{"id":12,"date":"2015-12-28T01:44:36","date_gmt":"2015-12-28T06:44:36","guid":{"rendered":"https:\/\/kryptogenesis.com.co\/kportal\/?page_id=12"},"modified":"2019-12-05T00:26:02","modified_gmt":"2019-12-05T05:26:02","slug":"seguridad-tecnica","status":"publish","type":"page","link":"https:\/\/kryptogenesis.com.co\/?page_id=12","title":{"rendered":"Consultor\u00eda en Seguridad T\u00e9cnica"},"content":{"rendered":"<div id=\"pl-12\"  class=\"panel-layout\" ><div id=\"pg-12-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-12-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-12-0-0-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"0\" >\t\t\t<div class=\"textwidget\"><p style=\"text-align: justify;\"><strong><span style=\"color: #888888; font-size: small;\">El servicio de consultor&iacute;a en seguridad t&eacute;cnica, est&aacute; enfocado en proporcionarle a las organizaciones m&eacute;todos para proteger sus dispositivos hardware que pueden ser sensibles o confidenciales, en vista de que facilitan el acceso a la informaci&oacute;n privada de la empresa. Dichos mecanismos est&aacute;n basados en las buenas pr&aacute;cticas proporcionadas por la norma <span style=\"color: #33cccc;\">ISO 27000<\/span> y los diferentes est&aacute;ndares nacionales e internacionales conforme a los requerimientos del negocio.<\/span><\/strong><\/p><\/div>\n\t\t<\/div><\/div><div id=\"pgc-12-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-12-0-1-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"1\" >\t\t\t<div class=\"textwidget\"><p style=\"text-align: justify;\"><span style=\"font-size: small; color: #808080;\"><strong><span style=\"color: #ff6600;\">Kryptog&eacute;nesis IT Security<\/span>, le ofrece dise&ntilde;ar e implantar la seguridad f&iacute;sica a cualquier dispositivo electr&oacute;nico IT, desde el sistema operativo del hardware hasta sofisticado software de control o plataformas iCloud. Dicha implementaci&oacute;n se realizar&aacute; acorde a los resultados que arroje el an&aacute;lisis de seguridad que realice en la empresa.<\/strong><\/span><\/p><\/div>\n\t\t<\/div><\/div><div id=\"pgc-12-0-2\"  class=\"panel-grid-cell\" ><div id=\"panel-12-0-2-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"2\" >\t\t\t<div class=\"textwidget\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-121 aligncenter\" src=\"https:\/\/kryptogenesis.com.co\/kportal\/wp-content\/uploads\/2015\/12\/seguridad_tecnica.png\" alt=\"seguridad_tecnica\" width=\"256\" height=\"150\" srcset=\"https:\/\/kryptogenesis.com.co\/kportal\/wp-content\/uploads\/2015\/12\/seguridad_tecnica.png 1000w, https:\/\/kryptogenesis.com.co\/kportal\/wp-content\/uploads\/2015\/12\/seguridad_tecnica-300x176.png 300w, https:\/\/kryptogenesis.com.co\/kportal\/wp-content\/uploads\/2015\/12\/seguridad_tecnica-768x449.png 768w\" sizes=\"auto, (max-width: 256px) 100vw, 256px\" \/><\/div>\n\t\t<\/div><\/div><\/div><div id=\"pg-12-1\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-12-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-12-1-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"3\" ><div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span style=\"color: #808080; font-size: small;\"><strong>La consultor\u00eda se encargar\u00e1 de evaluar los siguientes componentes:<\/strong><\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pg-12-2\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-12-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-12-2-0-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"4\" ><div class=\"panel-widget-style panel-widget-style-for-12-2-0-0\" >\t\t\t<div class=\"textwidget\"><div class=\"O0\"><span style=\"color: #ffffff;\"><strong>&bull;Redes cableadas e inal&aacute;mbricas, y dispositivos m&oacute;viles<\/strong><\/span><\/div><\/div>\n\t\t<\/div><\/div><\/div><div id=\"pgc-12-2-1\"  class=\"panel-grid-cell\" ><div id=\"panel-12-2-1-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"5\" ><div class=\"panel-widget-style panel-widget-style-for-12-2-1-0\" >\t\t\t<div class=\"textwidget\"><div class=\"O0\"><span style=\"color: #ffffff;\"><strong>&bull;Seguridad en las aplicaciones y servicios web.<\/strong><\/span><\/div><\/div>\n\t\t<\/div><\/div><\/div><div id=\"pgc-12-2-2\"  class=\"panel-grid-cell\" ><div id=\"panel-12-2-2-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"6\" ><div class=\"panel-widget-style panel-widget-style-for-12-2-2-0\" >\t\t\t<div class=\"textwidget\"><div class=\"O0\"><span style=\"color: #ffffff;\"><strong>&bull;Bases de datos.<\/strong><\/span><\/div><\/div>\n\t\t<\/div><\/div><\/div><div id=\"pgc-12-2-3\"  class=\"panel-grid-cell\" ><div id=\"panel-12-2-3-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"7\" ><div class=\"panel-widget-style panel-widget-style-for-12-2-3-0\" >\t\t\t<div class=\"textwidget\"><div class=\"O0\"><span style=\"color: #ffffff;\"><strong>&bull;Sistemas operativos.<\/strong><\/span><\/div><\/div>\n\t\t<\/div><\/div><\/div><div id=\"pgc-12-2-4\"  class=\"panel-grid-cell\" ><div id=\"panel-12-2-4-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"8\" ><div class=\"panel-widget-style panel-widget-style-for-12-2-4-0\" >\t\t\t<div class=\"textwidget\"><div class=\"O0\"><span style=\"color: #ffffff;\"><strong>&bull;Sistemas SCADA<\/strong><\/span><\/div><\/div>\n\t\t<\/div><\/div><\/div><div id=\"pgc-12-2-5\"  class=\"panel-grid-cell\" ><div id=\"panel-12-2-5-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"9\" ><div class=\"panel-widget-style panel-widget-style-for-12-2-5-0\" >\t\t\t<div class=\"textwidget\"><div class=\"O0\"><span style=\"color: #ffffff;\"><strong>&bull;Sistemas de Control Industrial &ndash; SCI.<\/strong><\/span><\/div><\/div>\n\t\t<\/div><\/div><\/div><\/div><div id=\"pg-12-3\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-12-3-0\"  class=\"panel-grid-cell\" ><div id=\"panel-12-3-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"10\" ><div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><a href=\"https:\/\/kryptogenesis.com.co\/kportal\/cotizador\/\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-351 aligncenter\" src=\"https:\/\/kryptogenesis.com.co\/kportal\/wp-content\/uploads\/2016\/01\/cotice_aqui-kryptogenesis.gif\" alt=\"cotice_aqui-kryptogenesis\" width=\"171\" height=\"42\" \/><\/a><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>El servicio de consultor&iacute;a en seguridad t&eacute;cnica, est&aacute; enfocado en proporcionarle a las organizaciones m&eacute;todos para proteger sus dispositivos hardware que pueden ser sensibles o confidenciales, en vista de que facilitan el acceso a la informaci&oacute;n privada de la empresa. Dichos mecanismos est&aacute;n basados en las buenas pr&aacute;cticas proporcionadas por la norma ISO 27000 y [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":460,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-12","page","type-page","status-publish","hentry","post"],"_links":{"self":[{"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/pages\/12","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12"}],"version-history":[{"count":0,"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/pages\/12\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/pages\/460"}],"wp:attachment":[{"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}