{"id":323935,"date":"2024-08-29T15:36:13","date_gmt":"2024-08-29T15:36:13","guid":{"rendered":"https:\/\/analisisdevulnerabilidades.com.mx\/?page_id=323935"},"modified":"2024-08-29T18:15:38","modified_gmt":"2024-08-29T18:15:38","slug":"inicio","status":"publish","type":"page","link":"https:\/\/analisisdevulnerabilidades.com.mx\/","title":{"rendered":"Inicio"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Header&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/analisisdevulnerabilidades.com.mx\/wp-content\/uploads\/2024\/08\/background.png&#8221; background_enable_pattern_style=&#8221;on&#8221; background_pattern_style=&#8221;tufted&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;2_3,1_3&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;80px||||false|false&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;||||false|false&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;cd25a76f-71dc-424a-a160-7add28474b31&#8243; header_2_font=&#8221;Lato||||||||&#8221; header_2_text_color=&#8221;#007FE0&#8243; header_4_text_color=&#8221;#007FE0&#8243; header_4_font_size=&#8221;33px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Bienvenidos<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;0983fb15-b31a-413a-a9a9-5566372559ef&#8221; header_text_color=&#8221;#FFFFFF&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><span>El an\u00e1lisis de vulnerabilidades en los negocios digitales es indispensable<br \/><\/span><\/h1>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/analisisdevulnerabilidades.com.mx\/wp-content\/uploads\/2024\/08\/laptop-2.png&#8221; title_text=&#8221;laptop-2&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;3vw|-19vw|||false|false&#8221; custom_margin_tablet=&#8221;|0vw||0vw|false|true&#8221; custom_margin_phone=&#8221;|0vw||0vw|false|true&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; scroll_fade_enable=&#8221;on&#8221; scroll_fade=&#8221;0|40|40|100|100%|100|30%&#8221; scroll_scaling_enable=&#8221;on&#8221; scroll_scaling=&#8221;0|50|50|100|100%|100|110%&#8221; scroll_blur_enable=&#8221;on&#8221; scroll_blur=&#8221;0|40|60|100|0px|0px|10px&#8221; motion_trigger_start=&#8221;bottom&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; background_enable_pattern_style=&#8221;on&#8221; background_pattern_style=&#8221;tufted&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;La importancia del an\u00e1lisis de vulnerabilidades en infraestructura&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; title_font=&#8221;Roboto|||||on|||&#8221; title_text_align=&#8221;left&#8221; title_font_size=&#8221;31px&#8221; title_line_height=&#8221;1.1em&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Lato||||||||&#8221; text_font_size=&#8221;20px&#8221; text_orientation=&#8221;justified&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; text_line_height=&#8221;1.6em&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>En un mundo cada vez m\u00e1s digitalizado, las organizaciones enfrentan amenazas cibern\u00e9ticas en constante evoluci\u00f3n. El an\u00e1lisis de vulnerabilidades es una de las herramientas m\u00e1s cruciales en el arsenal de ciberseguridad de cualquier empresa. Este proceso consiste en identificar, evaluar y mitigar posibles puntos d\u00e9biles en los sistemas y redes que pueden ser explotados por actores malintencionados.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/analisisdevulnerabilidades.com.mx\/wp-content\/uploads\/2024\/08\/62207.jpg&#8221; title_text=&#8221;62207&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221; custom_margin=&#8221;2vw||||false|false&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Features&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#000000&#8243; top_divider_style=&#8221;arrow&#8221; top_divider_color=&#8221;#FFFFFF&#8221; top_divider_height=&#8221;30px&#8221; bottom_divider_style=&#8221;slant&#8221; bottom_divider_color=&#8221;rgba(38,58,191,0.49)&#8221; bottom_divider_height=&#8221;12px&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;84016610-3694-4df9-972a-4539ed20bcfc&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>\u00bfCu\u00e1les son nuestros servicios?<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;17px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Nuestro equipo altamente calificado de expertos en seguridad inform\u00e1tica est\u00e1 listo para ayudarte a identificar y mitigar vulnerabilidades en tus activos digitales, asegurando que est\u00e9n protegidos de manera efectiva.<\/p>\n<p>Nuestro servicio de Pruebas de Seguridad, dise\u00f1ado para salvaguardar tu entorno digital contra las crecientes amenazas en l\u00ednea.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;30px|30px|30px|30px|true|true&#8221; custom_padding_tablet=&#8221;30px|30px|30px|30px|true|true&#8221; custom_padding_phone=&#8221;20px|20px|20px|20px|true|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;rgba(255,255,255,0.4)&#8221; global_colors_info=&#8221;{}&#8221; border_color_all__hover_enabled=&#8221;on|hover&#8221; border_color_all__hover=&#8221;#FFFFFF&#8221; background__hover_enabled=&#8221;off|hover&#8221; background_color__hover=&#8221;rgba(255,255,255,0.1)&#8221; background_enable_color__hover=&#8221;on&#8221;][et_pb_image src=&#8221;https:\/\/analisisdevulnerabilidades.com.mx\/wp-content\/uploads\/2024\/08\/hacker.png&#8221; title_text=&#8221;hacker&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;64px&#8221; max_height=&#8221;64px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;33336304-71d9-4d1b-a5f2-c43a9d755643&#8243; header_text_color=&#8221;#0047E0&#8243; header_4_text_align=&#8221;center&#8221; header_4_text_color=&#8221;#007FE0&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Pruebas de Caja Blanca<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;5643c394-1a41-43bb-8313-befad32ba1f4&#8243; text_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Analizamos su infraestructura con un conocimiento completo de sus sistemas. Esto nos permite identificar vulnerabilidades y aplicar soluciones precisas.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;30px|30px|30px|30px|true|true&#8221; custom_padding_tablet=&#8221;30px|30px|30px|30px|true|true&#8221; custom_padding_phone=&#8221;20px|20px|20px|20px|true|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;gcid-a4405f6c-a1ea-4782-80a8-25c182da384f&#8221; global_colors_info=&#8221;{%22gcid-a4405f6c-a1ea-4782-80a8-25c182da384f%22:%91%22border_color_all%22%93}&#8221; border_color_all__hover=&#8221;#FFFFFF&#8221; border_color_all__hover_enabled=&#8221;on|desktop&#8221; background__hover_enabled=&#8221;off|hover&#8221;][et_pb_image src=&#8221;https:\/\/analisisdevulnerabilidades.com.mx\/wp-content\/uploads\/2024\/08\/hacker.png&#8221; title_text=&#8221;hacker&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;64px&#8221; max_height=&#8221;64px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;33336304-71d9-4d1b-a5f2-c43a9d755643&#8243; header_4_text_align=&#8221;center&#8221; header_4_text_color=&#8221;#007FE0&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Pruebas de Caja Gris<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;5643c394-1a41-43bb-8313-befad32ba1f4&#8243; text_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Con un enfoque equilibrado e informaci\u00f3n parcial de tus sistemas, simulamos c\u00f3mo un atacante podr\u00eda abordar tus vulnerabilidades, brindando visibilidad de amenazas.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;30px|30px|30px|30px|true|true&#8221; custom_padding_tablet=&#8221;30px|30px|30px|30px|true|true&#8221; custom_padding_phone=&#8221;20px|20px|20px|20px|true|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;gcid-a4405f6c-a1ea-4782-80a8-25c182da384f&#8221; global_colors_info=&#8221;{%22gcid-a4405f6c-a1ea-4782-80a8-25c182da384f%22:%91%22border_color_all%22%93}&#8221; border_color_all__hover=&#8221;#FFFFFF&#8221; border_color_all__hover_enabled=&#8221;on|hover&#8221; background__hover_enabled=&#8221;off|hover&#8221;][et_pb_image src=&#8221;https:\/\/analisisdevulnerabilidades.com.mx\/wp-content\/uploads\/2024\/08\/hacker.png&#8221; title_text=&#8221;hacker&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;64px&#8221; max_height=&#8221;64px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;33336304-71d9-4d1b-a5f2-c43a9d755643&#8243; header_4_text_align=&#8221;center&#8221; header_4_text_color=&#8221;#007FE0&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Pruebas de Caja Negra<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;5643c394-1a41-43bb-8313-befad32ba1f4&#8243; text_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Simulamos un ataque externo, sin conocimiento previo de su infraestructura, para identificar brechas que podr\u00edan ser aprovechadas por atacantes.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;About&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#000000&#8243; background_enable_pattern_style=&#8221;on&#8221; background_pattern_style=&#8221;tufted&#8221; background_pattern_color=&#8221;rgba(255,255,255,0.19)&#8221; background_pattern_transform=&#8221;flip_vertical|flip_horizontal&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/analisisdevulnerabilidades.com.mx\/wp-content\/uploads\/2024\/08\/laptop-2.png&#8221; title_text=&#8221;laptop-2&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;6vw|||-4vw|false|false&#8221; custom_margin_tablet=&#8221;|||0vw|false|false&#8221; custom_margin_phone=&#8221;|||0vw|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; scroll_vertical_motion_enable=&#8221;on&#8221; scroll_vertical_motion=&#8221;0|50|50|100|1|0|-1&#8243; scroll_fade_enable=&#8221;on&#8221; scroll_blur_enable=&#8221;on&#8221; scroll_blur=&#8221;0|40|60|100|5px|0px|0px&#8221; global_colors_info=&#8221;{}&#8221; custom_margin__hover_enabled=&#8221;off|desktop&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;cd25a76f-71dc-424a-a160-7add28474b31&#8243; header_4_text_color=&#8221;#007FE0&#8243; header_4_font_size=&#8221;18px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Tenemos las experiencia<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;84016610-3694-4df9-972a-4539ed20bcfc&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; custom_margin=&#8221;||10px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Nuestro equipo de hacker \u00e9ticos<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;f2d75527-61c3-41cb-a843-c4ca3b8202f3&#8243; text_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Tiene la experiencia de an\u00e1lisis en miles de activos en diferentes tipos de organizaciones: entidades bancarias, industria, negocios en l\u00ednea, empresas de transporte, fintechs, etc.<\/p>\n<p>[\/et_pb_text][et_pb_cta title=&#8221;\u00bfPor qu\u00e9 nosotros?&#8221; button_url=&#8221;#&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;35611908-1979-4193-aca0-cfc0442d89da&#8221; header_font=&#8221;Exo 2||||||||&#8221; header_text_color=&#8221;#000000&#8243; header_font_size=&#8221;20px&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Lato||||||||&#8221; body_text_color=&#8221;#000000&#8243; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_color=&#8221;#007FE0&#8243; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#000000&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;4px&#8221; button_font=&#8221;Exo 2|700||on|||||&#8221; button_icon=&#8221;&#xf0a9;||fa||900&#8243; button_on_hover=&#8221;off&#8221; button_custom_padding=&#8221;12px|42px|12px|24px|true|false&#8221; text_orientation=&#8221;left&#8221; custom_padding=&#8221;30px|30px|30px|30px|true|true&#8221; custom_padding_tablet=&#8221;30px|30px|30px|30px|true|true&#8221; custom_padding_phone=&#8221;20px|20px|20px|20px|true|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; header_font_size_tablet=&#8221;16px&#8221; header_font_size_phone=&#8221;15px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; body_font_size_tablet=&#8221;15px&#8221; body_font_size_phone=&#8221;14px&#8221; body_font_size_last_edited=&#8221;on|desktop&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset4&#8243; box_shadow_horizontal=&#8221;6px&#8221; box_shadow_vertical=&#8221;-2px&#8221; box_shadow_blur=&#8221;40px&#8221; box_shadow_color=&#8221;#007FE0&#8243; global_colors_info=&#8221;{%22gcid-afa30cf2-6f5d-4b9c-aa39-7dbe1ac3b7a3%22:%91%22button_icon_color%22,%22button_icon_color%22%93}&#8221;]<\/p>\n<p>&#8220;Porque combinamos experiencia, \u00e9tica, innovaci\u00f3n y un enfoque personalizado para anticipar amenazas y proteger tus activos digitales. &#8220;<\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Project&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#000000&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;#000000 0%|rgba(0,0,0,0) 50%|#000000 100%&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_image=&#8221;https:\/\/analisisdevulnerabilidades.com.mx\/wp-content\/uploads\/2024\/08\/background.png&#8221; parallax=&#8221;on&#8221; custom_padding=&#8221;8vw||0vw||false|false&#8221; top_divider_style=&#8221;arrow&#8221; top_divider_color=&#8221;rgba(0,127,224,0.32)&#8221; top_divider_height=&#8221;22px&#8221; bottom_divider_style=&#8221;arrow&#8221; bottom_divider_color=&#8221;rgba(22,45,191,0.54)&#8221; bottom_divider_height=&#8221;18px&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;84016610-3694-4df9-972a-4539ed20bcfc&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; custom_margin=&#8221;||10px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Escaneo de activos<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;f2d75527-61c3-41cb-a843-c4ca3b8202f3&#8243; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;17px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Evaluamos aplicaciones m\u00f3viles en b\u00fasqueda de vulnerabilidades que podr\u00edan exponer los datos y comprometer la seguridad.<\/p>\n<p>Analizamos sistemas operativos y software para identificar vulnerabilidades que podr\u00edan ser aprovechados por atacantes.<\/p>\n<p>Escaneamos su infraestructura de red en busca de puntos d\u00e9biles que podr\u00edan ser explotados por ciberdelincuentes<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/analisisdevulnerabilidades.com.mx\/wp-content\/uploads\/2024\/08\/collage.png&#8221; title_text=&#8221;collage&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; next_background_color=&#8221;#222222&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; bottom_divider_style=&#8221;arrow2&#8243; bottom_divider_height=&#8221;31px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Cont\u00e1ctanos&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; title_font=&#8221;Roboto||||||||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Lato||||||||&#8221; text_font_size=&#8221;19px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"et_pb_module et_pb_text et_pb_text_1_tb_footer  et_pb_text_align_justified et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><span>\u00a1Cont\u00e1ctanos ahora!<\/span><\/p>\n<p><span> Nuestro equipo est\u00e1 listo para responder a tus preguntas, discutir tus necesidades espec\u00edficas y proporcionarte una soluci\u00f3n personalizada que proteja tu negocio.<br \/><\/span><\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_contact_form use_spam_service=&#8221;on&#8221; recaptcha_list=&#8221;analisisdevulnerabilidades-0&#8243; email=&#8221;contacto@ameci.org&#8221; title=&#8221;Gracias&#8221; custom_message=&#8221;Tienes nuevo mensaje en el portal de an\u00e1lisis de vulnerabilidades||et_pb_line_break_holder||||et_pb_line_break_holder||Nombre : %%name%%||et_pb_line_break_holder||Email: %%Email%%||et_pb_line_break_holder||Mensaje: %%Message%%&#8221; success_message=&#8221;Recibimos tu mensaje, y nos pondr\u00e9mos con contacto contigo&#8221; submit_button_text=&#8221;Env\u00edar mensaje&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; _unique_id=&#8221;25656249-2885-4f41-b11a-9eaab6d3fbd7&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_contact_field field_id=&#8221;Name&#8221; field_title=&#8221;Nombre&#8221; _builder_version=&#8221;4.27.0&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Email&#8221; field_title=&#8221;Email&#8221; field_type=&#8221;email&#8221; _builder_version=&#8221;4.27.0&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Message&#8221; field_title=&#8221;Mensaje&#8221; field_type=&#8221;text&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.0&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#222222&#8243; custom_margin=&#8221;||-90px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/analisisdevulnerabilidades.com.mx\/wp-content\/uploads\/2024\/08\/cropped-icono2.png&#8221; title_text=&#8221;cropped-icono2.png&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; width=&#8221;65%&#8221; max_width=&#8221;65%&#8221; module_alignment=&#8221;left&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Nosotros&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; title_text_color=&#8221;#2ea3f2&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Somos un grupo de profesionales especializados en ofrecer servicios y consultor\u00eda en seguridad de la informaci\u00f3n empresarial, tenemos experiencia en muchos sectores de empresas.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;AV m\u00e9xico&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; title_text_color=&#8221;#2ea3f2&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Somos parte de AMECI M\u00c9XICO<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/analisisdevulnerabilidades.com.mx\/wp-content\/uploads\/2024\/05\/logo.png&#8221; title_text=&#8221;logo&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; url=&#8221;https:\/\/ameci.org&#8221; url_new_window=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Lato||||||||&#8221; text_text_color=&#8221;#7CDA24&#8243; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/analisisdevulnerabilidades.com.mx\/wp-content\/uploads\/2024\/08\/shield-1-300x300.png\" width=\"41\" height=\"41\" alt=\"\" class=\"wp-image-324093 alignnone size-medium\" \/>Activo monitoreado por AMECI<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BienvenidosEl an\u00e1lisis de vulnerabilidades en los negocios digitales es indispensableEn un mundo cada vez m\u00e1s digitalizado, las organizaciones enfrentan amenazas cibern\u00e9ticas en constante evoluci\u00f3n. El an\u00e1lisis de vulnerabilidades es una de las herramientas m\u00e1s cruciales en el arsenal de ciberseguridad de cualquier empresa. Este proceso consiste en identificar, evaluar y mitigar posibles puntos d\u00e9biles en [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-323935","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/analisisdevulnerabilidades.com.mx\/index.php\/wp-json\/wp\/v2\/pages\/323935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/analisisdevulnerabilidades.com.mx\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/analisisdevulnerabilidades.com.mx\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/analisisdevulnerabilidades.com.mx\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/analisisdevulnerabilidades.com.mx\/index.php\/wp-json\/wp\/v2\/comments?post=323935"}],"version-history":[{"count":70,"href":"https:\/\/analisisdevulnerabilidades.com.mx\/index.php\/wp-json\/wp\/v2\/pages\/323935\/revisions"}],"predecessor-version":[{"id":324096,"href":"https:\/\/analisisdevulnerabilidades.com.mx\/index.php\/wp-json\/wp\/v2\/pages\/323935\/revisions\/324096"}],"wp:attachment":[{"href":"https:\/\/analisisdevulnerabilidades.com.mx\/index.php\/wp-json\/wp\/v2\/media?parent=323935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}