{"id":13073,"date":"2023-04-03T16:31:11","date_gmt":"2023-04-03T19:31:11","guid":{"rendered":"https:\/\/www.ostec.com.br\/soluciones\/pentest\/"},"modified":"2023-10-19T10:49:18","modified_gmt":"2023-10-19T13:49:18","slug":"pentest","status":"publish","type":"page","link":"https:\/\/www.ostec.com.br\/es\/soluciones-2\/pentest\/","title":{"rendered":"Servicio Pentest"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"13073\" class=\"elementor elementor-13073 elementor-6944\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3daafd3a elementor-section-content-middle elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3daafd3a\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-77887528\" data-id=\"77887528\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-34321076 elementor-widget elementor-widget-elementskit-heading\" data-id=\"34321076\" data-element_type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">PENTESTO<\/h2><h3 class=\"ekit-heading--subtitle elementskit-section-subtitle  \">\n\t\t\t\t\t\tSUS ACTIVOS M\u00c1S VALIOSOS PROTEGIDOS CONTRA ATAQUES CIBERN\u00c9TICOS\n\t\t\t\t\t<\/h3>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Estructuras de redes, sitios web y las aplicaciones son objetivos frecuentes de amenazas virtuales de todos los tipos. Por lo tanto, es importante aplicar esfuerzos superiores para garantizar que las estructuras cr\u00edticas est\u00e9n realmente protegidas.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7745f600 elementor-align-left elementor-widget__width-inherit elementor-widget-mobile__width-inherit elementor-widget elementor-widget-button\" data-id=\"7745f600\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"#pentest-especialista\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">HABLAR CON UN ESPECIALISTA<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-18cbed0d animated-fast\" data-id=\"18cbed0d\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a72a179 elementor-widget elementor-widget-image\" data-id=\"3a72a179\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2021\/12\/fav_color.svg\" class=\"attachment-large size-large wp-image-3584\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-53a6c31a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"53a6c31a\" data-element_type=\"section\" id=\"pentest-caracteristicas\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1d7587b4\" data-id=\"1d7587b4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b1736ed elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"4b1736ed\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h4 class=\"elementor-image-box-title\">SOBRE EL SERVICIO<\/h4><p class=\"elementor-image-box-description\">El <b>Pentest (Penetration testing)<\/b> , tambi\u00e9n llamado Prueva de Invasi\u00f3n o Intrusi\u00f3n, simula un ataque real a una aplicaci\u00f3n, red o sistema, buscando identificar vulnerabilidades que puedan ser aprovechadas para comprometer el entorno.<br><br>\n\nEl Pentest tambi\u00e9n se puede utilizar para probar los controles implementados, las habilidades y conocimientos del equipo de seguridad de la informaci\u00f3n. A trav\u00e9s del Pentest, la organizaci\u00f3n adquiere la capacidad de elegir conscientemente sus inversiones en seguridad.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2365afe2 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-image-box\" data-id=\"2365afe2\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">A qui\u00e9n est\u00e1 destinado<\/h3><p class=\"elementor-image-box-description\">La mayor\u00eda de las organizaciones pueden considerarse objetivos potenciales para los ciberdelincuentes, ya sean entidades gubernamentales o empresas privadas, independientemente de su tama\u00f1o o \u00e1rea. Por esta raz\u00f3n, el Pentest est\u00e1 indicado para empresas que tienen como objetivo proteger sus datos y entienden las consecuencias negativas asociadas con la p\u00e9rdida o fuga de informaci\u00f3n.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-54e3d42d elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"54e3d42d\" data-element_type=\"section\" id=\"pentest-tipos\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-751fa49c\" data-id=\"751fa49c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-701dd94e elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"701dd94e\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Camada_2\" viewBox=\"0 0 36.4 28.8\"><g id=\"Camada_1-2\"><path d=\"m9.7,27.7h17l1.2-15.25H8.5l1.2,15.25Zm-1.3-16.35h19.55l.4-4.55-5.8-5.7h-8.7l-5.8,5.7.35,4.55Zm-1,1.2L0,5.5l.65-.9,6.7,6.35-.35-4.5L13.4,0h9.6l6.4,6.45-.3,4.5,6.65-6.35.65.9-7.4,7.05H7.4Zm1.25,16.25l-1.25-16.25h21.6l-1.25,16.25H8.65Z\"><\/path><\/g><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\twhite box\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tModelo de prueba realizado sin conocimiento previo de la arquitectura, infraestructura y configuraciones del activo a probar. \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d6b9216 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"2d6b9216\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Camada_2\" viewBox=\"0 0 36.4 28.8\"><g id=\"Camada_1-2\"><path d=\"m9.7,27.7h17l1.2-15.25H8.5l1.2,15.25Zm-1.3-16.35h19.55l.4-4.55-5.8-5.7h-8.7l-5.8,5.7.35,4.55Zm-1,1.2L0,5.5l.65-.9,6.7,6.35-.35-4.5L13.4,0h9.6l6.4,6.45-.3,4.5,6.65-6.35.65.9-7.4,7.05H7.4Zm1.25,16.25l-1.25-16.25h21.6l-1.25,16.25H8.65Z\"><\/path><\/g><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tsilver box\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tModelo de prueba ejecutado con informaci\u00f3n b\u00e1sica sobre el activo probado, como: informaci\u00f3n de red, direcciones IP, etc.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-109a820d elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"109a820d\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Camada_2\" viewBox=\"0 0 36.4 28.8\"><g id=\"Camada_1-2\"><path d=\"m9.7,27.7h17l1.2-15.25H8.5l1.2,15.25Zm-1.3-16.35h19.55l.4-4.55-5.8-5.7h-8.7l-5.8,5.7.35,4.55Zm-1,1.2L0,5.5l.65-.9,6.7,6.35-.35-4.5L13.4,0h9.6l6.4,6.45-.3,4.5,6.65-6.35.65.9-7.4,7.05H7.4Zm1.25,16.25l-1.25-16.25h21.6l-1.25,16.25H8.65Z\"><\/path><\/g><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tBlack box\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tModelo de prueba realizado utilizando informaci\u00f3n interna que incluye: arquitectura, infraestructura y configuraciones de activos. \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9d18a12 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"9d18a12\" data-element_type=\"section\" id=\"pentest-beneficios\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6133c6d6\" data-id=\"6133c6d6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7ad5f68f elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"7ad5f68f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">BENEFICIOS Y CARACTER\u00cdSTICAS DEL SERVICIO PENTEST<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33faba6c elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"33faba6c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Conozca los principales beneficios y distintitvos del servicio <strong>Pentest<\/strong> ofrecido por <strong>OSTEC<\/strong> <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4599e26c elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-icon-box\" data-id=\"4599e26c\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tEntrega consultiva y profunda\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tEl servicio proporciona una entrega consultiva y profunda de conocimiento a los profesionales de la empresa involucrados en el proyecto.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b6f0043 elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-icon-box\" data-id=\"7b6f0043\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tMetodolog\u00eda <br>consistente\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tMetodolog\u00eda que respeta los principales est\u00e1ndares del mercado y necesidades de cumplimiento de normas \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c354c59 elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-icon-box\" data-id=\"5c354c59\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tProfesionales <br>certificados\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tProfesionales con amplia experiencia pr\u00e1ctica y amplio conocimiento en infraestructura y seguridad digital.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7616b960 elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-icon-box\" data-id=\"7616b960\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tEleva los niveles de <br>seguridad\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tEl Pentest es un servicio esencial para las empresas que necesitan avanzar en sus estrategias de seguridad.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c59e116 elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-icon-box\" data-id=\"1c59e116\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tReduce la posibilidad de incidentes\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tReducir la ventana de exposici\u00f3n de las vulnerabilidades es esencial para minimizar los posibles incidentes.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78fb74c8 elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-icon-box\" data-id=\"78fb74c8\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"http:\/\/eh\" >\n\t\t\t\t\t\t\tPlanes <br>personalizados\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tCampa\u00f1as de incentivos a las ventas que otorgan premios extraordinarios a los socios m\u00e1s destacados del a\u00f1o.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5982aba1 elementor-align-center elementor-widget__width-inherit elementor-widget elementor-widget-button\" data-id=\"5982aba1\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/wa.me\/554891170258\" id=\"btn-pentest-especialista-whats\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-whatsapp\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">HABLAR CON UN ESPECIALISTA<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4305252a elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4305252a\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7c44b303 animated-fast elementor-invisible\" data-id=\"7c44b303\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6907a2e9 elementor-widget elementor-widget-elementskit-video\" data-id=\"6907a2e9\" data-element_type=\"widget\" data-widget_type=\"elementskit-video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\t\t<div class=\"video-content\" data-video-player=\"[]\" data-video-setting=\"{&quot;videoVolume&quot;:&quot;horizontal&quot;,&quot;startVolume&quot;:0.80000000000000004,&quot;videoType&quot;:&quot;iframe&quot;,&quot;videoClass&quot;:&quot;mfp-fade&quot;}\">\n\t\t\t\n<a class=\"ekit_icon_button glow-btn ekit-video-popup ekit-video-popup-btn\" href=\"https:\/\/www.youtube.com\/embed\/LpDEFuqbtWM?feature=oembed?playlist=LpDEFuqbtWM&amp;mute=0&amp;autoplay=0&amp;loop=no&amp;controls=0&amp;start=0&amp;end=\" aria-label=\"video-popup\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-play\"><\/i>\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d929053 elementor-widget__width-inherit elementor-widget-mobile__width-inherit elementor-widget-tablet__width-inherit elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"1d929053\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h1 class=\"elementor-image-box-title\">entrega consultiva <br>y profundo <\/h1><p class=\"elementor-image-box-description\">Esta frase es parte de nuestro <b>Prop\u00f3sito de Marca<\/b> y orienta todas las acciones aqu\u00ed en <b>OSTEC<\/b> . Comprender en la pr\u00e1ctica el concepto de entrega consultiva y en profundidad, a trav\u00e9s de los testimonios de nuestros clientes.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-67eb1678 elementor-widget elementor-widget-image-carousel\" data-id=\"67eb1678\" data-element_type=\"widget\" data-settings=\"{&quot;slides_to_show&quot;:&quot;3&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;navigation&quot;:&quot;none&quot;,&quot;lazyload&quot;:&quot;yes&quot;,&quot;autoplay&quot;:&quot;no&quot;,&quot;infinite&quot;:&quot;no&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:15,&quot;sizes&quot;:[]},&quot;slides_to_show_tablet&quot;:&quot;3&quot;,&quot;slides_to_show_mobile&quot;:&quot;3&quot;,&quot;speed&quot;:500,&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"polite\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 3\"><a data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-slideshow=\"67eb1678\" data-elementor-lightbox-title=\"cliente-jayme\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTM3MTQsInVybCI6Imh0dHBzOlwvXC93d3cub3N0ZWMuY29tLmJyXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDIzXC8wOFwvY2xpZW50ZS1qYXltZS5qcGciLCJzbGlkZXNob3ciOiI2N2ViMTY3OCJ9\" href=\"https:\/\/youtu.be\/LpDEFuqbtWM?si=ESUtaRhWmYhqWuMp\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/08\/cliente-jayme.jpg\" alt=\"cliente-jayme\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/a><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 3\"><a data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-slideshow=\"67eb1678\" data-elementor-lightbox-title=\"cliente-bruno\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTM3MTEsInVybCI6Imh0dHBzOlwvXC93d3cub3N0ZWMuY29tLmJyXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDIzXC8wOFwvY2xpZW50ZS1icnVuby5qcGciLCJzbGlkZXNob3ciOiI2N2ViMTY3OCJ9\" href=\"https:\/\/youtu.be\/LpDEFuqbtWM?si=ESUtaRhWmYhqWuMp\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/08\/cliente-bruno.jpg\" alt=\"cliente-bruno\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/a><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 3\"><a data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-slideshow=\"67eb1678\" data-elementor-lightbox-title=\"cliente-wilson\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTM3MDgsInVybCI6Imh0dHBzOlwvXC93d3cub3N0ZWMuY29tLmJyXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDIzXC8wOFwvY2xpZW50ZS13aWxzb24uanBnIiwic2xpZGVzaG93IjoiNjdlYjE2NzgifQ%3D%3D\" href=\"https:\/\/youtu.be\/LpDEFuqbtWM?si=ESUtaRhWmYhqWuMp\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/08\/cliente-wilson.jpg\" alt=\"cliente-wilson\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/a><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-44c11d2 elementor-section-content-middle elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"44c11d2\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c99840b\" data-id=\"c99840b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1a9dca0 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"1a9dca0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Simular la<br> inversi\u00f3n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7d944e elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"a7d944e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Realizamos un pre-diagn\u00f3stico para entender sus necesidades y entregar una propuesta de precios acorde a la realidad de la empresa.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93e2ed8 elementor-align-left elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-elementskit-button\" data-id=\"93e2ed8\" data-element_type=\"widget\" data-widget_type=\"elementskit-button.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\t\t<div class=\"ekit-btn-wraper\">\n\t\t\t\t\t\t\t<a href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjcwMTMiLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D\" class=\"elementskit-btn  whitespace--normal\" id=\"btn-pentest-simulador\">\n\t\t\t\t\t<i class=\"fas fa-calculator\"><\/i>Simulador de acceso\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-202e70d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"202e70d\" data-element_type=\"section\" id=\"pentest-metodologia\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-450c86bd\" data-id=\"450c86bd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-96c5130 elementor-widget elementor-widget-heading\" data-id=\"96c5130\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Metodolog\u00eda<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb3e7b elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"eb3e7b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Nuestra metodolog\u00eda est\u00e1 en <strong>Open Web Application Security Project (OWASP)<\/strong> , <strong>Open Source Security Testing Methodology (OSSTMM)<\/strong> y <strong>Penetration Testing Execution Standard (PTES)<\/strong> .<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8418ce1 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"8418ce1\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h6 class=\"elementor-image-box-title\">ENUMERATION &amp; VULNERABILITY SCANNING<\/h6><p class=\"elementor-image-box-description\">Aplicaci\u00f3n de herramientas de escaneo de vulnerabilidades y an\u00e1lisis manual para identificar y mapear agujeros de seguridad.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-650c2103 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"650c2103\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h6 class=\"elementor-image-box-title\">REPORTING AND DOCUMENTATION<\/h6><p class=\"elementor-image-box-description\">Informes de amenazas, incluyendo etapas de correcci\u00f3n y la priorizaci\u00f3n de vulnerabilidades de alto riesgo.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e09e2b6 elementor-widget__width-inherit elementor-hidden-mobile elementor-widget elementor-widget-image\" data-id=\"3e09e2b6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/04\/metodologia-pentest.svg\" class=\"attachment-full size-full wp-image-6999\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e6b23c elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"2e6b23c\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h6 class=\"elementor-image-box-title\">RECONNAISSANCE<\/h6><p class=\"elementor-image-box-description\">Descubre datos cruciales sobre el objetivo, proporcionando la base para un Pentest personalizado.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78b582f9 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"78b582f9\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h6 class=\"elementor-image-box-title\">ATTACK AND PENETRATION<\/h6><p class=\"elementor-image-box-description\">Explotaci\u00f3n de vulnerabilidades identificadas, escalada de privilegios e identificaci\u00f3n de riesgos e impactos t\u00e9cnicos.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51d5d279 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"51d5d279\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h6 class=\"elementor-image-box-title\">REMEDIATION TESTING<\/h6><p class=\"elementor-image-box-description\">Pentest sobre las vulnerabilidades enumeradas en la fase de Informe y se\u00f1alar el nuevo nivel de riesgo.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-208b50d6 elementor-align-center elementor-widget__width-inherit elementor-widget elementor-widget-button\" data-id=\"208b50d6\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/wa.me\/554891170258\" id=\"btn-pentest-especialista-whats\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-whatsapp\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Hablar con un profesional<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4df3beb1 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4df3beb1\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76baf483 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"76baf483\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Entre<br>gables<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6df669e6 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-toggle\" data-id=\"6df669e6\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1841\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1841\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Documento con vulnerabilidades y clasificaci\u00f3n de riesgo<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1841\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1841\"><p>Entrega de un informe completo con todas las vulnerabilidades identificadas y las respectivas clasificaciones de riesgo. El informe sirve como referencia para los pr\u00f3ximos pasos del Pentest. Y tambi\u00e9n es una excelente herramienta para priorizar las inversiones en seguridad digital.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1842\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1842\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Documento con los pasos de la exploraci\u00f3n<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1842\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1842\"><p>Elaboraci\u00f3n de una gu\u00eda de exploraci\u00f3n detallando los caminos utilizados en la estrategia de exploraci\u00f3n, respetando el alcance definido y el tipo de enfoque utilizado en el Pentest.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1843\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1843\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Informe con activos y datos comprometidos<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1843\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1843\"><p>Informe detallado, mostrando los activos que fueron comprometidos durante el Pentest, respetando el alcance definido por la empresa al momento de contratar el servicio.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1844\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1844\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Informe de remediation Testing<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1844\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1844\"><p>Informe con el resultado del an\u00e1lisis del Remediation Testing, que es la prueba realizada luego de implementar las correcciones sugeridas durante la ejecuci\u00f3n del Pentest.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7cbf27fb elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7cbf27fb\" data-element_type=\"section\" id=\"pentest-especialista\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3727b62a\" data-id=\"3727b62a\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1a4fbaa4 elementor-cta--valign-middle elementor-widget__width-inherit elementor-cta--layout-image-right elementor-cta--tablet-layout-image-right elementor-cta--mobile-layout-image-above elementor-widget-mobile__width-inherit elementor-cta--skin-classic elementor-widget elementor-widget-call-to-action\" data-id=\"1a4fbaa4\" data-element_type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tLA SEGURIDAD DE<br>SU NEGOCIO EN<br>A UN NUEVO NIVEL\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\t<p>Eleva los niveles de seguridad de tu negocio con el servicio <b>Pentest OSTEC<\/b> .<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c902bec elementor-align-left elementor-widget elementor-widget-elementskit-button\" data-id=\"5c902bec\" data-element_type=\"widget\" data-widget_type=\"elementskit-button.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\t\t<div class=\"ekit-btn-wraper\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/wa.me\/554891170258\" target=\"_blank\" class=\"elementskit-btn  whitespace--normal\" id=\"btn-pentest-especialista-whats\">\n\t\t\t\t\t<i class=\"fab fa-whatsapp\"><\/i>Chatea en whatsapp\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>PENTESTO SUS ACTIVOS M\u00c1S VALIOSOS PROTEGIDOS CONTRA ATAQUES CIBERN\u00c9TICOS Estructuras de redes, sitios web y las aplicaciones son objetivos frecuentes de amenazas virtuales de todos los tipos. Por lo tanto, es importante aplicar esfuerzos superiores para garantizar que las estructuras cr\u00edticas est\u00e9n realmente protegidas. HABLAR CON UN ESPECIALISTA SOBRE EL SERVICIO El Pentest (Penetration testing) [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":14557,"parent":12468,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-13073","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Servicio pentest - OSTEC<\/title>\n<meta name=\"description\" content=\"El servicio Pentest ayuda a los profesionales a proteger estructuras de red, sitios web y aplicaciones de amenazas virtuales. Accede al sitio web.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ostec.com.br\/es\/soluciones-2\/pentest\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Servicio pentest - OSTEC\" \/>\n<meta property=\"og:description\" content=\"El servicio Pentest ayuda a los profesionales a proteger estructuras de red, sitios web y aplicaciones de amenazas virtuales. Accede al sitio web.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ostec.com.br\/es\/soluciones-2\/pentest\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC - Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-19T13:49:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/10\/especialista-realizando-pentest-mini.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"375\" \/>\n\t<meta property=\"og:image:height\" content=\"375\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ostec.com.br\/es\/soluciones-2\/pentest\/\",\"url\":\"https:\/\/www.ostec.com.br\/es\/soluciones-2\/pentest\/\",\"name\":\"Servicio pentest - OSTEC\",\"isPartOf\":{\"@id\":\"https:\/\/www.ostec.com.br\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ostec.com.br\/es\/soluciones-2\/pentest\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ostec.com.br\/es\/soluciones-2\/pentest\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/10\/especialista-realizando-pentest-mini.jpg\",\"datePublished\":\"2023-04-03T19:31:11+00:00\",\"dateModified\":\"2023-10-19T13:49:18+00:00\",\"description\":\"El servicio Pentest ayuda a los profesionales a proteger estructuras de red, sitios web y aplicaciones de amenazas virtuales. Accede al sitio web.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ostec.com.br\/es\/soluciones-2\/pentest\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ostec.com.br\/es\/soluciones-2\/pentest\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.ostec.com.br\/es\/soluciones-2\/pentest\/#primaryimage\",\"url\":\"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/10\/especialista-realizando-pentest-mini.jpg\",\"contentUrl\":\"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/10\/especialista-realizando-pentest-mini.jpg\",\"width\":375,\"height\":375},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ostec.com.br\/es\/soluciones-2\/pentest\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/www.ostec.com.br\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Soluciones\",\"item\":\"https:\/\/www.ostec.com.br\/es\/soluciones-2\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Servicio Pentest\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ostec.com.br\/#website\",\"url\":\"https:\/\/www.ostec.com.br\/\",\"name\":\"OSTEC - Seguran\u00e7a digital de resultados\",\"description\":\"Seguran\u00e7a digital de resultados.\",\"publisher\":{\"@id\":\"https:\/\/www.ostec.com.br\/#organization\"},\"alternateName\":\"OSTEC\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ostec.com.br\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ostec.com.br\/#organization\",\"name\":\"OSTEC Business Security\",\"alternateName\":\"OSTEC\",\"url\":\"https:\/\/www.ostec.com.br\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.ostec.com.br\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2021\/12\/fav_color.svg\",\"contentUrl\":\"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2021\/12\/fav_color.svg\",\"width\":1,\"height\":1,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/www.ostec.com.br\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\/\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/www.linkedin.com\/company\/ostec-security\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Servicio pentest - OSTEC","description":"El servicio Pentest ayuda a los profesionales a proteger estructuras de red, sitios web y aplicaciones de amenazas virtuales. Accede al sitio web.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ostec.com.br\/es\/soluciones-2\/pentest\/","og_locale":"es_ES","og_type":"article","og_title":"Servicio pentest - OSTEC","og_description":"El servicio Pentest ayuda a los profesionales a proteger estructuras de red, sitios web y aplicaciones de amenazas virtuales. Accede al sitio web.","og_url":"https:\/\/www.ostec.com.br\/es\/soluciones-2\/pentest\/","og_site_name":"OSTEC - Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec\/","article_modified_time":"2023-10-19T13:49:18+00:00","og_image":[{"width":375,"height":375,"url":"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/10\/especialista-realizando-pentest-mini.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ostec.com.br\/es\/soluciones-2\/pentest\/","url":"https:\/\/www.ostec.com.br\/es\/soluciones-2\/pentest\/","name":"Servicio pentest - OSTEC","isPartOf":{"@id":"https:\/\/www.ostec.com.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ostec.com.br\/es\/soluciones-2\/pentest\/#primaryimage"},"image":{"@id":"https:\/\/www.ostec.com.br\/es\/soluciones-2\/pentest\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/10\/especialista-realizando-pentest-mini.jpg","datePublished":"2023-04-03T19:31:11+00:00","dateModified":"2023-10-19T13:49:18+00:00","description":"El servicio Pentest ayuda a los profesionales a proteger estructuras de red, sitios web y aplicaciones de amenazas virtuales. Accede al sitio web.","breadcrumb":{"@id":"https:\/\/www.ostec.com.br\/es\/soluciones-2\/pentest\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ostec.com.br\/es\/soluciones-2\/pentest\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.ostec.com.br\/es\/soluciones-2\/pentest\/#primaryimage","url":"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/10\/especialista-realizando-pentest-mini.jpg","contentUrl":"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/10\/especialista-realizando-pentest-mini.jpg","width":375,"height":375},{"@type":"BreadcrumbList","@id":"https:\/\/www.ostec.com.br\/es\/soluciones-2\/pentest\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.ostec.com.br\/"},{"@type":"ListItem","position":2,"name":"Soluciones","item":"https:\/\/www.ostec.com.br\/es\/soluciones-2\/"},{"@type":"ListItem","position":3,"name":"Servicio Pentest"}]},{"@type":"WebSite","@id":"https:\/\/www.ostec.com.br\/#website","url":"https:\/\/www.ostec.com.br\/","name":"OSTEC - Seguran\u00e7a digital de resultados","description":"Seguran\u00e7a digital de resultados.","publisher":{"@id":"https:\/\/www.ostec.com.br\/#organization"},"alternateName":"OSTEC","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ostec.com.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/www.ostec.com.br\/#organization","name":"OSTEC Business Security","alternateName":"OSTEC","url":"https:\/\/www.ostec.com.br\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.ostec.com.br\/#\/schema\/logo\/image\/","url":"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2021\/12\/fav_color.svg","contentUrl":"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2021\/12\/fav_color.svg","width":1,"height":1,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/www.ostec.com.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec\/","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/www.linkedin.com\/company\/ostec-security\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.ostec.com.br\/es\/wp-json\/wp\/v2\/pages\/13073","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ostec.com.br\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ostec.com.br\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ostec.com.br\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ostec.com.br\/es\/wp-json\/wp\/v2\/comments?post=13073"}],"version-history":[{"count":0,"href":"https:\/\/www.ostec.com.br\/es\/wp-json\/wp\/v2\/pages\/13073\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.ostec.com.br\/es\/wp-json\/wp\/v2\/pages\/12468"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ostec.com.br\/es\/wp-json\/wp\/v2\/media\/14557"}],"wp:attachment":[{"href":"https:\/\/www.ostec.com.br\/es\/wp-json\/wp\/v2\/media?parent=13073"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}