{"id":48,"date":"2016-01-01T14:51:27","date_gmt":"2016-01-01T19:51:27","guid":{"rendered":"https:\/\/kryptogenesis.com.co\/kportal\/?page_id=48"},"modified":"2019-12-04T23:47:53","modified_gmt":"2019-12-05T04:47:53","slug":"outsourcing-en-seguridad-de-la-informacion","status":"publish","type":"page","link":"https:\/\/kryptogenesis.com.co\/?page_id=48","title":{"rendered":"Outsourcing en Seguridad de la Informaci\u00f3n"},"content":{"rendered":"<div id=\"pl-48\"  class=\"panel-layout\" ><div id=\"pg-48-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-48-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-48-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-108\" src=\"https:\/\/kryptogenesis.com.co\/kportal\/wp-content\/uploads\/2016\/01\/Outsourcing_en_tecnologias_de_la_informacion.jpg\" alt=\"outsourcing tecnologias de la informacion\" width=\"1200\" height=\"910\" srcset=\"https:\/\/kryptogenesis.com.co\/kportal\/wp-content\/uploads\/2016\/01\/Outsourcing_en_tecnologias_de_la_informacion.jpg 1000w, https:\/\/kryptogenesis.com.co\/kportal\/wp-content\/uploads\/2016\/01\/Outsourcing_en_tecnologias_de_la_informacion-300x227.jpg 300w, https:\/\/kryptogenesis.com.co\/kportal\/wp-content\/uploads\/2016\/01\/Outsourcing_en_tecnologias_de_la_informacion-768x582.jpg 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pg-48-1\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-48-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-48-1-0-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"1\" >\t\t\t<div class=\"textwidget\"><p style=\"text-align: justify;\" align=\"center\"><span style=\"font-size: small; color: #808080;\"><strong><span style=\"color: #ff6600;\">Kryptog&eacute;nesis IT Security<\/span>, ofrece el servicio de outsourcing a las diferentes organizaciones enfocado al fortalecimiento de tres principios claves: confidencialidad, integridad y disponibilidad, mediante el seguimiento de las buenas pr&aacute;cticas de la norma <span style=\"color: #33cccc;\">ISO 27000<\/span>,en busca de satisfacer la necesidad y demanda en los departamentos de T.I de las empresas en tener profesionales calificados y certificados en seguridad de la informaci&oacute;n, con el fin de garantizar la protecci&oacute;n de sus datos por medio de un ente externo.<\/strong><\/span><\/p><\/div>\n\t\t<\/div><\/div><div id=\"pgc-48-1-1\"  class=\"panel-grid-cell\" ><div id=\"panel-48-1-1-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"2\" >\t\t\t<div class=\"textwidget\"><p style=\"text-align: justify;\"><span style=\"color: #808080; font-size: small;\"><strong>Con este servicio, las empresas se benefician en aspectos tales como:<\/strong><\/span><\/p>\n<ul>\n    <li style=\"text-align: justify;\"><em><span style=\"color: #808080; font-size: small;\"><strong>Tener personal calificado para la protecci&oacute;n de su Infraestructura tecnol&oacute;gica.<\/strong><\/span><\/em><\/li>\n    <li style=\"text-align: justify;\"><em><span style=\"color: #808080; font-size: small;\"><strong>Garant&iacute;as en confidencialidad de la informaci&oacute;n administrada y protegida por el oficial de seguridad<\/strong><\/span><\/em><\/li>\n    <li style=\"text-align: justify;\"><em><span style=\"color: #808080; font-size: small;\"><strong>Calidad en el servicio de seguridad de la informaci&oacute;n.<\/strong><\/span><\/em><\/li>\n<\/ul><\/div>\n\t\t<\/div><\/div><div id=\"pgc-48-1-2\"  class=\"panel-grid-cell\" ><div id=\"panel-48-1-2-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"3\" >\t\t\t<div class=\"textwidget\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-248 aligncenter\" src=\"https:\/\/kryptogenesis.com.co\/kportal\/wp-content\/uploads\/2016\/04\/auditoria-icon-home-kryptogenesis.png\" alt=\"auditoria---icon-home-kryptogenesis\" width=\"183\" height=\"183\" srcset=\"https:\/\/kryptogenesis.com.co\/kportal\/wp-content\/uploads\/2016\/04\/auditoria-icon-home-kryptogenesis.png 250w, https:\/\/kryptogenesis.com.co\/kportal\/wp-content\/uploads\/2016\/04\/auditoria-icon-home-kryptogenesis-150x150.png 150w\" sizes=\"auto, (max-width: 183px) 100vw, 183px\" \/><\/div>\n\t\t<\/div><\/div><\/div><div id=\"pg-48-2\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-48-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-48-2-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"4\" ><div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p style=\"text-align: justify;\"><span style=\"font-size: medium; color: #808080;\"><strong>El alcance del servicio de Outsourcing en <span style=\"color: #339966;\">Seguridad<\/span> de la Informaci\u00f3n incluye:<\/strong><\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pg-48-3\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-48-3-0\"  class=\"panel-grid-cell\" ><div id=\"panel-48-3-0-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"5\" ><div class=\"panel-widget-style panel-widget-style-for-48-3-0-0\" >\t\t\t<div class=\"textwidget\"><div class=\"O0\"><strong><span style=\"color: #ffffff;\">&bull;Gesti&oacute;n de la estrategia de seguridad y el<\/span> <span style=\"color: #993300;\">SGSI<\/span><\/strong><\/div><\/div>\n\t\t<\/div><\/div><\/div><div id=\"pgc-48-3-1\"  class=\"panel-grid-cell\" ><div id=\"panel-48-3-1-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"6\" ><div class=\"panel-widget-style panel-widget-style-for-48-3-1-0\" >\t\t\t<div class=\"textwidget\"><div class=\"O0\"><span style=\"color: #ffffff;\"><strong>&bull;Gestion de los riesgos de seguridad de la informaci&oacute;n<\/strong><\/span><\/div><\/div>\n\t\t<\/div><\/div><\/div><div id=\"pgc-48-3-2\"  class=\"panel-grid-cell\" ><div id=\"panel-48-3-2-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"7\" ><div class=\"panel-widget-style panel-widget-style-for-48-3-2-0\" >\t\t\t<div class=\"textwidget\"><div class=\"O0\"><span style=\"color: #ffffff;\"><strong>&bull;Gesti\u00f3n de los incidentes de seguridad de la informaci&oacute;n<\/strong><\/span><\/div><\/div>\n\t\t<\/div><\/div><\/div><div id=\"pgc-48-3-3\"  class=\"panel-grid-cell\" ><div id=\"panel-48-3-3-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"8\" ><div class=\"panel-widget-style panel-widget-style-for-48-3-3-0\" >\t\t\t<div class=\"textwidget\"><div class=\"O0\"><span style=\"color: #ffffff;\"><strong>&bull;Gesti\u00f3n de las vulnerabilidades y amenazas de seguridad de la informaci&oacute;n<\/strong><\/span><\/div><\/div>\n\t\t<\/div><\/div><\/div><div id=\"pgc-48-3-4\"  class=\"panel-grid-cell\" ><div id=\"panel-48-3-4-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"9\" ><div class=\"panel-widget-style panel-widget-style-for-48-3-4-0\" >\t\t\t<div class=\"textwidget\"><div class=\"O0\"><span style=\"color: #ffffff;\"><strong>&bull;Gesti\u00f3n de la sensibilizaci&oacute;n en seguridad de la informaci&oacute;n<\/strong><\/span><\/div><\/div>\n\t\t<\/div><\/div><\/div><div id=\"pgc-48-3-5\"  class=\"panel-grid-cell\" ><div id=\"panel-48-3-5-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"10\" ><div class=\"panel-widget-style panel-widget-style-for-48-3-5-0\" >\t\t\t<div class=\"textwidget\"><div class=\"O0\"><span style=\"color: #ffffff;\"><strong>&bull;Gesti\u00f3n de el cumplimiento regulatorio relacionado con la seguridad<\/strong><\/span><\/div><\/div>\n\t\t<\/div><\/div><\/div><\/div><div id=\"pg-48-4\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-48-4-0\"  class=\"panel-grid-cell\" ><div id=\"panel-48-4-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"11\" ><div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><a href=\"https:\/\/kryptogenesis.com.co\/kportal\/cotizador\/\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-351 aligncenter\" src=\"https:\/\/kryptogenesis.com.co\/kportal\/wp-content\/uploads\/2016\/01\/cotice_aqui-kryptogenesis.gif\" alt=\"cotice_aqui-kryptogenesis\" width=\"171\" height=\"42\" \/><\/a><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Kryptog&eacute;nesis IT Security, ofrece el servicio de outsourcing a las diferentes organizaciones enfocado al fortalecimiento de tres principios claves: confidencialidad, integridad y disponibilidad, mediante el seguimiento de las buenas pr&aacute;cticas de la norma ISO 27000,en busca de satisfacer la necesidad y demanda en los departamentos de T.I de las empresas en tener profesionales calificados y [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":5,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-48","page","type-page","status-publish","hentry","post"],"_links":{"self":[{"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/pages\/48","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=48"}],"version-history":[{"count":0,"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/pages\/48\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/pages\/5"}],"wp:attachment":[{"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=48"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}