{"id":1925,"date":"2023-09-16T17:11:03","date_gmt":"2023-09-16T20:11:03","guid":{"rendered":"https:\/\/ciberingenieria.com.ar\/?page_id=1925"},"modified":"2023-11-23T09:52:37","modified_gmt":"2023-11-23T12:52:37","slug":"consultoria-en-ciberseguridad","status":"publish","type":"page","link":"https:\/\/ciberingenieria.com.ar\/index.php\/consultoria-en-ciberseguridad\/","title":{"rendered":"Consultor\u00eda en Ciberseguridad"},"content":{"rendered":"\n<div class=\"wp-block-uagb-container uag-hide-tab uag-hide-mob uagb-block-7e4dbf19 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-4684c7bc\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-20365701\"><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-not-stacked-on-mobile is-layout-flex wp-container-2 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-8849ffe6\"><h2 class=\"uagb-heading-text\">Consultor\u00eda en Ciberseguridad<\/h2><\/div>\n\n\n\n<p class=\"has-medium-font-size\" style=\"font-style:normal;font-weight:100;text-transform:none\"><strong>Tu Socio Estrat\u00e9gico para una Defensa Impecable<\/strong><\/p>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-09ca3dba\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-c56ebc37 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-04217730\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-1a60d93f\"><h2 class=\"uagb-heading-text\"><strong>La ciberseguridad es fundamental para la protecci\u00f3n de tu empresa en un mundo cada vez m\u00e1s digital y conectado.<\/strong><\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-8dd2694f\"><h2 class=\"uagb-heading-text\"><strong>Ofrecemos un completo servicio de Consultor\u00eda en Ciberseguridad dise\u00f1ado para abordar tus necesidades espec\u00edficas <strong><strong>y brindarte la gu\u00eda estrat\u00e9gica necesaria para fortalecer tu postura de seguridad y proteger tu activo m\u00e1s valioso: tu informaci\u00f3n<\/strong><\/strong> de amenazas digitales.<\/strong><\/h2><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\" style=\"padding-top:0;padding-right:var(--wp--preset--spacing--20);padding-bottom:0;padding-left:var(--wp--preset--spacing--20);font-size:35px;line-height:1.3\"><strong>Servicios de Consultor\u00eda en Ciberseguridad<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-8 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-6 wp-block-columns-is-layout-flex\" style=\"border-style:none;border-width:0px\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-8de802d6 animated zoomIn\"><h2 class=\"uagb-heading-text\">Asesoramiento en problem\u00e1ticas espec\u00edficas<\/h2><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"border-style:none;border-width:0px;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0;flex-basis:50%\">\n<p style=\"font-size:18px\">Entendemos que cada empresa enfrenta desaf\u00edos \u00fanicos en ciberseguridad. Nuestro equipo de expertos en ciberseguridad est\u00e1 aqu\u00ed para proporcionar asesoramiento en problem\u00e1ticas espec\u00edficas que puedan afectar tu organizaci\u00f3n. Abordamos preguntas y desaf\u00edos concretos, proporcionando soluciones a la medida de tus necesidades.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-image uagb-block-e61cd873 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/christina-wocintechchat-com-eF7HN40WbAQ-unsplash-4-1024x901.jpg \" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/christina-wocintechchat-com-eF7HN40WbAQ-unsplash-4-1024x901.jpg\" alt=\"\" class=\"uag-image-3340\" width=\"4133\" height=\"6199\" title=\"\" loading=\"lazy\"\/><\/figure><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns uag-hide-desktop is-layout-flex wp-container-14 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-12 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-8cf25508 animated zoomIn uag-hide-desktop\"><h2 class=\"uagb-heading-text\">Evaluaci\u00f3n de madurez en Seguridad de la Informaci\u00f3n<\/h2><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p class=\"uag-hide-desktop\" style=\"font-size:18px\">La seguridad de la informaci\u00f3n es un proceso en constante evoluci\u00f3n. Realizamos evaluaciones de madurez en seguridad de la informaci\u00f3n para evaluar el estado actual de tus pr\u00e1cticas de seguridad. Identificamos \u00e1reas de mejora y desarrollamos un plan estrat\u00e9gico para fortalecer tu postura de seguridad.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-image uagb-block-13f6eff2 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none uag-hide-desktop\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/lindsay-henwood-7_kRuX1hSXM-unsplash-edited-1024x1024.jpg \" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/lindsay-henwood-7_kRuX1hSXM-unsplash-edited-1024x1024.jpg\" alt=\"\" class=\"uag-image-3356\" width=\"1024\" height=\"1024\" title=\"\" loading=\"lazy\"\/><\/figure><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns uag-hide-tab uag-hide-mob is-layout-flex wp-container-20 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-18 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-image uagb-block-e54d66b6 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/lindsay-henwood-7_kRuX1hSXM-unsplash-edited.jpg \" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/lindsay-henwood-7_kRuX1hSXM-unsplash-edited.jpg\" alt=\"\" class=\"uag-image-3356\" width=\"1280\" height=\"853\" title=\"\" loading=\"lazy\"\/><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p style=\"font-size:18px\">La seguridad de la informaci\u00f3n es un proceso en constante evoluci\u00f3n. Realizamos evaluaciones de madurez en seguridad de la informaci\u00f3n para evaluar el estado actual de tus pr\u00e1cticas de seguridad. Identificamos \u00e1reas de mejora y desarrollamos un plan estrat\u00e9gico para fortalecer tu postura de seguridad.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-e82d4c9f animated zoomIn\"><h2 class=\"uagb-heading-text\">Evaluaci\u00f3n de madurez en Seguridad de la Informaci\u00f3n<\/h2><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-26 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-24 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-44e82cc4 animated zoomIn\"><h2 class=\"uagb-heading-text\">Estrategias de Seguridad a Medida<\/h2><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p style=\"font-size:18px\">Dise\u00f1amos estrategias de seguridad adaptadas a tus necesidades y requisitos \u00fanicos. Trabajamos en colaboraci\u00f3n contigo para establecer pol\u00edticas, procedimientos y controles eficaces que protejan tu empresa y cumplan con los est\u00e1ndares internacionales de seguridad.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-image uagb-block-e55b8055 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/soccer-8241012_1280-edited.jpg \" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/soccer-8241012_1280-edited.jpg\" alt=\"\" class=\"uag-image-3346\" width=\"5061\" height=\"2761\" title=\"\" loading=\"lazy\"\/><\/figure><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-5d220fe7 alignfull uagb-is-root-container\"><div class=\"uagb-container__shape uagb-container__shape-top\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 700 10\" preserveAspectRatio=\"none\"><path class=\"uagb-container__shape-fill\" d=\"M350,10L340,0h20L350,10z\"><\/path><\/svg><\/div><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-cfc3c551\">\n<p class=\"has-text-align-center has-ast-global-color-5-color has-text-color\" style=\"padding-top:var(--wp--preset--spacing--80);padding-right:0;padding-bottom:var(--wp--preset--spacing--80);padding-left:0;font-size:35px;line-height:1.6\">Beneficios de la consultor\u00eda<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list uagb-block-d51c1054\"><div class=\"uagb-icon-list__wrap\">\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-e9a076f3\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>Soluciones Personalizadas<\/strong><\/span><\/div>\n\n\n\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-307b84c7\"><span class=\"uagb-icon-list__label\">Nuestros servicios de consultor\u00eda se adaptan a tus desaf\u00edos espec\u00edficos, proporcionando soluciones a la medida de tus necesidades.<\/span><\/div>\n\n\n\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-f223b5ca\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong><strong><strong>Evaluaci\u00f3n Continua<\/strong><\/strong><\/strong><\/span><\/div>\n\n\n\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-a8d9deaf\"><span class=\"uagb-icon-list__label\">Con evaluaciones de madurez en seguridad de la informaci\u00f3n, hacemos que tu empresa est\u00e9 en constante mejora y adaptaci\u00f3n a las amenazas cambiantes.<\/span><\/div>\n\n\n\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-53d610d9\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong><strong><strong>Asesoramiento Experto<\/strong><\/strong><\/strong><\/span><\/div>\n\n\n\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-73a5a02f\"><span class=\"uagb-icon-list__label\">Nuestros expertos en ciberseguridad est\u00e1n al tanto de las \u00faltimas amenazas y tendencias, brind\u00e1ndote asesoramiento actualizado y proactivo.<\/span><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-06dfecd9 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-75069378\"><h2 class=\"uagb-heading-text\">\u00a1Fortalece tu seguridad con una estrategia cibersegura!<\/h2><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Consultor\u00eda en Ciberseguridad Tu Socio Estrat\u00e9gico para una Defensa Impecable La ciberseguridad es fundamental para la protecci\u00f3n de tu empresa en un mundo cada vez m\u00e1s digital y conectado. Ofrecemos un completo servicio de Consultor\u00eda en Ciberseguridad dise\u00f1ado para abordar tus necesidades espec\u00edficas y brindarte la gu\u00eda estrat\u00e9gica necesaria para fortalecer tu postura de seguridad [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"CeciliaManzano","author_link":"https:\/\/ciberingenieria.com.ar\/index.php\/author\/ceciliamanzano\/"},"uagb_comment_info":0,"uagb_excerpt":"Consultor\u00eda en Ciberseguridad Tu Socio Estrat\u00e9gico para una Defensa Impecable La ciberseguridad es fundamental para la protecci\u00f3n de tu empresa en un mundo cada vez m\u00e1s digital y conectado. Ofrecemos un completo servicio de Consultor\u00eda en Ciberseguridad dise\u00f1ado para abordar tus necesidades espec\u00edficas y brindarte la gu\u00eda estrat\u00e9gica necesaria para fortalecer tu postura de seguridad&hellip;","_links":{"self":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages\/1925"}],"collection":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/comments?post=1925"}],"version-history":[{"count":152,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages\/1925\/revisions"}],"predecessor-version":[{"id":3743,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages\/1925\/revisions\/3743"}],"wp:attachment":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/media?parent=1925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}