{"id":12065,"date":"2026-03-13T13:48:36","date_gmt":"2026-03-13T18:48:36","guid":{"rendered":"https:\/\/www.calivirtual.com.co\/demo2\/?page_id=12065"},"modified":"2026-04-29T15:18:40","modified_gmt":"2026-04-29T20:18:40","slug":"ciberseguridad","status":"publish","type":"page","link":"https:\/\/enterconn.com\/itsecurity\/ciberseguridad\/","title":{"rendered":"Ciberseguridad"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"12065\" class=\"elementor elementor-12065\">\n\t\t\t\t<div class=\"elementor-element elementor-element-84a836c e-flex e-con-boxed pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-parent \" data-id=\"84a836c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\t\t\t<div class=\"e-con-inner\">\r\n\t\t<div class=\"elementor-element elementor-element-7a18e3c e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"7a18e3c\" data-element_type=\"container\" data-e-type=\"container\"><div class=\"elementor-element elementor-element-dca7245 e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"dca7245\" data-element_type=\"container\" data-e-type=\"container\">\t\t<div class=\"elementor-element elementor-element-3ac785c elementor-widget elementor-widget-pxl_banner_box\" data-id=\"3ac785c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_banner_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n<div id=\"pxl_banner_box-3ac785c-8349\" class=\"pxl-banner-box pxl-banner-box1 \" data-wow-delay=\"ms\">\r\n    <div class=\"pxl-banner-inner style-default\">\r\n        <a class=\"pxl-inner-link\" href=\"https:\/\/enterconn.com\/itsecurity\/service\/seguridad-de-aplicaciones-y-web-waf-waap-proteccion-ddos\/\"><\/a>\r\n        <div class=\"row\">\r\n            <div class=\"col-sm-6\">\r\n                <div class=\"pxl-item-content\">\r\n                                            <h3 class=\"pxl-item-title\">\r\n                            Seguridad de Aplicaciones y Web                        <\/h3>\r\n                                                                <div class=\"pxl-item-desc\">\r\n                            WAF \/ WAAP \/ DDoS Principales objetivos de ciberataques.                        <\/div>\r\n                                    <\/div>\r\n            <\/div>\r\n            <div class=\"col-sm-6\">\r\n                <div class=\"pxl-inner-section\">\r\n                                            <div class=\"pxl-item--img\">\r\n                            <img fetchpriority=\"high\" decoding=\"async\" class=\"\" src=\"https:\/\/enterconn.com\/itsecurity\/wp-content\/uploads\/2025\/10\/Seguridad-de-Aplicaciones-Web-WAF-WAAP-Proteccion-DDoS.png\" width=\"800\" height=\"800\" alt=\"Seguridad-de-Aplicaciones-Web-WAF-WAAP-Protecci\u00f3n-DDoS\" title=\"Seguridad-de-Aplicaciones-Web-WAF-WAAP-Protecci\u00f3n-DDoS\" \/>                        <\/div>\r\n                                                                <div class=\"pxl-item-number\">\r\n                            01                        <\/div>\r\n                                    <\/div>\r\n            <\/div>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\r\n\t\t<div class=\"elementor-element elementor-element-c8ac203 e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"c8ac203\" data-element_type=\"container\" data-e-type=\"container\">\t\t<div class=\"elementor-element elementor-element-7bb1212 elementor-widget elementor-widget-pxl_banner_box\" data-id=\"7bb1212\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_banner_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n<div id=\"pxl_banner_box-7bb1212-1869\" class=\"pxl-banner-box pxl-banner-box1 \" data-wow-delay=\"ms\">\r\n    <div class=\"pxl-banner-inner style3\">\r\n        <a class=\"pxl-inner-link\" href=\"https:\/\/enterconn.com\/itsecurity\/service\/seguridad-de-bases-de-datos\/\"><\/a>\r\n        <div class=\"row\">\r\n            <div class=\"col-sm-6\">\r\n                <div class=\"pxl-item-content\">\r\n                                            <h3 class=\"pxl-item-title\">\r\n                            Seguridad de Bases de Datos                        <\/h3>\r\n                                                                <div class=\"pxl-item-desc\">\r\n                            Datos financieros, Personales, operativos y estrat\u00e9gicos.                        <\/div>\r\n                                    <\/div>\r\n            <\/div>\r\n            <div class=\"col-sm-6\">\r\n                <div class=\"pxl-inner-section\">\r\n                                            <div class=\"pxl-item--img\">\r\n                            <img decoding=\"async\" class=\"\" src=\"https:\/\/enterconn.com\/itsecurity\/wp-content\/uploads\/2025\/10\/Seguridad-de-Bases-de-Datos.jpg\" width=\"800\" height=\"800\" alt=\"Seguridad de Bases de Datos\" title=\"Seguridad de Bases de Datos\" \/>                        <\/div>\r\n                                                                <div class=\"pxl-item-number\">\r\n                            02                        <\/div>\r\n                                    <\/div>\r\n            <\/div>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t<div class=\"elementor-element elementor-element-fc73929 e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"fc73929\" data-element_type=\"container\" data-e-type=\"container\"><div class=\"elementor-element elementor-element-b184c26 e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"b184c26\" data-element_type=\"container\" data-e-type=\"container\">\t\t<div class=\"elementor-element elementor-element-c46a081 elementor-widget elementor-widget-pxl_banner_box\" data-id=\"c46a081\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_banner_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n<div id=\"pxl_banner_box-c46a081-8511\" class=\"pxl-banner-box pxl-banner-box1 \" data-wow-delay=\"ms\">\r\n    <div class=\"pxl-banner-inner style3\">\r\n        <a class=\"pxl-inner-link\" href=\"https:\/\/enterconn.com\/itsecurity\/service\/gestion-de-identidades-y-accesos-iam-pam\/\"><\/a>\r\n        <div class=\"row\">\r\n            <div class=\"col-sm-6\">\r\n                <div class=\"pxl-item-content\">\r\n                                            <h3 class=\"pxl-item-title\">\r\n                            Gesti\u00f3n de Identidades y Accesos                        <\/h3>\r\n                                                                <div class=\"pxl-item-desc\">\r\n                             (IAM \/ PAM) Credenciales comprometidas,   incidentes de seguridad.                        <\/div>\r\n                                    <\/div>\r\n            <\/div>\r\n            <div class=\"col-sm-6\">\r\n                <div class=\"pxl-inner-section\">\r\n                                            <div class=\"pxl-item--img\">\r\n                            <img decoding=\"async\" class=\"\" src=\"https:\/\/enterconn.com\/itsecurity\/wp-content\/uploads\/2025\/10\/Gestion-de-Identidades-y-Accesos.jpg\" width=\"800\" height=\"800\" alt=\"Gesti\u00f3n de Identidades y Accesos\" title=\"Gesti\u00f3n de Identidades y Accesos\" \/>                        <\/div>\r\n                                                                <div class=\"pxl-item-number\">\r\n                            03                        <\/div>\r\n                                    <\/div>\r\n            <\/div>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\r\n\t\t<div class=\"elementor-element elementor-element-29f4762 e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"29f4762\" data-element_type=\"container\" data-e-type=\"container\">\t\t<div class=\"elementor-element elementor-element-4ffe35e elementor-widget elementor-widget-pxl_banner_box\" data-id=\"4ffe35e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_banner_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n<div id=\"pxl_banner_box-4ffe35e-9294\" class=\"pxl-banner-box pxl-banner-box1 \" data-wow-delay=\"ms\">\r\n    <div class=\"pxl-banner-inner style-default\">\r\n        <a class=\"pxl-inner-link\" href=\"https:\/\/enterconn.com\/itsecurity\/service\/deteccion-y-respuesta-ante-amenazas-edr-xdr-ndr-con-ia\/\"><\/a>\r\n        <div class=\"row\">\r\n            <div class=\"col-sm-6\">\r\n                <div class=\"pxl-item-content\">\r\n                                            <h3 class=\"pxl-item-title\">\r\n                            Detecci\u00f3n y Respuesta ante Amenazas (EDR \/ XDR \/ NDR con IA)                        <\/h3>\r\n                                                                <div class=\"pxl-item-desc\">\r\n                            Los ataques modernos son silenciosos y persistentes.                        <\/div>\r\n                                    <\/div>\r\n            <\/div>\r\n            <div class=\"col-sm-6\">\r\n                <div class=\"pxl-inner-section\">\r\n                                            <div class=\"pxl-item--img\">\r\n                            <img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/enterconn.com\/itsecurity\/wp-content\/uploads\/2025\/10\/Deteccion-y-Respuesta-ante-Amenazas.jpg\" width=\"800\" height=\"800\" alt=\"Detecci\u00f3n y Respuesta ante Amenazas\" title=\"Detecci\u00f3n y Respuesta ante Amenazas\" \/>                        <\/div>\r\n                                                                <div class=\"pxl-item-number\">\r\n                            04                        <\/div>\r\n                                    <\/div>\r\n            <\/div>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t<div class=\"elementor-element elementor-element-e7ba8d7 e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"e7ba8d7\" data-element_type=\"container\" data-e-type=\"container\"><div class=\"elementor-element elementor-element-fe4c7cb e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"fe4c7cb\" data-element_type=\"container\" data-e-type=\"container\"><div class=\"elementor-element elementor-element-8c7b6ba e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"8c7b6ba\" data-element_type=\"container\" data-e-type=\"container\">\t\t<div class=\"elementor-element elementor-element-3510c52 elementor-widget elementor-widget-pxl_banner_box\" data-id=\"3510c52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_banner_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n<div id=\"pxl_banner_box-3510c52-3452\" class=\"pxl-banner-box pxl-banner-box1 \" data-wow-delay=\"ms\">\r\n    <div class=\"pxl-banner-inner style-default\">\r\n        <a class=\"pxl-inner-link\" href=\"https:\/\/enterconn.com\/itsecurity\/service\/ethical-hacking-pen-testing\/\"><\/a>\r\n        <div class=\"row\">\r\n            <div class=\"col-sm-6\">\r\n                <div class=\"pxl-item-content\">\r\n                                            <h3 class=\"pxl-item-title\">\r\n                            Ethical Hacking &amp; Pen Testing                        <\/h3>\r\n                                                                <div class=\"pxl-item-desc\">\r\n                            Eval\u00faa la seguridad real de tu organizaci\u00f3n desde la perspectiva de un atacante.                        <\/div>\r\n                                    <\/div>\r\n            <\/div>\r\n            <div class=\"col-sm-6\">\r\n                <div class=\"pxl-inner-section\">\r\n                                            <div class=\"pxl-item--img\">\r\n                            <img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/enterconn.com\/itsecurity\/wp-content\/uploads\/2025\/10\/Ethical-Hacking-Pen-Testing.jpg\" width=\"800\" height=\"800\" alt=\"Ethical Hacking &amp; Pen Testing\" title=\"Ethical Hacking &amp; Pen Testing\" \/>                        <\/div>\r\n                                                                <div class=\"pxl-item-number\">\r\n                            05                        <\/div>\r\n                                    <\/div>\r\n            <\/div>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t<div class=\"elementor-element elementor-element-3d557c7 e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"3d557c7\" data-element_type=\"container\" data-e-type=\"container\">\t\t<div class=\"elementor-element elementor-element-95078c2 elementor-widget elementor-widget-pxl_banner_box\" data-id=\"95078c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_banner_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n<div id=\"pxl_banner_box-95078c2-5605\" class=\"pxl-banner-box pxl-banner-box1 \" data-wow-delay=\"ms\">\r\n    <div class=\"pxl-banner-inner style3\">\r\n        <a class=\"pxl-inner-link\" href=\"https:\/\/enterconn.com\/itsecurity\/service\/microsegmentacion-de-red\/\"><\/a>\r\n        <div class=\"row\">\r\n            <div class=\"col-sm-6\">\r\n                <div class=\"pxl-item-content\">\r\n                                            <h3 class=\"pxl-item-title\">\r\n                            Microsegmentaci\u00f3n de Red                        <\/h3>\r\n                                                                <div class=\"pxl-item-desc\">\r\n                            La microsegmentaci\u00f3n limita la propagaci\u00f3n de amenazas dentro de la red.                        <\/div>\r\n                                    <\/div>\r\n            <\/div>\r\n            <div class=\"col-sm-6\">\r\n                <div class=\"pxl-inner-section\">\r\n                                            <div class=\"pxl-item--img\">\r\n                            <img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/enterconn.com\/itsecurity\/wp-content\/uploads\/2025\/10\/Microsegmentacion-de-Red.jpg\" width=\"800\" height=\"800\" alt=\"Microsegmentaci\u00f3n de Red\" title=\"Microsegmentaci\u00f3n de Red\" \/>                        <\/div>\r\n                                                                <div class=\"pxl-item-number\">\r\n                            06                        <\/div>\r\n                                    <\/div>\r\n            <\/div>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t<div class=\"elementor-element elementor-element-50c2e20 e-flex e-con-boxed pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-parent \" data-id=\"50c2e20\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\t\t\t<div class=\"e-con-inner\">\r\n\t\t<div class=\"elementor-element elementor-element-4fa8b89 e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"4fa8b89\" data-element_type=\"container\" data-e-type=\"container\"><div class=\"elementor-element elementor-element-ddb9001 e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"ddb9001\" data-element_type=\"container\" data-e-type=\"container\">\t\t<div class=\"elementor-element elementor-element-ae89f64 elementor-widget elementor-widget-pxl_banner_box\" data-id=\"ae89f64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_banner_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n<div id=\"pxl_banner_box-ae89f64-8498\" class=\"pxl-banner-box pxl-banner-box1 \" data-wow-delay=\"ms\">\r\n    <div class=\"pxl-banner-inner style3\">\r\n        <a class=\"pxl-inner-link\" href=\"https:\/\/enterconn.com\/itsecurity\/service\/proteccion-de-marca-digital\/\"><\/a>\r\n        <div class=\"row\">\r\n            <div class=\"col-sm-6\">\r\n                <div class=\"pxl-item-content\">\r\n                                            <h3 class=\"pxl-item-title\">\r\n                            Protecci\u00f3n de Marca Digital                        <\/h3>\r\n                                                                <div class=\"pxl-item-desc\">\r\n                            Detectamos amenazas que puedan afectar la confianza de clientes y socios.                        <\/div>\r\n                                    <\/div>\r\n            <\/div>\r\n            <div class=\"col-sm-6\">\r\n                <div class=\"pxl-inner-section\">\r\n                                            <div class=\"pxl-item--img\">\r\n                            <img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/enterconn.com\/itsecurity\/wp-content\/uploads\/2026\/03\/Proteccion-de-Marca-Digital.jpg\" width=\"800\" height=\"800\" alt=\"Protecci\u00f3n de Marca Digital\" title=\"Protecci\u00f3n de Marca Digital\" \/>                        <\/div>\r\n                                                                <div class=\"pxl-item-number\">\r\n                            07                        <\/div>\r\n                                    <\/div>\r\n            <\/div>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\r\n\t\t<div class=\"elementor-element elementor-element-aaf38d4 e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"aaf38d4\" data-element_type=\"container\" data-e-type=\"container\">\t\t<div class=\"elementor-element elementor-element-3449026 elementor-widget elementor-widget-pxl_banner_box\" data-id=\"3449026\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_banner_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n<div id=\"pxl_banner_box-3449026-6590\" class=\"pxl-banner-box pxl-banner-box1 \" data-wow-delay=\"ms\">\r\n    <div class=\"pxl-banner-inner style-default\">\r\n        <a class=\"pxl-inner-link\" href=\"https:\/\/enterconn.com\/itsecurity\/service\/centro-de-operaciones-de-seguridad-soc-siem-soar\/\"><\/a>\r\n        <div class=\"row\">\r\n            <div class=\"col-sm-6\">\r\n                <div class=\"pxl-item-content\">\r\n                                            <h3 class=\"pxl-item-title\">\r\n                            Centro de Operaciones de Seguridad \u2013 SOC (SIEM \/ SOAR)                        <\/h3>\r\n                                                                <div class=\"pxl-item-desc\">\r\n                            Monitoreo y respuesta continua frente a incidentes de seguridad.                        <\/div>\r\n                                    <\/div>\r\n            <\/div>\r\n            <div class=\"col-sm-6\">\r\n                <div class=\"pxl-inner-section\">\r\n                                            <div class=\"pxl-item--img\">\r\n                            <img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/enterconn.com\/itsecurity\/wp-content\/uploads\/2026\/03\/Centro-de-Operaciones-de-Seguridad-SOC-SIEM-SOAR.jpg\" width=\"800\" height=\"800\" alt=\"Centro de Operaciones de Seguridad SOC-SIEM-SOAR\" title=\"Centro de Operaciones de Seguridad SOC-SIEM-SOAR\" \/>                        <\/div>\r\n                                                                <div class=\"pxl-item-number\">\r\n                            08                        <\/div>\r\n                                    <\/div>\r\n            <\/div>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t<div class=\"elementor-element elementor-element-34ad837 e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"34ad837\" data-element_type=\"container\" data-e-type=\"container\"><div class=\"elementor-element elementor-element-5faa244 e-con-full e-flex pxl-column-none pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-full-content-with-space-none pxl-bg-color-none pxl-section-overlay-none e-con e-child \" data-id=\"5faa244\" data-element_type=\"container\" data-e-type=\"container\">\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Seguridad de Aplicaciones y Web WAF \/ WAAP \/ DDoS Principales objetivos de ciberataques. 01 Seguridad de Bases de Datos Datos financieros, Personales, operativos y estrat\u00e9gicos. 02 Gesti\u00f3n de Identidades y Accesos (IAM \/ PAM) Credenciales comprometidas, incidentes de seguridad. 03 Detecci\u00f3n y Respuesta ante Amenazas (EDR \/ XDR \/ NDR con IA) Los ataques [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-12065","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/enterconn.com\/itsecurity\/wp-json\/wp\/v2\/pages\/12065","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enterconn.com\/itsecurity\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/enterconn.com\/itsecurity\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/enterconn.com\/itsecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/enterconn.com\/itsecurity\/wp-json\/wp\/v2\/comments?post=12065"}],"version-history":[{"count":31,"href":"https:\/\/enterconn.com\/itsecurity\/wp-json\/wp\/v2\/pages\/12065\/revisions"}],"predecessor-version":[{"id":17562,"href":"https:\/\/enterconn.com\/itsecurity\/wp-json\/wp\/v2\/pages\/12065\/revisions\/17562"}],"wp:attachment":[{"href":"https:\/\/enterconn.com\/itsecurity\/wp-json\/wp\/v2\/media?parent=12065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}