{"id":382,"date":"2024-12-31T16:59:56","date_gmt":"2024-12-31T16:59:56","guid":{"rendered":"https:\/\/www.nimsistemas.es\/?page_id=382"},"modified":"2025-01-12T19:13:01","modified_gmt":"2025-01-12T19:13:01","slug":"soc-mdr","status":"publish","type":"page","link":"https:\/\/www.nimsistemas.es\/?page_id=382","title":{"rendered":"SOC MDR"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-fsiiexcd alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-fkr6sw6u uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h2 class=\"uagb-ifb-title\">Que es un SOC y por qu\u00e9 es esencial para la ciberseguridad<\/h2><\/div><p class=\"uagb-ifb-desc\">Los SOC en ciberseguridad suponen una pieza fundamental para proteger la infraestructura de tecnolog\u00eda de la informaci\u00f3n (TI) de una organizaci\u00f3n, para garantizar la confidencialidad, integridad y disponibilidad de los datos y sistemas.<br><br>Los SOC \u00abSecurity Operations Center\u00bb \u00abCentro de Operaciones de Seguridad\u00bb se refiere a los equipos o instalaciones encargados de gestionar la ciberseguridad de la organizaci\u00f3n.<br><br>Como objetivo principal de un SOC es detectar y responder a las amenazas cibern\u00e9ticas en tiempo real, 24x7x365.<br><\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-layout-grid uagb-block-zs8fardd\">\n<div class=\"wp-block-uagb-container uagb-block-6gxrt1md\">\n<div class=\"wp-block-uagb-info-box uagb-block-mwxdzatm uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title-prefix\">01<\/p><h3 class=\"uagb-ifb-title\">Prevenci\u00f3n<\/h3><\/div><p class=\"uagb-ifb-desc\">Monitorizamos la seguridad de sus dispositivos, supervisando la red y los sistemas en busca de cualquier actividad sospechosa antes que se conviertan en incidentes.<\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-srd3lnmu\">\n<div class=\"wp-block-uagb-info-box uagb-block-mddwkawk uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title-prefix\">02<\/p><h3 class=\"uagb-ifb-title\">Detecci\u00f3n de incidentes<\/h3><\/div><p class=\"uagb-ifb-desc\">Utilizando herramientas de seguridad para identificar posibles amenazas, investigando incidentes de seguridad para determinar su naturaleza, gravedad e impacto.<\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-rvhjiipb\">\n<div class=\"wp-block-uagb-info-box uagb-block-eqpvt0lh uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title-prefix\">03<\/p><h3 class=\"uagb-ifb-title\">Respuesta<\/h3><\/div><p class=\"uagb-ifb-desc\">Investigando los incidentes, llegando a la causa raiz mediante t\u00e9cnicas forenses y tomando medidas de mitigaci\u00f3n inmediatas para contener y eliminar la amenaza.<\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-hwwi2hyz\">\n<div class=\"wp-block-uagb-info-box uagb-block-dugk2xjv uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title-prefix\">04<\/p><h3 class=\"uagb-ifb-title\">Recuperaci\u00f3n <\/h3><\/div><p class=\"uagb-ifb-desc\">Ante todo, restituir los activos afectados al estado al que se hallaban, una respuesta a un ciberataque debe ser r\u00e1pida <\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-30axjm8a\">\n<div class=\"wp-block-uagb-info-box uagb-block-crrfqhyc uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title-prefix\">05<\/p><h3 class=\"uagb-ifb-title\">An\u00e1lisis <\/h3><\/div><p class=\"uagb-ifb-desc\">Una vez resuelto el incidente, es importante realizar un an\u00e1lisis post-incidente para determinar el origen, m\u00e9todo utilizado y c\u00f3mo se puede prevenir.<\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-gxrnhkxb\">\n<div class=\"wp-block-uagb-info-box uagb-block-l307aqij uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title-prefix\">06<\/p><h3 class=\"uagb-ifb-title\">Mejoras de seguridad<\/h3><\/div><p class=\"uagb-ifb-desc\">Llegado a \u00e9ste punto, se puede recomendar e implementar mejoras en la infraestructura de seguridad y nuevas herramientas de ciberseguridad.<\/p><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-0aytwkdd alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-4r8vpswp uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h2 class=\"uagb-ifb-title\">BENEFICIOS DE LA CIBERSEGURIDAD GESTIONADA<\/h2><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-azoq2wld\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-t5tvkuum\">\n<div class=\"wp-block-uagb-info-box uagb-block-mtygo21p uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title\">MONITORIZACION, GESTI\u00d3N Y AN\u00c1LISIS CONTINUO<\/p><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-f9da0fvi uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title\">RESPUESTA INMEDIATA A POTENCIALES AMENAZAS<\/p><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-x5msayt0 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title\">SOLUCIONES R\u00c1PIDAS Y EFICACES ANTE INCIDENTES<\/p><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-s7fdwpoi uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title\">PROTECCI\u00d3N EFECTIVA DE LOS ACTIVOS <\/p><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-a98b3b5e\">\n<div class=\"wp-block-uagb-info-box uagb-block-121e86e3 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title\">GARANTIZAR LA CONTINUIDAD DEL NEGOCIO<\/p><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-fc31c19e uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title\">DISPONIBILIDAD DE LOS DATOS<\/p><\/div><p class=\"uagb-ifb-desc\">.<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-46131ad5 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title\">MINIMIZAR LOS COSTES DE LA INVERSI\u00d3N<\/p><\/div><p class=\"uagb-ifb-desc\">.<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-78871d53 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title\">GARANTIZAR LA MEJORA EN CIBERSERGURIDAD<\/p><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","footnotes":""},"class_list":["post-382","page","type-page","status-publish","hentry"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"NIMSISTEMAS","author_link":"https:\/\/www.nimsistemas.es\/?author=2"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=\/wp\/v2\/pages\/382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=382"}],"version-history":[{"count":5,"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=\/wp\/v2\/pages\/382\/revisions"}],"predecessor-version":[{"id":408,"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=\/wp\/v2\/pages\/382\/revisions\/408"}],"wp:attachment":[{"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}