{"id":316,"date":"2024-12-30T12:51:50","date_gmt":"2024-12-30T12:51:50","guid":{"rendered":"https:\/\/www.nimsistemas.es\/?page_id=316"},"modified":"2025-05-15T07:34:30","modified_gmt":"2025-05-15T07:34:30","slug":"ciberseguridad","status":"publish","type":"page","link":"https:\/\/www.nimsistemas.es\/?page_id=316","title":{"rendered":"ciberseguridad"},"content":{"rendered":"\n<div class=\"wp-block-uagb-container uagb-block-bbibmofi alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-pbk7r2er uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title-prefix\">SOC MDR 365<\/p><h1 class=\"uagb-ifb-title\">Ciberseguridad gestionada<\/h1><\/div><p class=\"uagb-ifb-desc\">Monitorizaci\u00f3n e inteligencia MDR para proteger tu informaci\u00f3n<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-al2sepyx\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap \">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-gjnnavwz wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/www.nimsistemas.es\/?page_id=382\" rel=\"follow noopener\" target=\"_blank\" role=\"button\"><div class=\"uagb-button__link\">SOC MDR<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-0xbfbgcl alignfull uagb-is-root-container\">\n<div class=\"wp-block-uagb-info-box uagb-block-sq9bu8cm uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h2 class=\"uagb-ifb-title\">Servicios SOC MDR 365<\/h2><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-bgwuagis\">\n<div class=\"wp-block-uagb-container uagb-block-kmiaawbx\">\n<div class=\"wp-block-uagb-info-box uagb-block-kw6or63s uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Alerta Temprana<\/h3><\/div><p class=\"uagb-ifb-desc\">Monitorizamos y analizamos ciberataques de manera que podamos anticiparnos <\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-vdqt3sz2\">\n<div class=\"wp-block-uagb-info-box uagb-block-f41eojvy uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Endpoint Security<\/h3><\/div><p class=\"uagb-ifb-desc\">Defendemos tus dispositivos frente a ciberamenazas mediante el equipo SOC MDR<\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-a230a1d1\">\n<div class=\"wp-block-uagb-info-box uagb-block-f377dd83 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Respuesta r\u00e1pida<\/h3><\/div><p class=\"uagb-ifb-desc\">Detectamos, aislamos, erradicamos y minimizamos los da\u00f1os frente a ciberataques <\/p><\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-77eb9256 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h2 class=\"uagb-ifb-title\">Protegemos tu empresa, c\u00e9ntrate en tu negocio<\/h2><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-41684c38\">\n<div class=\"wp-block-uagb-container uagb-block-02a959e3\">\n<div class=\"wp-block-uagb-info-box uagb-block-e6beb0ed uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Operaciones TI<\/h3><\/div><p class=\"uagb-ifb-desc\">desde la aplicaci\u00f3n de parches, actualizaciones y gesti\u00f3n de la configuraci\u00f3n. <\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-23cb8a47\">\n<div class=\"wp-block-uagb-info-box uagb-block-756f3e92 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">En tiempo real<\/h3><\/div><p class=\"uagb-ifb-desc\">Resolvemos los problemas con mayor rapidez gracias a la supervisi\u00f3n en tiempo real y alertas gestionadas.<\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-f96934cb\">\n<div class=\"wp-block-uagb-info-box uagb-block-9a1e9528 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Visibilidad y control <\/h3><\/div><p class=\"uagb-ifb-desc\">de usuario, maquinas virtuales y dispositivos de red desde nuestro dashboard MDR<\/p><\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-hwxbxzz6 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-shrr95mm uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h2 class=\"uagb-ifb-title\">funciones y soluciones<\/h2><\/div><p class=\"uagb-ifb-desc\">Gestionamos la seguridad de los endpoints a gran escala mediante alertas proactivas y correcci\u00f3n minimizando el tiempo de inactividad<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-layout-grid uagb-block-egne2xd1\">\n<div class=\"wp-block-uagb-container uagb-block-aeg5xbwa\">\n<div class=\"wp-block-uagb-info-box uagb-block-2rlffx6y uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Controles de seguridad<\/h3><\/div><p class=\"uagb-ifb-desc\">Ayudando a regular la autenticaci\u00f3n, autorizaci\u00f3n y acceso a tu red previniendo mejor los ataques maliciosos<\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-iwkbi2qz\">\n<div class=\"wp-block-uagb-info-box uagb-block-rl54fjsy uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Refuerzo de endpoints<\/h3><\/div><p class=\"uagb-ifb-desc\">controlamos los dispositivos gestionados automatizando los cambios en todo el entorno TI<\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-dnjgecsn\">\n<div class=\"wp-block-uagb-info-box uagb-block-qyuaz9hq uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Gesti\u00f3n de software<\/h3><\/div><p class=\"uagb-ifb-desc\">automatizamos la aplicaci\u00f3n de parches, instalaci\u00f3n y desinstalaci\u00f3n de software en windows, Linux y macOS <\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-i4xqs7mi\">\n<div class=\"wp-block-uagb-info-box uagb-block-z057krfz uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Trabajos y tareas<\/h3><\/div><p class=\"uagb-ifb-desc\">Automatizamos las tareas de los endpoints para estandarizar resultados y mejorar la estabilidad de los dispositivos.<\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-oxmmibzd\">\n<div class=\"wp-block-uagb-info-box uagb-block-oo01nk74 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Resoluci\u00f3n r\u00e1pida<\/h3><\/div><p class=\"uagb-ifb-desc\">Detectamos y resolvemos problemas, servicios detenidos, reinicios y aplicaciones minimizando el impacto en su negocio.<\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-7e219b9d\">\n<div class=\"wp-block-uagb-info-box uagb-block-9bebd702 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Acceso remoto seguro<\/h3><\/div><p class=\"uagb-ifb-desc\">Avisamos y tomamos el control directo de los dispositivos gestionados para garantizar una asistencia r\u00e1pida y segura.<\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-afb3c2dc\">\n<div class=\"wp-block-uagb-info-box uagb-block-9412028d uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Supervisi\u00f3n y alerta<\/h3><\/div><p class=\"uagb-ifb-desc\">Supervisamos los dispositivos en tiempo real y notificamos los problemas para solucionarlo en el menor tiempo posible. <\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-b4421c4a\">\n<div class=\"wp-block-uagb-info-box uagb-block-9ee11f3f uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Copias de seguridad<\/h3><\/div><p class=\"uagb-ifb-desc\">Creamos copias de seguridad fiables en la nube minimizando el impacto de los ransonwares o cualquiero otro ataque malicioso.<\/p><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","footnotes":""},"class_list":["post-316","page","type-page","status-publish","hentry"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"NIMSISTEMAS","author_link":"https:\/\/www.nimsistemas.es\/?author=2"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=\/wp\/v2\/pages\/316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=316"}],"version-history":[{"count":10,"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=\/wp\/v2\/pages\/316\/revisions"}],"predecessor-version":[{"id":1119,"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=\/wp\/v2\/pages\/316\/revisions\/1119"}],"wp:attachment":[{"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}