{"id":12,"date":"2025-05-01T13:18:21","date_gmt":"2025-05-01T11:18:21","guid":{"rendered":"http:\/\/cyberhack-solutions.com\/?page_id=12"},"modified":"2025-12-11T17:01:06","modified_gmt":"2025-12-11T16:01:06","slug":"portada","status":"publish","type":"page","link":"https:\/\/cyberhack-solutions.com\/en\/","title":{"rendered":"Inicio"},"content":{"rendered":"<div class=\"wp-block-cover alignfull has-parallax is-repeated wp-duotone-rgb112844-rgba112843041-4\" style=\"min-height:100vh;aspect-ratio:unset;\"><div class=\"wp-block-cover__image-background wp-image-81 size-full has-parallax is-repeated\" style=\"background-position:50% 50%;background-image:url(https:\/\/lightskyblue-goldfinch-214874.hostingersite.com\/wp-content\/uploads\/ChatGPT-Image-14-may-2025-17_57_43.png)\"><\/div><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\" style=\"background-color:#001a3c\"><\/span><div class=\"wp-block-cover__inner-container has-global-padding is-layout-constrained wp-block-cover-is-layout-constrained\">\n<h1 class=\"wp-block-heading alignfull has-text-align-center has-text-color has-link-color has-xx-large-font-size wp-elements-79ec20c542afa95a075c1a2d72b0ae86\" style=\"color:#006cad\">Expertos en ciberseguridad<\/h1>\n\n\n\n<div class=\"wp-block-group alignfull is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-1114c821 wp-block-group-is-layout-flex\" style=\"padding-top:0;padding-bottom:0\">\n<p class=\"has-text-align-center has-large-font-size\" style=\"margin-right:0;margin-left:0\">El entorno digital est\u00e1 repleto de riesgos. Como expertos en ciberseguridad, protegemos su empresa frente a todo tipo de ataques, identificamos vulnerabilidades y establecemos defensas s\u00f3lidas contra amenazas actuales y emergentes.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons alignfull is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-76de4b3f wp-block-buttons-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:var(--wp--preset--spacing--30)\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-25 is-style-outline is-style-outline--2\"><a class=\"wp-block-button__link has-background has-medium-font-size has-custom-font-size wp-element-button\" href=\"https:\/\/cyberhack-solutions.com\/en\/contacto\/\" style=\"background-color:#063063;padding-right:0px;padding-left:0px\" target=\"_blank\" rel=\"noreferrer noopener\">CONT\u00c1CTENOS AHORA<\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-base-2-color has-alpha-channel-opacity has-base-2-background-color has-background is-style-dots\"\/>\n\n\n\n<div class=\"wp-block-cover alignfull is-light\" style=\"min-height:219px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-base-2-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container has-global-padding is-layout-constrained wp-block-cover-is-layout-constrained\">\n<div class=\"wp-block-columns alignfull are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><a href=\"https:\/\/cyberhack-solutions.com\/en\/portada\/personalizacion-completa\/\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"http:\/\/https:\/\/lightskyblue-goldfinch-214874.hostingersite.com\/wp-content\/uploads\/amenazas-de-ciberseguridad.png\" alt=\"\" class=\"wp-image-93\" style=\"object-fit:cover;width:50px;height:50px\" srcset=\"https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/amenazas-de-ciberseguridad.png 512w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/amenazas-de-ciberseguridad-300x300.png 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-text-align-center has-large-font-size\" style=\"margin-right:0\"><a href=\"https:\/\/cyberhack-solutions.com\/en\/portada\/personalizacion-completa\/\" data-type=\"page\" data-id=\"942\">Personalizaci\u00f3n completa<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\">Soluciones adaptadas a las necesidades de tu negocio.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image aligncenter size-full is-resized has-custom-border is-style-default\"><a href=\"https:\/\/cyberhack-solutions.com\/en\/portada\/solucion-integral\/\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"http:\/\/https:\/\/lightskyblue-goldfinch-214874.hostingersite.com\/wp-content\/uploads\/ciberseguridad.png\" alt=\"\" class=\"wp-image-96\" style=\"border-style:none;border-width:0px;border-radius:0px;object-fit:cover;width:50px;height:50px\" srcset=\"https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/ciberseguridad.png 512w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/ciberseguridad-300x300.png 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-text-align-center has-large-font-size\"><a href=\"https:\/\/cyberhack-solutions.com\/en\/portada\/solucion-integral\/\" data-type=\"page\" data-id=\"944\">Soluci\u00f3n integral<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\">Todo lo que necesitas en una sola plataforma.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><a href=\"https:\/\/cyberhack-solutions.com\/en\/portada\/enfocado-a-pymes\/\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"http:\/\/https:\/\/lightskyblue-goldfinch-214874.hostingersite.com\/wp-content\/uploads\/ciberseguridad-1.png\" alt=\"\" class=\"wp-image-97\" style=\"object-fit:cover;width:50px;height:50px\" srcset=\"https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/ciberseguridad-1.png 512w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/ciberseguridad-1-300x300.png 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-text-align-center has-large-font-size\"><a href=\"https:\/\/cyberhack-solutions.com\/en\/portada\/enfocado-a-pymes\/\" data-type=\"page\" data-id=\"946\">Enfocado a PYMES<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\">Herramientas accesibles y eficientes para peque\u00f1as y medianas empresas.<\/p>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull\" style=\"min-height:394px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#001b32\"><\/span><div class=\"wp-block-cover__inner-container has-global-padding is-layout-constrained wp-block-cover-is-layout-constrained\">\n<h1 class=\"wp-block-heading has-text-align-center\">Servicios<\/h1>\n\n\n\n<h2 class=\"wp-block-heading alignfull has-text-align-center\">Auditoria<\/h2>\n\n\n\n<div class=\"wp-block-cover alignfull\" style=\"min-height:315px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#004882\"><\/span><div class=\"wp-block-cover__inner-container has-global-padding is-layout-constrained wp-container-core-cover-is-layout-44626644 wp-block-cover-is-layout-constrained\">\n<div class=\"wp-block-columns alignfull is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Security Operation Center<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-contrast-color has-alpha-channel-opacity has-contrast-background-color has-background is-style-wide\"\/>\n\n\n\n<p class=\"has-large-font-size\">Defendemos sus sistemas e infraestructuras <\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-contrast-color has-alpha-channel-opacity has-contrast-background-color has-background is-style-wide\"\/>\n\n\n\n<p class=\"has-medium-font-size\">Estamos <strong>listos<\/strong> para detectar amenazas, responder y actuar incluso cuando  no sabe que algo est\u00e1 ocurriendo<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50\"><a class=\"wp-block-button__link has-background wp-element-button\" href=\"https:\/\/cyberhack-solutions.com\/en\/servicios\/SOC\/\" style=\"background-color:#00234e\" target=\"_blank\" rel=\"noreferrer noopener\">Servicio de SOC<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/lightskyblue-goldfinch-214874.hostingersite.com\/wp-content\/uploads\/93451363-a416-4dd0-998f-007ae24f62ae.png\" alt=\"\" class=\"wp-image-667\" style=\"object-fit:cover;width:700px;height:400px\" srcset=\"https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/93451363-a416-4dd0-998f-007ae24f62ae.png 1024w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/93451363-a416-4dd0-998f-007ae24f62ae-600x600.png 600w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/93451363-a416-4dd0-998f-007ae24f62ae-300x300.png 300w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/93451363-a416-4dd0-998f-007ae24f62ae-768x768.png 768w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/93451363-a416-4dd0-998f-007ae24f62ae-12x12.png 12w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull\" style=\"min-height:315px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#004882\"><\/span><div class=\"wp-block-cover__inner-container has-global-padding is-layout-constrained wp-container-core-cover-is-layout-44626644 wp-block-cover-is-layout-constrained\">\n<div class=\"wp-block-columns alignfull is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/lightskyblue-goldfinch-214874.hostingersite.com\/wp-content\/uploads\/hacker-descifrando-la-seguridad-de-los-datos-del-codigo-binario-1024x683.jpg\" alt=\"\" class=\"wp-image-60\" style=\"object-fit:cover;width:700px;height:400px\" srcset=\"https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/hacker-descifrando-la-seguridad-de-los-datos-del-codigo-binario-1024x683.jpg 1024w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/hacker-descifrando-la-seguridad-de-los-datos-del-codigo-binario-600x400.jpg 600w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/hacker-descifrando-la-seguridad-de-los-datos-del-codigo-binario-768x512.jpg 768w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/hacker-descifrando-la-seguridad-de-los-datos-del-codigo-binario-1536x1024.jpg 1536w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/hacker-descifrando-la-seguridad-de-los-datos-del-codigo-binario-2048x1365.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Seguridad_Defensiva<\/figcaption><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Ciberseguridad<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-contrast-color has-alpha-channel-opacity has-contrast-background-color has-background is-style-wide\"\/>\n\n\n\n<p class=\"has-large-font-size\">Defendemos sus sistemas e infraestructuras <\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-contrast-color has-alpha-channel-opacity has-contrast-background-color has-background is-style-wide\"\/>\n\n\n\n<p class=\"has-medium-font-size\">Estamos <strong>listos<\/strong> para detectar amenazas, responder y actuar incluso cuando  no sabe que algo est\u00e1 ocurriendo<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50\"><a class=\"wp-block-button__link has-background wp-element-button\" href=\"https:\/\/cyberhack-solutions.com\/en\/servicios\/ciberseguridad-defensiva\/\" style=\"background-color:#00234e\" target=\"_blank\" rel=\"noreferrer noopener\">Servicio de Ciberseguridad<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull\" style=\"min-height:315px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#004882\"><\/span><div class=\"wp-block-cover__inner-container has-global-padding is-layout-constrained wp-container-core-cover-is-layout-44626644 wp-block-cover-is-layout-constrained\">\n<div class=\"wp-block-columns alignfull is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Seguridad en la red<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-contrast-color has-alpha-channel-opacity has-contrast-background-color has-background is-style-wide\"\/>\n\n\n\n<p class=\"has-large-font-size\">Actuamos como protector hacia el mundo exterior<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-contrast-color has-alpha-channel-opacity has-contrast-background-color has-background is-style-wide\"\/>\n\n\n\n<p class=\"has-medium-font-size\">Construimos un <strong>muro<\/strong> invisible que <strong>protege cada conexi\u00f3n<\/strong>, dispositivo y persona que depende del sistema.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50\"><a class=\"wp-block-button__link has-background wp-element-button\" href=\"https:\/\/cyberhack-solutions.com\/en\/servicios\/seguridad-en-red\/\" style=\"background-color:#00234e\" target=\"_blank\" rel=\"noreferrer noopener\">Servicio de Seguridad en la red<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"574\" src=\"https:\/\/lightskyblue-goldfinch-214874.hostingersite.com\/wp-content\/uploads\/concepto-de-seguridad-cibernetica-en-el-arte-digital-1024x574.jpg\" alt=\"\" class=\"wp-image-63\" style=\"object-fit:cover;width:700px;height:400px\" srcset=\"https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/concepto-de-seguridad-cibernetica-en-el-arte-digital-1024x574.jpg 1024w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/concepto-de-seguridad-cibernetica-en-el-arte-digital-600x336.jpg 600w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/concepto-de-seguridad-cibernetica-en-el-arte-digital-768x430.jpg 768w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/concepto-de-seguridad-cibernetica-en-el-arte-digital-1536x861.jpg 1536w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/concepto-de-seguridad-cibernetica-en-el-arte-digital-2048x1148.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull\" style=\"min-height:315px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#004882\"><\/span><div class=\"wp-block-cover__inner-container has-global-padding is-layout-constrained wp-container-core-cover-is-layout-44626644 wp-block-cover-is-layout-constrained\">\n<div class=\"wp-block-columns alignfull is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1752\" src=\"https:\/\/lightskyblue-goldfinch-214874.hostingersite.com\/wp-content\/uploads\/la-tecnologia-integrada-en-la-vida-cotidiana-scaled.jpg\" alt=\"\" class=\"wp-image-62\" style=\"object-fit:cover;width:700px;height:400px\" srcset=\"https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/la-tecnologia-integrada-en-la-vida-cotidiana-scaled.jpg 2560w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/la-tecnologia-integrada-en-la-vida-cotidiana-600x411.jpg 600w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/la-tecnologia-integrada-en-la-vida-cotidiana-1024x701.jpg 1024w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/la-tecnologia-integrada-en-la-vida-cotidiana-768x525.jpg 768w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/la-tecnologia-integrada-en-la-vida-cotidiana-1536x1051.jpg 1536w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/la-tecnologia-integrada-en-la-vida-cotidiana-2048x1401.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Seguridad en la nube<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-contrast-color has-alpha-channel-opacity has-contrast-background-color has-background is-style-wide\"\/>\n\n\n\n<p class=\"has-large-font-size\">Cuidamos de sus activos virtuales<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-contrast-color has-alpha-channel-opacity has-contrast-background-color has-background is-style-wide\"\/>\n\n\n\n<p class=\"has-medium-font-size\">Damos <strong>importancia <\/strong>a la seguridad en un espacio digital totalmente desprotegido.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50\"><a class=\"wp-block-button__link has-background wp-element-button\" href=\"https:\/\/cyberhack-solutions.com\/en\/servicios\/seguridad-en-la-nube\/\" style=\"background-color:#00234e\" target=\"_blank\" rel=\"noreferrer noopener\">Servicio de Seguridad en la nube<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull\" style=\"min-height:315px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#004882\"><\/span><div class=\"wp-block-cover__inner-container has-global-padding is-layout-constrained wp-container-core-cover-is-layout-44626644 wp-block-cover-is-layout-constrained\">\n<div class=\"wp-block-columns alignfull is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Seguridad de End-Points<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-contrast-color has-alpha-channel-opacity has-contrast-background-color has-background is-style-wide\"\/>\n\n\n\n<p class=\"has-large-font-size\">Fortificamos sus dispositivos<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-contrast-color has-alpha-channel-opacity has-contrast-background-color has-background is-style-wide\"\/>\n\n\n\n<p class=\"has-medium-font-size\">Nos aseguramos de proteger todos y cada uno de los <strong>dispositivos<\/strong> de la infraestructura.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50\"><a class=\"wp-block-button__link has-background wp-element-button\" href=\"https:\/\/cyberhack-solutions.com\/en\/servicios\/seguridad-de-end-point\/\" style=\"background-color:#00234e\">Servicio de Seguridad de End-Points<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1463\" src=\"https:\/\/lightskyblue-goldfinch-214874.hostingersite.com\/wp-content\/uploads\/el-sistema-de-seguridad-bloquea-los-datos-para-la-seguridad-informatica-generados-por-ia-scaled.jpg\" alt=\"\" class=\"wp-image-65\" style=\"object-fit:cover;width:700px;height:400px\" srcset=\"https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/el-sistema-de-seguridad-bloquea-los-datos-para-la-seguridad-informatica-generados-por-ia-scaled.jpg 2560w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/el-sistema-de-seguridad-bloquea-los-datos-para-la-seguridad-informatica-generados-por-ia-600x343.jpg 600w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/el-sistema-de-seguridad-bloquea-los-datos-para-la-seguridad-informatica-generados-por-ia-1024x585.jpg 1024w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/el-sistema-de-seguridad-bloquea-los-datos-para-la-seguridad-informatica-generados-por-ia-768x439.jpg 768w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/el-sistema-de-seguridad-bloquea-los-datos-para-la-seguridad-informatica-generados-por-ia-1536x878.jpg 1536w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/el-sistema-de-seguridad-bloquea-los-datos-para-la-seguridad-informatica-generados-por-ia-2048x1170.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull\" style=\"min-height:315px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#004882\"><\/span><div class=\"wp-block-cover__inner-container has-global-padding is-layout-constrained wp-container-core-cover-is-layout-44626644 wp-block-cover-is-layout-constrained\">\n<div class=\"wp-block-columns alignfull is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1440\" src=\"https:\/\/lightskyblue-goldfinch-214874.hostingersite.com\/wp-content\/uploads\/dropbox-icon-icono-de-linea-conexion-de-la-placa-de-circuito-scaled.jpg\" alt=\"\" class=\"wp-image-67\" style=\"object-fit:cover;width:700px;height:400px\" srcset=\"https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/dropbox-icon-icono-de-linea-conexion-de-la-placa-de-circuito-scaled.jpg 2560w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/dropbox-icon-icono-de-linea-conexion-de-la-placa-de-circuito-600x338.jpg 600w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/dropbox-icon-icono-de-linea-conexion-de-la-placa-de-circuito-1024x576.jpg 1024w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/dropbox-icon-icono-de-linea-conexion-de-la-placa-de-circuito-768x432.jpg 768w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/dropbox-icon-icono-de-linea-conexion-de-la-placa-de-circuito-1536x864.jpg 1536w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/dropbox-icon-icono-de-linea-conexion-de-la-placa-de-circuito-2048x1152.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading has-x-large-font-size\">Gesti\u00f3n de identidades y accesos<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-contrast-color has-alpha-channel-opacity has-contrast-background-color has-background is-style-wide\"\/>\n\n\n\n<p class=\"has-large-font-size\">Controlamos sus accesos<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-contrast-color has-alpha-channel-opacity has-contrast-background-color has-background is-style-wide\"\/>\n\n\n\n<p class=\"has-medium-font-size\">Dise\u00f1amos sistemas que aseguran que cada usuario tenga el <strong>acceso<\/strong> <strong>justo<\/strong>, ni m\u00e1s ni menos.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50\"><a class=\"wp-block-button__link has-background wp-element-button\" href=\"https:\/\/cyberhack-solutions.com\/en\/servicios\/identidades-y-accesos\/\" style=\"background-color:#00234e\" target=\"_blank\" rel=\"noreferrer noopener\">Servicio de Gesti\u00f3n de identidades y accesos<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull\" style=\"min-height:315px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#004882\"><\/span><div class=\"wp-block-cover__inner-container has-global-padding is-layout-constrained wp-block-cover-is-layout-constrained\">\n<div class=\"wp-block-columns alignfull is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading has-x-large-font-size\">Normativas y regulaciones<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-contrast-color has-alpha-channel-opacity has-contrast-background-color has-background is-style-wide\"\/>\n\n\n\n<p class=\"has-large-font-size\">Aseguramos el cumplimiento normativo<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-contrast-color has-alpha-channel-opacity has-contrast-background-color has-background is-style-wide\"\/>\n\n\n\n<p class=\"has-medium-font-size\">Hacemos que el cumplimiento no sea una carga, sino una <strong>ventaja competitiva<\/strong> que demuestra tu <strong>compromiso<\/strong> con la seguridad y la confianza.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50\"><a class=\"wp-block-button__link has-background wp-element-button\" href=\"https:\/\/cyberhack-solutions.com\/en\/servicios\/normativas-y-regulaciones\/\" style=\"background-color:#00234e\" target=\"_blank\" rel=\"noreferrer noopener\">Servicio de Normativas y regulaciones<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1536\" height=\"1024\" src=\"https:\/\/lightskyblue-goldfinch-214874.hostingersite.com\/wp-content\/uploads\/5c9e945a-415b-4beb-8060-610d7715181f.png\" alt=\"\" class=\"wp-image-296\" style=\"object-fit:cover;width:700px;height:400px\" srcset=\"https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/5c9e945a-415b-4beb-8060-610d7715181f.png 1536w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/5c9e945a-415b-4beb-8060-610d7715181f-600x400.png 600w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/5c9e945a-415b-4beb-8060-610d7715181f-1024x683.png 1024w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/5c9e945a-415b-4beb-8060-610d7715181f-768x512.png 768w\" sizes=\"auto, (max-width: 1536px) 100vw, 1536px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading alignfull has-text-align-center\">Red Team<\/h2>\n\n\n\n<div class=\"wp-block-cover alignfull\" style=\"min-height:315px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#004882\"><\/span><div class=\"wp-block-cover__inner-container has-global-padding is-layout-constrained wp-block-cover-is-layout-constrained\">\n<div class=\"wp-block-columns alignfull is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Red Team<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-contrast-color has-alpha-channel-opacity has-contrast-background-color has-background is-style-wide\"\/>\n\n\n\n<p class=\"has-large-font-size\">Ciberataques reales para probar sus defensas<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-contrast-color has-alpha-channel-opacity has-contrast-background-color has-background is-style-wide\"\/>\n\n\n\n<p class=\"has-medium-font-size\">CyberHack Solutions encuentra sus vulnerabilidades antes de que se conviertan en amenazas.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50\"><a class=\"wp-block-button__link has-background wp-element-button\" href=\"https:\/\/cyberhack-solutions.com\/en\/servicios\/seguridad-ofensiva\/\" style=\"background-color:#00234e\" target=\"_blank\" rel=\"noreferrer noopener\">Servicio de Red Team<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"614\" src=\"https:\/\/lightskyblue-goldfinch-214874.hostingersite.com\/wp-content\/uploads\/representacion-3d-de-fondo-de-textura-hexagonal-1024x614.jpg\" alt=\"\" class=\"wp-image-61\" style=\"object-fit:cover;width:700px;height:400px\" srcset=\"https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/representacion-3d-de-fondo-de-textura-hexagonal-1024x614.jpg 1024w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/representacion-3d-de-fondo-de-textura-hexagonal-600x360.jpg 600w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/representacion-3d-de-fondo-de-textura-hexagonal-768x461.jpg 768w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/representacion-3d-de-fondo-de-textura-hexagonal-1536x922.jpg 1536w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/representacion-3d-de-fondo-de-textura-hexagonal-2048x1229.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading alignfull has-text-align-center\">Desarrollo y conciencia<\/h2>\n\n\n\n<div class=\"wp-block-cover alignfull\" style=\"min-height:315px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#004882\"><\/span><div class=\"wp-block-cover__inner-container has-global-padding is-layout-constrained wp-block-cover-is-layout-constrained\">\n<div class=\"wp-block-columns alignfull is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Formaci\u00f3n y concienciaci\u00f3n<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-contrast-color has-alpha-channel-opacity has-contrast-background-color has-background is-style-wide\"\/>\n\n\n\n<p class=\"has-large-font-size\">El conocimiento es tu mejor defensa<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-contrast-color has-alpha-channel-opacity has-contrast-background-color has-background is-style-wide\"\/>\n\n\n\n<p class=\"has-medium-font-size\">Entrenamos a tu equipo para que sepa c\u00f3mo actuar, qu\u00e9 mirar y cu\u00e1ndo alzar la voz.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50\"><a class=\"wp-block-button__link has-background wp-element-button\" href=\"https:\/\/cyberhack-solutions.com\/en\/servicios\/concienciacion-y-formacion\/\" style=\"background-color:#00234e\" target=\"_blank\" rel=\"noreferrer noopener\">Servicio de Concienciaci\u00f3n y Formaci\u00f3n<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/lightskyblue-goldfinch-214874.hostingersite.com\/wp-content\/uploads\/a5ee4ac0-d07a-4be4-9001-5e0cf8e75475-1024x683.png\" alt=\"\" class=\"wp-image-294\" style=\"object-fit:cover;width:700px;height:400px\" srcset=\"https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/a5ee4ac0-d07a-4be4-9001-5e0cf8e75475-1024x683.png 1024w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/a5ee4ac0-d07a-4be4-9001-5e0cf8e75475-600x400.png 600w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/a5ee4ac0-d07a-4be4-9001-5e0cf8e75475-768x512.png 768w, https:\/\/cyberhack-solutions.com\/wp-content\/uploads\/a5ee4ac0-d07a-4be4-9001-5e0cf8e75475.png 1536w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading alignfull has-text-align-center has-background has-xx-large-font-size\" style=\"background-color:#3399ff\">\u00bfPodemos ayudarle en algo?<\/h2>\n\n\n\n<div class=\"wp-block-buttons alignfull is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-76de4b3f wp-block-buttons-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:var(--wp--preset--spacing--30)\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-25 is-style-outline is-style-outline--3\"><a class=\"wp-block-button__link has-background has-medium-font-size has-custom-font-size wp-element-button\" href=\"https:\/\/cyberhack-solutions.com\/en\/contacto\/\" style=\"background-color:#063063;padding-right:0px;padding-left:0px\" target=\"_blank\" rel=\"noreferrer noopener\">CONT\u00c1CTENOS AHORA<\/a><\/div>\n<\/div>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-no-title","meta":{"_uag_custom_page_level_css":"","footnotes":""},"class_list":["post-12","page","type-page","status-publish","hentry"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false},"uagb_author_info":{"display_name":"prio","author_link":"https:\/\/cyberhack-solutions.com\/en\/author\/prio\/"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/cyberhack-solutions.com\/en\/wp-json\/wp\/v2\/pages\/12","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberhack-solutions.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberhack-solutions.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberhack-solutions.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberhack-solutions.com\/en\/wp-json\/wp\/v2\/comments?post=12"}],"version-history":[{"count":129,"href":"https:\/\/cyberhack-solutions.com\/en\/wp-json\/wp\/v2\/pages\/12\/revisions"}],"predecessor-version":[{"id":957,"href":"https:\/\/cyberhack-solutions.com\/en\/wp-json\/wp\/v2\/pages\/12\/revisions\/957"}],"wp:attachment":[{"href":"https:\/\/cyberhack-solutions.com\/en\/wp-json\/wp\/v2\/media?parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}