px|||” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” header_3_font=”Aclonica|700|on||||||” header_3_text_align=”center” header_3_text_color=”#0C71C3″ header_3_font_size=”46px” custom_margin=”||10px|||” custom_padding=”||0px|||” header_3_font_size_tablet=”46px” header_3_font_size_phone=”27px” header_3_font_size_last_edited=”on|phone” global_colors_info=”{}”]<\/p>\n

Nuestros Aliados en Ciberseguridad<\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=”4.16″ _module_preset=”default” text_font=”Aclonica|700|on||||||” text_orientation=”center” global_colors_info=”{}”]<\/p>\n

Puedes saber m\u00e1s de nuestros aliados tocando sus respectivos logos para tener mayor informaci\u00f3n.
Si necesitas asesor\u00eda para escoger y dimensionar tu soluci\u00f3n puedes dar click en este enlace<\/a> para coordinar que un especialista se ponga en contacto contigo y pueda ayudarte a elegir lo opci\u00f3n m\u00e1s adecuada a tu necesidad y presupuesto.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/10\/fortinet-logo.svg” title_text=”fortinet-logo” url=”https:\/\/www.fortinet.com\/lat” url_new_window=”on” _builder_version=”4.16″ _module_preset=”default” custom_margin=”14px|||||” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/10\/512px-Kaspersky_logo.svg.png” title_text=”512px-Kaspersky_logo.svg” url=”https:\/\/latam.kaspersky.com\/” url_new_window=”on” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/10\/Bitdefender-Logo-BW-web.svg” title_text=”Bitdefender-Logo-BW-web” url=”https:\/\/www.bitdefender.com\/” url_new_window=”on” _builder_version=”4.16″ _module_preset=”default” custom_margin=”11px|||||” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”off|desktop” admin_label=”Footer” _builder_version=”4.16″ background_enable_color=”off” background_color_gradient_direction=”140deg” background_enable_image=”off” custom_margin=”|||” custom_padding=”32px|0px|32px|0px|true|false” custom_padding_tablet=”10vw||10vw||true” custom_padding_phone=”5vw||5vw||true” locked=”off” global_colors_info=”{}”][et_pb_row use_custom_gutter=”on” _builder_version=”4.16″ custom_margin=”5px|auto||auto||” custom_padding=”15px||10px|||” use_custom_width=”on” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_contact_form email=”ventas@tecnosys.com.pe” title=”Cont\u00e1ctanos” success_message=”Mensaje enviado con \u00e9xito !!” submit_button_text=”Enviar Mensaje” module_id=”et_pb_contact_form_0″ _builder_version=”4.17.4″ _unique_id=”70452ce1-9c24-4bb0-9fbc-d159eff31aac” form_field_background_color=”#c4c4c4″ form_field_text_color=”#000000″ form_field_focus_text_color=”#000000″ title_font=”Aclonica|700|on||||||” title_text_align=”center” title_text_color=”#000000″ title_font_size=”33px” captcha_font=”Aclonica|700|on||||||” captcha_text_color=”#000000″ captcha_font_size=”14px” form_field_font=”Aclonica|700|on||||||” form_field_text_align=”center” form_field_font_size=”15px” form_field_letter_spacing=”1px” custom_button=”on” button_text_size=”16px” button_text_color=”#000000″ button_bg_color=”#a3c9c0″ button_border_width=”2px” button_border_color=”#FFFFFF” button_border_radius=”33px” button_letter_spacing=”3px” button_font=”|700|on||||||” button_use_icon=”off” text_orientation=”center” width=”100%” hover_enabled=”0″ button_text_size_last_edited=”off|desktop” border_radii=”on|9px|9px|9px|9px” border_width_all=”1px” border_color_all=”#FFFFFF” form_background_color=”rgba(0,0,0,0)” locked=”off” global_colors_info=”{}” sticky_enabled=”0″][et_pb_contact_field field_id=”Nombres_y_Apellidos” field_title=”Nombres y Apellidos” _builder_version=”4.16″ global_colors_info=”{}” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][\/et_pb_contact_field][et_pb_contact_field field_id=”Correo” field_title=”Correo Electr\u00f3nico” field_type=”email” _builder_version=”4.16″ global_colors_info=”{}” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][\/et_pb_contact_field][et_pb_contact_field field_id=”Celular” field_title=”Celular” _builder_version=”4.16″ global_colors_info=”{}” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][\/et_pb_contact_field][et_pb_contact_field field_id=”Soluci\u00f3n_de_Inter\u00e9s” field_title=”Soluci\u00f3n de Inter\u00e9s” field_type=”select” select_options=”%91{%22value%22:%22Delivery de Aplicaciones%22,%22checked%22:0,%22dragID%22:-1},{%22value%22:%22Virtualizaci\u00f3n%22,%22checked%22:0,%22dragID%22:0},{%22value%22:%22Seguridad Inform\u00e1tica%22,%22checked%22:0,%22dragID%22:1},{%22value%22:%22Soluciones Cloud%22,%22checked%22:0,%22dragID%22:2},{%22value%22:%22Centro de Datos%22,%22checked%22:0,%22dragID%22:3},{%22value%22:%22Soluciones de Respaldo%22,%22checked%22:0,%22dragID%22:4},{%22value%22:%22Ciberseguridad%22,%22checked%22:0,%22dragID%22:5}%93″ _builder_version=”4.16″ global_colors_info=”{}” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][\/et_pb_contact_field][et_pb_contact_field field_id=”Mensaje” field_title=”Mensaje” field_type=”text” fullwidth_field=”on” _builder_version=”4.16″ global_colors_info=”{}” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

La nueva era de la CiberseguridadEn Tecnosys, somos conscientes que la ciberseguridad evoluciona constantemente, por eso nosotros tambi\u00e9n estamos evolucionando siempre en nuestros servicios para brindarles las mejores plataformas de seguridad a nuestros clientes.\u00bf Qu\u00e9 es la Ciberseguridad?La ciberseguridad se refiere a las t\u00e9cnicas preventivas que se utilizan para proteger la integridad de las redes, […]<\/p>\n","protected":false},"author":1,"featured_media":3133,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":""},"yoast_head":"\nCiberseguridad - TECNOSYS<\/title>\n<meta name=\"description\" content=\"La ciberseguridad combate las amenazas cibern\u00e9ticas, como ataques a aplicaciones, malware, ransomware, phishing y kits de explotaci\u00f3n.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecnosys.com.pe\/ciberseguridad\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La nueva era de la Ciberseguridad\" \/>\n<meta property=\"og:description\" content=\"En esencia, la ciberseguridad implica proteger la informaci\u00f3n y los sistemas de las ciberamenazas.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecnosys.com.pe\/ciberseguridad\" \/>\n<meta property=\"og:site_name\" content=\"TECNOSYS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/tecnosysperu\/?ref=py_c\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-14T20:10:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/11\/illu-integrity.png\" \/>\n\t<meta property=\"og:image:width\" content=\"681\" \/>\n\t<meta property=\"og:image:height\" content=\"424\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tecnosys.com.pe\/ciberseguridad\",\"url\":\"https:\/\/www.tecnosys.com.pe\/ciberseguridad\",\"name\":\"Ciberseguridad - TECNOSYS\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecnosys.com.pe\/#website\"},\"datePublished\":\"2021-10-25T15:28:47+00:00\",\"dateModified\":\"2022-10-14T20:10:07+00:00\",\"description\":\"La ciberseguridad combate las amenazas cibern\u00e9ticas, como ataques a aplicaciones, malware, ransomware, phishing y kits de explotaci\u00f3n.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tecnosys.com.pe\/ciberseguridad#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tecnosys.com.pe\/ciberseguridad\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tecnosys.com.pe\/ciberseguridad#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.tecnosys.com.pe\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ciberseguridad\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tecnosys.com.pe\/#website\",\"url\":\"https:\/\/www.tecnosys.com.pe\/\",\"name\":\"TECNOSYS\",\"description\":\"Tecnolog\u00eda Para Trascender\",\"publisher\":{\"@id\":\"https:\/\/www.tecnosys.com.pe\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tecnosys.com.pe\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tecnosys.com.pe\/#organization\",\"name\":\"TECNOSYS\",\"url\":\"https:\/\/www.tecnosys.com.pe\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.tecnosys.com.pe\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/06\/Tecnosys-Portada.jpg\",\"contentUrl\":\"https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/06\/Tecnosys-Portada.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"TECNOSYS\"},\"image\":{\"@id\":\"https:\/\/www.tecnosys.com.pe\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/tecnosysperu\/?ref=py_c\",\"https:\/\/pe.linkedin.com\/company\/tecnosysperu\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ciberseguridad - TECNOSYS","description":"La ciberseguridad combate las amenazas cibern\u00e9ticas, como ataques a aplicaciones, malware, ransomware, phishing y kits de explotaci\u00f3n.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecnosys.com.pe\/ciberseguridad","og_locale":"es_ES","og_type":"article","og_title":"La nueva era de la Ciberseguridad","og_description":"En esencia, la ciberseguridad implica proteger la informaci\u00f3n y los sistemas de las ciberamenazas.","og_url":"https:\/\/www.tecnosys.com.pe\/ciberseguridad","og_site_name":"TECNOSYS","article_publisher":"https:\/\/www.facebook.com\/tecnosysperu\/?ref=py_c","article_modified_time":"2022-10-14T20:10:07+00:00","og_image":[{"width":681,"height":424,"url":"https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/11\/illu-integrity.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tecnosys.com.pe\/ciberseguridad","url":"https:\/\/www.tecnosys.com.pe\/ciberseguridad","name":"Ciberseguridad - TECNOSYS","isPartOf":{"@id":"https:\/\/www.tecnosys.com.pe\/#website"},"datePublished":"2021-10-25T15:28:47+00:00","dateModified":"2022-10-14T20:10:07+00:00","description":"La ciberseguridad combate las amenazas cibern\u00e9ticas, como ataques a aplicaciones, malware, ransomware, phishing y kits de explotaci\u00f3n.","breadcrumb":{"@id":"https:\/\/www.tecnosys.com.pe\/ciberseguridad#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecnosys.com.pe\/ciberseguridad"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecnosys.com.pe\/ciberseguridad#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.tecnosys.com.pe\/"},{"@type":"ListItem","position":2,"name":"Ciberseguridad"}]},{"@type":"WebSite","@id":"https:\/\/www.tecnosys.com.pe\/#website","url":"https:\/\/www.tecnosys.com.pe\/","name":"TECNOSYS","description":"Tecnolog\u00eda Para Trascender","publisher":{"@id":"https:\/\/www.tecnosys.com.pe\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecnosys.com.pe\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.tecnosys.com.pe\/#organization","name":"TECNOSYS","url":"https:\/\/www.tecnosys.com.pe\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.tecnosys.com.pe\/#\/schema\/logo\/image\/","url":"https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/06\/Tecnosys-Portada.jpg","contentUrl":"https:\/\/www.tecnosys.com.pe\/wp-content\/uploads\/2021\/06\/Tecnosys-Portada.jpg","width":1920,"height":1080,"caption":"TECNOSYS"},"image":{"@id":"https:\/\/www.tecnosys.com.pe\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/tecnosysperu\/?ref=py_c","https:\/\/pe.linkedin.com\/company\/tecnosysperu"]}]}},"_links":{"self":[{"href":"https:\/\/www.tecnosys.com.pe\/wp-json\/wp\/v2\/pages\/3093"}],"collection":[{"href":"https:\/\/www.tecnosys.com.pe\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tecnosys.com.pe\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecnosys.com.pe\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecnosys.com.pe\/wp-json\/wp\/v2\/comments?post=3093"}],"version-history":[{"count":89,"href":"https:\/\/www.tecnosys.com.pe\/wp-json\/wp\/v2\/pages\/3093\/revisions"}],"predecessor-version":[{"id":4302,"href":"https:\/\/www.tecnosys.com.pe\/wp-json\/wp\/v2\/pages\/3093\/revisions\/4302"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tecnosys.com.pe\/wp-json\/wp\/v2\/media\/3133"}],"wp:attachment":[{"href":"https:\/\/www.tecnosys.com.pe\/wp-json\/wp\/v2\/media?parent=3093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}