{"id":7264,"date":"2024-02-17T14:46:20","date_gmt":"2024-02-17T14:46:20","guid":{"rendered":"https:\/\/etek.com\/es\/?post_type=services&#038;p=7264"},"modified":"2024-03-07T09:33:55","modified_gmt":"2024-03-07T09:33:55","slug":"proteccion-de-terminales","status":"publish","type":"services","link":"https:\/\/etek.com\/es\/services\/proteccion-de-terminales\/","title":{"rendered":"Protecci\u00f3n de Endpoints"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7264\" class=\"elementor elementor-7264\" data-elementor-post-type=\"services\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9c60b0a e-flex e-con-boxed e-con e-parent\" data-id=\"9c60b0a\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-000ea43 e-con-full e-flex e-con e-child\" data-id=\"000ea43\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c745423 elementor-hidden-desktop elementor-widget elementor-widget-text-editor\" data-id=\"c745423\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 13-03-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\tInicio > Servicios >\u00a0 <strong>Protecci\u00f3n de terminales<\/strong>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8d72ee elementor-widget elementor-widget-heading\" data-id=\"e8d72ee\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 13-03-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h1 class=\"elementor-heading-title elementor-size-default\">Protecci\u00f3n de endpoints<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36d7c5b elementor-widget elementor-widget-text-editor\" data-id=\"36d7c5b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Supervisa, administra y proteje tus endpoints mediante el uso de las mejores soluciones que protegen los endpoints contra amenazas conocidas y desconocidas.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c507020 elementor-widget elementor-widget-button\" data-id=\"c507020\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#contactus\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">CONT\u00c1CTENOS<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0640a5b e-con-full e-flex e-con e-child\" data-id=\"0640a5b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f6caa78 fordesktop elementor-widget elementor-widget-image\" data-id=\"f6caa78\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 13-03-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"389\" height=\"385\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/arrow-bg.png\" class=\"attachment-large size-large wp-image-181\" alt=\"\" srcset=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/arrow-bg.png 389w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/arrow-bg-300x297.png 300w\" sizes=\"(max-width: 389px) 100vw, 389px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2d9c41b e-con-full e-flex e-con e-child\" data-id=\"2d9c41b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2340b04 elementor-hidden-tablet elementor-hidden-mobile whitespace1 elementor-widget elementor-widget-text-editor\" data-id=\"2340b04\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tInicio > Servicios >\u00a0 <strong>Protecci\u00f3n de terminales<\/strong>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62d5db1 elementor-widget elementor-widget-image\" data-id=\"62d5db1\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/Untitled-design-33.png\" class=\"attachment-large size-large wp-image-6713\" alt=\"\" srcset=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/Untitled-design-33.png 1024w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/Untitled-design-33-300x200.png 300w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/Untitled-design-33-768x512.png 768w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/Untitled-design-33-370x247.png 370w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/Untitled-design-33-690x460.png 690w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-96ffd26 e-flex e-con-boxed e-con e-parent\" data-id=\"96ffd26\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f5997f4 e-flex e-con-boxed e-con e-child\" data-id=\"f5997f4\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ff96c53 elementor-widget elementor-widget-heading\" data-id=\"ff96c53\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">La mayor\u00eda de los ciberataques se producen en los endpoints<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8bba430 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8bba430\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 13-03-2024 *\/\n.elementor-widget-divider{--divider-border-style:none;--divider-border-width:1px;--divider-color:#0c0d0e;--divider-icon-size:20px;--divider-element-spacing:10px;--divider-pattern-height:24px;--divider-pattern-size:20px;--divider-pattern-url:none;--divider-pattern-repeat:repeat-x}.elementor-widget-divider .elementor-divider{display:flex}.elementor-widget-divider .elementor-divider__text{font-size:15px;line-height:1;max-width:95%}.elementor-widget-divider .elementor-divider__element{margin:0 var(--divider-element-spacing);flex-shrink:0}.elementor-widget-divider .elementor-icon{font-size:var(--divider-icon-size)}.elementor-widget-divider .elementor-divider-separator{display:flex;margin:0;direction:ltr}.elementor-widget-divider--view-line_icon .elementor-divider-separator,.elementor-widget-divider--view-line_text .elementor-divider-separator{align-items:center}.elementor-widget-divider--view-line_icon .elementor-divider-separator:after,.elementor-widget-divider--view-line_icon .elementor-divider-separator:before,.elementor-widget-divider--view-line_text .elementor-divider-separator:after,.elementor-widget-divider--view-line_text .elementor-divider-separator:before{display:block;content:\"\";border-block-end:0;flex-grow:1;border-block-start:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--element-align-left .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-left .elementor-divider-separator:before{content:none}.elementor-widget-divider--element-align-left .elementor-divider__element{margin-left:0}.elementor-widget-divider--element-align-right .elementor-divider .elementor-divider-separator>.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-right .elementor-divider-separator:after{content:none}.elementor-widget-divider--element-align-right .elementor-divider__element{margin-right:0}.elementor-widget-divider--element-align-start .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-start .elementor-divider-separator:before{content:none}.elementor-widget-divider--element-align-start .elementor-divider__element{margin-inline-start:0}.elementor-widget-divider--element-align-end .elementor-divider .elementor-divider-separator>.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-end .elementor-divider-separator:after{content:none}.elementor-widget-divider--element-align-end .elementor-divider__element{margin-inline-end:0}.elementor-widget-divider:not(.elementor-widget-divider--view-line_text):not(.elementor-widget-divider--view-line_icon) .elementor-divider-separator{border-block-start:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--separator-type-pattern{--divider-border-style:none}.elementor-widget-divider--separator-type-pattern.elementor-widget-divider--view-line .elementor-divider-separator,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:after,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:before,.elementor-widget-divider--separator-type-pattern:not([class*=elementor-widget-divider--view]) .elementor-divider-separator{width:100%;min-height:var(--divider-pattern-height);-webkit-mask-size:var(--divider-pattern-size) 100%;mask-size:var(--divider-pattern-size) 100%;-webkit-mask-repeat:var(--divider-pattern-repeat);mask-repeat:var(--divider-pattern-repeat);background-color:var(--divider-color);-webkit-mask-image:var(--divider-pattern-url);mask-image:var(--divider-pattern-url)}.elementor-widget-divider--no-spacing{--divider-pattern-size:auto}.elementor-widget-divider--bg-round{--divider-pattern-repeat:round}.rtl .elementor-widget-divider .elementor-divider__text{direction:rtl}.e-con-inner>.elementor-widget-divider,.e-con>.elementor-widget-divider{width:var(--container-widget-width,100%);--flex-grow:var(--container-widget-flex-grow)}<\/style>\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f31d23 elementor-widget elementor-widget-text-editor\" data-id=\"6f31d23\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Con el aumento de la complejidad del panorama de amenazas, los endpoints son susceptibles a ataques y propensos a infectar la infraestructura cr\u00edtica.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-83a9559 e-flex e-con-boxed e-con e-parent\" data-id=\"83a9559\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5ab601f e-flex e-con-boxed e-con e-child\" data-id=\"5ab601f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2c99e1e e-flex e-con-boxed e-con e-child\" data-id=\"2c99e1e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d2ca2b4 elementor-widget elementor-widget-image\" data-id=\"d2ca2b4\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/S1.svg\" title=\"S1\" alt=\"S1\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce7fb66 elementor-widget elementor-widget-heading\" data-id=\"ce7fb66\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Falta de visibilidad<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0fa2462 elementor-widget elementor-widget-text-editor\" data-id=\"0fa2462\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>La mayor\u00eda de las empresas tendr\u00e1n soluciones para monitorear las actividades en la red, sin embargo, carecen de la capacidad para realizar actividades en los endpoints de los usuarios.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c077e40 e-flex e-con-boxed e-con e-child\" data-id=\"c077e40\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-67dee75 e-flex e-con-boxed e-con e-child\" data-id=\"67dee75\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5dc53df elementor-widget elementor-widget-image\" data-id=\"5dc53df\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/S2.svg\" title=\"S2\" alt=\"S2\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1352405 elementor-widget elementor-widget-heading\" data-id=\"1352405\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Fuerza laboral remota<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a64022 elementor-widget elementor-widget-text-editor\" data-id=\"5a64022\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tCon el aumento del trabajo desde casa, los usuarios trabajan fuera de la red de la oficina, donde las soluciones b\u00e1sicas no pueden proteger contra amenazas.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d32842 e-flex e-con-boxed e-con e-child\" data-id=\"5d32842\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2806805 e-flex e-con-boxed e-con e-child\" data-id=\"2806805\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4badb07 elementor-widget elementor-widget-image\" data-id=\"4badb07\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/S4.svg\" title=\"S4\" alt=\"S4\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b577c5a elementor-widget elementor-widget-heading\" data-id=\"b577c5a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Tome el control de su Endpoint con la implementaci\u00f3n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f4f9cc elementor-widget elementor-widget-text-editor\" data-id=\"9f4f9cc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tEl soporte de Endpoint Security Services de ETEK facilita la implementaci\u00f3n y deleita al cliente mediante el uso de las mejores herramientas y soluciones de su clase. Nos esforzamos por simplificar el entorno y al mismo tiempo protegernos contra entornos complejos.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8bbd730 e-flex e-con-boxed e-con e-parent\" data-id=\"8bbd730\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-91cfd4f e-con-full e-flex e-con e-child\" data-id=\"91cfd4f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-38ab864 elementor-widget elementor-widget-image\" data-id=\"38ab864\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/elementor\/thumbs\/arrow-bg-qgauib3ey70t97t165hclcx3wo7vxr682fft2sa2e2.png\" title=\"arrow bg\" alt=\"arrow bg\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-11cc737 e-con-full e-flex e-con e-child\" data-id=\"11cc737\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5eccd6e e-flex e-con-boxed e-con e-child\" data-id=\"5eccd6e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1583d8b elementor-widget elementor-widget-heading\" data-id=\"1583d8b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protecci\u00f3n contextualizada para cobertura de extremo a extremo<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c095031 elementor-widget elementor-widget-text-editor\" data-id=\"c095031\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tUso de las mejores herramientas y soluciones de su clase para proteger los activos de endpoints de amenazas externas e interrupciones internas.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f3d878 e-flex e-con-boxed e-con e-parent\" data-id=\"7f3d878\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5b553eb elementor-widget elementor-widget-spacer\" data-id=\"5b553eb\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 13-03-2024 *\/\n.elementor-column .elementor-spacer-inner{height:var(--spacer-size)}.e-con{--container-widget-width:100%}.e-con-inner>.elementor-widget-spacer,.e-con>.elementor-widget-spacer{width:var(--container-widget-width,var(--spacer-size));--align-self:var(--container-widget-align-self,initial);--flex-shrink:0}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container,.e-con>.elementor-widget-spacer>.elementor-widget-container{height:100%;width:100%}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer{height:100%}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner{height:var(--container-widget-height,var(--spacer-size))}.e-con-inner>.elementor-widget-spacer.elementor-widget-empty,.e-con>.elementor-widget-spacer.elementor-widget-empty{position:relative;min-height:22px;min-width:22px}.e-con-inner>.elementor-widget-spacer.elementor-widget-empty .elementor-widget-empty-icon,.e-con>.elementor-widget-spacer.elementor-widget-empty .elementor-widget-empty-icon{position:absolute;top:0;bottom:0;left:0;right:0;margin:auto;padding:0;width:22px;height:22px}<\/style>\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cf2db29 e-flex e-con-boxed e-con e-parent\" data-id=\"cf2db29\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2034a06 e-con-full e-flex e-con e-child\" data-id=\"2034a06\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-68e0b90 elementor-widget elementor-widget-heading\" data-id=\"68e0b90\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protecci\u00f3n contextualizada para cobertura de extremo a extremo<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0778409 elementor-widget elementor-widget-text-editor\" data-id=\"0778409\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tUso de las mejores herramientas y soluciones de su clase para proteger los activos de endpoints de amenazas externas e interrupciones internas.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-13ab30f e-con-full e-flex e-con e-child\" data-id=\"13ab30f\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c6055da e-con-full e-flex e-con e-child\" data-id=\"c6055da\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e2fdbd elementor-widget elementor-widget-heading\" data-id=\"3e2fdbd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u25cf B\u00fasqueda de amenazas gestionada<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b97e0c elementor-widget elementor-widget-text-editor\" data-id=\"9b97e0c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tProporcionar una soluci\u00f3n integral que incluya implementaci\u00f3n y servicio administrado para garantizar la preparaci\u00f3n para responder a los ataques.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-683f699 elementor-widget elementor-widget-heading\" data-id=\"683f699\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u25cf Protecci\u00f3n consciente del contenido<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c2fe3f elementor-widget elementor-widget-text-editor\" data-id=\"0c2fe3f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Identifica \u00e1reas clave de fuga y protegete contra ciberataques<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08e30cd elementor-widget elementor-widget-heading\" data-id=\"08e30cd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u25cf Control del dispositivo<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d13a3ba elementor-widget elementor-widget-text-editor\" data-id=\"d13a3ba\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Has cumplir el control del dispositivo, como el bloqueo de USB, el control de puertos y el cifrado obligatorio.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c4dd943 elementor-widget elementor-widget-heading\" data-id=\"c4dd943\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u25cf Equipo de expertos<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-232d5a6 elementor-widget elementor-widget-text-editor\" data-id=\"232d5a6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tEquipo experimentado de soporte e implementaci\u00f3n para ayudar a brindar servicios alineados con los requisitos de cumplimiento, industriales y comerciales.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c84629 e-flex e-con-boxed e-con e-parent\" data-id=\"4c84629\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0fcf56c elementor-widget elementor-widget-spacer\" data-id=\"0fcf56c\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-019d133 e-flex e-con-boxed e-con e-parent\" data-id=\"019d133\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-17267d0 e-con-full e-flex e-con e-child\" data-id=\"17267d0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-21c01c6 elementor-widget elementor-widget-heading\" data-id=\"21c01c6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Plataforma de protecci\u00f3n de endpoints (EPP)<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cab1dbf elementor-widget elementor-widget-text-editor\" data-id=\"cab1dbf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tLa plataforma EPP act\u00faa como una primera l\u00ednea de defensa contra los ciberataques defendi\u00e9ndose de las amenazas que intentan acceder a la red de la organizaci\u00f3n.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad44d68 elementor-widget elementor-widget-heading\" data-id=\"ad44d68\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Detecci\u00f3n y respuesta de endpoints (EDR)<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4577c84 elementor-widget elementor-widget-text-editor\" data-id=\"4577c84\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tLa soluci\u00f3n EDR ayuda con el seguimiento de amenazas que no se detectan dentro de la red de la organizaci\u00f3n, permite a los analistas brindar respuesta a incidentes y realizar an\u00e1lisis forenses en un escenario posterior al ataque.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-047231d e-con-full e-flex e-con e-child\" data-id=\"047231d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e1d8f54 fordesktop elementor-widget elementor-widget-image\" data-id=\"e1d8f54\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/Untitled-design-17-1.png\" class=\"attachment-large size-large wp-image-6638\" alt=\"\" srcset=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/Untitled-design-17-1.png 1024w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/Untitled-design-17-1-300x200.png 300w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/Untitled-design-17-1-768x512.png 768w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/Untitled-design-17-1-370x247.png 370w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/Untitled-design-17-1-690x460.png 690w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1bd818a e-flex e-con-boxed e-con e-parent\" data-id=\"1bd818a\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e4cb06a e-con-full e-flex e-con e-child\" data-id=\"e4cb06a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ff0210 fordesktop elementor-widget elementor-widget-image\" data-id=\"7ff0210\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"549\" height=\"331\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/threathunting.png\" class=\"attachment-large size-large wp-image-5265\" alt=\"\" srcset=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/threathunting.png 549w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/threathunting-300x181.png 300w, https:\/\/etek.com\/es\/wp-content\/uploads\/2023\/11\/threathunting-370x223.png 370w\" sizes=\"(max-width: 549px) 100vw, 549px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c8b260a e-con-full e-flex e-con e-child\" data-id=\"c8b260a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-03e5d16 elementor-widget elementor-widget-heading\" data-id=\"03e5d16\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">XDR: Detecci\u00f3n y respuesta extendidas<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afdef6c elementor-widget elementor-widget-text-editor\" data-id=\"afdef6c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tXDR es una combinaci\u00f3n cuidadosamente seleccionada de soluci\u00f3n EDR y EPP para brindar protecci\u00f3n contra amenazas y tambi\u00e9n ayudar a la organizaci\u00f3n con la capacidad de respuesta a incidentes y an\u00e1lisis forense.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9aa2240 elementor-widget elementor-widget-heading\" data-id=\"9aa2240\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Respuesta de incidencia<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cbd068 elementor-widget elementor-widget-text-editor\" data-id=\"6cbd068\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tServicios dedicados para brindarles a nuestros clientes el proceso de respuesta a incidentes, ayud\u00e1ndolos a identificar el vector de amenaza, qu\u00e9 caus\u00f3 la infracci\u00f3n y c\u00f3mo recuperarse de ella. Contamos con nuestros expertos trabajando 24 horas al d\u00eda, 7 d\u00edas a la semana en todo el mundo para ayudar a nuestros clientes.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a4c1ca7 e-flex e-con-boxed e-con e-parent\" data-id=\"a4c1ca7\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-687da9f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"687da9f\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-250a7fb e-flex e-con-boxed e-con e-parent\" data-id=\"250a7fb\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d0b85ec e-con-full e-flex e-con e-child\" data-id=\"d0b85ec\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-949e66c elementor-widget elementor-widget-heading\" data-id=\"949e66c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Preguntas clave hechas por nuestros clientes<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d870073 elementor-widget elementor-widget-text-editor\" data-id=\"d870073\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tPreguntas clave formuladas por nuestros clientes.\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b64149f elementor-widget elementor-widget-button\" data-id=\"b64149f\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">More FAQ's<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b34bbdb e-con-full e-flex e-con e-child\" data-id=\"b34bbdb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6bbaf2d elementor-widget elementor-widget-elementskit-accordion\" data-id=\"6bbaf2d\" data-element_type=\"widget\" data-widget_type=\"elementskit-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" >\n        <div class=\"elementskit-accordion accoedion-primary\" id=\"accordion-69e6ec96b36d9\">\n\n            \n                <div class=\"elementskit-card active\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-0-6bbaf2d\">\n                        <a href=\"#collapse-281e6fb69e6ec96b36d9\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-281e6fb69e6ec96b36d9\" aria-expanded=\"true\" aria-controls=\"Collapse-281e6fb69e6ec96b36d9\">\n                            \n                            <span class=\"ekit-accordion-title\">\u00bfEn qu\u00e9 se diferencia Endpoint Security de DLP?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-open icon-right icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-closed icon-right icon icon-up-arrow\"><\/i>                                    <\/div>\n\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-281e6fb69e6ec96b36d9\" class=\" show collapse\" aria-labelledby=\"primaryHeading-0-6bbaf2d\" data-parent=\"#accordion-69e6ec96b36d9\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            La seguridad de endpoints es un enfoque basado en soluciones de ciberseguridad para detectar dispositivos, aplicaciones o comunicaciones no autorizadas. Por otro lado, la prevenci\u00f3n de p\u00e9rdida de datos (DLP) protege sus datos almacenados contra el acceso, uso o divulgaci\u00f3n no autorizados.                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-1-6bbaf2d\">\n                        <a href=\"#collapse-a2f33a769e6ec96b36d9\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-a2f33a769e6ec96b36d9\" aria-expanded=\"false\" aria-controls=\"Collapse-a2f33a769e6ec96b36d9\">\n                            \n                            <span class=\"ekit-accordion-title\">\u00bfPor qu\u00e9 se necesita una soluci\u00f3n de seguridad para endpoints?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-open icon-right icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-closed icon-right icon icon-up-arrow\"><\/i>                                    <\/div>\n\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-a2f33a769e6ec96b36d9\" class=\" collapse\" aria-labelledby=\"primaryHeading-1-6bbaf2d\" data-parent=\"#accordion-69e6ec96b36d9\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            La soluci\u00f3n de seguridad para terminales identifica amenazas en todo su entorno, examina la vida \u00fatil de la amenaza y ofrece informaci\u00f3n sobre lo que ocurri\u00f3, c\u00f3mo ingres\u00f3 a su sistema, ad\u00f3nde fue, qu\u00e9 estaba haciendo en ese momento y qu\u00e9 puede hacer para detenerla.                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-2-6bbaf2d\">\n                        <a href=\"#collapse-035897569e6ec96b36d9\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-035897569e6ec96b36d9\" aria-expanded=\"false\" aria-controls=\"Collapse-035897569e6ec96b36d9\">\n                            \n                            <span class=\"ekit-accordion-title\">\u00bfCu\u00e1l es el modelo de precios?<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-open icon-right icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-closed icon-right icon icon-up-arrow\"><\/i>                                    <\/div>\n\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-035897569e6ec96b36d9\" class=\" collapse\" aria-labelledby=\"primaryHeading-2-6bbaf2d\" data-parent=\"#accordion-69e6ec96b36d9\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            El precio se basa en el modelo por usuario.                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                        <\/div>\n    <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c099e0b e-con-full etek-gradient e-flex e-con e-parent\" data-id=\"c099e0b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\" data-core-v316-plus=\"true\">\n\t\t<div class=\"elementor-element elementor-element-4da366f e-flex e-con-boxed e-con e-child\" data-id=\"4da366f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1f8e1d2 e-flex e-con-boxed e-con e-child\" data-id=\"1f8e1d2\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eeb05d7 elementor-widget elementor-widget-counter\" data-id=\"eeb05d7\" data-element_type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 13-03-2024 *\/\n.elementor-counter .elementor-counter-number-wrapper{display:flex;font-size:69px;font-weight:600;line-height:1}.elementor-counter .elementor-counter-number-prefix,.elementor-counter .elementor-counter-number-suffix{flex-grow:1;white-space:pre-wrap}.elementor-counter .elementor-counter-number-prefix{text-align:right}.elementor-counter .elementor-counter-number-suffix{text-align:left}.elementor-counter .elementor-counter-title{text-align:center;font-size:19px;font-weight:400;line-height:2.5}<\/style>\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"350\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\"><\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-counter-title\">Clientes empresariales felices<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-689bdf3 e-con-full e-flex e-con e-child\" data-id=\"689bdf3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-597703b elementor-widget elementor-widget-counter\" data-id=\"597703b\" data-element_type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"500\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\"><\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-counter-title\">Proyectos MSS<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1d051a5 e-con-full e-flex e-con e-child\" data-id=\"1d051a5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c2e321 elementor-widget elementor-widget-counter\" data-id=\"4c2e321\" data-element_type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"200\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\"><\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-counter-title\">Expertos en seguridad calificados<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-09644ef e-con-full e-flex e-con e-child\" data-id=\"09644ef\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5aa927e elementor-widget elementor-widget-counter\" data-id=\"5aa927e\" data-element_type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"30\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\"><\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-counter-title\">A\u00f1os en Ciberseguridad<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f0c196 e-flex e-con-boxed e-con e-parent\" data-id=\"7f0c196\" data-element_type=\"container\" id=\"contactus\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e311c01 e-con-full e-flex e-con e-child\" data-id=\"e311c01\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-19248b0 elementor-widget elementor-widget-heading\" data-id=\"19248b0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PONTE EN CONTACTO CON NOSOTROS<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0fbe75e elementor-widget elementor-widget-text-editor\" data-id=\"0fbe75e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script>\n<script>\n  hbspt.forms.create({\n    region: \"na1\",\n    portalId: \"8010931\",\n    formId: \"b53c5dad-14c4-4c7d-b18a-354877a5ff0f\"\n  });\n<\/script>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b6ed8f4 e-con-full e-flex e-con e-child\" data-id=\"b6ed8f4\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"featured_media":0,"template":"","_links":{"self":[{"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/services\/7264"}],"collection":[{"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/services"}],"about":[{"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/types\/services"}],"version-history":[{"count":23,"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/services\/7264\/revisions"}],"predecessor-version":[{"id":8099,"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/services\/7264\/revisions\/8099"}],"wp:attachment":[{"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/media?parent=7264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}