{"id":15023,"date":"2023-04-13T22:56:12","date_gmt":"2023-04-14T01:56:12","guid":{"rendered":"https:\/\/www.ostec.com.br\/soluciones-2\/analisis-de-vulnerabilidades\/"},"modified":"2023-10-19T10:23:20","modified_gmt":"2023-10-19T13:23:20","slug":"analisis-de-vulnerabilidades","status":"publish","type":"page","link":"https:\/\/www.ostec.com.br\/es\/soluciones-2\/analisis-de-vulnerabilidades\/","title":{"rendered":"An\u00e1lisis de vulnerabilidades"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"15023\" class=\"elementor elementor-15023 elementor-7550\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-39ea1365 elementor-section-content-middle elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"39ea1365\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-52a6a28\" data-id=\"52a6a28\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-18d4e02c elementor-widget elementor-widget-elementskit-heading\" data-id=\"18d4e02c\" data-element_type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">AN\u00c1LISIS DE VULNERABILIDAD EN SEGURIDAD DE LA INFORMACI\u00d3N<\/h2><h3 class=\"ekit-heading--subtitle elementskit-section-subtitle  \">\n\t\t\t\t\t\tLas amenazas no dejan de llegar a menos que dejes de buscar.\n\t\t\t\t\t<\/h3>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Identifica vulnerabilidades de seguridad digital, con la ayuda de expertos con una experiencia amplia y herramientas altamente especializadas.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b3df6e5 elementor-align-left elementor-widget__width-inherit elementor-widget-mobile__width-inherit elementor-widget elementor-widget-button\" data-id=\"4b3df6e5\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"#analisis-vulnerabilidades-especialista\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">HABLAR CON UN ESPECIALISTA<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2973fc2f animated-fast elementor-invisible\" data-id=\"2973fc2f\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6d454eb6 elementor-widget elementor-widget-image\" data-id=\"6d454eb6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2021\/12\/fav_color.svg\" class=\"attachment-large size-large wp-image-3584\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-72112dbd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"72112dbd\" data-element_type=\"section\" id=\"pentest-caracteristicas\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-235dc862\" data-id=\"235dc862\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6ab2e9c elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget-tablet__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"6ab2e9c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h4 style=\"font-style: italic; font-weight: 900;\">SOBRE EL SERVICIO<\/h4>\n<p>El servicio de An\u00e1lisis de vulnerabilidades tiene como objetivo identificar, cuantificar y analizar vulnerabilidades en redes, sistemas, hardware, aplicaciones y otros dispositivos de TI, ya sea en las instalaciones o en la nube.<\/p>\n<p>El servicio permite una mejor comprensi\u00f3n de los activos, las medidas de seguridad y sus vulnerabilidades, lo que reduce la probabilidad de que un atacante encuentre y explote fallas en el entorno tecnol\u00f3gico y, en consecuencia, aumenta el nivel de seguridad de la informaci\u00f3n.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df52abc elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget-tablet__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"df52abc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h4 style=\"font-style: italic; font-weight: 900;\">A QUI\u00c9N SE DESTINA<\/h4><p>La mayor\u00eda de las organizaciones pueden considerarse objetivos potenciales para los ciberdelincuentes, ya sean entidades gubernamentales o empresas privadas, independientemente de su tama\u00f1o o \u00e1rea.\n\nPor esta raz\u00f3n, el An\u00e1lisis de Vulnerabilidades es un servicio que pueden consumir las empresas que entienden la necesidad de invertir en acciones proactivas para minimizar las posibilidades de p\u00e9rdida o exposici\u00f3n de datos.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4f834948 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"4f834948\" data-element_type=\"section\" id=\"pentest-beneficios\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2e184664\" data-id=\"2e184664\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2a1ebbd elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget-tablet__width-initial elementor-widget elementor-widget-heading\" data-id=\"2a1ebbd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">BENEFICIOS Y CARACTER\u00cdSTICAS<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-511a4bbc elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget-tablet__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"511a4bbc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Conozca los principales beneficios y diferenciales del servicio <strong>de An\u00e1lisis de Vulnerabilidades<\/strong><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5cb179aa elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"5cb179aa\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Camada_2\" viewBox=\"0 0 32.25 34.8\"><g id=\"Camada_1-2\"><path d=\"m6,34.8v-7.2c-1.9-1.73-3.38-3.66-4.43-5.78s-1.58-4.27-1.58-6.46c0-4.27,1.5-7.9,4.49-10.88C7.49,1.49,11.12,0,15.4,0c3.43,0,6.56,1.06,9.38,3.18,2.82,2.12,4.64,4.84,5.48,8.18l1.97,7.8c.09.44,0,.82-.24,1.15s-.61.5-1.08.5h-4.1v7.3c0,.72-.27,1.35-.81,1.89s-1.17.81-1.89.81h-5.3v4h-1.1v-5.1h6.4c.47,0,.85-.15,1.15-.45s.45-.68.45-1.15v-8.4h5.5l-2-8.15c-.77-3.13-2.45-5.66-5.05-7.58s-5.52-2.88-8.75-2.88c-3.97,0-7.35,1.38-10.13,4.14C2.49,7.99,1.1,11.36,1.1,15.33c0,2.07.42,4.02,1.27,5.85.84,1.82,2.02,3.44,3.53,4.83l1.2,1.14v7.65h-1.1Zm8.7-12.7h1.4l.05-1.55c.63-.1,1.24-.31,1.83-.62.59-.31,1.08-.72,1.47-1.23l1.35.7.7-1.15-1.15-.9c.27-.68.4-1.37.4-2.08s-.13-1.4-.4-2.07l1.15-.9-.7-1.15-1.35.7c-.41-.49-.91-.89-1.48-1.19-.58-.31-1.18-.51-1.82-.61l-.05-1.6h-1.4l-.05,1.6c-.67.1-1.29.3-1.87.61-.58.31-1.07.7-1.48,1.19l-1.35-.7-.65,1.15,1.15.9c-.3.68-.45,1.37-.45,2.08s.15,1.4.45,2.07l-1.15.9.65,1.15,1.35-.7c.39.51.88.91,1.47,1.23.59.31,1.21.52,1.88.62l.05,1.55Zm.7-2.7c-1.17,0-2.14-.4-2.93-1.2-.78-.8-1.18-1.76-1.18-2.9s.39-2.14,1.17-2.93c.78-.78,1.75-1.18,2.9-1.18s2.13.39,2.93,1.17c.8.78,1.2,1.75,1.2,2.9s-.4,2.13-1.2,2.93c-.8.8-1.76,1.2-2.9,1.2Z\"><\/path><\/g><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tEntrega consultiva y profunda\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tEl servicio proporciona una entrega consultiva y en profundidad, aportando valor a los profesionales implicados en el proyecto.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f7d8815 elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"5f7d8815\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Camada_2\" viewBox=\"0 0 37.4 33.4\"><g id=\"Camada_1-2\"><path d=\"m26.05,33.4v-6.1h-7.9V7.15h-6.8v6.15H0V0h11.35v6.05h14.7V0h11.35v13.3h-11.35v-6.15h-6.8v19.05h6.8v-6.15h11.35v13.35h-11.35ZM1.1,1.1v11.1V1.1Zm26.05,20.05v11.15-11.15Zm0-20.05v11.1V1.1Zm0,11.1h9.15V1.1h-9.15v11.1Zm0,20.1h9.15v-11.15h-9.15v11.15ZM1.1,12.2h9.15V1.1H1.1v11.1Z\"><\/path><\/g><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tMetodolog\u00eda consistente\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tMetodolog\u00eda consistente y ampliamente probada, con resultados sorprendentes en los primeros escaneos.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d9812a0 elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"1d9812a0\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<a href=\"http:\/\/eh\" class=\"elementor-icon\" tabindex=\"-1\" aria-label=\"Planes personalizados\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Camada_2\" viewBox=\"0 0 15.35 33.4\"><g id=\"Camada_1-2\"><path d=\"m7.05,33.4v-3.95c-1.73-.13-3.2-.66-4.4-1.58s-2.08-2.13-2.65-3.63l1-.5c.63,1.47,1.48,2.59,2.53,3.38s2.43,1.18,4.13,1.18,3.14-.43,4.53-1.28,2.08-2.19,2.08-4.03c0-1.6-.52-2.88-1.55-3.83s-2.78-1.83-5.25-2.63c-2.37-.77-4.09-1.65-5.18-2.65s-1.63-2.35-1.63-4.05.68-3.05,2.05-4.15,2.82-1.67,4.35-1.7V0h1.1v4c1.27.07,2.38.34,3.35.83s1.8,1.26,2.5,2.33l-.9.6c-.53-.8-1.24-1.46-2.13-1.98s-1.98-.78-3.28-.78c-1.57,0-2.95.43-4.15,1.3s-1.8,2.05-1.8,3.55c0,1.3.42,2.38,1.25,3.25.83.87,2.62,1.73,5.35,2.6,2.47.83,4.25,1.79,5.35,2.88s1.65,2.54,1.65,4.38-.68,3.34-2.05,4.53-3.08,1.83-5.15,1.93v4h-1.1Z\"><\/path><\/g><\/svg>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"http:\/\/eh\" >\n\t\t\t\t\t\t\tPlanes personalizados\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tLos planes var\u00edan de acuerdo al alcance de cada proyecto, respetando las necesidades y capacidad de inversi\u00f3n de cada empresa.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d99f681 elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"2d99f681\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<a href=\"http:\/\/eh\" class=\"elementor-icon\" tabindex=\"-1\" aria-label=\"Eleva el nivel de seguridad de la empresa.\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Camada_2\" viewBox=\"0 0 26.79 34.5\"><defs><style>.cls-1{fill:#0ddbff;}<\/style><\/defs><g id=\"Camada_2-2\"><g id=\"Camada_1-2\"><path class=\"cls-1\" d=\"m13.39,34.5c-3.83-1.23-7.02-3.62-9.57-7.17-2.55-3.55-3.82-7.56-3.82-12.02V5L13.39,0l13.4,5v10.3c0,4.47-1.28,8.47-3.83,12.02s-5.74,5.94-9.58,7.17h.01Zm0-1.2c3.57-1.13,6.51-3.38,8.83-6.75s3.47-7.12,3.47-11.25V5.75L13.39,1.15,1.09,5.75v9.55c0,4.13,1.16,7.88,3.47,11.25,2.32,3.37,5.26,5.62,8.83,6.75Z\"><\/path><\/g><\/g><\/svg>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"http:\/\/eh\" >\n\t\t\t\t\t\t\tEleva el nivel de seguridad de la empresa.\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tEl proceso de An\u00e1lisis de Vulnerabilidades eleva los niveles de seguridad de la empresa al minimizar el tiempo de exposici\u00f3n a las vulnerabilidades de seguridad.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e467bc9 elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"4e467bc9\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Camada_2\" viewBox=\"0 0 36.9 20.7\"><g id=\"Camada_1-2\"><path d=\"m27.7,20.7v-1.1h7.45l-14.1-13.95-8.1,8.15L0,.8l.8-.8,12.15,12.1,8.1-8.1,14.75,14.8v-7.3h1.1v9.2h-9.2Z\"><\/path><\/g><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tReduce el da\u00f1o causado por las vulnerabilidades\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tLa explotaci\u00f3n de vulnerabilidades puede traer p\u00e9rdidas financieras y de imagen empresarial. La fuga de datos, el secuestro de informaci\u00f3n son ejemplos de incidentes.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a240984 elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"3a240984\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<a href=\"http:\/\/eh\" class=\"elementor-icon\" tabindex=\"-1\" aria-label=\"Inversiones en seguridad m\u00e1s asertivas\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Camada_2\" viewBox=\"0 0 33.4 31.55\"><g id=\"Camada_1-2\"><path d=\"m0,31.55v-2.1l1.1-1.1v3.2H0Zm8.1,0v-10.1l1.1-1.1v11.2h-1.1Zm8.05,0v-11.2l1.1,1.15v10.05h-1.1Zm8.1,0v-10.05l1.1-1.1v11.15h-1.1Zm8.05,0V13.45l1.1-1.1v19.2h-1.1ZM0,18.9v-1.5L12.7,4.7l8,8L33.4,0v1.55l-12.7,12.7L12.7,6.25,0,18.9Z\"><\/path><\/g><\/svg>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"http:\/\/eh\" >\n\t\t\t\t\t\t\tInversiones en seguridad m\u00e1s asertivas\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tEl informe de vulnerabilidades encontradas ayuda a priorizar las inversiones en seguridad e infraestructura digital, lo que genera un r\u00e1pido retorno de la inversi\u00f3n.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-583e90bd elementor-align-center elementor-widget__width-inherit elementor-widget-mobile__width-inherit elementor-widget elementor-widget-button\" data-id=\"583e90bd\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/wa.me\/554891170258\" id=\"btn-analise-vul-especialista-whats\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-whatsapp\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">HABLAR CON UN ESPECIALISTA<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7a03f446 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7a03f446\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-51b88be7 animated-fast elementor-invisible\" data-id=\"51b88be7\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-441d60f4 elementor-widget elementor-widget-elementskit-video\" data-id=\"441d60f4\" data-element_type=\"widget\" data-widget_type=\"elementskit-video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\t\t<div class=\"video-content\" data-video-player=\"[]\" data-video-setting=\"{&quot;videoVolume&quot;:&quot;horizontal&quot;,&quot;startVolume&quot;:0.80000000000000004,&quot;videoType&quot;:&quot;iframe&quot;,&quot;videoClass&quot;:&quot;mfp-fade&quot;}\">\n\t\t\t\n<a class=\"ekit_icon_button glow-btn ekit-video-popup ekit-video-popup-btn\" href=\"https:\/\/www.youtube.com\/embed\/LpDEFuqbtWM?feature=oembed?playlist=LpDEFuqbtWM&amp;mute=0&amp;autoplay=0&amp;loop=no&amp;controls=0&amp;start=0&amp;end=\" aria-label=\"video-popup\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-play\"><\/i>\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20a3130 elementor-widget__width-inherit elementor-widget-mobile__width-inherit elementor-widget-tablet__width-inherit elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"20a3130\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h1 class=\"elementor-image-box-title\">entrega consultiva  <br>y profundo  <\/h1><p class=\"elementor-image-box-description\">Esta frase es parte de nuestro <b>Prop\u00f3sito de Marca<\/b> y orienta todas las acciones aqu\u00ed en <b>OSTEC<\/b> . Comprender en la pr\u00e1ctica el concepto de entrega consultiva y en profundidad, a trav\u00e9s de los testimonios de nuestros clientes.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36454fcd elementor-widget elementor-widget-image-carousel\" data-id=\"36454fcd\" data-element_type=\"widget\" data-settings=\"{&quot;slides_to_show&quot;:&quot;3&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;navigation&quot;:&quot;none&quot;,&quot;lazyload&quot;:&quot;yes&quot;,&quot;autoplay&quot;:&quot;no&quot;,&quot;infinite&quot;:&quot;no&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:15,&quot;sizes&quot;:[]},&quot;slides_to_show_tablet&quot;:&quot;3&quot;,&quot;slides_to_show_mobile&quot;:&quot;3&quot;,&quot;speed&quot;:500,&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"polite\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 3\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/08\/cliente-jayme.jpg\" alt=\"cliente-jayme\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 3\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/08\/cliente-bruno.jpg\" alt=\"cliente-bruno\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 3\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/08\/cliente-wilson.jpg\" alt=\"cliente-wilson\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dd76356 elementor-section-content-middle elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"dd76356\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f419673\" data-id=\"f419673\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-858522f elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"858522f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Simular la<br> inversi\u00f3n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb9a05f elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"fb9a05f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Realizamos un pre-diagn\u00f3stico para entender sus necesidades y entregar una propuesta de precios acorde a la realidad de la empresa.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef29f19 elementor-align-left elementor-widget__width-initial elementor-widget elementor-widget-elementskit-button\" data-id=\"ef29f19\" data-element_type=\"widget\" data-widget_type=\"elementskit-button.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\t\t<div class=\"ekit-btn-wraper\">\n\t\t\t\t\t\t\t<a href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6Ijc3MDQiLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D\" class=\"elementskit-btn  whitespace--normal\" id=\"btn-analise-vul-simulador\">\n\t\t\t\t\t<i class=\"fas fa-calculator\"><\/i>Simulador de acceso\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-61460990 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"61460990\" data-element_type=\"section\" id=\"pentest-metodologia\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7dd14563\" data-id=\"7dd14563\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-666e5a80 elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"666e5a80\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Metodolog\u00eda<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-629bb656 elementor-widget__width-inherit elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"629bb656\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Conozca nuestra metodolog\u00eda y comprenda c\u00f3mo podemos brindar m\u00e1s eficiencia para identificar vulnerabilidades y resultados para su negocio.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7397c379 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget-tablet__width-initial elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"7397c379\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h6 class=\"elementor-image-box-title\">1. Mapeo<\/h6><p class=\"elementor-image-box-description\">Determina los activos de hardware y software en el entorno de la organizaci\u00f3n, mediante la aplicaci\u00f3n de tecnolog\u00edas y procesos.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d3fec57 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"1d3fec57\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h6 class=\"elementor-image-box-title\">2. CLASIFICACI\u00d3N DE LA <br>URGENCIA<\/h6><p class=\"elementor-image-box-description\">Definici\u00f3n de urgencia para cada activo identificado en la fase de mapeo.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-66ccac7 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget-tablet__width-initial elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"66ccac7\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h6 class=\"elementor-image-box-title\">3. IDENTIFICACI\u00d3N DE VULNERABILIDADES<\/h6><p class=\"elementor-image-box-description\">Momento en que se identifican vulnerabilidades que afectan a los activos, mediante la aplicaci\u00f3n de scanners espec\u00edficos.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61ca84a1 elementor-widget__width-inherit elementor-hidden-mobile elementor-widget elementor-widget-image\" data-id=\"61ca84a1\" data-element_type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_mouse&quot;:&quot;yes&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/04\/metodologia-analise-vulnerabilidades.svg\" class=\"attachment-full size-full wp-image-7687\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3806c218 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget-tablet__width-initial elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"3806c218\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h6 class=\"elementor-image-box-title\">4. DEFINICI\u00d3N<br> DE RIESGOS<\/h6><p class=\"elementor-image-box-description\">Evaluaci\u00f3n de riesgos para cada vulnerabilidad, basada en archivos almacenados de vulnerabilidades.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e68f6c4 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget-tablet__width-initial elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"6e68f6c4\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h6 class=\"elementor-image-box-title\">5. INFORME Y <br>DOCUMENTACI\u00d3N<\/h6><p class=\"elementor-image-box-description\">Informe de vulnerabilidad, con una lista de prioridades, ordenadas por nivel de riesgo y criticidad del activo.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1aeeb7ef elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget-tablet__width-initial elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"1aeeb7ef\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h6 class=\"elementor-image-box-title\">6. REMEDIATION <br>TESTING<\/h6><p class=\"elementor-image-box-description\">Realizaci\u00f3n de un nuevo An\u00e1lisis de Vulnerabilidad basado en las referencias enumeradas en el informe.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c80a19d elementor-align-center elementor-widget__width-inherit elementor-widget-mobile__width-inherit elementor-widget elementor-widget-button\" data-id=\"2c80a19d\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/wa.me\/554891170258\" id=\"btn-analise-vul-especialista-whats\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-whatsapp\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Hablar con un experto<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4624c840 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4624c840\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29476a4 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"29476a4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Entre<br>gables<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d0cd79e elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-toggle\" data-id=\"1d0cd79e\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4871\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-4871\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Reporte con vulnerabilidades y urgencias<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-4871\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-4871\"><div class=\"elementor-accordion-item\">\n<div id=\"elementor-tab-content-1361\" class=\"elementor-tab-content elementor-clearfix elementor-active\" role=\"tabpanel\" data-tab=\"1\" aria-labelledby=\"elementor-tab-title-1361\">\n<p>Informe con la lista de activos y vulnerabilidades encontradas, as\u00ed como la clasificaci\u00f3n de riesgo de cada activo.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-accordion-item\">\n<div id=\"elementor-tab-title-1362\" class=\"elementor-tab-title\" role=\"tab\" data-tab=\"2\" aria-controls=\"elementor-tab-content-1362\" aria-expanded=\"false\"> <\/div>\n<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4872\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-4872\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Plan de acci\u00f3n priorizado<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-4872\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-4872\"><div class=\"elementor-accordion-item\">\n<div id=\"elementor-tab-content-1362\" class=\"elementor-tab-content elementor-clearfix elementor-active\" role=\"tabpanel\" data-tab=\"2\" aria-labelledby=\"elementor-tab-title-1362\">\n<p>Elaboraci\u00f3n de un plan de acci\u00f3n para la correcci\u00f3n de vulnerabilidades. El plan se entregar\u00e1 priorizado, facilitando las decisiones internas asociadas al proceso de correcci\u00f3n de vulnerabilidades.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-accordion-item\">\n<div id=\"elementor-tab-title-1363\" class=\"elementor-tab-title\" role=\"tab\" data-tab=\"3\" aria-controls=\"elementor-tab-content-1363\" aria-expanded=\"false\"> <\/div>\n<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4873\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-4873\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Remediation testing<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-4873\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-4873\"><p>Ejecuci\u00f3n de un nuevo escaneo para evaluar el escenario encontrado luego de ejecutar las correcciones sugeridas.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6d57a086 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6d57a086\" data-element_type=\"section\" id=\"produtos-utm-duvidas\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7547c4be\" data-id=\"7547c4be\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3ee8a104 elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"3ee8a104\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Preguntas<br>Frecuentes<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4bdc6a47 elementor-widget-mobile__width-inherit elementor-widget elementor-widget-toggle\" data-id=\"4bdc6a47\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1271\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1271\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">\u00bfCU\u00c1NTO TIEMPO TARDA EL SERVICIO DE AN\u00c1LISIS DE VULNERABILIDADES?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1271\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1271\"><p>El tiempo var\u00eda seg\u00fan la complejidad del entorno y el alcance del proyecto. Esta informaci\u00f3n es uno de los puntos que est\u00e1n en la propuesta comercial. Obtenga esta informaci\u00f3n llenando el formulario disponible en: \u201c <a href=\"https:\/\/www.ostec.com.br\/processos\/analise-vulnerabilidade\/#analise-vulnerabilidades-simulador\">Simule su inversi\u00f3n<\/a> \u201d.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1272\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1272\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">\u00bfEL SERVICIO PROPORCIONA ANALISTA IN-COMPANY?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1272\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1272\"><p>Dependiendo del alcance esperado, puede ser necesario un analista in-company, sin embargo, la gran mayor\u00eda de las intervenciones se pueden realizar de forma remota. En todo caso, la definici\u00f3n de agendas in-company estar\u00e1 alineada con la parte contratante y respetar\u00e1 las especificidades de cada negocio.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1273\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1273\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">\u00bfC\u00d3MO CONTRATAR EL SERVICIO?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1273\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1273\"><div class=\"elementor-toggle-item\">\n<div id=\"elementor-tab-content-2523\" class=\"elementor-tab-content elementor-clearfix elementor-active\" role=\"tabpanel\" data-tab=\"3\" aria-labelledby=\"elementor-tab-title-2523\">\n<p>Es posible expresar inter\u00e9s en consultar a trav\u00e9s del formulario <a href=\"https:\/\/www.ostec.com.br\/processos\/analise-vulnerabilidade\/#analise-vulnerabilidades-simulador\">de simulaci\u00f3n de inversi\u00f3n<\/a> en el sitio web. Luego de completar, sus datos ser\u00e1n procesados \u200b\u200by uno de nuestros analistas se pondr\u00e1 en contacto para la continuidad del servicio. Tambi\u00e9n puede contactar a OSTEC por correo electr\u00f3nico comercial@ostec.com.br o por tel\u00e9fono <a href=\"tel:%204830528500\">|48|3052-8500<\/a> .<\/p>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3d7e9df5 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3d7e9df5\" data-element_type=\"section\" id=\"analise-vulnerabilidades-especialista\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5b137c6f\" data-id=\"5b137c6f\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2ca87ab5 elementor-cta--valign-middle elementor-widget__width-inherit elementor-cta--layout-image-right elementor-cta--tablet-layout-image-right elementor-cta--mobile-layout-image-above elementor-widget-mobile__width-inherit elementor-cta--skin-classic elementor-widget elementor-widget-call-to-action\" data-id=\"2ca87ab5\" data-element_type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tLA SEGURIDAD DE<br>SU NEGOCIO EN<br>A UN NUEVO NIVEL\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\t<p>Eleve los niveles de seguridad de tu negocio con el <b>servicio de An\u00e1lisis de Vulnerabilidades<\/b> .<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e4a55e3 elementor-align-left elementor-widget elementor-widget-elementskit-button\" data-id=\"5e4a55e3\" data-element_type=\"widget\" data-widget_type=\"elementskit-button.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\t\t<div class=\"ekit-btn-wraper\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/wa.me\/554891170258\" target=\"_blank\" class=\"elementskit-btn  whitespace--normal\" id=\"btn-analise-vul-especialista-whats\">\n\t\t\t\t\t<i class=\"fab fa-whatsapp\"><\/i>Chatea en whatsapp\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>AN\u00c1LISIS DE VULNERABILIDAD EN SEGURIDAD DE LA INFORMACI\u00d3N Las amenazas no dejan de llegar a menos que dejes de buscar. Identifica vulnerabilidades de seguridad digital, con la ayuda de expertos con una experiencia amplia y herramientas altamente especializadas. HABLAR CON UN ESPECIALISTA SOBRE EL SERVICIO El servicio de An\u00e1lisis de vulnerabilidades tiene como objetivo identificar, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":14551,"parent":12468,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-15023","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>An\u00e1lisis de vulnerabilidades -<\/title>\n<meta name=\"description\" content=\"Servicio de An\u00e1lisis de Vulnerabilidad, para identificar amenazas virtuales. Descubre nuestras diferencias y simula la inversi\u00f3n.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ostec.com.br\/es\/soluciones-2\/analisis-de-vulnerabilidades\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An\u00e1lisis de vulnerabilidades -\" \/>\n<meta property=\"og:description\" content=\"Servicio de An\u00e1lisis de Vulnerabilidad, para identificar amenazas virtuales. Descubre nuestras diferencias y simula la inversi\u00f3n.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ostec.com.br\/es\/soluciones-2\/analisis-de-vulnerabilidades\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC - Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-19T13:23:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/10\/especialista-fazendo-analise-vulnerabilidades-seguranca-mini.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ostec.com.br\/es\/soluciones-2\/analisis-de-vulnerabilidades\/\",\"url\":\"https:\/\/www.ostec.com.br\/es\/soluciones-2\/analisis-de-vulnerabilidades\/\",\"name\":\"An\u00e1lisis de vulnerabilidades -\",\"isPartOf\":{\"@id\":\"https:\/\/www.ostec.com.br\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ostec.com.br\/es\/soluciones-2\/analisis-de-vulnerabilidades\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ostec.com.br\/es\/soluciones-2\/analisis-de-vulnerabilidades\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/10\/especialista-fazendo-analise-vulnerabilidades-seguranca-mini.jpg\",\"datePublished\":\"2023-04-14T01:56:12+00:00\",\"dateModified\":\"2023-10-19T13:23:20+00:00\",\"description\":\"Servicio de An\u00e1lisis de Vulnerabilidad, para identificar amenazas virtuales. Descubre nuestras diferencias y simula la inversi\u00f3n.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ostec.com.br\/es\/soluciones-2\/analisis-de-vulnerabilidades\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ostec.com.br\/es\/soluciones-2\/analisis-de-vulnerabilidades\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.ostec.com.br\/es\/soluciones-2\/analisis-de-vulnerabilidades\/#primaryimage\",\"url\":\"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/10\/especialista-fazendo-analise-vulnerabilidades-seguranca-mini.jpg\",\"contentUrl\":\"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/10\/especialista-fazendo-analise-vulnerabilidades-seguranca-mini.jpg\",\"width\":500,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ostec.com.br\/es\/soluciones-2\/analisis-de-vulnerabilidades\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/www.ostec.com.br\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Soluciones\",\"item\":\"https:\/\/www.ostec.com.br\/es\/soluciones-2\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"An\u00e1lisis de vulnerabilidades\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ostec.com.br\/#website\",\"url\":\"https:\/\/www.ostec.com.br\/\",\"name\":\"OSTEC - Seguran\u00e7a digital de resultados\",\"description\":\"Seguran\u00e7a digital de resultados.\",\"publisher\":{\"@id\":\"https:\/\/www.ostec.com.br\/#organization\"},\"alternateName\":\"OSTEC\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ostec.com.br\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ostec.com.br\/#organization\",\"name\":\"OSTEC Business Security\",\"alternateName\":\"OSTEC\",\"url\":\"https:\/\/www.ostec.com.br\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.ostec.com.br\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2021\/12\/fav_color.svg\",\"contentUrl\":\"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2021\/12\/fav_color.svg\",\"width\":1,\"height\":1,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/www.ostec.com.br\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\/\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/www.linkedin.com\/company\/ostec-security\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"An\u00e1lisis de vulnerabilidades -","description":"Servicio de An\u00e1lisis de Vulnerabilidad, para identificar amenazas virtuales. Descubre nuestras diferencias y simula la inversi\u00f3n.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ostec.com.br\/es\/soluciones-2\/analisis-de-vulnerabilidades\/","og_locale":"es_ES","og_type":"article","og_title":"An\u00e1lisis de vulnerabilidades -","og_description":"Servicio de An\u00e1lisis de Vulnerabilidad, para identificar amenazas virtuales. Descubre nuestras diferencias y simula la inversi\u00f3n.","og_url":"https:\/\/www.ostec.com.br\/es\/soluciones-2\/analisis-de-vulnerabilidades\/","og_site_name":"OSTEC - Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec\/","article_modified_time":"2023-10-19T13:23:20+00:00","og_image":[{"width":500,"height":500,"url":"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/10\/especialista-fazendo-analise-vulnerabilidades-seguranca-mini.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ostec.com.br\/es\/soluciones-2\/analisis-de-vulnerabilidades\/","url":"https:\/\/www.ostec.com.br\/es\/soluciones-2\/analisis-de-vulnerabilidades\/","name":"An\u00e1lisis de vulnerabilidades -","isPartOf":{"@id":"https:\/\/www.ostec.com.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ostec.com.br\/es\/soluciones-2\/analisis-de-vulnerabilidades\/#primaryimage"},"image":{"@id":"https:\/\/www.ostec.com.br\/es\/soluciones-2\/analisis-de-vulnerabilidades\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/10\/especialista-fazendo-analise-vulnerabilidades-seguranca-mini.jpg","datePublished":"2023-04-14T01:56:12+00:00","dateModified":"2023-10-19T13:23:20+00:00","description":"Servicio de An\u00e1lisis de Vulnerabilidad, para identificar amenazas virtuales. Descubre nuestras diferencias y simula la inversi\u00f3n.","breadcrumb":{"@id":"https:\/\/www.ostec.com.br\/es\/soluciones-2\/analisis-de-vulnerabilidades\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ostec.com.br\/es\/soluciones-2\/analisis-de-vulnerabilidades\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.ostec.com.br\/es\/soluciones-2\/analisis-de-vulnerabilidades\/#primaryimage","url":"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/10\/especialista-fazendo-analise-vulnerabilidades-seguranca-mini.jpg","contentUrl":"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2023\/10\/especialista-fazendo-analise-vulnerabilidades-seguranca-mini.jpg","width":500,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.ostec.com.br\/es\/soluciones-2\/analisis-de-vulnerabilidades\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.ostec.com.br\/"},{"@type":"ListItem","position":2,"name":"Soluciones","item":"https:\/\/www.ostec.com.br\/es\/soluciones-2\/"},{"@type":"ListItem","position":3,"name":"An\u00e1lisis de vulnerabilidades"}]},{"@type":"WebSite","@id":"https:\/\/www.ostec.com.br\/#website","url":"https:\/\/www.ostec.com.br\/","name":"OSTEC - Seguran\u00e7a digital de resultados","description":"Seguran\u00e7a digital de resultados.","publisher":{"@id":"https:\/\/www.ostec.com.br\/#organization"},"alternateName":"OSTEC","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ostec.com.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/www.ostec.com.br\/#organization","name":"OSTEC Business Security","alternateName":"OSTEC","url":"https:\/\/www.ostec.com.br\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.ostec.com.br\/#\/schema\/logo\/image\/","url":"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2021\/12\/fav_color.svg","contentUrl":"https:\/\/www.ostec.com.br\/wp-content\/uploads\/2021\/12\/fav_color.svg","width":1,"height":1,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/www.ostec.com.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec\/","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/www.linkedin.com\/company\/ostec-security\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.ostec.com.br\/es\/wp-json\/wp\/v2\/pages\/15023","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ostec.com.br\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ostec.com.br\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ostec.com.br\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ostec.com.br\/es\/wp-json\/wp\/v2\/comments?post=15023"}],"version-history":[{"count":0,"href":"https:\/\/www.ostec.com.br\/es\/wp-json\/wp\/v2\/pages\/15023\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.ostec.com.br\/es\/wp-json\/wp\/v2\/pages\/12468"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ostec.com.br\/es\/wp-json\/wp\/v2\/media\/14551"}],"wp:attachment":[{"href":"https:\/\/www.ostec.com.br\/es\/wp-json\/wp\/v2\/media?parent=15023"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}