
{"id":4980,"date":"2019-03-04T14:15:12","date_gmt":"2019-03-04T17:15:12","guid":{"rendered":"https:\/\/www.talsoft.com.ar\/site\/?page_id=4980"},"modified":"2026-01-15T09:42:39","modified_gmt":"2026-01-15T12:42:39","slug":"home-2","status":"publish","type":"page","link":"https:\/\/www.talsoft.com.ar\/site\/en\/home-2\/","title":{"rendered":"Home en"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbHeader\u00bb _builder_version=\u00bb4.21.0&#8243; background_position=\u00bbtop_right\u00bb top_divider_arrangement_last_edited=\u00bboff|desktop\u00bb hover_enabled=\u00bb0&#8243; collapsed=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb background_enable_image=\u00bboff\u00bb sticky_enabled=\u00bb0&#8243;][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb4.16&#8243; z_index=\u00bb1&#8243; hover_enabled=\u00bb0&#8243; collapsed=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.16&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.16&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_cta title=\u00bbCybersecurity Maturity Framework\u00bb button_url=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/en\/cybersecurity-maturity-framework\/\u00bb button_text=\u00bbStart with a Cybersecurity GAP\u00bb _builder_version=\u00bb4.21.0&#8243; _module_preset=\u00bbdefault\u00bb header_level=\u00bbh1&#8243; header_font=\u00bb|700|||||||\u00bb header_text_color=\u00bb#000000&#8243; body_font=\u00bb|600|on||||||\u00bb body_text_color=\u00bb#000000&#8243; background_color=\u00bb#FFFFFF\u00bb custom_button=\u00bbon\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#CB0519&#8243; button_border_radius=\u00bb6px\u00bb hover_enabled=\u00bb0&#8243; border_radii=\u00bbon|10px|10px|10px|10px\u00bb border_width_all=\u00bb1px\u00bb border_color_all=\u00bb#0C71C3&#8243; box_shadow_style_button=\u00bbpreset4&#8243; global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb sticky_enabled=\u00bb0&#8243; width=\u00bb100%\u00bb custom_margin=\u00bb|||-304px||\u00bb]<\/p>\n<h3 style=\"text-align: center;\"><span style=\"color: #000000;\"><em data-start=\"2208\" data-end=\"2254\">Executive clarity before audits and pressure<\/em><\/span><\/h3>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb4.16&#8243; z_index=\u00bb1&#8243; hover_enabled=\u00bb0&#8243; collapsed=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.16&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.16&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbFeatures\u00bb _builder_version=\u00bb4.16&#8243; collapsed=\u00bbon\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; _builder_version=\u00bb4.16&#8243; custom_margin=\u00bb-8vw||||false\u00bb custom_padding=\u00bb63px||0px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbEarly detection of vulnerabilities\u00bb image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/beneficios_icon1.png\u00bb image_icon_width=\u00bb30%\u00bb _builder_version=\u00bb4.16&#8243; header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb image_max_width=\u00bb30%\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">Our methodology allows us to periodically audit your business to find vulnerabilities.<\/span><\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; transform_scale_tablet=\u00bb\u00bb transform_scale_phone=\u00bb\u00bb transform_scale_last_edited=\u00bbon|desktop\u00bb transform_translate=\u00bb0px|-94px\u00bb transform_translate_tablet=\u00bb0px|0px\u00bb transform_translate_phone=\u00bb\u00bb transform_translate_last_edited=\u00bbon|desktop\u00bb transform_translate_linked=\u00bboff\u00bb transform_rotate_tablet=\u00bb\u00bb transform_rotate_phone=\u00bb\u00bb transform_rotate_last_edited=\u00bbon|desktop\u00bb transform_skew_tablet=\u00bb\u00bb transform_skew_phone=\u00bb\u00bb transform_skew_last_edited=\u00bbon|desktop\u00bb transform_origin_tablet=\u00bb\u00bb transform_origin_phone=\u00bb\u00bb transform_origin_last_edited=\u00bbon|desktop\u00bb transform_styles_last_edited=\u00bbon|desktop\u00bb transform_styles_tablet=\u00bb\u00bb transform_styles_phone=\u00bb\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbAudit within software development\u00bb image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/beneficios_icon2.png\u00bb image_icon_width=\u00bb30%\u00bb _builder_version=\u00bb4.16&#8243; header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb image_max_width=\u00bb30%\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">We audit systems during the software life cycle, which allows us to find vulnerabilities in the early stages of development.<\/span><\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=\u00bbMaximize your profits and minimize your money losses.\u00bb image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/beneficios_icon5.png\u00bb image_icon_width=\u00bb30%\u00bb _builder_version=\u00bb4.16&#8243; header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb image_max_width=\u00bb30%\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">The main consequences for your business in a computer attack, causes loss of money, information theft, image \/ reputation damage, legal problems.<\/span><\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; transform_scale_tablet=\u00bb\u00bb transform_scale_phone=\u00bb\u00bb transform_scale_last_edited=\u00bbon|desktop\u00bb transform_translate=\u00bb0px|-188px\u00bb transform_translate_tablet=\u00bb0px|0px\u00bb transform_translate_phone=\u00bb\u00bb transform_translate_last_edited=\u00bbon|desktop\u00bb transform_translate_linked=\u00bboff\u00bb transform_rotate_tablet=\u00bb\u00bb transform_rotate_phone=\u00bb\u00bb transform_rotate_last_edited=\u00bbon|desktop\u00bb transform_skew_tablet=\u00bb\u00bb transform_skew_phone=\u00bb\u00bb transform_skew_last_edited=\u00bbon|desktop\u00bb transform_origin_tablet=\u00bb\u00bb transform_origin_phone=\u00bb\u00bb transform_origin_last_edited=\u00bbon|desktop\u00bb transform_styles_last_edited=\u00bbon|desktop\u00bb transform_styles_tablet=\u00bb\u00bb transform_styles_phone=\u00bb\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbIncrease trust with Clients \/ Investors\u00bb image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/beneficios_icon3.png\u00bb image_icon_width=\u00bb30%\u00bb _builder_version=\u00bb4.16&#8243; header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb image_max_width=\u00bb30%\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">When your business has guidelines as its main axis, computer security in all its aspects, improves trust with Clients and \/ or Investors.<\/span><\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=\u00bbProtection of critical and confidential information\u00bb image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/beneficios_icon3.png\u00bb image_icon_width=\u00bb30%\u00bb _builder_version=\u00bb4.16&#8243; header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb image_max_width=\u00bb30%\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">Our services allow us to improve the protection of critical and confidential information against computer attacks.<\/span><\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; next_background_color=\u00bb#ffffff\u00bb admin_label=\u00bbFeedback\u00bb _builder_version=\u00bb4.16&#8243; use_background_color_gradient=\u00bbon\u00bb background_color_gradient_direction=\u00bb243deg\u00bb background_color_gradient_stops=\u00bb#cb0519 49%|#ffffff 100%\u00bb background_color_gradient_start=\u00bb#cb0519&#8243; background_color_gradient_start_position=\u00bb49%\u00bb background_color_gradient_end=\u00bb#ffffff\u00bb background_image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/cyber-security-12.png\u00bb background_size=\u00bbcontain\u00bb background_position=\u00bbtop_left\u00bb overflow-x=\u00bbhidden\u00bb overflow-y=\u00bbhidden\u00bb custom_margin=\u00bb||\u00bb top_divider_height=\u00bb26vw\u00bb top_divider_flip=\u00bbhorizontal\u00bb bottom_divider_style=\u00bbasymmetric\u00bb bottom_divider_height=\u00bb22vw\u00bb collapsed=\u00bbon\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb4.16&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.16&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_testimonial author=\u00bbDavid Casta\u00f1eda\u00bb company_name=\u00bbProyectos Millennium\u00bb portrait_url=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/foto4.jpeg\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb background_enable_color=\u00bboff\u00bb background_image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg\u00bb custom_padding=\u00bb||73px|||\u00bb border_radii=\u00bbon|20px|20px|20px|20px\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">Very grateful, a very professional service and with immediate results on a very sensitive issue, such as computer security.<\/span><\/span><\/p>\n<p>[\/et_pb_testimonial][et_pb_testimonial author=\u00bbRodrigo Alfaro \u00bb job_title=\u00bbCEO\u00bb company_name=\u00bbGemforce\u00bb portrait_url=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/foto5.jpeg\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bbrgba(0,0,0,0)\u00bb background_image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg\u00bb border_radii=\u00bbon|20px|20px|20px|20px\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">\u00abWe were receiving attacks on our website, from the moment we contacted Talsoft they attended us instantly and were involved in solving the problem, what impressed me the most was their availability and determination to help us solve the problem.\u00bb<\/span><\/span><\/p>\n<p>[\/et_pb_testimonial][et_pb_testimonial company_name=\u00bbAvisLatam\u00bb portrait_url=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/foto1.jpeg\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bbrgba(0,0,0,0)\u00bb background_image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg\u00bb custom_padding=\u00bb||96px|||\u00bb border_radii=\u00bbon|20px|20px|20px|20px\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">\u00abThey delivered a quality service and accommodated the project delivery times, as they were quite limited.\u00bb<\/span><\/span><\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.16&#8243; custom_padding=\u00bb||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_testimonial author=\u00bbCarlos Bergia\u00bb job_title=\u00bbSysAdmin\u00bb company_name=\u00bbWcentrix\u00bb portrait_url=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/foto3.jpeg\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bbrgba(0,0,0,0)\u00bb background_image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg\u00bb border_radii=\u00bbon|20px|20px|20px|20px\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span class=\"tlid-translation translation\"><span title=\"\"><\/span><\/span><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">\u00abVery easy to contact Talsoft, either by mail or skype, communication was very fast. With regard to vulnerability scanning, very satisfied with the tool.\u00bb<\/span><\/span><\/p>\n<p>[\/et_pb_testimonial][et_pb_testimonial author=\u00bbRicardo May\u00bb company_name=\u00bbNexuscom Arg.\u00bb portrait_url=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/foto2.jpeg\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bbrgba(0,0,0,0)\u00bb background_image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg\u00bb custom_padding=\u00bb||70px|||\u00bb border_radii=\u00bbon|20px|20px|20px|20px\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span class=\"tlid-translation translation\"><span title=\"\"><\/span><\/span><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">\u00abWith your consulting services we managed to improve the computer security of our systems, allowing us to reach a level of excellence and thus certify PCI-DSS.\u00bb<\/span><\/span><\/p>\n<p>[\/et_pb_testimonial][et_pb_text _builder_version=\u00bb4.16&#8243; text_font=\u00bb||||||||\u00bb header_2_font=\u00bbOverpass|900|||||||\u00bb header_2_font_size=\u00bb56px\u00bb header_2_line_height=\u00bb1.1em\u00bb header_3_font=\u00bbOverpass|600|||||||\u00bb header_3_text_color=\u00bb#00b4ff\u00bb header_3_font_size=\u00bb30px\u00bb header_3_line_height=\u00bb1.2em\u00bb background_layout=\u00bbdark\u00bb header_2_font_size_tablet=\u00bb38px\u00bb header_2_font_size_phone=\u00bb26px\u00bb header_2_font_size_last_edited=\u00bbon|desktop\u00bb header_3_font_tablet=\u00bb\u00bb header_3_font_phone=\u00bbOverpass|700|||||||\u00bb header_3_font_last_edited=\u00bbon|phone\u00bb header_3_font_size_tablet=\u00bb24px\u00bb header_3_font_size_phone=\u00bb18px\u00bb header_3_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h3><\/h3>\n<h2><span style=\"font-size: xx-large;\"><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">Why control and know the computer security of your company?<\/span><\/span><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_divider color=\u00bb#00b4ff\u00bb divider_weight=\u00bb2px\u00bb _builder_version=\u00bb4.16&#8243; width=\u00bb100px\u00bb custom_margin=\u00bb||0px\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbServicios\u00bb _builder_version=\u00bb4.16&#8243; use_background_color_gradient=\u00bbon\u00bb background_color_gradient_direction=\u00bb263deg\u00bb background_color_gradient_stops=\u00bb#ffffff 45%|#cb0519 91%\u00bb background_color_gradient_start=\u00bb#ffffff\u00bb background_color_gradient_start_position=\u00bb45%\u00bb background_color_gradient_end=\u00bb#cb0519&#8243; background_color_gradient_end_position=\u00bb91%\u00bb background_image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/cyber-security-03-1.png\u00bb parallax=\u00bbon\u00bb locked=\u00bboff\u00bb collapsed=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.21.0&#8243; _module_preset=\u00bbdefault\u00bb][et_pb_column _builder_version=\u00bb4.21.0&#8243; _module_preset=\u00bbdefault\u00bb type=\u00bb4_4&#8243;][et_pb_cta title=\u00bbCybersecurity Maturity Framework\u00bb button_url=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/en\/cybersecurity-maturity-framework\/\u00bb button_text=\u00bbStart with a Cybersecurity GAP\u00bb _builder_version=\u00bb4.21.0&#8243; _module_preset=\u00bbdefault\u00bb header_level=\u00bbh1&#8243; header_font=\u00bb|700|||||||\u00bb header_text_color=\u00bb#000000&#8243; body_font=\u00bb|600|on||||||\u00bb body_text_color=\u00bb#000000&#8243; background_color=\u00bb#FFFFFF\u00bb custom_button=\u00bbon\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#CB0519&#8243; button_border_radius=\u00bb6px\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb border_width_all=\u00bb1px\u00bb border_color_all=\u00bb#0C71C3&#8243; box_shadow_style_button=\u00bbpreset4&#8243; global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb]<\/p>\n<h3 style=\"text-align: center;\"><span style=\"color: #000000;\">For companies facing audits, enterprise customers, and security pressure<\/span><\/h3>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#cb0519&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#cb0519&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb text_text_color=\u00bb#ffffff\u00bb header_text_color=\u00bb#ffffff\u00bb text_orientation=\u00bbcenter\u00bb background_layout=\u00bbdark\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h2><strong>CEO \/ Founder<\/strong><\/h2>\n<p>[\/et_pb_text][et_pb_team_member name=\u00bbLeandro Ferrari\u00bb position=\u00bbCEO \/ Fundador\u00bb image_url=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2013\/12\/leandroferrari_2.jpg\u00bb twitter_url=\u00bbhttps:\/\/twitter.com\/avatar_leandro\u00bb linkedin_url=\u00bbhttps:\/\/www.linkedin.com\/in\/leandroferrari\/\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb header_text_color=\u00bb#ffffff\u00bb body_text_color=\u00bb#ffffff\u00bb position_text_align=\u00bbcenter\u00bb text_orientation=\u00bbcenter\u00bb background_layout=\u00bbdark\u00bb border_radii_image=\u00bbon|97px|97px|97px|97px\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_team_member][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; fullwidth=\u00bbon\u00bb admin_label=\u00bbBLog\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb collapsed=\u00bbon\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_fullwidth_post_slider include_categories=\u00bb1&#8243; more_text=\u00bbLeer mas\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#cb0519&#8243; background_enable_image=\u00bboff\u00bb custom_padding=\u00bb||327px|||\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_fullwidth_post_slider][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbFooter\u00bb _builder_version=\u00bb4.16&#8243; use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_direction_radial=\u00bbtop right\u00bb background_color_gradient_stops=\u00bb#ffffff 0%|#cb0519 81%\u00bb background_color_gradient_start=\u00bb#ffffff\u00bb background_color_gradient_end=\u00bb#cb0519&#8243; background_color_gradient_end_position=\u00bb81%\u00bb background_image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/cyber-security-17.png\u00bb z_index=\u00bb10&#8243; overflow-x=\u00bbvisible\u00bb overflow-y=\u00bbvisible\u00bb custom_margin=\u00bb-247px|||||\u00bb custom_padding=\u00bb||10vw|||\u00bb locked=\u00bboff\u00bb collapsed=\u00bbon\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb2_5,3_5&#8243; make_equal=\u00bbon\u00bb _builder_version=\u00bb4.16&#8243; background_color=\u00bb#ffffff\u00bb custom_margin=\u00bb-146px|auto|-2px|auto||\u00bb custom_padding=\u00bb0px||0px||true\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1&#8243; box_shadow_vertical=\u00bb40px\u00bb box_shadow_blur=\u00bb60px\u00bb box_shadow_spread=\u00bb-8px\u00bb box_shadow_color=\u00bbrgba(10,45,97,0.48)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb2_5&#8243; _builder_version=\u00bb4.16&#8243; custom_padding=\u00bb60px|40px|60px|40px|true|true\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.16&#8243; header_2_font=\u00bbOverpass|900|||||||\u00bb header_2_font_size=\u00bb56px\u00bb header_2_line_height=\u00bb1.1em\u00bb header_2_font_size_tablet=\u00bb38px\u00bb header_2_font_size_phone=\u00bb26px\u00bb header_2_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h2>Talsoft TS<\/h2>\n<p>[\/et_pb_text][et_pb_blurb title=\u00bbMar del plata, Buenos Aires, Argentina\u00bb use_icon=\u00bbon\u00bb font_icon=\u00bb&#xe081;||divi||400&#8243; icon_color=\u00bb#006ac1&#8243; icon_placement=\u00bbleft\u00bb image_icon_width=\u00bb24px\u00bb _builder_version=\u00bb4.16&#8243; header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb icon_font_size=\u00bb24px\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Lunes &#8211; Viernes : 9am &#8211; 5pm<\/p>\n<p>[\/et_pb_blurb][et_pb_social_media_follow _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_social_media_follow_network social_network=\u00bbfacebook\u00bb url=\u00bbhttps:\/\/www.facebook.com\/talsoftsrl\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#3b5998&#8243; global_colors_info=\u00bb{}\u00bb follow_button=\u00bboff\u00bb url_new_window=\u00bbon\u00bb]facebook[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=\u00bbtwitter\u00bb url=\u00bbhttps:\/\/twitter.com\/talsoft\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#00aced\u00bb global_colors_info=\u00bb{}\u00bb follow_button=\u00bboff\u00bb url_new_window=\u00bbon\u00bb]twitter[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=\u00bblinkedin\u00bb url=\u00bbhttp:\/\/www.linkedin.com\/company\/talsoft\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#007bb6&#8243; global_colors_info=\u00bb{}\u00bb follow_button=\u00bboff\u00bb url_new_window=\u00bbon\u00bb]linkedin[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=\u00bbyoutube\u00bb url=\u00bbhttps:\/\/www.youtube.com\/channel\/UCnO026Qq-DHx3yHjL6jTO9g\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#a82400&#8243; global_colors_info=\u00bb{}\u00bb follow_button=\u00bboff\u00bb url_new_window=\u00bbon\u00bb]youtube[\/et_pb_social_media_follow_network][\/et_pb_social_media_follow][\/et_pb_column][et_pb_column type=\u00bb3_5&#8243; _builder_version=\u00bb4.16&#8243; use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_direction_radial=\u00bbtop right\u00bb background_color_gradient_stops=\u00bb#cb0519 0%|#cb0519 100%\u00bb background_color_gradient_start=\u00bb#cb0519&#8243; background_color_gradient_end=\u00bb#cb0519&#8243; background_image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/cyber-security-010-1.png\u00bb background_size=\u00bbcontain\u00bb background_position=\u00bbbottom_left\u00bb transform_translate_linked=\u00bboff\u00bb custom_padding=\u00bb60px|40px|60px|20%|true\u00bb custom_padding_tablet=\u00bb80px|||40px\u00bb custom_padding_phone=\u00bb\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb background_last_edited=\u00bbon|desktop\u00bb background_image_tablet=\u00bbhttp:\/\/zaib.sandbox.etdevs.com\/divi\/wp-content\/uploads\/sites\/2\/2019\/06\/cyber-security-11.png\u00bb background_enable_image_tablet=\u00bbon\u00bb background_position_tablet=\u00bbtop_left\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.16&#8243; text_font=\u00bb||||||||\u00bb text_text_color=\u00bb#ffffff\u00bb header_text_color=\u00bb#ffffff\u00bb header_2_font=\u00bbOverpass|900|||||||\u00bb header_2_font_size=\u00bb56px\u00bb header_2_line_height=\u00bb1.1em\u00bb text_orientation=\u00bbcenter\u00bb background_layout=\u00bbdark\u00bb header_2_font_size_tablet=\u00bb38px\u00bb header_2_font_size_phone=\u00bb26px\u00bb header_2_font_size_last_edited=\u00bbon|desktop\u00bb text_text_align=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h1><span style=\"font-size: x-large;\"><strong><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">Let&#8217;s start protecting your business against computer attacks<\/span><\/span><\/strong><\/span><\/h1>\n<p>[\/et_pb_text][et_pb_button button_url=\u00bbhttps:\/\/myths.talsoft-security.com\/schedule-call-en\u00bb button_text=\u00bbContact Us\u00bb button_alignment=\u00bbcenter\u00bb _builder_version=\u00bb4.21.0&#8243; custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#000000&#8243; button_bg_use_color_gradient=\u00bbon\u00bb button_bg_color_gradient_type=\u00bbcircular\u00bb button_bg_color_gradient_direction=\u00bb140deg\u00bb button_bg_color_gradient_direction_radial=\u00bbtop right\u00bb button_bg_color_gradient_stops=\u00bb#ffffff 0%|#ffffff 100%\u00bb button_bg_color_gradient_start=\u00bb#ffffff\u00bb button_bg_color_gradient_end=\u00bb#ffffff\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb100px\u00bb button_font=\u00bbOverpass|900||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_padding=\u00bb20px|30px|20px|30px|true|true\u00bb hover_enabled=\u00bb0&#8243; box_shadow_style=\u00bbpreset3&#8243; box_shadow_vertical=\u00bb0px\u00bb box_shadow_blur=\u00bb0px\u00bb box_shadow_spread=\u00bb-10px\u00bb box_shadow_color=\u00bbrgba(25,114,255,0.4)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb box_shadow_color__hover=\u00bb#2585b2&#8243; box_shadow_blur__hover_enabled=\u00bbon\u00bb box_shadow_blur__hover=\u00bb40px\u00bb box_shadow_vertical__hover_enabled=\u00bbon\u00bb box_shadow_vertical__hover=\u00bb10px\u00bb sticky_enabled=\u00bb0&#8243;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Executive clarity before audits and pressureOur methodology allows us to periodically audit your business to find vulnerabilities.We audit systems during the software life cycle, which allows us to find vulnerabilities in the early stages of development.The main consequences for your business in a computer attack, causes loss of money, information theft, image \/ reputation damage, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-4980","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/pages\/4980","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/comments?post=4980"}],"version-history":[{"count":22,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/pages\/4980\/revisions"}],"predecessor-version":[{"id":7386,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/pages\/4980\/revisions\/7386"}],"wp:attachment":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/media?parent=4980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}