
{"id":2540,"date":"2014-09-26T12:12:38","date_gmt":"2014-09-26T15:12:38","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?page_id=2540"},"modified":"2020-08-19T10:47:48","modified_gmt":"2020-08-19T13:47:48","slug":"auditoria-pci-dss","status":"publish","type":"page","link":"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/auditoria-pci-dss\/","title":{"rendered":"Auditor\u00eda PCI DSS"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_fullwidth_post_title meta=&#8221;off&#8221; featured_image=&#8221;off&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_fullwidth_post_title][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.22&#8243;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; admin_label=&#8221;row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span class=\"intelliTXT\">Las empresas que <strong>almacenan, procesan o transmiten informaci\u00f3n con tarjetas de cr\u00e9dito est\u00e1n obligadas<\/strong> por las principales marcas de tarjetas (Visa, Mastercard, etc.),<strong> a cumplir con un conjunto de normas conocidas como Est\u00e1ndares de Seguridad de Datos de pago<\/strong> (PCI-DSS).<\/span><\/p>\n<p style=\"text-align: justify;\"><strong>PCI DSS<\/strong> son una serie de normas que est\u00e1n desarrolladas <strong>para proteger los datos de los due\u00f1os de tarjetas de cr\u00e9dito<\/strong> durante, y despu\u00e9s, de una transacci\u00f3n financiera.<\/p>\n<p>Existen 6 categor\u00edas de est\u00e1ndares a cumplir:<\/p>\n<ol>\n<li>Construir y mantener una red segura.<\/li>\n<li>Proteger los datos del due\u00f1o de la tarjeta.<\/li>\n<li>Mantener un programa de gesti\u00f3n de vulnerabilidades.<\/li>\n<li>Implementar medidas fuertes de control de acceso.<\/li>\n<li>Monitorizar y probar las redes regularmente.<\/li>\n<li>Mantener una pol\u00edtica de seguridad de la informaci\u00f3n.<\/li>\n<\/ol>\n<p><strong>Informaci\u00f3n PCI DSS<\/strong>:\u00a0 <a href=\"https:\/\/www.pcisecuritystandards.org\/\">Aqu\u00ed<\/a><\/p>\n<p style=\"text-align: justify;\"><strong>Talsoft<\/strong> permite <strong>complementar y acompa\u00f1ar a la empresa a su certificaci\u00f3n PCI DSS<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_video_slider _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;487px&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221;][et_pb_video_slider_item src=&#8221;https:\/\/youtu.be\/EcG_b4Pl-kY&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; show_image_overlay=&#8221;off&#8221;][\/et_pb_video_slider_item][et_pb_video_slider_item src=&#8221;https:\/\/youtu.be\/wQXvIAKtdxo&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; show_image_overlay=&#8221;off&#8221;][\/et_pb_video_slider_item][et_pb_video_slider_item src=&#8221;https:\/\/youtu.be\/0WQlUKbuXP4&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; show_image_overlay=&#8221;off&#8221;][\/et_pb_video_slider_item][\/et_pb_video_slider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_row column_structure=&#8221;1_5,3_5,1_5&#8243; admin_label=&#8221;DescripcionServicio&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; width=&#8221;69.8%&#8221; custom_margin=&#8221;|199px||auto||&#8221; custom_padding=&#8221;|0px||||&#8221;][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_pricing_tables featured_table_background_color=&#8221;#000000&#8243; featured_table_header_background_color=&#8221;#ffffff&#8221; featured_table_header_text_color=&#8221;#ffffff&#8221; header_background_color=&#8221;#ffffff&#8221; featured_table_subheader_text_color=&#8221;#ffffff&#8221; featured_table_text_color=&#8221;#000000&#8243; featured_table_bullet_color=&#8221;#ffffff&#8221; bullet_color=&#8221;#ffffff&#8221; show_featured_drop_shadow=&#8221;off&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; subheader_text_color=&#8221;#ffffff&#8221; body_text_color=&#8221;#000000&#8243; header_text_color=&#8221;#ffffff&#8221; header_text_align=&#8221;center&#8221; subheader_text_align=&#8221;center&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#cb0519&#8243; text_orientation=&#8221;center&#8221; hover_enabled=&#8221;0&#8243; width_last_edited=&#8221;off|desktop&#8221;][et_pb_pricing_table featured=&#8221;on&#8221; title=&#8221;Auditor\u00eda PCI DSS&#8221; subtitle=&#8221;Por Proyecto \/ Anual&#8221; button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjkwNyJ9fQ==@&#8221; button_text=&#8221;Cont\u00e1ctenos&#8221; bullet_color=&#8221;#cb0519&#8243; price_background_color=&#8221;#cb0519&#8243; header_background_color=&#8221;#cb0519&#8243; _builder_version=&#8221;4.5.6&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#ffffff&#8221; body_text_color=&#8221;#000000&#8243; subheader_text_color=&#8221;#000000&#8243; currency_frequency_text_color=&#8221;#ffffff&#8221; excluded_text_color=&#8221;#000000&#8243; background_color=&#8221;rgba(0,0,0,0)&#8221; background_enable_color=&#8221;on&#8221; button_alignment=&#8221;center&#8221; text_orientation=&#8221;left&#8221; border_color_all_price=&#8221;#cb0519&#8243;]<\/p>\n<p>Hacking \u00e9tico externo \/ interno<\/p>\n<p>Hardening de servidores y servicios<\/p>\n<p>Acceso al cloud privado <a href=\"http:\/\/www.vuldash.com\">www.vuldash.com<\/a><\/p>\n<p>Consultor\u00eda y atenci\u00f3n personalizada PCI DSS<\/p>\n<p>Auditor\u00eda artesanal por nuestros expertos<\/p>\n<p>Atenci\u00f3n personalizada<\/p>\n<p>[\/et_pb_pricing_table][\/et_pb_pricing_tables][\/et_pb_column][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; next_background_color=&#8221;#ffffff&#8221; admin_label=&#8221;Feedback&#8221; _builder_version=&#8221;4.5.6&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#cb0519&#8243; background_color_gradient_end=&#8221;#ffffff&#8221; background_color_gradient_direction=&#8221;243deg&#8221; background_color_gradient_start_position=&#8221;49%&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/cyber-security-12.png&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;top_left&#8221; min_height=&#8221;1549px&#8221; overflow-x=&#8221;hidden&#8221; overflow-y=&#8221;hidden&#8221; custom_margin=&#8221;||&#8221; custom_padding=&#8221;13vw|||||&#8221; top_divider_height=&#8221;26vw&#8221; top_divider_flip=&#8221;horizontal&#8221; bottom_divider_style=&#8221;asymmetric&#8221; bottom_divider_height=&#8221;22vw&#8221; collapsed=&#8221;off&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.5.6&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25.3&#8243;][et_pb_testimonial author=&#8221;David Casta\u00f1eda&#8221; company_name=&#8221;Proyectos Millennium&#8221; portrait_url=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/foto4.jpeg&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; custom_padding=&#8221;||73px|||&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221;]<\/p>\n<p>Muy agradecido, un servicio muy profesional y con resultados inmediatos en un tema muy delicado, como la seguridad inform\u00e1tica.<\/p>\n<p>[\/et_pb_testimonial][et_pb_testimonial author=&#8221;Rodrigo Alfaro &#8221; job_title=&#8221;CEO&#8221; company_name=&#8221;Gemforce&#8221; portrait_url=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/foto5.jpeg&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221;]<\/p>\n<p>&#8220;Estuvimos recibiendo ataques en nuestro sitio web, desde el momento que contactamos a Talsoft nos atendieron al instante y se involucraron en la soluci\u00f3n del problema, lo que m\u00e1s me impresiono fue su disponibilidad y empe\u00f1o en ayudarnos a resolver el problema.&#8221;<\/p>\n<p>[\/et_pb_testimonial][et_pb_testimonial company_name=&#8221;AvisLatam&#8221; portrait_url=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/foto1.jpeg&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; custom_padding=&#8221;||96px|||&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221;]<\/p>\n<p>&#8220;Entregaron un servicio de calidad y se acomodaron a los tiempos de entrega del proyecto, siendo que eran bastante acotados.&#8221;<\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25.3&#8243; custom_padding=&#8221;||&#8221;][et_pb_testimonial author=&#8221;Carlos Bergia&#8221; job_title=&#8221;SysAdmin&#8221; company_name=&#8221;Wcentrix&#8221; portrait_url=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/foto3.jpeg&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221;]<\/p>\n<p><span class=\"tlid-translation translation\"><span title=\"\">&#8220;Mucha facilidad de contacto con Talsoft, ya sea por mail o skype la comunicaci\u00f3n era muy r\u00e1pida. Con respecto al escaneo de vulnerabilidades, muy conforme con la herramienta.<\/span><\/span>&#8220;<\/p>\n<p>[\/et_pb_testimonial][et_pb_testimonial author=&#8221;Ricardo May&#8221; company_name=&#8221;Nexuscom Arg.&#8221; portrait_url=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/foto2.jpeg&#8221; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; custom_padding=&#8221;||70px|||&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221;]<\/p>\n<p><span class=\"tlid-translation translation\"><span title=\"\">&#8220;Con vuestros servicios de consultor\u00eda logramos mejorar la seguridad inform\u00e1tica de nuestros sistemas, permiti\u00e9ndonos alcanzar un nivel de excelencia y as\u00ed certificar PCI-DSS.<\/span><\/span>&#8220;<\/p>\n<p>[\/et_pb_testimonial][et_pb_text _builder_version=&#8221;4.5.6&#8243; text_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|900|||||||&#8221; header_2_font_size=&#8221;56px&#8221; header_2_line_height=&#8221;1.1em&#8221; header_3_font=&#8221;Overpass|600|||||||&#8221; header_3_text_color=&#8221;#00b4ff&#8221; header_3_font_size=&#8221;30px&#8221; header_3_line_height=&#8221;1.2em&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_3_font_tablet=&#8221;&#8221; header_3_font_phone=&#8221;Overpass|700|||||||&#8221; header_3_font_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;24px&#8221; header_3_font_size_phone=&#8221;18px&#8221; header_3_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221;]<\/p>\n<h3><\/h3>\n<h2><span style=\"font-size: xx-large;\">\u00bfPor qu\u00e9 controlar y conocer la seguridad inform\u00e1tica de su empresa?<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#00b4ff&#8221; divider_weight=&#8221;2px&#8221; _builder_version=&#8221;3.25.1&#8243; width=&#8221;100px&#8221; custom_margin=&#8221;||0px&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;3.27.4&#8243; text_font=&#8221;Overpass|300|||||||&#8221; text_font_size=&#8221;17px&#8221; text_line_height=&#8221;1.8em&#8221; background_layout=&#8221;dark&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221;]<\/p>\n<p>Los principales <strong>consecuencias<\/strong> para tu <strong>negocio<\/strong> ante un <strong>ataque inform\u00e1tico<\/strong>, ocasiona <strong>p\u00e9rdida de dinero, robo de informaci\u00f3n, da\u00f1o de imagen \/ reputaci\u00f3n, problemas legales<\/strong>.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjkwNyJ9fQ==@&#8221; button_text=&#8221;Cont\u00e1ctenos&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.5.6&#8243; _dynamic_attributes=&#8221;button_url&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;19px&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;rgba(0,0,0,0)&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;#ffffff&#8221; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Overpass|900||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_padding=&#8221;17px|52px|17px|52px|true|true&#8221; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;0px&#8221; box_shadow_spread=&#8221;-10px&#8221; box_shadow_color=&#8221;rgba(25,114,255,0.4)&#8221; locked=&#8221;off&#8221; box_shadow_color__hover=&#8221;#2585b2&#8243; box_shadow_blur__hover_enabled=&#8221;on&#8221; box_shadow_blur__hover=&#8221;40px&#8221; box_shadow_vertical__hover_enabled=&#8221;on&#8221; box_shadow_vertical__hover=&#8221;10px&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;3.25.3&#8243; custom_padding=&#8221;0px||0px|||&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25.3&#8243;][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25.3&#8243;][et_pb_image src=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/cyber-security-15.jpg&#8221; _builder_version=&#8221;3.25.3&#8243; transform_scale_tablet=&#8221;100%|100%&#8221; transform_scale_phone=&#8221;&#8221; transform_scale_last_edited=&#8221;on|desktop&#8221; transform_translate=&#8221;10vw|0px&#8221; transform_translate_tablet=&#8221;0vw|0vw&#8221; transform_translate_phone=&#8221;&#8221; transform_translate_last_edited=&#8221;on|desktop&#8221; transform_translate_linked=&#8221;off&#8221; transform_rotate=&#8221;0deg|0deg|318deg&#8221; transform_rotate_tablet=&#8221;0deg|0deg|14deg&#8221; transform_rotate_phone=&#8221;&#8221; transform_rotate_last_edited=&#8221;on|desktop&#8221; transform_skew_tablet=&#8221;&#8221; transform_skew_phone=&#8221;&#8221; transform_skew_last_edited=&#8221;on|desktop&#8221; transform_origin_tablet=&#8221;&#8221; transform_origin_phone=&#8221;&#8221; transform_origin_last_edited=&#8221;on|desktop&#8221; transform_styles_last_edited=&#8221;on|desktop&#8221; custom_margin=&#8221;|-30vw|8vw||false&#8221; transform_styles_tablet=&#8221;&#8221; transform_styles_phone=&#8221;&#8221; border_radii=&#8221;on|500px|500px|500px|500px&#8221; locked=&#8221;off&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Las empresas que almacenan, procesan o transmiten informaci\u00f3n con tarjetas de cr\u00e9dito est\u00e1n obligadas por las principales marcas de tarjetas (Visa, Mastercard, etc.), a cumplir con un conjunto de normas conocidas como Est\u00e1ndares de Seguridad de Datos de pago (PCI-DSS). PCI DSS son una serie de normas que est\u00e1n desarrolladas para proteger los datos de [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":1191,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p style=\"text-align: justify;\"><span class=\"intelliTXT\">Las empresas que <strong>almacenan, procesan o transmiten informaci\u00f3n con tarjetas de cr\u00e9dito est\u00e1n obligadas<\/strong> por las principales marcas de tarjetas (Visa, Mastercard, etc.),<strong> a cumplir con un conjunto de normas conocidas como Est\u00e1ndares de Seguridad de Datos de pago<\/strong> (PCI-DSS).<\/span><\/p>\n<p style=\"text-align: justify;\"><strong>PCI DSS<\/strong> son una serie de normas que est\u00e1n desarrolladas <strong>para proteger los datos de los due\u00f1os de tarjetas de cr\u00e9dito<\/strong> durante, y despu\u00e9s, de una transacci\u00f3n financiera.<\/p>\nExisten 6 categor\u00edas de est\u00e1ndares a cumplir:\n<ol>\n \t<li>Construir y mantener una red segura.<\/li>\n \t<li>Proteger los datos del due\u00f1o de la tarjeta.<\/li>\n \t<li>Mantener un programa de gesti\u00f3n de vulnerabilidades.<\/li>\n \t<li>Implementar medidas fuertes de control de acceso.<\/li>\n \t<li>Monitorizar y probar las redes regularmente.<\/li>\n \t<li>Mantener una pol\u00edtica de seguridad de la informaci\u00f3n.<\/li>\n<\/ol>\n<strong>Informaci\u00f3n PCI DSS<\/strong>:\u00a0 <a href=\"https:\/\/www.pcisecuritystandards.org\/\">Aqu\u00ed<\/a>\n<p style=\"text-align: justify;\"><strong>Talsoft<\/strong> permite <strong>complementar y acompa\u00f1ar a la empresa a su certificaci\u00f3n PCI DSS<\/strong><\/p>\n<p style=\"text-align: center;\">[tw_pricing_table column=\"2\" price_category_list=\"pci\"]<\/p>\n<p style=\"text-align: justify;\">[tw_divider type=\"space\" height=\"50\"]<\/p>\n<p style=\"text-align: justify;\">Al conocer el nivel de seguridad inform\u00e1tica de su empresa, podr\u00e1 <em><strong>mejorar la seguridad de su negocio<\/strong> y <strong>estar preparado frente ataques <\/strong><\/em>por intrusos inform\u00e1ticos. <em><strong>Evitar\u00e1 el robo\/fuga de informaci\u00f3n confidencia<\/strong>l<\/em>, porque tendr\u00e1 un conocimiento real de la seguridad y podr\u00e1 <strong>tomar decisiones pro-activas<\/strong> frente a un ataque cibern\u00e9tico. <em><strong>Minimizar\u00e1 las p\u00e9rdidas de dinero y maximizar\u00e1 sus ganancias<\/strong><\/em> al tener el control del estado de seguridad en su empresa. Sus clientes\/inversores\/proveedores notar\u00e1n que se preocupa por los datos confidenciales en su empresa y <em><strong>mejorar\u00e1 su imagen\/prestigio.<\/strong> <strong>Nuestros profesionales trabajan en forma artesanal<\/strong><\/em>, de la misma forma que lo hace un intruso pero autorizado por usted, este es un<em> <strong>valor incalculable<\/strong><\/em> para su empresa. Tendr\u00e1 a su disposici\u00f3n <strong>expertos en seguridad inform\u00e1tica<\/strong> que lo ayudar\u00e1n en dar respuestas a los incidentes y toma de decisiones en forma personalizada.<\/p>\n<span style=\"text-decoration: underline;\"><strong>Este es el momento de empezar a proteger su negocio<\/strong><\/span>. Obtenga<span style=\"text-decoration: underline;\"><strong> sin costo su cotizaci\u00f3n personalizada<\/strong> <\/span>con nuestros expertos, <span style=\"text-decoration: underline;\"><strong>ahora mismo<\/strong>...<\/span>\n<p style=\"text-align: center;\">[tw_button icon=\"\" link=\"https:\/\/www.talsoft-security.com\/site\/obtener-una-cotizacion\/\" size=\"medium\" rounded=\"true\" style=\"flat\" hover=\"default\" color=\"#f01d1d\" target=\"_blank\"]Obtener una cotizaci\u00f3n[\/tw_button]<\/p>","_et_gb_content_width":"","footnotes":""},"class_list":["post-2540","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Auditor\u00eda PCI DSS<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/auditoria-pci-dss\/\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/auditoria-pci-dss\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/auditoria-pci-dss\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Auditor\u00eda PCI DSS\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2014-09-26T15:12:38+00:00\",\"dateModified\":\"2020-08-19T13:47:48+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/auditoria-pci-dss\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/auditoria-pci-dss\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/auditoria-pci-dss\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Servicios\",\"item\":\"https:\/\/www.talsoft-security.com\/site\/servicios\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguridad Inform\u00e1tica\",\"item\":\"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Auditor\u00eda PCI DSS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Auditor\u00eda PCI DSS","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/auditoria-pci-dss\/","twitter_misc":{"Estimated reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/auditoria-pci-dss\/","url":"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/auditoria-pci-dss\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Auditor\u00eda PCI DSS","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2014-09-26T15:12:38+00:00","dateModified":"2020-08-19T13:47:48+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","breadcrumb":{"@id":"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/auditoria-pci-dss\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/auditoria-pci-dss\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/auditoria-pci-dss\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Servicios","item":"https:\/\/www.talsoft-security.com\/site\/servicios\/"},{"@type":"ListItem","position":2,"name":"Seguridad Inform\u00e1tica","item":"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/"},{"@type":"ListItem","position":3,"name":"Auditor\u00eda PCI DSS"}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/pages\/2540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=2540"}],"version-history":[{"count":28,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/pages\/2540\/revisions"}],"predecessor-version":[{"id":6541,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/pages\/2540\/revisions\/6541"}],"up":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/pages\/1191"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=2540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}