{"id":42,"date":"2025-08-15T09:12:18","date_gmt":"2025-08-15T15:12:18","guid":{"rendered":"https:\/\/mediumpurple-ferret-434765.hostingersite.com\/?page_id=42"},"modified":"2025-11-11T18:18:24","modified_gmt":"2025-11-12T00:18:24","slug":"soluciones-y-ciberseguridad","status":"publish","type":"page","link":"https:\/\/onesec.mx\/en\/soluciones-y-ciberseguridad\/","title":{"rendered":"Services"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"42\" class=\"elementor elementor-42\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f80bdc6 e-flex e-con-boxed e-con e-parent\" data-id=\"f80bdc6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f85531c elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"f85531c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;_animation_delay&quot;:150}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">WE PROTECT YOUR DIGITAL ASSETS<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a017f3f elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"a017f3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;_animation_delay&quot;:250}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Our goal is to reduce risks, protect critical information, and ensure regulatory compliance.<\/p>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-acee19f e-flex e-con-boxed e-con e-parent\" data-id=\"acee19f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-65a9c66 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"65a9c66\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:100}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3bab821 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"3bab821\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CyberSec Consulting<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a355543 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"a355543\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:150}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Strategies to strengthen your organization's cybersecurity.<\/p><p>We assess risks, design policies, manage access, and ensure regulatory compliance.<\/p><p class=\"translation-block\">Our approach is proactive in <strong>identifying vulnerabilities, implementing improvements, and protecting critical data.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e43fd8 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"3e43fd8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5645c1a elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"5645c1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewbox=\"0 0 20 20\" fill=\"none\"><g clip-path=\"url(#clip0_87_383)\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.6094 9.99219C15.8242 12.5547 12.5625 15.8203 10.0039 19.6055C10.0039 19.6055 10.0039 19.6094 10 19.6094C10 19.6094 10 19.6055 9.99609 19.6055C7.4375 15.8203 4.17578 12.5547 0.390625 9.99219C4.24609 7.51563 7.52344 4.24219 10 0.390625C12.4766 4.24219 15.7539 7.51563 19.6094 9.99219Z\" fill=\"#5BBE86\"><\/path><\/g><defs><clippath id=\"clip0_87_383\"><rect width=\"20\" height=\"20\" fill=\"white\"><\/rect><\/clippath><\/defs><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cybersecurity strategy aligned with standards and frameworks (ISO27001, NIST, PCI, etc.)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07ad052 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"07ad052\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewbox=\"0 0 20 20\" fill=\"none\"><g clip-path=\"url(#clip0_87_383)\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.6094 9.99219C15.8242 12.5547 12.5625 15.8203 10.0039 19.6055C10.0039 19.6055 10.0039 19.6094 10 19.6094C10 19.6094 10 19.6055 9.99609 19.6055C7.4375 15.8203 4.17578 12.5547 0.390625 9.99219C4.24609 7.51563 7.52344 4.24219 10 0.390625C12.4766 4.24219 15.7539 7.51563 19.6094 9.99219Z\" fill=\"#5BBE86\"><\/path><\/g><defs><clippath id=\"clip0_87_383\"><rect width=\"20\" height=\"20\" fill=\"white\"><\/rect><\/clippath><\/defs><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cybersecurity stance<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9072b50 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"9072b50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewbox=\"0 0 20 20\" fill=\"none\"><g clip-path=\"url(#clip0_87_383)\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.6094 9.99219C15.8242 12.5547 12.5625 15.8203 10.0039 19.6055C10.0039 19.6055 10.0039 19.6094 10 19.6094C10 19.6094 10 19.6055 9.99609 19.6055C7.4375 15.8203 4.17578 12.5547 0.390625 9.99219C4.24609 7.51563 7.52344 4.24219 10 0.390625C12.4766 4.24219 15.7539 7.51563 19.6094 9.99219Z\" fill=\"#5BBE86\"><\/path><\/g><defs><clippath id=\"clip0_87_383\"><rect width=\"20\" height=\"20\" fill=\"white\"><\/rect><\/clippath><\/defs><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Technology Risk Consulting<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-918e3a6 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"918e3a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewbox=\"0 0 20 20\" fill=\"none\"><g clip-path=\"url(#clip0_87_383)\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.6094 9.99219C15.8242 12.5547 12.5625 15.8203 10.0039 19.6055C10.0039 19.6055 10.0039 19.6094 10 19.6094C10 19.6094 10 19.6055 9.99609 19.6055C7.4375 15.8203 4.17578 12.5547 0.390625 9.99219C4.24609 7.51563 7.52344 4.24219 10 0.390625C12.4766 4.24219 15.7539 7.51563 19.6094 9.99219Z\" fill=\"#5BBE86\"><\/path><\/g><defs><clippath id=\"clip0_87_383\"><rect width=\"20\" height=\"20\" fill=\"white\"><\/rect><\/clippath><\/defs><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Regulatory Compliance (audits)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86b410f elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"86b410f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewbox=\"0 0 20 20\" fill=\"none\"><g clip-path=\"url(#clip0_87_383)\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.6094 9.99219C15.8242 12.5547 12.5625 15.8203 10.0039 19.6055C10.0039 19.6055 10.0039 19.6094 10 19.6094C10 19.6094 10 19.6055 9.99609 19.6055C7.4375 15.8203 4.17578 12.5547 0.390625 9.99219C4.24609 7.51563 7.52344 4.24219 10 0.390625C12.4766 4.24219 15.7539 7.51563 19.6094 9.99219Z\" fill=\"#5BBE86\"><\/path><\/g><defs><clippath id=\"clip0_87_383\"><rect width=\"20\" height=\"20\" fill=\"white\"><\/rect><\/clippath><\/defs><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Business continuity<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46f0af8 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"46f0af8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewbox=\"0 0 20 20\" fill=\"none\"><g clip-path=\"url(#clip0_87_383)\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.6094 9.99219C15.8242 12.5547 12.5625 15.8203 10.0039 19.6055C10.0039 19.6055 10.0039 19.6094 10 19.6094C10 19.6094 10 19.6055 9.99609 19.6055C7.4375 15.8203 4.17578 12.5547 0.390625 9.99219C4.24609 7.51563 7.52344 4.24219 10 0.390625C12.4766 4.24219 15.7539 7.51563 19.6094 9.99219Z\" fill=\"#5BBE86\"><\/path><\/g><defs><clippath id=\"clip0_87_383\"><rect width=\"20\" height=\"20\" fill=\"white\"><\/rect><\/clippath><\/defs><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Reputational Crisis Management<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-44876cf e-flex e-con-boxed e-con e-parent\" data-id=\"44876cf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-33c8034 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"33c8034\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:100}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1eef64d elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"1eef64d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Incident Management and Threat Response (SOC)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e78fcc7 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"e78fcc7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:150}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">Proactive monitoring, detection, and response to <strong>cyber threats<\/strong>, with specialized personnel and <strong>advanced technologies<\/strong> to protect critical assets and reduce risks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e56de38 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"e56de38\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7daec6f elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"7daec6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewbox=\"0 0 20 20\" fill=\"none\"><g clip-path=\"url(#clip0_87_383)\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.6094 9.99219C15.8242 12.5547 12.5625 15.8203 10.0039 19.6055C10.0039 19.6055 10.0039 19.6094 10 19.6094C10 19.6094 10 19.6055 9.99609 19.6055C7.4375 15.8203 4.17578 12.5547 0.390625 9.99219C4.24609 7.51563 7.52344 4.24219 10 0.390625C12.4766 4.24219 15.7539 7.51563 19.6094 9.99219Z\" fill=\"#5BBE86\"><\/path><\/g><defs><clippath id=\"clip0_87_383\"><rect width=\"20\" height=\"20\" fill=\"white\"><\/rect><\/clippath><\/defs><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Security Operations Centers (SOC) <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0cf3832 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"0cf3832\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewbox=\"0 0 20 20\" fill=\"none\"><g clip-path=\"url(#clip0_87_383)\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.6094 9.99219C15.8242 12.5547 12.5625 15.8203 10.0039 19.6055C10.0039 19.6055 10.0039 19.6094 10 19.6094C10 19.6094 10 19.6055 9.99609 19.6055C7.4375 15.8203 4.17578 12.5547 0.390625 9.99219C4.24609 7.51563 7.52344 4.24219 10 0.390625C12.4766 4.24219 15.7539 7.51563 19.6094 9.99219Z\" fill=\"#5BBE86\"><\/path><\/g><defs><clippath id=\"clip0_87_383\"><rect width=\"20\" height=\"20\" fill=\"white\"><\/rect><\/clippath><\/defs><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Incident detection and response (SIEM\/SOAR)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a13c51a elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a13c51a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewbox=\"0 0 20 20\" fill=\"none\"><g clip-path=\"url(#clip0_87_383)\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.6094 9.99219C15.8242 12.5547 12.5625 15.8203 10.0039 19.6055C10.0039 19.6055 10.0039 19.6094 10 19.6094C10 19.6094 10 19.6055 9.99609 19.6055C7.4375 15.8203 4.17578 12.5547 0.390625 9.99219C4.24609 7.51563 7.52344 4.24219 10 0.390625C12.4766 4.24219 15.7539 7.51563 19.6094 9.99219Z\" fill=\"#5BBE86\"><\/path><\/g><defs><clippath id=\"clip0_87_383\"><rect width=\"20\" height=\"20\" fill=\"white\"><\/rect><\/clippath><\/defs><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Digital forensic analysis<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ca6994 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"0ca6994\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewbox=\"0 0 20 20\" fill=\"none\"><g clip-path=\"url(#clip0_87_383)\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.6094 9.99219C15.8242 12.5547 12.5625 15.8203 10.0039 19.6055C10.0039 19.6055 10.0039 19.6094 10 19.6094C10 19.6094 10 19.6055 9.99609 19.6055C7.4375 15.8203 4.17578 12.5547 0.390625 9.99219C4.24609 7.51563 7.52344 4.24219 10 0.390625C12.4766 4.24219 15.7539 7.51563 19.6094 9.99219Z\" fill=\"#5BBE86\"><\/path><\/g><defs><clippath id=\"clip0_87_383\"><rect width=\"20\" height=\"20\" fill=\"white\"><\/rect><\/clippath><\/defs><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Threat Intelligence Platform (TIP)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e74f7c elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"4e74f7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewbox=\"0 0 20 20\" fill=\"none\"><g clip-path=\"url(#clip0_87_383)\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.6094 9.99219C15.8242 12.5547 12.5625 15.8203 10.0039 19.6055C10.0039 19.6055 10.0039 19.6094 10 19.6094C10 19.6094 10 19.6055 9.99609 19.6055C7.4375 15.8203 4.17578 12.5547 0.390625 9.99219C4.24609 7.51563 7.52344 4.24219 10 0.390625C12.4766 4.24219 15.7539 7.51563 19.6094 9.99219Z\" fill=\"#5BBE86\"><\/path><\/g><defs><clippath id=\"clip0_87_383\"><rect width=\"20\" height=\"20\" fill=\"white\"><\/rect><\/clippath><\/defs><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Simulation and attack exercises (Purple Team)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0785825 e-flex e-con-boxed e-con e-parent\" data-id=\"0785825\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-08736bc e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"08736bc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:100}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48d1dc8 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"48d1dc8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Risk Operations Center (CROC)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d20e6bf elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"d20e6bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:150}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">Specialized services to evaluate and optimize the operation of a <strong>SOC<\/strong> (Security Operations Center), strengthen its policies, and improve its response capabilities.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fcc9bc9 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"fcc9bc9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cfb197c elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"cfb197c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewbox=\"0 0 20 20\" fill=\"none\"><g clip-path=\"url(#clip0_87_383)\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.6094 9.99219C15.8242 12.5547 12.5625 15.8203 10.0039 19.6055C10.0039 19.6055 10.0039 19.6094 10 19.6094C10 19.6094 10 19.6055 9.99609 19.6055C7.4375 15.8203 4.17578 12.5547 0.390625 9.99219C4.24609 7.51563 7.52344 4.24219 10 0.390625C12.4766 4.24219 15.7539 7.51563 19.6094 9.99219Z\" fill=\"#5BBE86\"><\/path><\/g><defs><clippath id=\"clip0_87_383\"><rect width=\"20\" height=\"20\" fill=\"white\"><\/rect><\/clippath><\/defs><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Risk Operations Center<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3ba23e elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"c3ba23e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewbox=\"0 0 20 20\" fill=\"none\"><g clip-path=\"url(#clip0_87_383)\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.6094 9.99219C15.8242 12.5547 12.5625 15.8203 10.0039 19.6055C10.0039 19.6055 10.0039 19.6094 10 19.6094C10 19.6094 10 19.6055 9.99609 19.6055C7.4375 15.8203 4.17578 12.5547 0.390625 9.99219C4.24609 7.51563 7.52344 4.24219 10 0.390625C12.4766 4.24219 15.7539 7.51563 19.6094 9.99219Z\" fill=\"#5BBE86\"><\/path><\/g><defs><clippath id=\"clip0_87_383\"><rect width=\"20\" height=\"20\" fill=\"white\"><\/rect><\/clippath><\/defs><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Detection and response to regulatory compliance risks<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9796353 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"9796353\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewbox=\"0 0 20 20\" fill=\"none\"><g clip-path=\"url(#clip0_87_383)\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.6094 9.99219C15.8242 12.5547 12.5625 15.8203 10.0039 19.6055C10.0039 19.6055 10.0039 19.6094 10 19.6094C10 19.6094 10 19.6055 9.99609 19.6055C7.4375 15.8203 4.17578 12.5547 0.390625 9.99219C4.24609 7.51563 7.52344 4.24219 10 0.390625C12.4766 4.24219 15.7539 7.51563 19.6094 9.99219Z\" fill=\"#5BBE86\"><\/path><\/g><defs><clippath id=\"clip0_87_383\"><rect width=\"20\" height=\"20\" fill=\"white\"><\/rect><\/clippath><\/defs><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Detection and response to data leakage risks<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d399550 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"d399550\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewbox=\"0 0 20 20\" fill=\"none\"><g clip-path=\"url(#clip0_87_383)\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.6094 9.99219C15.8242 12.5547 12.5625 15.8203 10.0039 19.6055C10.0039 19.6055 10.0039 19.6094 10 19.6094C10 19.6094 10 19.6055 9.99609 19.6055C7.4375 15.8203 4.17578 12.5547 0.390625 9.99219C4.24609 7.51563 7.52344 4.24219 10 0.390625C12.4766 4.24219 15.7539 7.51563 19.6094 9.99219Z\" fill=\"#5BBE86\"><\/path><\/g><defs><clippath id=\"clip0_87_383\"><rect width=\"20\" height=\"20\" fill=\"white\"><\/rect><\/clippath><\/defs><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Human risks (harassment, bullying, hate, discrimination)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f0552b8 e-flex e-con-boxed e-con e-parent\" data-id=\"f0552b8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ad93c65 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"ad93c65\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:100}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e004877 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"e004877\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Managed Services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f72e654 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"f72e654\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:150}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">We specialize in the <strong>operation of technology platforms<\/strong>, ensuring their optimal functioning and alignment with the strategic needs of the organization.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8dc3079 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"8dc3079\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b9da578 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"b9da578\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewbox=\"0 0 20 20\" fill=\"none\"><g clip-path=\"url(#clip0_87_383)\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.6094 9.99219C15.8242 12.5547 12.5625 15.8203 10.0039 19.6055C10.0039 19.6055 10.0039 19.6094 10 19.6094C10 19.6094 10 19.6055 9.99609 19.6055C7.4375 15.8203 4.17578 12.5547 0.390625 9.99219C4.24609 7.51563 7.52344 4.24219 10 0.390625C12.4766 4.24219 15.7539 7.51563 19.6094 9.99219Z\" fill=\"#5BBE86\"><\/path><\/g><defs><clippath id=\"clip0_87_383\"><rect width=\"20\" height=\"20\" fill=\"white\"><\/rect><\/clippath><\/defs><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Operation of technology platforms<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3914241 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"3914241\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewbox=\"0 0 20 20\" fill=\"none\"><g clip-path=\"url(#clip0_87_383)\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.6094 9.99219C15.8242 12.5547 12.5625 15.8203 10.0039 19.6055C10.0039 19.6055 10.0039 19.6094 10 19.6094C10 19.6094 10 19.6055 9.99609 19.6055C7.4375 15.8203 4.17578 12.5547 0.390625 9.99219C4.24609 7.51563 7.52344 4.24219 10 0.390625C12.4766 4.24219 15.7539 7.51563 19.6094 9.99219Z\" fill=\"#5BBE86\"><\/path><\/g><defs><clippath id=\"clip0_87_383\"><rect width=\"20\" height=\"20\" fill=\"white\"><\/rect><\/clippath><\/defs><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Operation of business processes related to standards and frameworks<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5549b5f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5549b5f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-97948fd e-flex e-con-boxed e-con e-parent\" data-id=\"97948fd\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2d83859 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"2d83859\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:100}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7faa918 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"7faa918\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Leading Cybersecurity Technologies<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5297900 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"5297900\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:150}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">Implementation and support of leading security tools, from <strong> design to operation and license sales.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-440c0ed e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"440c0ed\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a26c436 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a26c436\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewbox=\"0 0 20 20\" fill=\"none\"><g clip-path=\"url(#clip0_87_383)\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.6094 9.99219C15.8242 12.5547 12.5625 15.8203 10.0039 19.6055C10.0039 19.6055 10.0039 19.6094 10 19.6094C10 19.6094 10 19.6055 9.99609 19.6055C7.4375 15.8203 4.17578 12.5547 0.390625 9.99219C4.24609 7.51563 7.52344 4.24219 10 0.390625C12.4766 4.24219 15.7539 7.51563 19.6094 9.99219Z\" fill=\"#5BBE86\"><\/path><\/g><defs><clippath id=\"clip0_87_383\"><rect width=\"20\" height=\"20\" fill=\"white\"><\/rect><\/clippath><\/defs><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Architecture and integration<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a78113 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"7a78113\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewbox=\"0 0 20 20\" fill=\"none\"><g clip-path=\"url(#clip0_87_383)\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.6094 9.99219C15.8242 12.5547 12.5625 15.8203 10.0039 19.6055C10.0039 19.6055 10.0039 19.6094 10 19.6094C10 19.6094 10 19.6055 9.99609 19.6055C7.4375 15.8203 4.17578 12.5547 0.390625 9.99219C4.24609 7.51563 7.52344 4.24219 10 0.390625C12.4766 4.24219 15.7539 7.51563 19.6094 9.99219Z\" fill=\"#5BBE86\"><\/path><\/g><defs><clippath id=\"clip0_87_383\"><rect width=\"20\" height=\"20\" fill=\"white\"><\/rect><\/clippath><\/defs><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Installation and Configuration<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc62944 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"fc62944\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewbox=\"0 0 20 20\" fill=\"none\"><g clip-path=\"url(#clip0_87_383)\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.6094 9.99219C15.8242 12.5547 12.5625 15.8203 10.0039 19.6055C10.0039 19.6055 10.0039 19.6094 10 19.6094C10 19.6094 10 19.6055 9.99609 19.6055C7.4375 15.8203 4.17578 12.5547 0.390625 9.99219C4.24609 7.51563 7.52344 4.24219 10 0.390625C12.4766 4.24219 15.7539 7.51563 19.6094 9.99219Z\" fill=\"#5BBE86\"><\/path><\/g><defs><clippath id=\"clip0_87_383\"><rect width=\"20\" height=\"20\" fill=\"white\"><\/rect><\/clippath><\/defs><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Support<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c5381f elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"7c5381f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewbox=\"0 0 20 20\" fill=\"none\"><g clip-path=\"url(#clip0_87_383)\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.6094 9.99219C15.8242 12.5547 12.5625 15.8203 10.0039 19.6055C10.0039 19.6055 10.0039 19.6094 10 19.6094C10 19.6094 10 19.6055 9.99609 19.6055C7.4375 15.8203 4.17578 12.5547 0.390625 9.99219C4.24609 7.51563 7.52344 4.24219 10 0.390625C12.4766 4.24219 15.7539 7.51563 19.6094 9.99219Z\" fill=\"#5BBE86\"><\/path><\/g><defs><clippath id=\"clip0_87_383\"><rect width=\"20\" height=\"20\" fill=\"white\"><\/rect><\/clippath><\/defs><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Licensing sales<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4082a84 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4082a84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9eef718 e-flex e-con-boxed e-con e-parent\" data-id=\"9eef718\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-af0e532 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"af0e532\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our Practices<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e2f3abc elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"e2f3abc\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:150}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">Our practices are designed to protect identities, data, infrastructure, and applications, strengthening every layer of the digital ecosystem.\nThrough a comprehensive approach that combines technology, governance, processes, and awareness, we help our clients anticipate threats, comply with regulations, and accelerate their secure transformation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5ae7093 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"5ae7093\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8a244c6 elementor-widget elementor-widget-heading\" data-id=\"8a244c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Digital Identity Governance<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-323e4fc elementor-widget elementor-widget-text-editor\" data-id=\"323e4fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul style=\"font-weight: 400;\"><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"1\" data-aria-level=\"1\" class=\"translation-block\"><span data-usefontface=\"true\" data-contrast=\"none\">Identity and Access Governance (IAG)<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-usefontface=\"true\" data-contrast=\"none\">Privileged Access Management <\/span><span data-usefontface=\"true\" data-contrast=\"none\">(PAM)<\/span>\u200b<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-usefontface=\"true\" data-contrast=\"none\">Access management solutions, <\/span><span data-usefontface=\"true\" data-contrast=\"none\">SSO, Federation<\/span>\u200b<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-usefontface=\"true\" data-contrast=\"none\">Zero Trust and RBAC platforms <\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7d7f68c e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"7d7f68c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d539373 elementor-widget elementor-widget-heading\" data-id=\"d539373\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Government and Data Protection<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e42db09 elementor-widget elementor-widget-text-editor\" data-id=\"e42db09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul style=\"font-weight: 400;\"><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"6\" data-aria-level=\"1\"><span data-usefontface=\"true\" data-contrast=\"none\">Discovery<\/span>\u200b<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"7\" data-aria-level=\"1\"><span data-usefontface=\"true\" data-contrast=\"none\">Ranking\u00a0<\/span>\u200b<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"8\" data-aria-level=\"1\"><span data-usefontface=\"true\" data-contrast=\"none\">Labeling<\/span>\u200b<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"9\" data-aria-level=\"1\"><span data-usefontface=\"true\" data-contrast=\"none\">Protection<\/span>\u200b<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"10\" data-aria-level=\"1\"><span data-usefontface=\"true\" data-contrast=\"none\">Usage and access monitoring\u00a0<\/span>\u200b<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-56d74ea e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"56d74ea\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-45a7bde elementor-widget elementor-widget-heading\" data-id=\"45a7bde\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Governance, Risk, and Compliance (GRC)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec0923f elementor-widget elementor-widget-text-editor\" data-id=\"ec0923f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul style=\"font-weight: 400;\"><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-usefontface=\"false\" data-contrast=\"none\">Security risk management<\/span>\u200b<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-usefontface=\"false\" data-contrast=\"none\">Regulatory compliance (ISO 27001, <\/span><span data-usefontface=\"false\" data-contrast=\"none\">NIST, GDPR, PCI DSS, etc.)<\/span>\u200b<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-usefontface=\"false\" data-contrast=\"none\">Security audit and control<\/span>\u200b<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"4\" data-aria-level=\"1\" class=\"translation-block\">Security policy and procedure management<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-usefontface=\"false\" data-contrast=\"none\">Third-party evaluation and assurance<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-af66fae e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"af66fae\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:500}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-81b53cf elementor-widget elementor-widget-heading\" data-id=\"81b53cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cloud Security and DevSecOps<br><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb470f2 elementor-widget elementor-widget-text-editor\" data-id=\"bb470f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul style=\"font-weight: 400;\"><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"8\" data-aria-level=\"1\" class=\"translation-block\">Security in multi-cloud and hybrid architectures<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"9\" data-aria-level=\"1\"><span data-usefontface=\"false\" data-contrast=\"none\">Cloud Security Posture Management (CSPM)<\/span>\u200b<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"10\" data-aria-level=\"1\" class=\"translation-block\">Cloud Infrastructure Entitlement Management (CIEM)<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"11\" data-aria-level=\"1\" class=\"translation-block\">Security in containerized environments and Kubernetes<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"12\" data-aria-level=\"1\" class=\"translation-block\">Security integration in the development lifecycle (DevSecOps)<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-858e511 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"858e511\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:600}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e7f279a elementor-widget elementor-widget-heading\" data-id=\"e7f279a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Network Security and Zero Trust Architectures<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-01bb50c elementor-widget elementor-widget-text-editor\" data-id=\"01bb50c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul style=\"font-weight: 400;\"><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"1\" data-aria-level=\"1\" class=\"translation-block\">Microsegmentation and secure access (ZTNA, SDP)<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"2\" data-aria-level=\"1\" class=\"translation-block\">Perimeter protection with NGFW and IPS\/IDS<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-usefontface=\"true\" data-contrast=\"none\">Security in SD-WAN and SASE networks<\/span>\u200b<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-usefontface=\"true\" data-contrast=\"none\">Security in OT\/ICS and SCADA environments<\/span>\u200b<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"5\" data-aria-level=\"1\" class=\"translation-block\">Network traffic monitoring and anomaly detection (NDR)<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-710fd34 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"710fd34\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:600}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-58ea28c elementor-widget elementor-widget-heading\" data-id=\"58ea28c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Application Security<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3943f9 elementor-widget elementor-widget-text-editor\" data-id=\"e3943f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul style=\"font-weight: 400;\"><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"7\" data-aria-level=\"1\" class=\"translation-block\">Static and dynamic code analysis (SAST\/DAST)<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"8\" data-aria-level=\"1\" class=\"translation-block\">Runtime Application Self-Protection (RASP)<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"9\" data-aria-level=\"1\" class=\"translation-block\">Security in APIs and gateways<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"10\" data-aria-level=\"1\" class=\"translation-block\">Dependency and security management in CI\/CD<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"11\" data-aria-level=\"1\" class=\"translation-block\">Penetration testing and ethical hacking<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3c95066 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"3c95066\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:600}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fbc7c45 elementor-widget elementor-widget-heading\" data-id=\"fbc7c45\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Security in Emerging Technologies<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c32649 elementor-widget elementor-widget-text-editor\" data-id=\"8c32649\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul style=\"font-weight: 400;\"><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"1\" data-aria-level=\"1\" class=\"translation-block\">Security in artificial intelligence and machine learning<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"2\" data-aria-level=\"1\" class=\"translation-block\">Critical Infrastructure and OT Protection<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"3\" data-aria-level=\"1\" class=\"translation-block\">Security in IoT and embedded devices<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"4\" data-aria-level=\"1\" class=\"translation-block\">Quantum computing and its impact on cryptography<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"5\" data-aria-level=\"1\" class=\"translation-block\">Blockchain and security in digital transactions<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-01ec61f e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"01ec61f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:600}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cfe52d7 elementor-widget elementor-widget-heading\" data-id=\"cfe52d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">User Security and Awareness<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56c9ed3 elementor-widget elementor-widget-text-editor\" data-id=\"56c9ed3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul style=\"font-weight: 400;\"><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"7\" data-aria-level=\"1\" class=\"translation-block\">Cybersecurity training and awareness<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"8\" data-aria-level=\"1\" class=\"translation-block\">Simulation of phishing and ransomware attacks<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"9\" data-aria-level=\"1\" class=\"translation-block\">Social media security and digital identity management<\/li><li data-charcodes=\"252\" data-font=\"Wingdings,Sans-Serif\" data-buautonum=\"8\" data-margin=\"270\" data-aria-posinset=\"10\" data-aria-level=\"1\" class=\"translation-block\">Protection against social engineering and digital fraud<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-215e47c e-flex e-con-boxed e-con e-parent\" data-id=\"215e47c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-02a2820 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"02a2820\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:250}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f9ea88 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"0f9ea88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Discover how our digital identity governance and management solutions, backed by a \"zero trust\" approach, mitigate risks and strengthen your business security.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-30b9653 e-flex e-con-boxed e-con e-parent\" data-id=\"30b9653\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ad2400d e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"ad2400d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:150}\">\n\t\t<div class=\"elementor-element elementor-element-94ffc36 e-con-full e-flex e-con e-child\" data-id=\"94ffc36\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5dcac68 elementor-widget elementor-widget-icon-box\" data-id=\"5dcac68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAssess your risk level\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tDiscover hidden vulnerabilities and take control of your cybersecurity.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca19b80 elementor-widget elementor-widget-premium-addon-button\" data-id=\"ca19b80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-button.default\">\n\t\t\t\t\t\n\n\t\t<a class=\"premium-button premium-button-style2 premium-btn-md premium-button-style2-dshutinhor\" href=\"https:\/\/onesec.mx\/en\/contacto\/\">\n\t\t\t<div class=\"premium-button-text-icon-wrapper\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\tContact us\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/a>\n\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>PROTEGEMOS TUS ACTIVOS DIGITALES Nuestro objetivo es reducir riesgos, proteger informaci\u00f3n cr\u00edtica y garantizar el cumplimiento normativo. Consultor\u00eda CyberSec Estrategias\u00a0 para fortalecer la ciberseguridad de tu organizaci\u00f3n. Evaluamos riesgos, dise\u00f1amos pol\u00edticas, gestionamos accesos y aseguramos el cumplimiento normativo. Nuestro enfoque es proactivo para identificar vulnerabilidades, implementar mejoras y proteger datos cr\u00edticos. Estrategia de Ciberseguridad alineada [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"content-type":"","footnotes":""},"class_list":["post-42","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/onesec.mx\/en\/wp-json\/wp\/v2\/pages\/42","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onesec.mx\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/onesec.mx\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/onesec.mx\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/onesec.mx\/en\/wp-json\/wp\/v2\/comments?post=42"}],"version-history":[{"count":181,"href":"https:\/\/onesec.mx\/en\/wp-json\/wp\/v2\/pages\/42\/revisions"}],"predecessor-version":[{"id":19521,"href":"https:\/\/onesec.mx\/en\/wp-json\/wp\/v2\/pages\/42\/revisions\/19521"}],"wp:attachment":[{"href":"https:\/\/onesec.mx\/en\/wp-json\/wp\/v2\/media?parent=42"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}