
{"id":1049,"date":"2011-01-03T13:26:51","date_gmt":"2011-01-03T16:26:51","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/index.php"},"modified":"2020-08-19T10:41:23","modified_gmt":"2020-08-19T13:41:23","slug":"testeo-de-seguridad-informatica","status":"publish","type":"page","link":"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/testeo-de-seguridad-informatica\/","title":{"rendered":"Hacking \u00c9tico para Empresas"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_fullwidth_post_title meta=&#8221;off&#8221; featured_image=&#8221;off&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_fullwidth_post_title][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.22&#8243; collapsed=&#8221;off&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_video_slider _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;487px&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221;][et_pb_video_slider_item src=&#8221;https:\/\/www.youtube.com\/watch?v=Jw8C8NNHCbo&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; show_image_overlay=&#8221;off&#8221;][\/et_pb_video_slider_item][et_pb_video_slider_item src=&#8221;https:\/\/youtu.be\/EcG_b4Pl-kY&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; show_image_overlay=&#8221;off&#8221;][\/et_pb_video_slider_item][et_pb_video_slider_item src=&#8221;https:\/\/youtu.be\/wQXvIAKtdxo&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; show_image_overlay=&#8221;off&#8221;][\/et_pb_video_slider_item][et_pb_video_slider_item src=&#8221;https:\/\/youtu.be\/0WQlUKbuXP4&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; show_image_overlay=&#8221;off&#8221;][\/et_pb_video_slider_item][\/et_pb_video_slider][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.5.6&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;||-138px|||&#8221; custom_padding=&#8221;||85px|||&#8221;]<p><\/p>\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper\"><\/div>\n<\/figure>\n<p><\/p>\n<p>Un proyecto de<strong> Hacking \u00c9tico<\/strong> consiste en una auditor\u00eda de seguridad\u00a0controlada en los sistemas inform\u00e1ticos de una empresa, de <em><strong>la misma forma que lo har\u00eda un intruso o pirata inform\u00e1tico pero de forma \u00e9tica, previa autorizaci\u00f3n de un convenio de confidencialidad por escrito<\/strong><\/em>. El resultado es un informe donde se identifican los sistemas en los que se ha logrado penetrar y la informaci\u00f3n confidencial y\/o secreta conseguida. <strong>E<em>ste servicio tambi\u00e9n puede utilizarse para garantizar el cumplimiento de PCI DSS<\/em>.<\/strong><\/p>\n<p><\/p>\n<p>Comprende un conjunto de <strong><em>metodolog\u00edas y t\u00e9cnicas para realizar un diagn\u00f3stico integral de las debilidades de los sistemas inform\u00e1ticos de la organizaci\u00f3n<\/em>.<\/strong> Consiste en un modelo que reproduce intentos de acceso a cualquier entorno inform\u00e1tico de un intruso potencial desde los diferentes puntos de entrada que existan, tanto internos como remotos. Detectando las debilidades de la organizaci\u00f3n antes de que se produzcan los ingresos indebidos de intrusos.<\/p>\n<p><\/p>\n<p style=\"text-align: center;\"><\/p>\n<h2><\/h2>\n<h2><\/h2>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Titulo Beneficios&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;]<h2 style=\"text-align: left;\">Beneficios para su empresa<\/h2>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; admin_label=&#8221;Beneficios&#8221; _builder_version=&#8221;3.25.3&#8243; custom_margin=&#8221;-8vw||||false&#8221; custom_padding=&#8221;300px||0px|||&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25.1&#8243;][et_pb_blurb title=&#8221;Detecci\u00f3n temprana de Vulnerabilidades&#8221; image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/beneficios_icon1.png&#8221; image_max_width=&#8221;30%&#8221; _builder_version=&#8221;4.5.6&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221;]<p>Nuestra metodolog\u00eda nos permite auditar per\u00edodicamente su negocio para encontras vulnerabilidades.<\/p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25.1&#8243; transform_scale_tablet=&#8221;&#8221; transform_scale_phone=&#8221;&#8221; transform_scale_last_edited=&#8221;on|desktop&#8221; transform_translate=&#8221;0px|-94px&#8221; transform_translate_tablet=&#8221;0px|0px&#8221; transform_translate_phone=&#8221;&#8221; transform_translate_last_edited=&#8221;on|desktop&#8221; transform_translate_linked=&#8221;off&#8221; transform_rotate_tablet=&#8221;&#8221; transform_rotate_phone=&#8221;&#8221; transform_rotate_last_edited=&#8221;on|desktop&#8221; transform_skew_tablet=&#8221;&#8221; transform_skew_phone=&#8221;&#8221; transform_skew_last_edited=&#8221;on|desktop&#8221; transform_origin_tablet=&#8221;&#8221; transform_origin_phone=&#8221;&#8221; transform_origin_last_edited=&#8221;on|desktop&#8221; transform_styles_last_edited=&#8221;on|desktop&#8221; transform_styles_tablet=&#8221;&#8221; transform_styles_phone=&#8221;&#8221;][et_pb_blurb title=&#8221;Auditor\u00eda dentro del desarrollo de software&#8221; image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/beneficios_icon2.png&#8221; image_max_width=&#8221;30%&#8221; _builder_version=&#8221;4.5.6&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221;]<p>Auditamos sistemas durante el ciclo de vida del software, que permite encontrar vulnerabilidades en fases tempranas del desarrollo.<\/p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Maximize sus ganancias y minimize sus p\u00e9rdidas de dinero.&#8221; image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/beneficios_icon5.png&#8221; image_max_width=&#8221;30%&#8221; _builder_version=&#8221;4.5.6&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221;]<p>Los principales consecuencias para tu negocio ante un ataque inform\u00e1tico, ocasiona p\u00e9rdida de dinero, robo de informaci\u00f3n, da\u00f1o de imagen \/ reputaci\u00f3n, problemas legales.<\/p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25.1&#8243; transform_scale_tablet=&#8221;&#8221; transform_scale_phone=&#8221;&#8221; transform_scale_last_edited=&#8221;on|desktop&#8221; transform_translate=&#8221;0px|-188px&#8221; transform_translate_tablet=&#8221;0px|0px&#8221; transform_translate_phone=&#8221;&#8221; transform_translate_last_edited=&#8221;on|desktop&#8221; transform_translate_linked=&#8221;off&#8221; transform_rotate_tablet=&#8221;&#8221; transform_rotate_phone=&#8221;&#8221; transform_rotate_last_edited=&#8221;on|desktop&#8221; transform_skew_tablet=&#8221;&#8221; transform_skew_phone=&#8221;&#8221; transform_skew_last_edited=&#8221;on|desktop&#8221; transform_origin_tablet=&#8221;&#8221; transform_origin_phone=&#8221;&#8221; transform_origin_last_edited=&#8221;on|desktop&#8221; transform_styles_last_edited=&#8221;on|desktop&#8221; transform_styles_tablet=&#8221;&#8221; transform_styles_phone=&#8221;&#8221;][et_pb_blurb title=&#8221;Aumenta la confianza con Clientes \/ -inversores&#8221; image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/beneficios_icon3.png&#8221; image_max_width=&#8221;30%&#8221; _builder_version=&#8221;4.5.6&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221;]<p>Cuando su negocio tiene lineamientos como eje principal, la seguridad inform\u00e1tica en todos sus aspectos, mejora la confianza con Clientes y\/o Inversores.<\/p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Protecci\u00f3n de la informaci\u00f3n cr\u00edtica y confidencial&#8221; image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/beneficios_icon3.png&#8221; image_max_width=&#8221;30%&#8221; _builder_version=&#8221;4.5.6&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221;]<p>Nuestros servicios permiten mejorar la protecci\u00f3n de la infomaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos.<\/p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_5,3_5,1_5&#8243; admin_label=&#8221;DescripcionServicio&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; width=&#8221;69.8%&#8221; custom_margin=&#8221;|199px||auto||&#8221; custom_padding=&#8221;|0px||||&#8221;][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_pricing_tables featured_table_background_color=&#8221;#000000&#8243; featured_table_header_background_color=&#8221;#ffffff&#8221; featured_table_header_text_color=&#8221;#ffffff&#8221; header_background_color=&#8221;#ffffff&#8221; featured_table_subheader_text_color=&#8221;#ffffff&#8221; featured_table_text_color=&#8221;#000000&#8243; featured_table_bullet_color=&#8221;#ffffff&#8221; bullet_color=&#8221;#ffffff&#8221; show_featured_drop_shadow=&#8221;off&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; subheader_text_color=&#8221;#ffffff&#8221; body_text_color=&#8221;#000000&#8243; header_text_color=&#8221;#ffffff&#8221; header_text_align=&#8221;center&#8221; subheader_text_align=&#8221;center&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#cb0519&#8243; text_orientation=&#8221;center&#8221; hover_enabled=&#8221;0&#8243;][et_pb_pricing_table featured=&#8221;on&#8221; title=&#8221;Proyecto de Hacking \u00e9tico&#8221; subtitle=&#8221;Por Proyecto \/ Anual&#8221; button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjkwNyJ9fQ==@&#8221; button_text=&#8221;Cont\u00e1ctenos&#8221; bullet_color=&#8221;#cb0519&#8243; price_background_color=&#8221;#cb0519&#8243; header_background_color=&#8221;#cb0519&#8243; _builder_version=&#8221;4.5.6&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#ffffff&#8221; body_text_color=&#8221;#000000&#8243; subheader_text_color=&#8221;#000000&#8243; currency_frequency_text_color=&#8221;#ffffff&#8221; excluded_text_color=&#8221;#000000&#8243; background_color=&#8221;rgba(0,0,0,0)&#8221; background_enable_color=&#8221;on&#8221; button_alignment=&#8221;center&#8221; text_orientation=&#8221;left&#8221; border_color_all_price=&#8221;#cb0519&#8243;]<p>+Planificaci\u00f3n de ataque.<\/p>\n<p>+Reconocimiento de la empresa.<br \/> +Detecci\u00f3n de vulnerabilidades.<br \/> +Explotaci\u00f3n de vulnerabilidades.<br \/> +Generaci\u00f3n de reportes Inicial y Final.<br \/> +Re-verificaci\u00f3n de problema corregidos hasta 30 d\u00edas.<br \/> +Consultor\u00eda en seguridad inform\u00e1tica.<br \/> +Cloud Privado para su empresa.<br \/> +Tipo Externo o Interno.<\/p>[\/et_pb_pricing_table][\/et_pb_pricing_tables][\/et_pb_column][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;metodogia&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2011\/01\/metodologia_frame2.png&#8221; title_text=&#8221;bg_talsoft_1354x619&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.5.6&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25.3&#8243;][et_pb_testimonial author=&#8221;David Casta\u00f1eda&#8221; company_name=&#8221;Proyectos Millennium&#8221; portrait_url=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/foto4.jpeg&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; custom_padding=&#8221;||73px|||&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221;]<p>Muy agradecido, un servicio muy profesional y con resultados inmediatos en un tema muy delicado, como la seguridad inform\u00e1tica.<\/p>[\/et_pb_testimonial][et_pb_testimonial author=&#8221;Rodrigo Alfaro &#8221; job_title=&#8221;CEO&#8221; company_name=&#8221;Gemforce&#8221; portrait_url=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/foto5.jpeg&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221;]<p>&#8220;Estuvimos recibiendo ataques en nuestro sitio web, desde el momento que contactamos a Talsoft nos atendieron al instante y se involucraron en la soluci\u00f3n del problema, lo que m\u00e1s me impresiono fue su disponibilidad y empe\u00f1o en ayudarnos a resolver el problema.&#8221;<\/p>[\/et_pb_testimonial][et_pb_testimonial company_name=&#8221;AvisLatam&#8221; portrait_url=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/foto1.jpeg&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; custom_padding=&#8221;||96px|||&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221;]<p>&#8220;Entregaron un servicio de calidad y se acomodaron a los tiempos de entrega del proyecto, siendo que eran bastante acotados.&#8221;<\/p>[\/et_pb_testimonial][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25.3&#8243; custom_padding=&#8221;||&#8221;][et_pb_testimonial author=&#8221;Carlos Bergia&#8221; job_title=&#8221;SysAdmin&#8221; company_name=&#8221;Wcentrix&#8221; portrait_url=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/foto3.jpeg&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221;]<p><span class=\"tlid-translation translation\"><span title=\"\">&#8220;Mucha facilidad de contacto con Talsoft, ya sea por mail o skype la comunicaci\u00f3n era muy r\u00e1pida. Con respecto al escaneo de vulnerabilidades, muy conforme con la herramienta.<\/span><\/span>&#8220;<\/p>[\/et_pb_testimonial][et_pb_testimonial author=&#8221;Ricardo May&#8221; company_name=&#8221;Nexuscom Arg.&#8221; portrait_url=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/foto2.jpeg&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; custom_padding=&#8221;||70px|||&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221;]<p><span class=\"tlid-translation translation\"><span title=\"\">&#8220;Con vuestros servicios de consultor\u00eda logramos mejorar la seguridad inform\u00e1tica de nuestros sistemas, permiti\u00e9ndonos alcanzar un nivel de excelencia y as\u00ed certificar PCI-DSS.<\/span><\/span>&#8220;<\/p>[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Calltoaction&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_cta button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjkwNyJ9fQ==@&#8221; button_text=&#8221;Cont\u00e1ctenos&#8221; _builder_version=&#8221;4.5.6&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; background_color=&#8221;#cb0519&#8243; border_radii=&#8221;on|20px|20px|20px|20px&#8221;]<p>Empieze a proteger su negocio frente ataques inform\u00e1ticos<\/p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][\/et_pb_section]","protected":false},"excerpt":{"rendered":"<p>Un proyecto de Hacking \u00c9tico consiste en una auditor\u00eda de seguridad\u00a0controlada en los sistemas inform\u00e1ticos de una empresa, de la misma forma que lo har\u00eda un intruso o pirata inform\u00e1tico pero de forma \u00e9tica, previa autorizaci\u00f3n de un convenio de confidencialidad por escrito. El resultado es un informe donde se identifican los sistemas en los [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":1191,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:core-embed\/youtube {\"url\":\"https:\/\/www.youtube.com\/watch?v=Jw8C8NNHCbo\",\"type\":\"video\",\"providerNameSlug\":\"youtube\",\"className\":\"wp-embed-aspect-16-9 wp-has-aspect-ratio\"} -->\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/www.youtube.com\/watch?v=Jw8C8NNHCbo\n<\/div><\/figure>\n<!-- \/wp:core-embed\/youtube -->\n\n<!-- wp:paragraph -->\n<p>Un proyecto de<strong> Hacking \u00c9tico<\/strong> consiste en una auditor\u00eda de seguridad&nbsp;controlada en los sistemas inform\u00e1ticos de una empresa, de <em><strong>la misma forma que lo har\u00eda un intruso o pirata inform\u00e1tico pero de forma \u00e9tica, previa autorizaci\u00f3n de un convenio de confidencialidad por escrito<\/strong><\/em>. El resultado es un informe donde se identifican los sistemas en los que se ha logrado penetrar y la informaci\u00f3n confidencial y\/o secreta conseguida. <strong>E<em>ste servicio tambi\u00e9n puede utilizarse para garantizar el cumplimiento de PCI DSS<\/em>.<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Comprende un conjunto de <strong><em>metodolog\u00edas y t\u00e9cnicas para realizar un diagn\u00f3stico integral de las debilidades de los sistemas inform\u00e1ticos de la organizaci\u00f3n<\/em>.<\/strong> Consiste en un modelo que reproduce intentos de acceso a cualquier entorno inform\u00e1tico de un intruso potencial desde los diferentes puntos de entrada que existan, tanto internos como remotos. Detectando las debilidades de la organizaci\u00f3n antes de que se produzcan los ingresos indebidos de intrusos.<\/p>\n<!-- \/wp:paragraph -->\n\n<h2>Tipos de Hacking \u00e9tico<\/h2>\n<ul>\n<li><strong>Hacking \u00c9tico Externo<\/strong>: Permite evaluar el estado de la seguridad de una organizaci\u00f3n desde Internet como si lo hiciera un intruso real.<\/li>\n<li><strong>Hacking \u00c9tico Interno<\/strong>: Permite evaluar el estado de la seguridad dentro de la organizaci\u00f3n.<\/li>\n<\/ul>\n<h2>Conoce la opini\u00f3n de nuestros clientes<\/h2>\n<p>[tw_divider type=\"space\" height=\"20\"]<\/p>\n<p>[tw_testimonials test_style=\"style_2\" category_ids=\"\" count=\"22\" bg_color=\" \" text_color=\" \" name_color=\" \" direction=\"right\" duration=\"1000\" timeout=\"2000\"]<\/p>\n<p>[tw_divider type=\"space\" height=\"20\"]<\/p>\n<p style=\"text-align: center;\">[tw_button icon=\"\" link=\"https:\/\/www.talsoft-security.com\/site\/obtener-una-cotizacion\/\" size=\"medium\" rounded=\"true\" style=\"flat\" hover=\"default\" color=\"#f01d1d\" target=\"_blank\"]Obtener una cotizaci\u00f3n[\/tw_button]<\/p>\n<h2>Metodolog\u00eda<a href=\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2011\/01\/Pentest.png\"><img class=\" wp-image-2870 size-large aligncenter\" src=\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2011\/01\/metodologia_frame2-1024x658.png\" alt=\"metodologia_frame2\" width=\"960\" height=\"617\"\/><\/a><\/h2>\n<h2>Beneficios para su empresa<\/h2>\n<p style=\"text-align: justify;\"><strong>La inversi\u00f3n<\/strong> que realiza la empresa con nuestros servicios, permite <strong>minimizar la p\u00e9rdida de dinero y maximizar las ganancias<\/strong>, a\u00fan cuando ocurren ataques cibern\u00e9ticos. <strong>Aumentar\u00e1 su imagen, prestigio, fidelidad<\/strong> porque proteger\u00e1 la informaci\u00f3n confidencial y la relaci\u00f3n<strong> con clientes, inversores, proveedores<\/strong>.<\/p>\n<p style=\"text-align: justify;\">Le garantizamos que con nuestros servicios,<strong> podr\u00e1 controlar y conocer <\/strong>el estado de la seguridad inform\u00e1tica de tu empresa y concentrarte en el crecimiento y prosperidad de tu negocio. <strong>Nuestros profesionales trabajan en forma artesanal<\/strong>, de la misma forma que lo hace un intruso pero <strong>en forma autorizada<\/strong>. Tendr\u00e1 a su disposici\u00f3n <strong>expertos en seguridad inform\u00e1tica<\/strong> que lo ayudaran en dar respuestas a los incidentes y toma de decisiones en forma personalizada.<\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"text-decoration: underline;\">Es el momento de empezar a proteger su negocio<\/span>. <span style=\"text-decoration: underline;\">Obtenga sin costo su cotizaci\u00f3n personalizada<\/span> con nuestros expertos, <span style=\"text-decoration: underline;\">ahora mismo...<\/span><\/strong><\/p>\n<p style=\"text-align: justify;\">[tw_divider type=\"space\" height=\"40\"]<\/p>\n<p style=\"text-align: justify;\">[tw_pricing_table column=\"3\" price_category_list=\"hackingetico\"]<\/p>\n<p style=\"text-align: justify;\">[tw_divider type=\"space\" height=\"40\"]<\/p>","_et_gb_content_width":"","footnotes":""},"class_list":["post-1049","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Hacking \u00c9tico para Empresas<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/testeo-de-seguridad-informatica\/\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/testeo-de-seguridad-informatica\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/testeo-de-seguridad-informatica\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Hacking \u00c9tico para Empresas\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2011-01-03T16:26:51+00:00\",\"dateModified\":\"2020-08-19T13:41:23+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/testeo-de-seguridad-informatica\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/testeo-de-seguridad-informatica\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/testeo-de-seguridad-informatica\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Servicios\",\"item\":\"https:\/\/www.talsoft-security.com\/site\/servicios\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguridad Inform\u00e1tica\",\"item\":\"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hacking \u00c9tico para Empresas\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Hacking \u00c9tico para Empresas","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/testeo-de-seguridad-informatica\/","twitter_misc":{"Estimated reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/testeo-de-seguridad-informatica\/","url":"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/testeo-de-seguridad-informatica\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Hacking \u00c9tico para Empresas","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2011-01-03T16:26:51+00:00","dateModified":"2020-08-19T13:41:23+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","breadcrumb":{"@id":"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/testeo-de-seguridad-informatica\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/testeo-de-seguridad-informatica\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/testeo-de-seguridad-informatica\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Servicios","item":"https:\/\/www.talsoft-security.com\/site\/servicios\/"},{"@type":"ListItem","position":2,"name":"Seguridad Inform\u00e1tica","item":"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/"},{"@type":"ListItem","position":3,"name":"Hacking \u00c9tico para Empresas"}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/pages\/1049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=1049"}],"version-history":[{"count":87,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/pages\/1049\/revisions"}],"predecessor-version":[{"id":6534,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/pages\/1049\/revisions\/6534"}],"up":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/pages\/1191"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=1049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}