
{"id":5340,"date":"2019-10-09T21:20:59","date_gmt":"2019-10-10T00:20:59","guid":{"rendered":"https:\/\/www.talsoft.com.ar\/site\/?page_id=5340"},"modified":"2024-08-21T11:35:50","modified_gmt":"2024-08-21T14:35:50","slug":"purple-team-service","status":"publish","type":"page","link":"https:\/\/www.talsoft.com.ar\/site\/es\/servicios\/seguridad-informatica\/purple-team-service\/","title":{"rendered":"Purple Team Service"},"content":{"rendered":"[et_pb_section fb_built=\u00bb1&#8243; fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_fullwidth_post_title meta=\u00bboff\u00bb featured_image=\u00bboff\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_fullwidth_post_title][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbsection\u00bb _builder_version=\u00bb4.16&#8243; custom_padding=\u00bb||0px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_2,1_2&#8243; admin_label=\u00bbrow\u00bb _builder_version=\u00bb4.16&#8243; background_size=\u00bbinitial\u00bb background_position=\u00bbtop_left\u00bb background_repeat=\u00bbrepeat\u00bb custom_padding=\u00bb||0px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.16&#8243; custom_padding=\u00bb|||\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text admin_label=\u00bbText\u00bb _builder_version=\u00bb4.16&#8243; background_size=\u00bbinitial\u00bb background_position=\u00bbtop_left\u00bb background_repeat=\u00bbrepeat\u00bb min_height=\u00bb466px\u00bb custom_padding=\u00bb||0px|||\u00bb global_colors_info=\u00bb{}\u00bb]<p><\/p>\n<p><\/p>\n<p><strong>El Servicio Purple Team Talsoft TS<\/strong> permite <strong>simular ataques a los sistemas corporativos de la empresa<\/strong> y <strong>realizar una retroalimentaci\u00f3n<\/strong> de los resultados del ataque, para<strong> implementar controles y monitoreo del lado de defensa<\/strong> de la empresa<strong>. Se integran t\u00e1cticas y controles defensivos de acuerdo con las amenazas y vulnerabilidades encontradas.<\/strong><\/p>\n<p><\/p>\n<p><\/p>\n<p><strong>La inversi\u00f3n<\/strong> que realiza la empresa con nuestros servicios, permite <strong>minimizar la p\u00e9rdida de dinero y maximizar las ganancias<\/strong>, a\u00fan cuando ocurren ataques cibern\u00e9ticos. <strong>Aumentar\u00e1 su imagen, prestigio, fidelidad<\/strong> porque proteger\u00e1 la informaci\u00f3n confidencial y la relaci\u00f3n<strong> con clientes, inversores, proveedores<\/strong>.<\/p>\n<p><\/p>\n<p><\/p>\n<p>Le garantizamos que con nuestros servicios,<strong> podr\u00e1 controlar y conocer <\/strong>el estado de la seguridad inform\u00e1tica de tu empresa y concentrarte en el crecimiento y prosperidad de tu negocio. <strong>Nuestros profesionales trabajan en forma artesanal<\/strong>, de la misma forma que lo hace un intruso pero <strong>en forma autorizada<\/strong>. Tendr\u00e1 a su disposici\u00f3n <strong>expertos en seguridad inform\u00e1tica<\/strong> que lo ayudaran en dar respuestas a los incidentes y toma de decisiones en forma personalizada.<\/p>\n<p><\/p>\n<p><\/p>\n<p><\/p>\n<p><\/p>\n<p><\/p>\n<p><\/p>\n<p><\/p>\n<p><\/p>\n<p><\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.16&#8243; custom_padding=\u00bb|||\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_video_slider _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb min_height=\u00bb487px\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_video_slider_item src=\u00bbhttps:\/\/youtu.be\/EcG_b4Pl-kY\u00bb _builder_version=\u00bb4.5.6&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb show_image_overlay=\u00bboff\u00bb][\/et_pb_video_slider_item][et_pb_video_slider_item src=\u00bbhttps:\/\/youtu.be\/wQXvIAKtdxo\u00bb _builder_version=\u00bb4.5.6&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb show_image_overlay=\u00bboff\u00bb][\/et_pb_video_slider_item][et_pb_video_slider_item src=\u00bbhttps:\/\/youtu.be\/0WQlUKbuXP4&#8243; _builder_version=\u00bb4.5.6&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb show_image_overlay=\u00bboff\u00bb][\/et_pb_video_slider_item][\/et_pb_video_slider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px|||||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2019\/10\/CAT-V1.0-ES.jpg\u00bb title_text=\u00bbCAT V1.0 ES\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb||235px|||\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbFeatures\u00bb _builder_version=\u00bb4.16&#8243; min_height=\u00bb861px\u00bb custom_margin=\u00bb64px|||||\u00bb custom_padding=\u00bb0px||0px|||\u00bb collapsed=\u00bbon\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; _builder_version=\u00bb4.16&#8243; min_height=\u00bb556px\u00bb custom_margin=\u00bb-8vw|auto|-33px|auto|false|\u00bb custom_padding=\u00bb63px||0px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbDetecci\u00f3n temprana de Vulnerabilidades\u00bb image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/beneficios_icon1.png\u00bb image_icon_width=\u00bb30%\u00bb _builder_version=\u00bb4.16&#8243; header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb image_max_width=\u00bb30%\u00bb global_colors_info=\u00bb{}\u00bb]<p>Nuestra metodolog\u00eda nos permite auditar per\u00edodicamente su negocio para encontras vulnerabilidades.<\/p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; transform_scale_tablet=\u00bb\u00bb transform_scale_phone=\u00bb\u00bb transform_scale_last_edited=\u00bbon|desktop\u00bb transform_translate=\u00bb0px|-94px\u00bb transform_translate_tablet=\u00bb0px|0px\u00bb transform_translate_phone=\u00bb\u00bb transform_translate_last_edited=\u00bbon|desktop\u00bb transform_translate_linked=\u00bboff\u00bb transform_rotate_tablet=\u00bb\u00bb transform_rotate_phone=\u00bb\u00bb transform_rotate_last_edited=\u00bbon|desktop\u00bb transform_skew_tablet=\u00bb\u00bb transform_skew_phone=\u00bb\u00bb transform_skew_last_edited=\u00bbon|desktop\u00bb transform_origin_tablet=\u00bb\u00bb transform_origin_phone=\u00bb\u00bb transform_origin_last_edited=\u00bbon|desktop\u00bb transform_styles_last_edited=\u00bbon|desktop\u00bb transform_styles_tablet=\u00bb\u00bb transform_styles_phone=\u00bb\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbAuditor\u00eda dentro del desarrollo de software\u00bb image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/beneficios_icon2.png\u00bb image_icon_width=\u00bb30%\u00bb _builder_version=\u00bb4.16&#8243; header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb image_max_width=\u00bb30%\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<p>Auditamos sistemas durante el ciclo de vida del software, que permite encontrar vulnerabilidades en fases tempranas del desarrollo.<\/p>[\/et_pb_blurb][et_pb_blurb title=\u00bbMaximize sus ganancias y minimize sus p\u00e9rdidas de dinero.\u00bb image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/beneficios_icon5.png\u00bb image_icon_width=\u00bb30%\u00bb _builder_version=\u00bb4.16&#8243; header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb image_max_width=\u00bb30%\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<p>Los principales consecuencias para tu negocio ante un ataque inform\u00e1tico, ocasiona p\u00e9rdida de dinero, robo de informaci\u00f3n, da\u00f1o de imagen \/ reputaci\u00f3n, problemas legales.<\/p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; transform_scale_tablet=\u00bb\u00bb transform_scale_phone=\u00bb\u00bb transform_scale_last_edited=\u00bbon|desktop\u00bb transform_translate=\u00bb0px|-188px\u00bb transform_translate_tablet=\u00bb0px|0px\u00bb transform_translate_phone=\u00bb\u00bb transform_translate_last_edited=\u00bbon|desktop\u00bb transform_translate_linked=\u00bboff\u00bb transform_rotate_tablet=\u00bb\u00bb transform_rotate_phone=\u00bb\u00bb transform_rotate_last_edited=\u00bbon|desktop\u00bb transform_skew_tablet=\u00bb\u00bb transform_skew_phone=\u00bb\u00bb transform_skew_last_edited=\u00bbon|desktop\u00bb transform_origin_tablet=\u00bb\u00bb transform_origin_phone=\u00bb\u00bb transform_origin_last_edited=\u00bbon|desktop\u00bb transform_styles_last_edited=\u00bbon|desktop\u00bb transform_styles_tablet=\u00bb\u00bb transform_styles_phone=\u00bb\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbAumenta la confianza con Clientes \/ -inversores\u00bb image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/beneficios_icon3.png\u00bb image_icon_width=\u00bb30%\u00bb _builder_version=\u00bb4.16&#8243; header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb image_max_width=\u00bb30%\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<p>Cuando su negocio tiene lineamientos como eje principal, la seguridad inform\u00e1tica en todos sus aspectos, mejora la confianza con Clientes y\/o Inversores.<\/p>[\/et_pb_blurb][et_pb_blurb title=\u00bbProtecci\u00f3n de la informaci\u00f3n cr\u00edtica y confidencial\u00bb image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/beneficios_icon3.png\u00bb image_icon_width=\u00bb30%\u00bb _builder_version=\u00bb4.16&#8243; header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb image_max_width=\u00bb30%\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<p>Nuestros servicios permiten mejorar la protecci\u00f3n de la infomaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos.<\/p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px|||||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_5,3_5,1_5&#8243; admin_label=\u00bbDescripcionServicio\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb69.8%\u00bb custom_margin=\u00bb|199px||auto||\u00bb custom_padding=\u00bb|0px||||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_5&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_column][et_pb_column type=\u00bb3_5&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_pricing_tables featured_table_background_color=\u00bb#000000&#8243; featured_table_header_background_color=\u00bb#ffffff\u00bb featured_table_header_text_color=\u00bb#ffffff\u00bb header_background_color=\u00bb#ffffff\u00bb featured_table_subheader_text_color=\u00bb#ffffff\u00bb featured_table_text_color=\u00bb#000000&#8243; featured_table_bullet_color=\u00bb#ffffff\u00bb bullet_color=\u00bb#ffffff\u00bb show_featured_drop_shadow=\u00bboff\u00bb _builder_version=\u00bb4.21.0&#8243; _module_preset=\u00bbdefault\u00bb subheader_text_color=\u00bb#ffffff\u00bb body_text_color=\u00bb#000000&#8243; header_text_color=\u00bb#ffffff\u00bb header_text_align=\u00bbcenter\u00bb subheader_text_align=\u00bbcenter\u00bb background_enable_color=\u00bboff\u00bb background_image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg\u00bb custom_button=\u00bbon\u00bb button_text_color=\u00bb#cb0519&#8243; text_orientation=\u00bbcenter\u00bb width=\u00bb100%\u00bb custom_margin=\u00bb|2px||3px||\u00bb custom_padding=\u00bb|6px||0px||\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;][et_pb_pricing_table featured=\u00bbon\u00bb title=\u00bbPurple Team Service\u00bb subtitle=\u00bbSuscripci\u00f3n Anual\u00bb button_url=\u00bbhttps:\/\/myths.talsoft-security.com\/schedule-call-contacto\u00bb button_text=\u00bbCont\u00e1ctenos\u00bb bullet_color=\u00bb#cb0519&#8243; price_background_color=\u00bb#cb0519&#8243; header_background_color=\u00bb#cb0519&#8243; _builder_version=\u00bb4.21.0&#8243; _module_preset=\u00bbdefault\u00bb header_text_align=\u00bbcenter\u00bb header_text_color=\u00bb#ffffff\u00bb body_text_color=\u00bb#000000&#8243; subheader_text_color=\u00bb#000000&#8243; currency_frequency_text_color=\u00bb#ffffff\u00bb excluded_text_color=\u00bb#000000&#8243; background_color=\u00bbrgba(0,0,0,0)\u00bb background_enable_color=\u00bbon\u00bb button_alignment=\u00bbcenter\u00bb text_orientation=\u00bbleft\u00bb hover_enabled=\u00bb0&#8243; border_color_all_price=\u00bb#cb0519&#8243; global_colors_info=\u00bb{}\u00bb sticky_transition=\u00bbon\u00bb sticky_enabled=\u00bb0&#8243;]<p><strong>Firma y acuerdo MSA<\/strong><br \/><strong>Respuesta ante incidentes<\/strong><br \/><strong>Atenci\u00f3n personalizada<\/strong><br \/><strong>Expertos en tecnolog\u00edas<\/strong> en cloud y seguridad inform\u00e1tica<br \/>Tareas generales:<br \/><strong>Modo Ataque<\/strong><br \/>Planificaci\u00f3n de ataque.<br \/>Reconocimiento de la empresa.<br \/>Enumeraci\u00f3n de activos.<br \/>Detecci\u00f3n y An\u00e1lisis de vulnerabilidades.<br \/>Explotaci\u00f3n de vulnerabilidades.<br \/>Post-Explotaci\u00f3n y pivoteo.<br \/>Generaci\u00f3n de informes.<br \/><strong>Modo Defensa<\/strong><br \/>An\u00e1lisis de vulnerabilidades encontradas<br \/>An\u00e1lisis de infraestructura cloud<br \/>An\u00e1lisis de Pol\u00edtica de seguridad y procedimientos<br \/>An\u00e1lisis de Firewall y dispositivos de seguridad<br \/>Hardening de usuarios (Tiene un costo adicional de licencias)<br \/>Hardening de servicios y servidores<br \/>An\u00e1lisis de configuraciones por defecto<\/p>[\/et_pb_pricing_table][\/et_pb_pricing_tables][\/et_pb_column][et_pb_column type=\u00bb1_5&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; next_background_color=\u00bb#ffffff\u00bb admin_label=\u00bbFeedback\u00bb _builder_version=\u00bb4.16&#8243; use_background_color_gradient=\u00bbon\u00bb background_color_gradient_direction=\u00bb243deg\u00bb background_color_gradient_stops=\u00bb#cb0519 49%|#ffffff 100%\u00bb background_color_gradient_start=\u00bb#cb0519&#8243; background_color_gradient_start_position=\u00bb49%\u00bb background_color_gradient_end=\u00bb#ffffff\u00bb background_image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/cyber-security-12.png\u00bb background_size=\u00bbcontain\u00bb background_position=\u00bbtop_left\u00bb min_height=\u00bb1549px\u00bb overflow-x=\u00bbhidden\u00bb overflow-y=\u00bbhidden\u00bb custom_margin=\u00bb||\u00bb custom_padding=\u00bb13vw|||||\u00bb top_divider_height=\u00bb26vw\u00bb top_divider_flip=\u00bbhorizontal\u00bb bottom_divider_style=\u00bbasymmetric\u00bb bottom_divider_height=\u00bb22vw\u00bb collapsed=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb4.16&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.16&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_testimonial author=\u00bbDavid Casta\u00f1eda\u00bb company_name=\u00bbProyectos Millennium\u00bb portrait_url=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/foto4.jpeg\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb background_enable_color=\u00bboff\u00bb background_image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg\u00bb custom_padding=\u00bb||73px|||\u00bb border_radii=\u00bbon|20px|20px|20px|20px\u00bb global_colors_info=\u00bb{}\u00bb]<p>Muy agradecido, un servicio muy profesional y con resultados inmediatos en un tema muy delicado, como la seguridad inform\u00e1tica.<\/p>[\/et_pb_testimonial][et_pb_testimonial author=\u00bbRodrigo Alfaro \u00bb job_title=\u00bbCEO\u00bb company_name=\u00bbGemforce\u00bb portrait_url=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/foto5.jpeg\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bbrgba(0,0,0,0)\u00bb background_image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg\u00bb border_radii=\u00bbon|20px|20px|20px|20px\u00bb global_colors_info=\u00bb{}\u00bb]<p>\u00abEstuvimos recibiendo ataques en nuestro sitio web, desde el momento que contactamos a Talsoft nos atendieron al instante y se involucraron en la soluci\u00f3n del problema, lo que m\u00e1s me impresiono fue su disponibilidad y empe\u00f1o en ayudarnos a resolver el problema.\u00bb<\/p>[\/et_pb_testimonial][et_pb_testimonial company_name=\u00bbAvisLatam\u00bb portrait_url=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/foto1.jpeg\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bbrgba(0,0,0,0)\u00bb background_image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg\u00bb custom_padding=\u00bb||96px|||\u00bb border_radii=\u00bbon|20px|20px|20px|20px\u00bb global_colors_info=\u00bb{}\u00bb]<p>\u00abEntregaron un servicio de calidad y se acomodaron a los tiempos de entrega del proyecto, siendo que eran bastante acotados.\u00bb<\/p>[\/et_pb_testimonial][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.16&#8243; custom_padding=\u00bb||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_testimonial author=\u00bbCarlos Bergia\u00bb job_title=\u00bbSysAdmin\u00bb company_name=\u00bbWcentrix\u00bb portrait_url=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/foto3.jpeg\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bbrgba(0,0,0,0)\u00bb background_image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg\u00bb border_radii=\u00bbon|20px|20px|20px|20px\u00bb global_colors_info=\u00bb{}\u00bb]<p><span class=\"tlid-translation translation\"><span title=\"\">\u00abMucha facilidad de contacto con Talsoft, ya sea por mail o skype la comunicaci\u00f3n era muy r\u00e1pida. Con respecto al escaneo de vulnerabilidades, muy conforme con la herramienta.<\/span><\/span>\u00ab<\/p>[\/et_pb_testimonial][et_pb_testimonial author=\u00bbRicardo May\u00bb company_name=\u00bbNexuscom Arg.\u00bb portrait_url=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/foto2.jpeg\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bbrgba(0,0,0,0)\u00bb background_image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg\u00bb custom_padding=\u00bb||70px|||\u00bb border_radii=\u00bbon|20px|20px|20px|20px\u00bb global_colors_info=\u00bb{}\u00bb]<p><span class=\"tlid-translation translation\"><span title=\"\">\u00abCon vuestros servicios de consultor\u00eda logramos mejorar la seguridad inform\u00e1tica de nuestros sistemas, permiti\u00e9ndonos alcanzar un nivel de excelencia y as\u00ed certificar PCI-DSS.<\/span><\/span>\u00ab<\/p>[\/et_pb_testimonial][et_pb_text _builder_version=\u00bb4.16&#8243; text_font=\u00bb||||||||\u00bb header_2_font=\u00bbOverpass|900|||||||\u00bb header_2_font_size=\u00bb56px\u00bb header_2_line_height=\u00bb1.1em\u00bb header_3_font=\u00bbOverpass|600|||||||\u00bb header_3_text_color=\u00bb#00b4ff\u00bb header_3_font_size=\u00bb30px\u00bb header_3_line_height=\u00bb1.2em\u00bb background_layout=\u00bbdark\u00bb header_2_font_size_tablet=\u00bb38px\u00bb header_2_font_size_phone=\u00bb26px\u00bb header_2_font_size_last_edited=\u00bbon|desktop\u00bb header_3_font_tablet=\u00bb\u00bb header_3_font_phone=\u00bbOverpass|700|||||||\u00bb header_3_font_last_edited=\u00bbon|phone\u00bb header_3_font_size_tablet=\u00bb24px\u00bb header_3_font_size_phone=\u00bb18px\u00bb header_3_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<h3><\/h3>\n<h2><span style=\"font-size: xx-large;\">\u00bfPor qu\u00e9 controlar y conocer la seguridad inform\u00e1tica de su empresa?<\/span><\/h2>[\/et_pb_text][et_pb_divider color=\u00bb#00b4ff\u00bb divider_weight=\u00bb2px\u00bb _builder_version=\u00bb4.16&#8243; width=\u00bb100px\u00bb custom_margin=\u00bb||0px\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][et_pb_text _builder_version=\u00bb4.16&#8243; text_font=\u00bbOverpass|300|||||||\u00bb text_font_size=\u00bb17px\u00bb text_line_height=\u00bb1.8em\u00bb background_layout=\u00bbdark\u00bb text_font_size_tablet=\u00bb\u00bb text_font_size_phone=\u00bb14px\u00bb text_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<p>Los principales <strong>consecuencias<\/strong> para tu <strong>negocio<\/strong> ante un <strong>ataque inform\u00e1tico<\/strong>, ocasiona <strong>p\u00e9rdida de dinero, robo de informaci\u00f3n, da\u00f1o de imagen \/ reputaci\u00f3n, problemas legales<\/strong>.<\/p>[\/et_pb_text][et_pb_button button_url=\u00bbhttps:\/\/myths.talsoft-security.com\/schedule-call-contacto\u00bb button_text=\u00bbCont\u00e1ctenos\u00bb button_alignment=\u00bbcenter\u00bb _builder_version=\u00bb4.21.0&#8243; custom_button=\u00bbon\u00bb button_text_size=\u00bb19px\u00bb button_text_color=\u00bb#ffffff\u00bb button_bg_color=\u00bbrgba(0,0,0,0)\u00bb button_border_width=\u00bb2px\u00bb button_border_color=\u00bb#ffffff\u00bb button_border_radius=\u00bb100px\u00bb button_font=\u00bbOverpass|900||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_padding=\u00bb17px|52px|17px|52px|true|true\u00bb hover_enabled=\u00bb0&#8243; box_shadow_style=\u00bbpreset3&#8243; box_shadow_vertical=\u00bb0px\u00bb box_shadow_blur=\u00bb0px\u00bb box_shadow_spread=\u00bb-10px\u00bb box_shadow_color=\u00bbrgba(25,114,255,0.4)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb box_shadow_color__hover=\u00bb#2585b2&#8243; box_shadow_blur__hover_enabled=\u00bbon\u00bb box_shadow_blur__hover=\u00bb40px\u00bb box_shadow_vertical__hover_enabled=\u00bbon\u00bb box_shadow_vertical__hover=\u00bb10px\u00bb sticky_enabled=\u00bb0&#8243;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb4.16&#8243; custom_padding=\u00bb0px||0px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.16&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.16&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/cyber-security-15.jpg\u00bb _builder_version=\u00bb4.16&#8243; transform_scale_tablet=\u00bb100%|100%\u00bb transform_scale_phone=\u00bb\u00bb transform_scale_last_edited=\u00bbon|desktop\u00bb transform_translate=\u00bb10vw|0px\u00bb transform_translate_tablet=\u00bb0vw|0vw\u00bb transform_translate_phone=\u00bb\u00bb transform_translate_last_edited=\u00bbon|desktop\u00bb transform_translate_linked=\u00bboff\u00bb transform_rotate=\u00bb0deg|0deg|318deg\u00bb transform_rotate_tablet=\u00bb0deg|0deg|14deg\u00bb transform_rotate_phone=\u00bb\u00bb transform_rotate_last_edited=\u00bbon|desktop\u00bb transform_skew_tablet=\u00bb\u00bb transform_skew_phone=\u00bb\u00bb transform_skew_last_edited=\u00bbon|desktop\u00bb transform_origin_tablet=\u00bb\u00bb transform_origin_phone=\u00bb\u00bb transform_origin_last_edited=\u00bbon|desktop\u00bb transform_styles_last_edited=\u00bbon|desktop\u00bb custom_margin=\u00bb|-30vw|8vw||false\u00bb transform_styles_tablet=\u00bb\u00bb transform_styles_phone=\u00bb\u00bb border_radii=\u00bbon|500px|500px|500px|500px\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_cta button_url=\u00bbhttps:\/\/myths.talsoft-security.com\/schedule-call-contacto\u00bb button_text=\u00bbCont\u00e1ctenos\u00bb _builder_version=\u00bb4.21.0&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#cb0519&#8243; hover_enabled=\u00bb0&#8243; border_radii=\u00bbon|20px|20px|20px|20px\u00bb global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;]<p>Empieze a proteger su negocio frente ataques inform\u00e1ticos<\/p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][\/et_pb_section]","protected":false},"excerpt":{"rendered":"<p>El Servicio Purple Team Talsoft TS permite simular ataques a los sistemas corporativos de la empresa y realizar una retroalimentaci\u00f3n de los resultados del ataque, para implementar controles y monitoreo del lado de defensa de la empresa. Se integran t\u00e1cticas y controles defensivos de acuerdo con las amenazas y vulnerabilidades encontradas. La inversi\u00f3n que realiza [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":1191,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:core-embed\/youtube {\"url\":\"https:\/\/youtu.be\/wQXvIAKtdxo\",\"type\":\"video\",\"providerNameSlug\":\"youtube\",\"className\":\"wp-embed-aspect-16-9 wp-has-aspect-ratio\"} -->\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/youtu.be\/wQXvIAKtdxo\n<\/div><\/figure>\n<!-- \/wp:core-embed\/youtube -->\n\n<!-- wp:paragraph -->\n<p> <strong>El Purple Team Talsoft TS<\/strong> permite <strong>simular ataques a los sistemas corporativos de la empresa<\/strong> y <strong>realizar una retroalimentaci\u00f3n<\/strong> de los resultados del ataque, para<strong> implementar controles y monitoreo del lado de defensa<\/strong> de la empresa<strong>. Se integran t\u00e1cticas y controles defensivos de acuerdo con las amenazas y vulnerabilidades encontradas.<\/strong> <\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>La inversi\u00f3n<\/strong> que realiza la empresa con nuestros servicios, permite <strong>minimizar la p\u00e9rdida de dinero y maximizar las ganancias<\/strong>, a\u00fan cuando ocurren ataques cibern\u00e9ticos. <strong>Aumentar\u00e1 su imagen, prestigio, fidelidad<\/strong> porque proteger\u00e1 la informaci\u00f3n confidencial y la relaci\u00f3n<strong> con clientes, inversores, proveedores<\/strong>.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Le garantizamos que con nuestros servicios,<strong> podr\u00e1 controlar y conocer <\/strong>el estado de la seguridad inform\u00e1tica de tu empresa y concentrarte en el crecimiento y prosperidad de tu negocio. <strong>Nuestros profesionales trabajan en forma artesanal<\/strong>, de la misma forma que lo hace un intruso pero <strong>en forma autorizada<\/strong>. Tendr\u00e1 a su disposici\u00f3n <strong>expertos en seguridad inform\u00e1tica<\/strong> que lo ayudaran en dar respuestas a los incidentes y toma de decisiones en forma personalizada.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>[tw_divider type=\"line\" height=\"20\"]<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>[tw_pricing_table column=\"1\" price_category_list=\"purple-es\"]<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>[tw_divider type=\"line\" height=\"60\"]<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:image {\"align\":\"center\",\"id\":2774} -->\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img src=\"http:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2012\/11\/beneficios_1200.png\" alt=\"\" class=\"wp-image-2774\"\/><\/figure><\/div>\n<!-- \/wp:image -->\n\n<!-- wp:heading -->\n<h2>Conoce la opini\u00f3n de nuestros clientes<\/h2>\n<!-- \/wp:heading -->\n\n<!-- wp:shortcode -->\n[tw_divider type=\"space\" height=\"20\"]\n<!-- \/wp:shortcode -->\n\n<!-- wp:shortcode -->\n[tw_testimonials test_style=\"style_2\" category_ids=\"\" count=\"5\" bg_color=\" \" text_color=\" \" name_color=\" \" direction=\"right\" duration=\"1000\" timeout=\"2000\"]\n<!-- \/wp:shortcode -->\n\n<!-- wp:shortcode -->\n[tw_divider type=\"space\" height=\"20\"]\n<!-- \/wp:shortcode -->\n\n<!-- wp:image {\"id\":2741} -->\n<figure class=\"wp-block-image\"><img src=\"http:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2012\/11\/metodologia_1200x735.png\" alt=\"metodologia_1200x735\" class=\"wp-image-2741\"\/><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:heading {\"level\":3} -->\n<h3><strong>Es el momento de empezar a proteger su negocio. Obtenga sin costo su cotizaci\u00f3n personalizada con nuestros expertos, ahora mismo...<\/strong><\/h3>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph {\"align\":\"center\"} -->\n<p class=\"has-text-align-center\">[tw_button icon=\"\" link=\"http:\/\/www.talsoft.com.ar\/site\/obtener-una-cotizacion\/\" size=\"medium\" rounded=\"true\" style=\"flat\" hover=\"default\" color=\"#f01d1d\" target=\"_blank\"]Obtener una cotizaci\u00f3n[\/tw_button]<\/p>\n<!-- \/wp:paragraph -->","_et_gb_content_width":"","footnotes":""},"class_list":["post-5340","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/pages\/5340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/comments?post=5340"}],"version-history":[{"count":15,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/pages\/5340\/revisions"}],"predecessor-version":[{"id":6927,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/pages\/5340\/revisions\/6927"}],"up":[{"embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/pages\/1191"}],"wp:attachment":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/media?parent=5340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}