{"id":785,"date":"2014-08-16T23:08:54","date_gmt":"2014-08-16T23:08:54","guid":{"rendered":"http:\/\/evosec.eu\/?page_id=785"},"modified":"2016-09-11T00:57:42","modified_gmt":"2016-09-11T00:57:42","slug":"what-we-do","status":"publish","type":"page","link":"https:\/\/evosec.eu\/es\/what-we-do\/","title":{"rendered":"Lo Que Hacemos"},"content":{"rendered":"<h2><a href=\"\/security\"><i class=\"fa fa-shield fa-fw\"><\/i>SEGURIDAD DE TI<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i><a href=\"http:\/\/evosec.eu\/smbs-fast-cyber-security-checklist\/\">SMB Quick Check<\/a><\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Auditor\u00eda de seguridad Web<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Auditor\u00eda de seguridad de red<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Auditor\u00eda de seguridad de servidor<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Auditor\u00eda de seguridad de dispositivo incrustado<\/li>\n<\/ul>\n<h2><a href=\"\/operations\"><i class=\"fa fa-heartbeat fa-fw\"><\/i>OPERACIONES DE TI<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Creaci\u00f3n de redes<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Servidores Linux<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Copias de seguridad \/ prueba de Ransomware backups<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Monitoreo de sitios web, rangos de IPs\/IP, dispositivos etc.<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>3er partido\/obsoletos protocolos actualizaci\u00f3n\/integraciones<\/li>\n<\/ul>\n<h2><a href=\"\/automation\"><i class=\"fa fa-cogs fa-fw\"><\/i>AUTOMATIZACI\u00d3N DE TI<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Rastreo\/an\u00e1lisis de datos<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Correos electr\u00f3nicos automatizados<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Desarrollados a medida de aplicaciones, scripts o soluciones para ejecutarse en generalmente disponible incrustado placas &#8211; frambuesa PI, Arduino etc.<\/li>\n<\/ul>\n<h2><a href=\"\/web-support\"><i class=\"fa fa-user fa-fw\"><\/i>SOPORTE WEB<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Actualizaci\u00f3n, el Monitor y el parche: sitios basados en WordPress y Plugins<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Actualizaci\u00f3n, el Monitor y el parche: sitios basados en Joomla, Plugins y componentes<\/li>\n<\/ul>\n<h2><a href=\"\/iot-devices-security-assessment\"><i class=\"fa fa-wifi fa-fw\"><\/i>SEGURIDAD de dispositivos de IoT<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Comprobar configuraci\u00f3n\/resoluci\u00f3n de problemas<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Contrase\u00f1as de protocolos-texto<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Ingenier\u00eda inversa de protocolos<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Contrase\u00f1as fijas, puertas traseras, por defecto<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>SEGURIDAD DE TI SMB Quick Check Auditor\u00eda de seguridad Web Auditor\u00eda de seguridad de red Auditor\u00eda de seguridad de servidor Auditor\u00eda de seguridad de dispositivo incrustado OPERACIONES DE TI Creaci\u00f3n de redes Servidores Linux Copias de seguridad \/ prueba de Ransomware backups Monitoreo de sitios web, rangos de IPs\/IP, dispositivos &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-785","page","type-page","status-publish","hentry"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"es","enabled_languages":["en","da","de","es","fi","fr","it","hu","nl","no","pl","pt","ru","sv"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"da":{"title":true,"content":true,"excerpt":false},"de":{"title":true,"content":true,"excerpt":false},"es":{"title":true,"content":true,"excerpt":false},"fi":{"title":true,"content":true,"excerpt":false},"fr":{"title":true,"content":true,"excerpt":false},"it":{"title":true,"content":true,"excerpt":false},"hu":{"title":true,"content":true,"excerpt":false},"nl":{"title":true,"content":true,"excerpt":false},"no":{"title":true,"content":true,"excerpt":false},"pl":{"title":true,"content":true,"excerpt":false},"pt":{"title":true,"content":true,"excerpt":false},"ru":{"title":true,"content":true,"excerpt":false},"sv":{"title":true,"content":true,"excerpt":false}}},"_links":{"self":[{"href":"https:\/\/evosec.eu\/es\/wp-json\/wp\/v2\/pages\/785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evosec.eu\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/evosec.eu\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/evosec.eu\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/evosec.eu\/es\/wp-json\/wp\/v2\/comments?post=785"}],"version-history":[{"count":3,"href":"https:\/\/evosec.eu\/es\/wp-json\/wp\/v2\/pages\/785\/revisions"}],"predecessor-version":[{"id":2132,"href":"https:\/\/evosec.eu\/es\/wp-json\/wp\/v2\/pages\/785\/revisions\/2132"}],"wp:attachment":[{"href":"https:\/\/evosec.eu\/es\/wp-json\/wp\/v2\/media?parent=785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}