{"id":7240,"date":"2024-02-17T14:22:23","date_gmt":"2024-02-17T14:22:23","guid":{"rendered":"https:\/\/etek.com\/es\/?post_type=services&#038;p=7240"},"modified":"2024-03-05T14:08:11","modified_gmt":"2024-03-05T14:08:11","slug":"inteligencia-de-amenazas","status":"publish","type":"services","link":"https:\/\/etek.com\/es\/services\/inteligencia-de-amenazas\/","title":{"rendered":"Inteligencia de Amenazas"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7240\" class=\"elementor elementor-7240\" data-elementor-post-type=\"services\">\n\t\t\t\t<div class=\"elementor-element elementor-element-04fd637 e-flex e-con-boxed e-con e-parent\" data-id=\"04fd637\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a75a13f e-con-full e-flex e-con e-child\" data-id=\"a75a13f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52ebbc9 elementor-hidden-desktop elementor-widget elementor-widget-text-editor\" data-id=\"52ebbc9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 13-03-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\tInicio > Servicios > <strong>Inteligencia de amenazas<\/strong>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-358d632 elementor-widget elementor-widget-heading\" data-id=\"358d632\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 13-03-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h1 class=\"elementor-heading-title elementor-size-default\">La inteligencia temprana importa<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-755e8fc elementor-widget elementor-widget-text-editor\" data-id=\"755e8fc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tIdentificar una amenaza potencial tempranamente antes de que se materialice una exposici\u00f3n al riesgo marca la diferencia para una organizaci\u00f3n que se toma en serio la protecci\u00f3n de sus objetivos comerciales en un panorama din\u00e1mico y constantemente desafiante.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1f7cccb e-con-full e-flex e-con e-child\" data-id=\"1f7cccb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d76800 fordesktop elementor-widget elementor-widget-image\" data-id=\"6d76800\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 13-03-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"389\" height=\"385\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/arrow-bg.png\" class=\"attachment-large size-large wp-image-181\" alt=\"\" srcset=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/arrow-bg.png 389w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/arrow-bg-300x297.png 300w\" sizes=\"(max-width: 389px) 100vw, 389px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-776fb80 e-con-full e-flex e-con e-child\" data-id=\"776fb80\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b95db52 elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-text-editor\" data-id=\"b95db52\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tInicio > Servicios > <strong>Inteligencia de amenazas<\/strong>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6973769 elementor-widget elementor-widget-image\" data-id=\"6973769\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"549\" height=\"331\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/threatintelligence.png\" class=\"attachment-large size-large wp-image-5225\" alt=\"\" srcset=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/threatintelligence.png 549w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/threatintelligence-300x181.png 300w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/threatintelligence-370x223.png 370w\" sizes=\"(max-width: 549px) 100vw, 549px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cc1ec2e e-flex e-con-boxed e-con e-parent\" data-id=\"cc1ec2e\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e92797e e-flex e-con-boxed e-con e-child\" data-id=\"e92797e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a33e2f0 elementor-widget elementor-widget-heading\" data-id=\"a33e2f0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Identificar y mitigar riesgos en la superficie digital externa<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-349c7cf elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"349c7cf\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 13-03-2024 *\/\n.elementor-widget-divider{--divider-border-style:none;--divider-border-width:1px;--divider-color:#0c0d0e;--divider-icon-size:20px;--divider-element-spacing:10px;--divider-pattern-height:24px;--divider-pattern-size:20px;--divider-pattern-url:none;--divider-pattern-repeat:repeat-x}.elementor-widget-divider .elementor-divider{display:flex}.elementor-widget-divider .elementor-divider__text{font-size:15px;line-height:1;max-width:95%}.elementor-widget-divider .elementor-divider__element{margin:0 var(--divider-element-spacing);flex-shrink:0}.elementor-widget-divider .elementor-icon{font-size:var(--divider-icon-size)}.elementor-widget-divider .elementor-divider-separator{display:flex;margin:0;direction:ltr}.elementor-widget-divider--view-line_icon .elementor-divider-separator,.elementor-widget-divider--view-line_text .elementor-divider-separator{align-items:center}.elementor-widget-divider--view-line_icon .elementor-divider-separator:after,.elementor-widget-divider--view-line_icon .elementor-divider-separator:before,.elementor-widget-divider--view-line_text .elementor-divider-separator:after,.elementor-widget-divider--view-line_text .elementor-divider-separator:before{display:block;content:\"\";border-block-end:0;flex-grow:1;border-block-start:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--element-align-left .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-left .elementor-divider-separator:before{content:none}.elementor-widget-divider--element-align-left .elementor-divider__element{margin-left:0}.elementor-widget-divider--element-align-right .elementor-divider .elementor-divider-separator>.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-right .elementor-divider-separator:after{content:none}.elementor-widget-divider--element-align-right .elementor-divider__element{margin-right:0}.elementor-widget-divider--element-align-start .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-start .elementor-divider-separator:before{content:none}.elementor-widget-divider--element-align-start .elementor-divider__element{margin-inline-start:0}.elementor-widget-divider--element-align-end .elementor-divider .elementor-divider-separator>.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-end .elementor-divider-separator:after{content:none}.elementor-widget-divider--element-align-end .elementor-divider__element{margin-inline-end:0}.elementor-widget-divider:not(.elementor-widget-divider--view-line_text):not(.elementor-widget-divider--view-line_icon) .elementor-divider-separator{border-block-start:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--separator-type-pattern{--divider-border-style:none}.elementor-widget-divider--separator-type-pattern.elementor-widget-divider--view-line .elementor-divider-separator,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:after,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:before,.elementor-widget-divider--separator-type-pattern:not([class*=elementor-widget-divider--view]) .elementor-divider-separator{width:100%;min-height:var(--divider-pattern-height);-webkit-mask-size:var(--divider-pattern-size) 100%;mask-size:var(--divider-pattern-size) 100%;-webkit-mask-repeat:var(--divider-pattern-repeat);mask-repeat:var(--divider-pattern-repeat);background-color:var(--divider-color);-webkit-mask-image:var(--divider-pattern-url);mask-image:var(--divider-pattern-url)}.elementor-widget-divider--no-spacing{--divider-pattern-size:auto}.elementor-widget-divider--bg-round{--divider-pattern-repeat:round}.rtl .elementor-widget-divider .elementor-divider__text{direction:rtl}.e-con-inner>.elementor-widget-divider,.e-con>.elementor-widget-divider{width:var(--container-widget-width,100%);--flex-grow:var(--container-widget-flex-grow)}<\/style>\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2364d56 elementor-widget elementor-widget-text-editor\" data-id=\"2364d56\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tAnticipar una ciberamenaza externa que pueda materializar un riesgo es actualmente un imperativo que implica tener total visibilidad, reactividad y agilidad a la hora de tomar decisiones de mitigaci\u00f3n.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-300418b e-flex e-con-boxed e-con e-parent\" data-id=\"300418b\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-87eac3f e-flex e-con-boxed e-con e-child\" data-id=\"87eac3f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a898603 e-flex e-con-boxed e-con e-child\" data-id=\"a898603\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e0e7e79 elementor-widget elementor-widget-image\" data-id=\"e0e7e79\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/S1.svg\" title=\"S1\" alt=\"S1\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96fc05b elementor-widget elementor-widget-heading\" data-id=\"96fc05b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Visibilidad limitada en la superficie exterior.<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b87eef elementor-widget elementor-widget-text-editor\" data-id=\"0b87eef\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tLa cobertura limitada de la superficie de ataque externa reduce las posibilidades de ser eficaz a la hora de identificar y contener los riesgos empresariales.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5afdb78 e-flex e-con-boxed e-con e-child\" data-id=\"5afdb78\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f389554 e-flex e-con-boxed e-con e-child\" data-id=\"f389554\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-274a791 elementor-widget elementor-widget-image\" data-id=\"274a791\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/S2.svg\" title=\"S2\" alt=\"S2\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85862ea elementor-widget elementor-widget-heading\" data-id=\"85862ea\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Tomar decisiones informadas de manera oportuna<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e73e5a8 elementor-widget elementor-widget-text-editor\" data-id=\"e73e5a8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\u00bfC\u00f3mo validar en muy poco tiempo la amenaza es real y c\u00f3mo afecta su impacto al negocio?\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8ca469d e-flex e-con-boxed e-con e-child\" data-id=\"8ca469d\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e513151 e-flex e-con-boxed e-con e-child\" data-id=\"e513151\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-caf99d4 elementor-widget elementor-widget-image\" data-id=\"caf99d4\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/S4.svg\" title=\"S4\" alt=\"S4\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-daa10de elementor-widget elementor-widget-heading\" data-id=\"daa10de\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfCu\u00e1l es la mejor manera de responder a un incidente?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c18b53a elementor-widget elementor-widget-text-editor\" data-id=\"c18b53a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tLas acciones que conduzcan a una mitigaci\u00f3n efectiva de la amenaza actual requieren una buena comprensi\u00f3n de las capacidades y las mejores alternativas de soluci\u00f3n.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ff25bba e-flex e-con-boxed e-con e-parent\" data-id=\"ff25bba\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-eed97bf e-con-full e-flex e-con e-child\" data-id=\"eed97bf\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-22f5454 elementor-widget elementor-widget-image\" data-id=\"22f5454\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/elementor\/thumbs\/arrow-bg-qgauib3ey70t97t165hclcx3wo7vxr682fft2sa2e2.png\" title=\"arrow bg\" alt=\"arrow bg\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-982a775 e-con-full e-flex e-con e-child\" data-id=\"982a775\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1901bf4 e-flex e-con-boxed e-con e-child\" data-id=\"1901bf4\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df32e2b elementor-widget elementor-widget-heading\" data-id=\"df32e2b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfC\u00f3mo apoya ETEK la consecuci\u00f3n de estos desaf\u00edos?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f3b2dd elementor-widget elementor-widget-text-editor\" data-id=\"2f3b2dd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tNuestro servicio se centra en una visi\u00f3n unificada de la huella de riesgo digital en la Surface, Deep y Dark Web y cubre las siguientes capacidades. *Gesti\u00f3n del riesgo de reputaci\u00f3n de marca. *Monitoreo de Darkweb e inteligencia sobre delitos cibern\u00e9ticos. *Reducci\u00f3n de la superficie de ciberataque. *Gesti\u00f3n de riesgos en la cadena de suministro. *Mejora de las capacidades de respuesta a incidentes.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2d710a4 e-flex e-con-boxed e-con e-parent\" data-id=\"2d710a4\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9b23672 elementor-widget elementor-widget-spacer\" data-id=\"9b23672\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 13-03-2024 *\/\n.elementor-column .elementor-spacer-inner{height:var(--spacer-size)}.e-con{--container-widget-width:100%}.e-con-inner>.elementor-widget-spacer,.e-con>.elementor-widget-spacer{width:var(--container-widget-width,var(--spacer-size));--align-self:var(--container-widget-align-self,initial);--flex-shrink:0}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container,.e-con>.elementor-widget-spacer>.elementor-widget-container{height:100%;width:100%}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer{height:100%}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner{height:var(--container-widget-height,var(--spacer-size))}.e-con-inner>.elementor-widget-spacer.elementor-widget-empty,.e-con>.elementor-widget-spacer.elementor-widget-empty{position:relative;min-height:22px;min-width:22px}.e-con-inner>.elementor-widget-spacer.elementor-widget-empty .elementor-widget-empty-icon,.e-con>.elementor-widget-spacer.elementor-widget-empty .elementor-widget-empty-icon{position:absolute;top:0;bottom:0;left:0;right:0;margin:auto;padding:0;width:22px;height:22px}<\/style>\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f5cb5b1 e-flex e-con-boxed e-con e-parent\" data-id=\"f5cb5b1\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a5c48b6 e-con-full e-flex e-con e-child\" data-id=\"a5c48b6\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e6566d elementor-widget elementor-widget-heading\" data-id=\"3e6566d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Detecci\u00f3n temprana de lo que importa<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4c218d elementor-widget elementor-widget-text-editor\" data-id=\"f4c218d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t&#8220;Conc\u00e9ntrese en proporcionar una visibilidad unificada y profunda del panorama de amenazas a trav\u00e9s del descubrimiento, recopilaci\u00f3n y an\u00e1lisis de inteligencia sobre amenazas cibern\u00e9ticas de la web profunda y la web superficial de la web oscura.\n&#8220;\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7d3d656 e-con-full e-flex e-con e-child\" data-id=\"7d3d656\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c5bc70 e-con-full e-flex e-con e-child\" data-id=\"0c5bc70\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c3eb176 elementor-widget elementor-widget-heading\" data-id=\"c3eb176\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u25cf Visibilidad del cibercrimen en Internet<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-514ec73 elementor-widget elementor-widget-text-editor\" data-id=\"514ec73\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t90% de visibilidad en los mercados de delitos cibern\u00e9ticos. 10 veces m\u00e1s cobertura que cualquier otra soluci\u00f3n. Procesamiento de m\u00e1s de 300 mil millones de registros de Deep &#038; Dark Web y m\u00e1s de 15 mil millones de p\u00e1ginas monitoreadas por d\u00eda.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2447fb6 elementor-widget elementor-widget-heading\" data-id=\"2447fb6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u25cf Equipo propio de analistas<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c0f1c1 elementor-widget elementor-widget-text-editor\" data-id=\"7c0f1c1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tTodas las actividades de an\u00e1lisis e investigaci\u00f3n de delitos cibern\u00e9ticos son realizadas por un equipo interno de analistas. No se indexa informaci\u00f3n de terceros.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f0e0815 elementor-widget elementor-widget-heading\" data-id=\"f0e0815\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u25cf Uso de IA y aprendizaje autom\u00e1tico<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61b299d elementor-widget elementor-widget-text-editor\" data-id=\"61b299d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tAlertas priorizadas y automatizaci\u00f3n del flujo de trabajo mediante IA y ML (pendiente de patente).\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-279d056 elementor-widget elementor-widget-heading\" data-id=\"279d056\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u25cf Apoyo continuo<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-256ea2c elementor-widget elementor-widget-text-editor\" data-id=\"256ea2c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tETEK no s\u00f3lo reporta alertas derivadas de la inteligencia de amenazas, sino que acompa\u00f1a todo el proceso de investigaci\u00f3n y contenci\u00f3n de riesgos digitales asociados al cibercrimen.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0433ec1 e-flex e-con-boxed e-con e-parent\" data-id=\"0433ec1\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aadcc30 elementor-widget elementor-widget-spacer\" data-id=\"aadcc30\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-05ebc1d e-flex e-con-boxed e-con e-parent\" data-id=\"05ebc1d\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-beac29f e-con-full e-flex e-con e-child\" data-id=\"beac29f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d93764c elementor-widget elementor-widget-heading\" data-id=\"d93764c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Inteligencia sobre amenazas a lo largo del ciclo de vida de la infracci\u00f3n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c68ba5 elementor-widget elementor-widget-text-editor\" data-id=\"4c68ba5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tConc\u00e9ntrese en proporcionar una visibilidad unificada y profunda del panorama de amenazas a trav\u00e9s del descubrimiento, recopilaci\u00f3n, an\u00e1lisis y s\u00edntesis continuos de inteligencia sobre amenazas cibern\u00e9ticas de la web profunda y la web superficial de la web oscura.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22051d6 elementor-widget elementor-widget-heading\" data-id=\"22051d6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Gesti\u00f3n de la superficie de ataque<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7f47fb elementor-widget elementor-widget-text-editor\" data-id=\"b7f47fb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tNuestra capacidad de gesti\u00f3n de la superficie de ataque le permite enumerar y evaluar continuamente el riesgo de los activos que son p\u00fablicos en Internet.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0dea833 e-con-full e-flex e-con e-child\" data-id=\"0dea833\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ed2f16a fordesktop elementor-widget elementor-widget-image\" data-id=\"ed2f16a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"504\" height=\"330\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/service-box.png\" class=\"attachment-large size-large wp-image-695\" alt=\"\" srcset=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/service-box.png 504w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/service-box-300x196.png 300w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/elementor\/thumbs\/service-box-150x150.png 503w\" sizes=\"(max-width: 504px) 100vw, 504px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aebf97b e-flex e-con-boxed e-con e-parent\" data-id=\"aebf97b\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f9fd519 e-con-full e-flex e-con e-child\" data-id=\"f9fd519\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a64ccd fordesktop elementor-widget elementor-widget-image\" data-id=\"3a64ccd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"504\" height=\"330\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/service-box.png\" class=\"attachment-large size-large wp-image-695\" alt=\"\" srcset=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/service-box.png 504w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/service-box-300x196.png 300w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/elementor\/thumbs\/service-box-150x150.png 503w\" sizes=\"(max-width: 504px) 100vw, 504px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f8e8927 e-con-full e-flex e-con e-child\" data-id=\"f8e8927\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5027172 elementor-widget elementor-widget-heading\" data-id=\"5027172\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Inteligencia en la Web Oscura y Delitos Cibern\u00e9ticos<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-407ffdd elementor-widget elementor-widget-text-editor\" data-id=\"407ffdd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tCombinaci\u00f3n de experiencia t\u00e9cnica y poder de Big Data para entregar se\u00f1ales de alerta temprana de inteligencia sobre amenazas en la Deep y Dark Web.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-efffc8e elementor-widget elementor-widget-heading\" data-id=\"efffc8e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Inteligencia en la Web Oscura y Delitos Cibern\u00e9ticos<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23ba488 elementor-widget elementor-widget-text-editor\" data-id=\"23ba488\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tCobertura completa de los vectores de amenazas que utilizan los ciberdelincuentes para lanzar ataques destinados a afectar a la marca.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-33f97fa e-flex e-con-boxed e-con e-parent\" data-id=\"33f97fa\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-17106f0 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"17106f0\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-689caf5 e-flex e-con-boxed e-con e-parent\" data-id=\"689caf5\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e320c2b e-con-full e-flex e-con e-child\" data-id=\"e320c2b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c3ba1a elementor-widget elementor-widget-heading\" data-id=\"5c3ba1a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Inteligencia de amenazas<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-424c43f elementor-widget elementor-widget-text-editor\" data-id=\"424c43f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tPreguntas clave formuladas por nuestros clientes.\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2fbb8c6 elementor-widget elementor-widget-button\" data-id=\"2fbb8c6\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">More FAQ's<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c2a8cc e-con-full e-flex e-con e-child\" data-id=\"0c2a8cc\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-759c4ea elementor-widget elementor-widget-elementskit-accordion\" data-id=\"759c4ea\" data-element_type=\"widget\" data-widget_type=\"elementskit-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" >\n        <div class=\"elementskit-accordion accoedion-primary\" id=\"accordion-69e6ecb56a299\">\n\n            \n                <div class=\"elementskit-card active\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-0-759c4ea\">\n                        <a href=\"#collapse-281e6fb69e6ecb56a299\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-281e6fb69e6ecb56a299\" aria-expanded=\"true\" aria-controls=\"Collapse-281e6fb69e6ecb56a299\">\n                            \n                            <span class=\"ekit-accordion-title\">\u00bfQu\u00e9 diferencia a esta soluci\u00f3n de otras soluciones de inteligencia contra amenazas del mercado?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-open icon-right icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-closed icon-right icon icon-up-arrow\"><\/i>                                    <\/div>\n\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-281e6fb69e6ecb56a299\" class=\" show collapse\" aria-labelledby=\"primaryHeading-0-759c4ea\" data-parent=\"#accordion-69e6ecb56a299\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            Visibilidad de 360\u00b0 en la superficie de ataque externa. Presencia en el 90% de los mercados de cibercrimen. +200 mil millones de registros escaneados en DeepWeb. +50 mil millones de indicadores de amenaza identificados. M\u00e1s de 400 millones de activos digitales monitoreados. Soporte continuo durante todo el ciclo de incumplimiento (antes, durante y despu\u00e9s).                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-1-759c4ea\">\n                        <a href=\"#collapse-a2f33a769e6ecb56a299\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-a2f33a769e6ecb56a299\" aria-expanded=\"false\" aria-controls=\"Collapse-a2f33a769e6ecb56a299\">\n                            \n                            <span class=\"ekit-accordion-title\">\u00bfQu\u00e9 casos de uso cubre la soluci\u00f3n en general?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-open icon-right icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-closed icon-right icon icon-up-arrow\"><\/i>                                    <\/div>\n\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-a2f33a769e6ecb56a299\" class=\" collapse\" aria-labelledby=\"primaryHeading-1-759c4ea\" data-parent=\"#accordion-69e6ecb56a299\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            El servicio ofrece seis capacidades que se enumeran a continuaci\u00f3n y 32 par\u00e1metros de b\u00fasqueda para brindar inteligencia sobre amenazas de 360 \u200b\u200bgrados. *Monitoreo de reputaci\u00f3n de marca *Detecci\u00f3n de superficies de ataque *Monitoreo de Internet oscuro y abierto *Inteligencia sobre delitos cibern\u00e9ticos *Puntuaci\u00f3n cibern\u00e9tica de terceros *Inteligencia sobre amenazas                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-2-759c4ea\">\n                        <a href=\"#collapse-0679d8d69e6ecb56a299\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-0679d8d69e6ecb56a299\" aria-expanded=\"false\" aria-controls=\"Collapse-0679d8d69e6ecb56a299\">\n                            \n                            <span class=\"ekit-accordion-title\">\u00bfQu\u00e9 capacidades de respuesta a incidentes tiene el servicio?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-open icon-right icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-closed icon-right icon icon-up-arrow\"><\/i>                                    <\/div>\n\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-0679d8d69e6ecb56a299\" class=\" collapse\" aria-labelledby=\"primaryHeading-2-759c4ea\" data-parent=\"#accordion-69e6ecb56a299\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            Para amenazas asociadas a Phishing o abuso de marca es posible aplicar TakeDowns con un tiempo promedio de 6 - 8 horas. Para los ataques provenientes de actores de amenazas Deep &amp; DarkWeb, el servicio puede respaldar actividades de validaci\u00f3n y contenci\u00f3n contactando directamente a los actores de amenazas.                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                        <\/div>\n    <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f7aadc8 e-con-full etek-gradient e-flex e-con e-parent\" data-id=\"f7aadc8\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\" data-core-v316-plus=\"true\">\n\t\t<div class=\"elementor-element elementor-element-8da19d7 e-flex e-con-boxed e-con e-child\" data-id=\"8da19d7\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-72c5281 e-flex e-con-boxed e-con e-child\" data-id=\"72c5281\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a643a4b elementor-widget elementor-widget-counter\" data-id=\"a643a4b\" data-element_type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 13-03-2024 *\/\n.elementor-counter .elementor-counter-number-wrapper{display:flex;font-size:69px;font-weight:600;line-height:1}.elementor-counter .elementor-counter-number-prefix,.elementor-counter .elementor-counter-number-suffix{flex-grow:1;white-space:pre-wrap}.elementor-counter .elementor-counter-number-prefix{text-align:right}.elementor-counter .elementor-counter-number-suffix{text-align:left}.elementor-counter .elementor-counter-title{text-align:center;font-size:19px;font-weight:400;line-height:2.5}<\/style>\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"350\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\"><\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-counter-title\">Clientes empresariales felices<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-842e5aa e-con-full e-flex e-con e-child\" data-id=\"842e5aa\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-98fc377 elementor-widget elementor-widget-counter\" data-id=\"98fc377\" data-element_type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"500\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\"><\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-counter-title\">Proyectos MSS<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c56f27b e-con-full e-flex e-con e-child\" data-id=\"c56f27b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c6b4c93 elementor-widget elementor-widget-counter\" data-id=\"c6b4c93\" data-element_type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"200\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\"><\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-counter-title\">Expertos en seguridad calificados<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-819d930 e-con-full e-flex e-con e-child\" data-id=\"819d930\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dde3613 elementor-widget elementor-widget-counter\" data-id=\"dde3613\" data-element_type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"29\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\"><\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-counter-title\">A\u00f1os en Ciberseguridad<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b5026fc e-flex e-con-boxed e-con e-parent\" data-id=\"b5026fc\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-68ef6ed e-con-full e-flex e-con e-child\" data-id=\"68ef6ed\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-028a05b elementor-widget elementor-widget-heading\" data-id=\"028a05b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PONTE EN CONTACTO CON NOSOTROS<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30de48b elementor-widget elementor-widget-text-editor\" data-id=\"30de48b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script>\n<script>\n  hbspt.forms.create({\n    region: \"na1\",\n    portalId: \"8010931\",\n    formId: \"b53c5dad-14c4-4c7d-b18a-354877a5ff0f\"\n  });\n<\/script>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a4beaf e-con-full e-flex e-con e-child\" data-id=\"4a4beaf\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"featured_media":0,"template":"","_links":{"self":[{"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/services\/7240"}],"collection":[{"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/services"}],"about":[{"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/types\/services"}],"version-history":[{"count":20,"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/services\/7240\/revisions"}],"predecessor-version":[{"id":7984,"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/services\/7240\/revisions\/7984"}],"wp:attachment":[{"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/media?parent=7240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}