{"id":285,"date":"2018-03-15T07:32:27","date_gmt":"2018-03-15T07:32:27","guid":{"rendered":"http:\/\/localhost\/icos\/?page_id=285"},"modified":"2023-03-21T15:20:25","modified_gmt":"2023-03-21T15:20:25","slug":"home-particle-animate","status":"publish","type":"page","link":"https:\/\/legal.com.py\/ciberseguridad\/","title":{"rendered":"Ciberseguridad"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb banner=\u00bbtrue\u00bb particles=\u00bbtrue\u00bb fullheight=\u00bbtrue\u00bb el_class=\u00bbmobile-center banner-particle banner-curb\u00bb][vc_column css_animation=\u00bbnone\u00bb offset=\u00bbvc_col-md-offset-1 vc_col-md-10&#8243; time=\u00bb0.5&#8243;][vc_empty_space height=\u00bb60px\u00bb][vc_column_text]<\/p>\n<div class=\"header-image-lobelia animated\" data-animate=\"fadeInUp\" data-delay=\"0.65\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-596 size-full aligncenter\" src=\"https:\/\/legal.com.py\/ciberseguridad\/wp-content\/uploads\/2022\/12\/slider.png\" alt=\"\" width=\"750\" height=\"423\" srcset=\"https:\/\/legal.com.py\/ciberseguridad\/wp-content\/uploads\/2022\/12\/slider.png 750w, https:\/\/legal.com.py\/ciberseguridad\/wp-content\/uploads\/2022\/12\/slider-300x169.png 300w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column css_animation=\u00bbnone\u00bb offset=\u00bbvc_col-md-offset-2 vc_col-md-8&#8243;][vc_column_text css=\u00bb.vc_custom_1672666673723{margin-bottom: 35px !important;}\u00bb el_class=\u00bbtext-center header-txt\u00bb]<\/p>\n<h1 class=\"animated\" data-animate=\"fadeInUp\" data-delay=\"0.95\">Ciberseguridad para tu empresa.<\/h1>\n<div class=\"page\" title=\"Page 2\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>Seguridad de la Informacio\u0301n y Ciberseguridad de su<\/p>\n<p>organizacio\u0301n bajo nuestra administracio\u0301n.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<ul class=\"btns animated\" data-animate=\"fadeInUp\" data-delay=\"1.15\">\n<li><a class=\"btn\" href=\"#nosotros\">Nosotros<\/a><\/li>\n<li><a class=\"btn btn-alt\" href=\"#servicios\">Servicios<\/a><\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbsection-pad section-bg nopb\u00bb el_id=\u00bbnosotros\u00bb][vc_column animate=\u00bbfadeInUp\u00bb offset=\u00bbvc_col-md-6&#8243; el_class=\u00bbres-m-bttm\u00bb time=\u00bb0.1&#8243;][vc_single_image image=\u00bb603&#8243; img_size=\u00bblarge\u00bb alignment=\u00bbcenter\u00bb style=\u00bbvc_box_shadow_circle_2&#8243;][\/vc_column][vc_column offset=\u00bbvc_col-md-offset-1 vc_col-md-5 vc_col-sm-offset-0&#8243;][vc_column_text css=\u00bb.vc_custom_1672238699197{margin-bottom: 18px !important;}\u00bb]<\/p>\n<h2 class=\"animated\" data-animate=\"fadeInUp\" data-delay=\".2\">Nosotros.<\/h2>\n<div class=\"page\" title=\"Page 2\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>Potencialice su negocio y transfiera los requerimientos de Seguridad de la Informacio\u0301n y Ciberseguridad de su organizacio\u0301n bajo nuestra administracio\u0301n, para posicionarse a la vanguardia de la industria de nivel global, a trave\u0301s de nuestros servicios cumpla con las exigencias establecidas por entes de control a nivel local e internacional. Transforme el corazo\u0301n tecnolo\u0301gico de su organizacio\u0301n para volverlo resiliente ante amenazas e incidentes ciberne\u0301ticos.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbsection-pad section-bg\u00bb el_id=\u00bbservicios\u00bb][vc_column offset=\u00bbvc_col-md-offset-2 vc_col-md-8 vc_col-sm-offset-0&#8243;]\n        <div class=\"section-head text-center\">\n                <h2 class=\"section-title animated\" data-animate=\"fadeInUp\" data-delay=\".1\">\n            Nuestros Servicios            <span>Servicios<\/span>        <\/h2>\n    <\/div>\n    \n[vc_empty_space height=\u00bb50px\u00bb][\/vc_column][vc_column width=\u00bb5\/12&#8243; animate=\u00bbfadeInUp\u00bb el_class=\u00bbres-m-btm\u00bb time=\u00bb0.3&#8243;][vc_single_image image=\u00bb609&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbcenter\u00bb][\/vc_column][vc_column width=\u00bb1\/2&#8243; animate=\u00bbfadeInUp\u00bb offset=\u00bbvc_col-sm-offset-1&#8243; time=\u00bb0.4&#8243;]\n\n        <div class=\"features-item-s2 d-flex  line\">\n        <div class=\"features-icon-s2\">\n            <img decoding=\"async\" src=\"https:\/\/legal.com.py\/ciberseguridad\/wp-content\/uploads\/2018\/06\/icon-decentralized.png\" alt=\"icon\">\n        <\/div>\n        <div class=\"features-texts-s2\">\n            <h5 class=\"features-title-s2\">Consultor\u00eda<\/h5>\n            <p><\/p>\n<div class=\"page\" title=\"Page 5\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>Diagno\u0301sticos de Ciberseguridad, Gobernanza de la Seguridad de la Informacio\u0301n, Continuidad del Negocio.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/p>\n        <\/div>\n    <\/div>\n    \n\n\n        <div class=\"features-item-s2 d-flex  line\">\n        <div class=\"features-icon-s2\">\n            <img decoding=\"async\" src=\"https:\/\/legal.com.py\/ciberseguridad\/wp-content\/uploads\/2018\/06\/icon-crowd.png\" alt=\"icon\">\n        <\/div>\n        <div class=\"features-texts-s2\">\n            <h5 class=\"features-title-s2\">Entrenamiento<\/h5>\n            <p><\/p>\n<div class=\"page\" title=\"Page 9\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>Capacitacio\u0301n en Seguridad de la Informacio\u0301n, Programas de Entrenamientos.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/p>\n        <\/div>\n    <\/div>\n    \n\n\n        <div class=\"features-item-s2 d-flex \">\n        <div class=\"features-icon-s2\">\n            <img decoding=\"async\" src=\"https:\/\/legal.com.py\/ciberseguridad\/wp-content\/uploads\/2018\/06\/icon-reward.png\" alt=\"icon\">\n        <\/div>\n        <div class=\"features-texts-s2\">\n            <h5 class=\"features-title-s2\">Virtual CISO<\/h5>\n            <p><\/p>\n<div class=\"page\" title=\"Page 12\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>Gestio\u0301n del riesgo de ciberseguridad, Asesori\u0301a en ciberseguridad, Gestio\u0301n de la seguridad de la informacio\u0301n.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/p>\n        <\/div>\n    <\/div>\n    \n[\/vc_column][\/vc_row][vc_row equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbsection-pad section-bg\u00bb][vc_column width=\u00bb5\/12&#8243; animate=\u00bbfadeInUp\u00bb el_class=\u00bbres-m-btm\u00bb time=\u00bb0.3&#8243;]\n\n        <div class=\"features-item-s2 d-flex  line\">\n        <div class=\"features-icon-s2\">\n            <img decoding=\"async\" src=\"https:\/\/legal.com.py\/ciberseguridad\/wp-content\/uploads\/2018\/06\/icon-decentralized.png\" alt=\"icon\">\n        <\/div>\n        <div class=\"features-texts-s2\">\n            <h5 class=\"features-title-s2\">SOC as a Service<\/h5>\n            <p><\/p>\n<div class=\"page\" title=\"Page 5\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 14\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>Respuesta a Incidentes Ciberne\u0301ticos, Gestio\u0301n de TI, Gestio\u0301n de la Ciberseguridad, Inteligencia de Amenazas Ciberne\u0301tica, Ana\u0301lisis de Forense Digital y Respuesta a Incidentes Ciberne\u0301ticos, Sistemas de Control Industrial.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/p>\n        <\/div>\n    <\/div>\n    \n\n\n        <div class=\"features-item-s2 d-flex  line\">\n        <div class=\"features-icon-s2\">\n            <img decoding=\"async\" src=\"https:\/\/legal.com.py\/ciberseguridad\/wp-content\/uploads\/2018\/06\/icon-crowd.png\" alt=\"icon\">\n        <\/div>\n        <div class=\"features-texts-s2\">\n            <h5 class=\"features-title-s2\">Emulaci\u00f3n de Adversario<\/h5>\n            <p><\/p>\n<div class=\"page\" title=\"Page 9\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 21\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>La emulacio\u0301n del adversario aprovecha las ta\u0301cticas, te\u0301cnicas y procedimientos del adversario, mejorados por la inteligencia de amenazas ciberne\u0301ticas, para crear una prueba de seguridad basada en campan\u0303as de intrusio\u0301n del mundo real.<\/p>\n<p>La emulacio\u0301n adversaria ayuda a las organizaciones a enfocar sus pruebas de seguridad para priorizar las amenazas que sus defensores pueden enfrentar cada di\u0301a.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/p>\n        <\/div>\n    <\/div>\n    \n\n\n        <div class=\"features-item-s2 d-flex \">\n        <div class=\"features-icon-s2\">\n            <img decoding=\"async\" src=\"https:\/\/legal.com.py\/ciberseguridad\/wp-content\/uploads\/2018\/06\/icon-reward.png\" alt=\"icon\">\n        <\/div>\n        <div class=\"features-texts-s2\">\n            <h5 class=\"features-title-s2\">Equipamiento<\/h5>\n            <p><\/p>\n<div class=\"page\" title=\"Page 12\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 22\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 23\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>Disen\u0303amos hardware de acuerdo a las necesidades de nuestros aliados, ofrecemos soluciones de hardware de todas las gamas desde networking, racks, servidores, estaciones de trabajo porta\u0301tiles y de escritorio para todos los requerimientos y organizaciones de todas las envergaduras.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/p>\n        <\/div>\n    <\/div>\n    \n[\/vc_column][vc_column width=\u00bb1\/2&#8243; animate=\u00bbfadeInUp\u00bb offset=\u00bbvc_col-sm-offset-1&#8243; time=\u00bb0.4&#8243;][vc_single_image image=\u00bb612&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbcenter\u00bb style=\u00bbvc_box_circle_2&#8243;][\/vc_column][\/vc_row][vc_row el_class=\u00bbsection-pad section-bg-alt\u00bb][vc_column][vc_row_inner][vc_column_inner width=\u00bb2\/3&#8243; offset=\u00bbvc_col-sm-offset-2&#8243;]\n        <div class=\"section-head text-center\">\n                <h2 class=\"section-title animated\" data-animate=\"fadeInUp\" data-delay=\".1\">\n            DIVISION MILITAR            <span>MILITAR<\/span>        <\/h2>\n    <\/div>\n    \n[vc_column_text css=\u00bb.vc_custom_1672245298300{margin-top: 50px !important;margin-bottom: 60px !important;}\u00bb el_class=\u00bbtext-center\u00bb]<\/p>\n<div class=\"page\" title=\"Page 25\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>Servicios para la Fuerzas Armadas.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb][vc_column_inner el_class=\u00bbres-m-btm\u00bb animate=\u00bbfadeInUp\u00bb offset=\u00bbvc_col-md-offset-1 vc_col-md-5&#8243; time=\u00bb0.3&#8243;][vc_single_image image=\u00bb617&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbcenter\u00bb style=\u00bbvc_box_circle_2&#8243; el_class=\u00bbimgfix\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bborder-last order-lg-first\u00bb offset=\u00bbvc_col-md-6&#8243;][vc_column_text]<\/p>\n<div class=\"text-block\">\n<div class=\"page\" title=\"Page 25\">\n<div class=\"section\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 25\">\n<div class=\"section\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<ul>\n<li>SIGINT &#8211; Signaling Intelligence (Inteligencia de Sen\u0303ales)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<ul>\n<li>Tactical Cloud (Nube Ta\u0301ctica)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<ul>\n<li>IMINT &#8211; Image Intelligence (Inteligencia de Ima\u0301genes)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<ul>\n<li>Signal Conflict (Conflicto de Sen\u0303ales)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<ul>\n<li>Cyber Offensive Capabilities (Capacidades Ofensivas Ciberne\u0301ticas)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<ul>\n<li>Strategic Command &amp; Control (Estrategia de Comando y Control)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<ul>\n<li>Cybersoldier Capabilities Training (Entrenamiento de Capacidades de Cibersoldado).<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbsection-pad section-bg\u00bb][vc_column offset=\u00bbvc_col-md-offset-2 vc_col-md-8 vc_col-sm-offset-0&#8243;]\n        <div class=\"section-head text-center\">\n                <h2 class=\"section-title animated\" data-animate=\"fadeInUp\" data-delay=\".1\">\n            Gesti\u00f3n de la Ciberseguridad            <span>Ciberseguridad<\/span>        <\/h2>\n    <\/div>\n    \n[vc_column_text css=\u00bb.vc_custom_1672245824317{margin-top: 50px !important;margin-bottom: 60px !important;}\u00bb el_class=\u00bbtext-center\u00bb]<\/p>\n<div class=\"page\" title=\"Page 25\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 16\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>Con el servicio de gestion de la ciberseguridad ofrecemos proteccio\u0301n de los activos de informacio\u0301n de la organizacio\u0301n, frente a las amenazas de ciberne\u0301ticas, algunas de las herramientas en nuestras implementaciones son:<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column animate=\u00bbfadeInUp\u00bb time=\u00bb0.3&#8243;][vc_row_inner el_class=\u00bbproblem-list\u00bb css=\u00bb.vc_custom_1529488984202{margin-right: 0px !important;margin-left: 0px !important;}\u00bb][vc_column_inner width=\u00bb1\/2&#8243; animate=\u00bbfadeInUp\u00bb time=\u00bb0.4&#8243;]\n\n    <div class=\"problem-item d-sm-flex d-block\">\n        <div class=\"problem-icon\">\n            <img decoding=\"async\" src=\"https:\/\/legal.com.py\/ciberseguridad\/wp-content\/uploads\/2022\/12\/SIEM.png\" alt=\"icon\">\n        <\/div>\n        <div class=\"problem-info\">\n            <h5 class=\"problem-title\">Sistema de Gesti\u00f3n de Eventos e Informaci\u00f3n de Seguridad<\/h5>\n                    <\/div>\n    <\/div>\n\n[\/vc_column_inner][vc_column_inner width=\u00bb1\/2&#8243; animate=\u00bbfadeInUp\u00bb time=\u00bb0.5&#8243;]\n\n    <div class=\"problem-item d-sm-flex d-block\">\n        <div class=\"problem-icon\">\n            <img decoding=\"async\" src=\"https:\/\/legal.com.py\/ciberseguridad\/wp-content\/uploads\/2022\/12\/Captura-de-Pantalla-2022-12-28-a-las-13.46.50.png\" alt=\"icon\">\n        <\/div>\n        <div class=\"problem-info\">\n            <h5 class=\"problem-title\">Firewall de Aplicaciones Web<\/h5>\n                    <\/div>\n    <\/div>\n\n[\/vc_column_inner][vc_column_inner width=\u00bb1\/2&#8243; animate=\u00bbfadeInUp\u00bb time=\u00bb0.6&#8243;]\n\n    <div class=\"problem-item d-sm-flex d-block\">\n        <div class=\"problem-icon\">\n            <img decoding=\"async\" src=\"https:\/\/legal.com.py\/ciberseguridad\/wp-content\/uploads\/2022\/12\/Captura-de-Pantalla-2022-12-28-a-las-13.49.52.png\" alt=\"icon\">\n        <\/div>\n        <div class=\"problem-info\">\n            <h5 class=\"problem-title\">Sistema de Detecci\u00f3n de Intrusiones \/ Sistema de Prevenci\u00f3n de Intrusiones<\/h5>\n                    <\/div>\n    <\/div>\n\n[\/vc_column_inner][vc_column_inner width=\u00bb1\/2&#8243; animate=\u00bbfadeInUp\u00bb time=\u00bb0.7&#8243;]\n\n    <div class=\"problem-item d-sm-flex d-block\">\n        <div class=\"problem-icon\">\n            <img decoding=\"async\" src=\"https:\/\/legal.com.py\/ciberseguridad\/wp-content\/uploads\/2022\/12\/qualys-multi-vector-edr.webp\" alt=\"icon\">\n        <\/div>\n        <div class=\"problem-info\">\n            <h5 class=\"problem-title\">Detecci\u00f3n y Respuesta de Endpoint<\/h5>\n                    <\/div>\n    <\/div>\n\n[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbsection-pad no-pt section-bg\u00bb][vc_column offset=\u00bbvc_col-md-offset-2 vc_col-md-8 vc_col-sm-offset-0&#8243;]\n        <div class=\"section-head text-center\">\n                <h2 class=\"section-title animated\" data-animate=\"fadeInUp\" data-delay=\".1\">\n            Continuidad del Negocio            <span>Continuidad del Negocio<\/span>        <\/h2>\n    <\/div>\n    \n[vc_column_text css=\u00bb.vc_custom_1672246673136{margin-top: 50px !important;margin-bottom: 60px !important;}\u00bb el_class=\u00bbtext-center\u00bb]<\/p>\n<div class=\"page\" title=\"Page 7\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>Acompan\u0303amos a nuestros clientes a proyectar una imagen tecnolo\u0301gica e innovadora.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column][vc_row_inner el_class=\u00bbsolution\u00bb][vc_column_inner width=\u00bb1\/2&#8243; animate=\u00bbfadeInUp\u00bb offset=\u00bbvc_col-md-3&#8243; time=\u00bb0.3&#8243;]\n\n        <div class=\" features-box text-center\">\n                <img decoding=\"async\" src=\"https:\/\/legal.com.py\/ciberseguridad\/wp-content\/uploads\/2022\/12\/check-mark.png\" alt=\"features\">\n                <h5>Plan de Continuidad del Negocio (BCP).<\/h5>\n        <p><\/p>\n    <\/div>\n    \n[\/vc_column_inner][vc_column_inner width=\u00bb1\/2&#8243; animate=\u00bbfadeInUp\u00bb offset=\u00bbvc_col-md-3&#8243; time=\u00bb0.4&#8243;]\n\n        <div class=\" features-box text-center\">\n                <img decoding=\"async\" src=\"https:\/\/legal.com.py\/ciberseguridad\/wp-content\/uploads\/2022\/12\/check-mark.png\" alt=\"features\">\n                <h5>An\u00e1lisis de Impacto al Negocio (BIA).<\/h5>\n        <p><\/p>\n    <\/div>\n    \n[\/vc_column_inner][vc_column_inner width=\u00bb1\/2&#8243; animate=\u00bbfadeInUp\u00bb offset=\u00bbvc_col-md-3&#8243; time=\u00bb0.5&#8243;]\n\n        <div class=\" features-box text-center\">\n                <img decoding=\"async\" src=\"https:\/\/legal.com.py\/ciberseguridad\/wp-content\/uploads\/2022\/12\/check-mark.png\" alt=\"features\">\n                <h5>Plan de Respuesta a Incidentes Cibern\u00e9ticos.<\/h5>\n        <p><\/p>\n    <\/div>\n    \n[\/vc_column_inner][vc_column_inner width=\u00bb1\/2&#8243; animate=\u00bbfadeInUp\u00bb offset=\u00bbvc_col-md-3&#8243; time=\u00bb0.6&#8243;]\n\n        <div class=\" features-box text-center\">\n                <img decoding=\"async\" src=\"https:\/\/legal.com.py\/ciberseguridad\/wp-content\/uploads\/2022\/12\/check-mark.png\" alt=\"features\">\n                <h5>Plan de Protecci\u00f3n de Infraestructura Cr\u00edtica (CIP).<\/h5>\n        <p><\/p>\n    <\/div>\n    \n[\/vc_column_inner][vc_column_inner width=\u00bb1\/2&#8243; animate=\u00bbfadeInUp\u00bb offset=\u00bbvc_col-md-3&#8243; time=\u00bb0.7&#8243;][\/vc_column_inner][vc_column_inner width=\u00bb1\/2&#8243; animate=\u00bbfadeInUp\u00bb offset=\u00bbvc_col-md-3&#8243; time=\u00bb0.8&#8243;]\n\n        <div class=\" features-box text-center\">\n                <img decoding=\"async\" src=\"https:\/\/legal.com.py\/ciberseguridad\/wp-content\/uploads\/2022\/12\/check-mark.png\" alt=\"features\">\n                <h5>Plan de Recuperaci\u00f3n de Desastres.<\/h5>\n        <p><\/p>\n    <\/div>\n    \n[\/vc_column_inner][vc_column_inner width=\u00bb1\/2&#8243; animate=\u00bbfadeInUp\u00bb offset=\u00bbvc_col-md-3&#8243; time=\u00bb0.9&#8243;]\n\n        <div class=\" features-box text-center\">\n                <img decoding=\"async\" src=\"https:\/\/legal.com.py\/ciberseguridad\/wp-content\/uploads\/2022\/12\/check-mark.png\" alt=\"features\">\n                <h5>Transformaci\u00f3n Digital.<\/h5>\n        <p><\/p>\n    <\/div>\n    \n[\/vc_column_inner][vc_column_inner width=\u00bb1\/2&#8243; animate=\u00bbfadeInUp\u00bb offset=\u00bbvc_col-md-3&#8243; time=\u00bb1&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbsection-pad section-bg-alt\u00bb el_id=\u00bbapplication\u00bb][vc_column offset=\u00bbvc_col-lg-offset-3 vc_col-lg-6 vc_col-md-offset-2 vc_col-md-8&#8243;]\n        <div class=\"section-head text-center\">\n                <h2 class=\"section-title animated\" data-animate=\"fadeInUp\" data-delay=\".1\">\n            Respuesta a Incidentes Cibern\u00e9ticos            <span>Respuesta<\/span>        <\/h2>\n    <\/div>\n    \n[\/vc_column][\/vc_row][vc_row equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbsection-pad section-bg-alt\u00bb][vc_column width=\u00bb1\/3&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_column_text]<\/p>\n<div class=\"text-block\">\n<div class=\"page\" title=\"Page 14\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>Desplegamos tareas de capacidad reactivas ante incidentes ciberne\u0301ticos, ofrecemos respuesta a incidentes, ana\u0301lisis del evento, contencio\u0301n, mitigacio\u0301n e informe del evento. Emisio\u0301n de alertas, recomendaciones basados en el esquema del cliente.<\/p>\n<\/div>\n<div class=\"page\" title=\"Page 14\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>Nuestros expertos se encargan de limitar el impacto a incidentes de seguridad en su entorno de TI y evitar la propagacio\u0301n del ataque.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"page\" title=\"Page 14\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>Para incidentes como violaciones de datos o ransomware, abordamos ra\u0301pidamente las inquietudes ma\u0301s urgentes. Nos movemos para aislar al atacante, analizar y contener la situacio\u0301n, identificar la causa rai\u0301z y disen\u0303ar estrategias para remediar los problemas subyacentes.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb5\/12&#8243;][vc_single_image image=\u00bb629&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbright\u00bb style=\u00bbvc_box_shadow_border\u00bb][\/vc_column][\/vc_row][vc_row el_class=\u00bbsection-pad section-bg\u00bb el_id=\u00bbcontact\u00bb][vc_column][vc_row_inner][vc_column_inner]\n        <div class=\"section-head text-center\">\n                <h2 class=\"section-title animated\" data-animate=\"fadeInUp\" data-delay=\".1\">\n            CONTACTAR CON NOSOTROS            <span>CONTACTOS<\/span>        <\/h2>\n    <\/div>\n    \n[\/vc_column_inner][\/vc_row_inner][vc_column_text el_class=\u00bbtext-center\u00bb css=\u00bb.vc_custom_1672247565192{margin-top: 50px !important;padding-bottom: 60px !important;}\u00bb]<\/p>\n<p class=\"animated\" data-animate=\"fadeInUp\" data-delay=\".2\">\u00bfTe interesa adquirir un servicio?, env\u00edanos un mensaje y contactaremos con usted.<\/p>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner animate=\u00bbfadeInUp\u00bb offset=\u00bbvc_col-md-offset-2 vc_col-md-8&#8243; time=\u00bb0.3&#8243;][vc_column_text css=\u00bb.vc_custom_1679412023676{padding-bottom: 60px !important;}\u00bb]<\/p>\n<p style=\"text-align: center;\"><em class=\"fa fa-phone\">WhatsApp +595 981 400926 |\u00a0 <\/em><i>Email info<\/i>@legal.com.py<\/p>\n<p>[\/vc_column_text]<div class=\"wpcf7 no-js\" id=\"wpcf7-f301-o1\" lang=\"en-US\" dir=\"ltr\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/ciberseguridad\/wp-json\/wp\/v2\/pages\/285#wpcf7-f301-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"301\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"5.7.2\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f301-o1\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/div>\n<div class=\"comment-form text-center\">\n\t<div class=\"form-results\">\n\t<\/div>\n\t<div class=\"input-field\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required input-line\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span><label class=\"input-title\">Tu Nombre & Apellido<\/label>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"input-field\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email input-line\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span><label class=\"input-title\">Tu Email<\/label>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"input-field\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-message\"><textarea cols=\"40\" rows=\"10\" class=\"wpcf7-form-control wpcf7-textarea input-line txtarea\" aria-invalid=\"false\" name=\"your-message\"><\/textarea><\/span><label class=\"input-title\">Tu mensaje<\/label>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"input-field\">\n\t\t<p><button type=\"submit\" class=\"btn\">Enviar<\/button>\n\t\t<\/p>\n\t<\/div>\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div><\/form><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb banner=\u00bbtrue\u00bb particles=\u00bbtrue\u00bb fullheight=\u00bbtrue\u00bb el_class=\u00bbmobile-center banner-particle banner-curb\u00bb][vc_column css_animation=\u00bbnone\u00bb offset=\u00bbvc_col-md-offset-1 vc_col-md-10&#8243; time=\u00bb0.5&#8243;][vc_empty_space height=\u00bb60px\u00bb][vc_column_text] [\/vc_column_text][\/vc_column][vc_column css_animation=\u00bbnone\u00bb offset=\u00bbvc_col-md-offset-2 vc_col-md-8&#8243;][vc_column_text css=\u00bb.vc_custom_1672666673723{margin-bottom: 35px !important;}\u00bb el_class=\u00bbtext-center header-txt\u00bb] Ciberseguridad para tu empresa. Seguridad de la Informacio\u0301n y Ciberseguridad de su organizacio\u0301n bajo nuestra administracio\u0301n. &nbsp; Nosotros Servicios [\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbsection-pad section-bg nopb\u00bb el_id=\u00bbnosotros\u00bb][vc_column animate=\u00bbfadeInUp\u00bb offset=\u00bbvc_col-md-6&#8243; el_class=\u00bbres-m-bttm\u00bb time=\u00bb0.1&#8243;][vc_single_image image=\u00bb603&#8243; img_size=\u00bblarge\u00bb [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/template-onepage.php","meta":{"footnotes":""},"class_list":["post-285","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/legal.com.py\/ciberseguridad\/wp-json\/wp\/v2\/pages\/285","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/legal.com.py\/ciberseguridad\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/legal.com.py\/ciberseguridad\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/legal.com.py\/ciberseguridad\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/legal.com.py\/ciberseguridad\/wp-json\/wp\/v2\/comments?post=285"}],"version-history":[{"count":42,"href":"https:\/\/legal.com.py\/ciberseguridad\/wp-json\/wp\/v2\/pages\/285\/revisions"}],"predecessor-version":[{"id":663,"href":"https:\/\/legal.com.py\/ciberseguridad\/wp-json\/wp\/v2\/pages\/285\/revisions\/663"}],"wp:attachment":[{"href":"https:\/\/legal.com.py\/ciberseguridad\/wp-json\/wp\/v2\/media?parent=285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}