
{"id":4980,"date":"2019-03-04T14:15:12","date_gmt":"2019-03-04T17:15:12","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?page_id=4980"},"modified":"2023-11-27T09:37:11","modified_gmt":"2023-11-27T12:37:11","slug":"home-2","status":"publish","type":"page","link":"https:\/\/www.talsoft-security.com\/site\/","title":{"rendered":"Home en"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Header&#8221; _builder_version=&#8221;4.16&#8243; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/smartmockups_kah568op.jpg&#8221; background_position=&#8221;top_right&#8221; top_divider_arrangement_last_edited=&#8221;off|desktop&#8221; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; z_index=&#8221;1&#8243; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h1 style=\"text-align: center;\"><span style=\"font-size: x-large; color: #ff0000;\"><strong><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">Let&#8217;s start protecting your business against computer attacks<\/span><\/span><\/strong><\/span><\/h1>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjUwMTgifX0=@&#8221; button_text=&#8221;Contact US&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _dynamic_attributes=&#8221;button_url&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#cb0519&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Overpass|900||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_padding=&#8221;20px|59px|20px|59px|true|true&#8221; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;20px&#8221; box_shadow_blur=&#8221;40px&#8221; box_shadow_spread=&#8221;-10px&#8221; box_shadow_color=&#8221;rgba(23,102,193,0.46)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_color__hover=&#8221;#2585b2&#8243; box_shadow_blur__hover_enabled=&#8221;on&#8221; box_shadow_blur__hover=&#8221;20px&#8221; box_shadow_vertical__hover_enabled=&#8221;on&#8221; box_shadow_vertical__hover=&#8221;10px&#8221; custom_margin=&#8221;||315px|||&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; z_index=&#8221;0&#8243; width=&#8221;100%&#8221; max_width=&#8221;none&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/cyber-security-01.png&#8221; show_bottom_space=&#8221;off&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; custom_margin=&#8221;-40vw||-2px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Features&#8221; _builder_version=&#8221;4.16&#8243; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_margin=&#8221;-8vw||||false&#8221; custom_padding=&#8221;63px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Early detection of vulnerabilities&#8221; image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/beneficios_icon1.png&#8221; image_icon_width=&#8221;30%&#8221; _builder_version=&#8221;4.16&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; image_max_width=&#8221;30%&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">Our methodology allows us to periodically audit your business to find vulnerabilities.<\/span><\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; transform_scale_tablet=&#8221;&#8221; transform_scale_phone=&#8221;&#8221; transform_scale_last_edited=&#8221;on|desktop&#8221; transform_translate=&#8221;0px|-94px&#8221; transform_translate_tablet=&#8221;0px|0px&#8221; transform_translate_phone=&#8221;&#8221; transform_translate_last_edited=&#8221;on|desktop&#8221; transform_translate_linked=&#8221;off&#8221; transform_rotate_tablet=&#8221;&#8221; transform_rotate_phone=&#8221;&#8221; transform_rotate_last_edited=&#8221;on|desktop&#8221; transform_skew_tablet=&#8221;&#8221; transform_skew_phone=&#8221;&#8221; transform_skew_last_edited=&#8221;on|desktop&#8221; transform_origin_tablet=&#8221;&#8221; transform_origin_phone=&#8221;&#8221; transform_origin_last_edited=&#8221;on|desktop&#8221; transform_styles_last_edited=&#8221;on|desktop&#8221; transform_styles_tablet=&#8221;&#8221; transform_styles_phone=&#8221;&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Audit within software development&#8221; image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/beneficios_icon2.png&#8221; image_icon_width=&#8221;30%&#8221; _builder_version=&#8221;4.16&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; image_max_width=&#8221;30%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">We audit systems during the software life cycle, which allows us to find vulnerabilities in the early stages of development.<\/span><\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Maximize your profits and minimize your money losses.&#8221; image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/beneficios_icon5.png&#8221; image_icon_width=&#8221;30%&#8221; _builder_version=&#8221;4.16&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; image_max_width=&#8221;30%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">The main consequences for your business in a computer attack, causes loss of money, information theft, image \/ reputation damage, legal problems.<\/span><\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; transform_scale_tablet=&#8221;&#8221; transform_scale_phone=&#8221;&#8221; transform_scale_last_edited=&#8221;on|desktop&#8221; transform_translate=&#8221;0px|-188px&#8221; transform_translate_tablet=&#8221;0px|0px&#8221; transform_translate_phone=&#8221;&#8221; transform_translate_last_edited=&#8221;on|desktop&#8221; transform_translate_linked=&#8221;off&#8221; transform_rotate_tablet=&#8221;&#8221; transform_rotate_phone=&#8221;&#8221; transform_rotate_last_edited=&#8221;on|desktop&#8221; transform_skew_tablet=&#8221;&#8221; transform_skew_phone=&#8221;&#8221; transform_skew_last_edited=&#8221;on|desktop&#8221; transform_origin_tablet=&#8221;&#8221; transform_origin_phone=&#8221;&#8221; transform_origin_last_edited=&#8221;on|desktop&#8221; transform_styles_last_edited=&#8221;on|desktop&#8221; transform_styles_tablet=&#8221;&#8221; transform_styles_phone=&#8221;&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Increase trust with Clients \/ Investors&#8221; image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/beneficios_icon3.png&#8221; image_icon_width=&#8221;30%&#8221; _builder_version=&#8221;4.16&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; image_max_width=&#8221;30%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">When your business has guidelines as its main axis, computer security in all its aspects, improves trust with Clients and \/ or Investors.<\/span><\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Protection of critical and confidential information&#8221; image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/beneficios_icon3.png&#8221; image_icon_width=&#8221;30%&#8221; _builder_version=&#8221;4.16&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; image_max_width=&#8221;30%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">Our services allow us to improve the protection of critical and confidential information against computer attacks.<\/span><\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; next_background_color=&#8221;#ffffff&#8221; admin_label=&#8221;Feedback&#8221; _builder_version=&#8221;4.16&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;243deg&#8221; background_color_gradient_stops=&#8221;#cb0519 49%|#ffffff 100%&#8221; background_color_gradient_start=&#8221;#cb0519&#8243; background_color_gradient_start_position=&#8221;49%&#8221; background_color_gradient_end=&#8221;#ffffff&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/cyber-security-12.png&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;top_left&#8221; overflow-x=&#8221;hidden&#8221; overflow-y=&#8221;hidden&#8221; custom_margin=&#8221;||&#8221; top_divider_height=&#8221;26vw&#8221; top_divider_flip=&#8221;horizontal&#8221; bottom_divider_style=&#8221;asymmetric&#8221; bottom_divider_height=&#8221;22vw&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_testimonial author=&#8221;David Casta\u00f1eda&#8221; company_name=&#8221;Proyectos Millennium&#8221; portrait_url=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/foto4.jpeg&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; custom_padding=&#8221;||73px|||&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">Very grateful, a very professional service and with immediate results on a very sensitive issue, such as computer security.<\/span><\/span><\/p>\n<p>[\/et_pb_testimonial][et_pb_testimonial author=&#8221;Rodrigo Alfaro &#8221; job_title=&#8221;CEO&#8221; company_name=&#8221;Gemforce&#8221; portrait_url=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/foto5.jpeg&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">&#8220;We were receiving attacks on our website, from the moment we contacted Talsoft they attended us instantly and were involved in solving the problem, what impressed me the most was their availability and determination to help us solve the problem.&#8221;<\/span><\/span><\/p>\n<p>[\/et_pb_testimonial][et_pb_testimonial company_name=&#8221;AvisLatam&#8221; portrait_url=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/foto1.jpeg&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; custom_padding=&#8221;||96px|||&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">&#8220;They delivered a quality service and accommodated the project delivery times, as they were quite limited.&#8221;<\/span><\/span><\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_testimonial author=&#8221;Carlos Bergia&#8221; job_title=&#8221;SysAdmin&#8221; company_name=&#8221;Wcentrix&#8221; portrait_url=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/foto3.jpeg&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span class=\"tlid-translation translation\"><span title=\"\"><\/span><\/span><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">&#8220;Very easy to contact Talsoft, either by mail or skype, communication was very fast. With regard to vulnerability scanning, very satisfied with the tool.&#8221;<\/span><\/span><\/p>\n<p>[\/et_pb_testimonial][et_pb_testimonial author=&#8221;Ricardo May&#8221; company_name=&#8221;Nexuscom Arg.&#8221; portrait_url=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/foto2.jpeg&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; custom_padding=&#8221;||70px|||&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span class=\"tlid-translation translation\"><span title=\"\"><\/span><\/span><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">&#8220;With your consulting services we managed to improve the computer security of our systems, allowing us to reach a level of excellence and thus certify PCI-DSS.&#8221;<\/span><\/span><\/p>\n<p>[\/et_pb_testimonial][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|900|||||||&#8221; header_2_font_size=&#8221;56px&#8221; header_2_line_height=&#8221;1.1em&#8221; header_3_font=&#8221;Overpass|600|||||||&#8221; header_3_text_color=&#8221;#00b4ff&#8221; header_3_font_size=&#8221;30px&#8221; header_3_line_height=&#8221;1.2em&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_3_font_tablet=&#8221;&#8221; header_3_font_phone=&#8221;Overpass|700|||||||&#8221; header_3_font_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;24px&#8221; header_3_font_size_phone=&#8221;18px&#8221; header_3_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><\/h3>\n<h2><span style=\"font-size: xx-large;\"><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">Why control and know the computer security of your company?<\/span><\/span><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#00b4ff&#8221; divider_weight=&#8221;2px&#8221; _builder_version=&#8221;4.16&#8243; width=&#8221;100px&#8221; custom_margin=&#8221;||0px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;Overpass|300|||||||&#8221; text_font_size=&#8221;17px&#8221; text_line_height=&#8221;1.8em&#8221; background_layout=&#8221;dark&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"text-wrap tlid-copy-target\">\n<div class=\"result-shield-container tlid-copy-target\" tabindex=\"0\"><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">The main consequences for your business in a computer attack, causes loss of money, information theft, image \/ reputation damage, legal problems.<\/span><\/span><span class=\"tlid-translation-gender-indicator translation-gender-indicator\"><\/span><\/div>\n<\/div>\n<div class=\"tlid-result-transliteration-container result-transliteration-container transliteration-container\">\n<div class=\"tlid-transliteration-content transliteration-content full\"><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjkwNyJ9fQ==@&#8221; button_text=&#8221;Contact Us&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _dynamic_attributes=&#8221;button_url&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;19px&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;rgba(0,0,0,0)&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;#ffffff&#8221; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Overpass|900||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_padding=&#8221;17px|52px|17px|52px|true|true&#8221; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;0px&#8221; box_shadow_spread=&#8221;-10px&#8221; box_shadow_color=&#8221;rgba(25,114,255,0.4)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_color__hover=&#8221;#2585b2&#8243; box_shadow_blur__hover_enabled=&#8221;on&#8221; box_shadow_blur__hover=&#8221;40px&#8221; box_shadow_vertical__hover_enabled=&#8221;on&#8221; box_shadow_vertical__hover=&#8221;10px&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/cyber-security-15.jpg&#8221; _builder_version=&#8221;4.16&#8243; transform_scale_tablet=&#8221;100%|100%&#8221; transform_scale_phone=&#8221;&#8221; transform_scale_last_edited=&#8221;on|desktop&#8221; transform_translate=&#8221;10vw|0px&#8221; transform_translate_tablet=&#8221;0vw|0vw&#8221; transform_translate_phone=&#8221;&#8221; transform_translate_last_edited=&#8221;on|desktop&#8221; transform_translate_linked=&#8221;off&#8221; transform_rotate=&#8221;0deg|0deg|318deg&#8221; transform_rotate_tablet=&#8221;0deg|0deg|14deg&#8221; transform_rotate_phone=&#8221;&#8221; transform_rotate_last_edited=&#8221;on|desktop&#8221; transform_skew_tablet=&#8221;&#8221; transform_skew_phone=&#8221;&#8221; transform_skew_last_edited=&#8221;on|desktop&#8221; transform_origin_tablet=&#8221;&#8221; transform_origin_phone=&#8221;&#8221; transform_origin_last_edited=&#8221;on|desktop&#8221; transform_styles_last_edited=&#8221;on|desktop&#8221; custom_margin=&#8221;|-30vw|8vw||false&#8221; transform_styles_tablet=&#8221;&#8221; transform_styles_phone=&#8221;&#8221; border_radii=&#8221;on|500px|500px|500px|500px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Servicios&#8221; _builder_version=&#8221;4.16&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;263deg&#8221; background_color_gradient_stops=&#8221;#ffffff 45%|#cb0519 91%&#8221; background_color_gradient_start=&#8221;#ffffff&#8221; background_color_gradient_start_position=&#8221;45%&#8221; background_color_gradient_end=&#8221;#cb0519&#8243; background_color_gradient_end_position=&#8221;91%&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/cyber-security-03-1.png&#8221; parallax=&#8221;on&#8221; locked=&#8221;off&#8221; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_column _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243;][et_pb_cta title=&#8221;Red Team Service&#8221; button_url=&#8221;https:\/\/www.talsoft-security.com\/site\/en\/red-team-service\/&#8221; button_text=&#8221;More Info&#8221; admin_label=&#8221;LCoudManager&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#000000&#8243; body_text_color=&#8221;#000000&#8243; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#cb0519&#8243; border_radii=&#8221;on|20px|20px|20px|20px&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#cb0519&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><strong><\/strong><span lang=\"en\"><span title=\"\"><span lang=\"en-US\">The <\/span><span lang=\"en-US\">Red Team Talsoft TS <\/span><span lang=\"en-US\">allows to <\/span><span lang=\"en-US\">simulate an agent that makes attacks on corporate systems contemplating vectors of attacks at a digital, physical and human level of the company<\/span><\/span><\/span><\/p>\n<p>[\/et_pb_cta][et_pb_cta title=&#8221;Purple Team Service&#8221; button_url=&#8221;https:\/\/www.talsoft-security.com\/site\/en\/purple-team-service\/&#8221; button_text=&#8221;More info&#8221; admin_label=&#8221;Purple&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#000000&#8243; body_text_color=&#8221;#000000&#8243; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#cb0519&#8243; border_radii=&#8221;on|20px|20px|20px|20px&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#cb0519&#8243; global_colors_info=&#8221;{}&#8221; custom_padding__hover_enabled=&#8221;on|desktop&#8221;]<\/p>\n<p style=\"text-align: left;\"><strong><\/strong><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">It allows simulating attacks on the company&#8217;s corporate systems and providing feedback on the attack results, to implement controls and monitoring on the defense side of the company<\/span><\/span><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243;][et_pb_cta title=&#8221;PCI DSS Consulting&#8221; button_url=&#8221;https:\/\/www.talsoft-security.com\/site\/en\/pci-dss\/&#8221; button_text=&#8221;Mas Info&#8221; admin_label=&#8221;PCIDSS&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#000000&#8243; body_text_color=&#8221;#000000&#8243; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#cb0519&#8243; border_radii=&#8221;on|20px|20px|20px|20px&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#cb0519&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><strong><\/strong><span lang=\"en\"><span title=\"\">Our services complement and accompany the company to its PCI DSS certification.<\/span><\/span><\/p>\n<p>[\/et_pb_cta][et_pb_cta title=&#8221;Ethical hacking&#8221; button_url=&#8221;https:\/\/www.talsoft-security.com\/site\/en\/ethical-hacking-for-companies\/&#8221; button_text=&#8221;More info&#8221; admin_label=&#8221;hAcking etico&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#000000&#8243; body_text_color=&#8221;#000000&#8243; background_color=&#8221;#ffffff&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#cb0519&#8243; border_radii=&#8221;on|20px|20px|20px|20px&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#cb0519&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><strong><\/strong><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">A computer security audit allows the company to know the level of security against computer attacks and implement controls to protect its critical and confidential information.<\/span><\/span><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#cb0519&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#cb0519&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#ffffff&#8221; header_text_color=&#8221;#ffffff&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><strong>CEO \/ Founder<\/strong><\/h2>\n<p>[\/et_pb_text][et_pb_team_member name=&#8221;Leandro Ferrari&#8221; position=&#8221;CEO \/ Fundador&#8221; image_url=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2013\/12\/leandroferrari_2.jpg&#8221; twitter_url=&#8221;https:\/\/twitter.com\/avatar_leandro&#8221; linkedin_url=&#8221;https:\/\/www.linkedin.com\/in\/leandroferrari\/&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#ffffff&#8221; body_text_color=&#8221;#ffffff&#8221; position_text_align=&#8221;center&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; border_radii_image=&#8221;on|97px|97px|97px|97px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_team_member][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; admin_label=&#8221;BLog&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_post_slider include_categories=&#8221;1&#8243; more_text=&#8221;Leer mas&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#cb0519&#8243; background_enable_image=&#8221;off&#8221; custom_padding=&#8221;||327px|||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_fullwidth_post_slider][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Footer&#8221; _builder_version=&#8221;4.16&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_type=&#8221;circular&#8221; background_color_gradient_direction_radial=&#8221;top right&#8221; background_color_gradient_stops=&#8221;#ffffff 0%|#cb0519 81%&#8221; background_color_gradient_start=&#8221;#ffffff&#8221; background_color_gradient_end=&#8221;#cb0519&#8243; background_color_gradient_end_position=&#8221;81%&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/cyber-security-17.png&#8221; z_index=&#8221;10&#8243; overflow-x=&#8221;visible&#8221; overflow-y=&#8221;visible&#8221; custom_margin=&#8221;-247px|||||&#8221; custom_padding=&#8221;||10vw|||&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#ffffff&#8221; custom_margin=&#8221;-146px|auto|-2px|auto||&#8221; custom_padding=&#8221;0px||0px||true&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_vertical=&#8221;40px&#8221; box_shadow_blur=&#8221;60px&#8221; box_shadow_spread=&#8221;-8px&#8221; box_shadow_color=&#8221;rgba(10,45,97,0.48)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;60px|40px|60px|40px|true|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; header_2_font=&#8221;Overpass|900|||||||&#8221; header_2_font_size=&#8221;56px&#8221; header_2_line_height=&#8221;1.1em&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Talsoft TS<\/h2>\n<p>[\/et_pb_text][et_pb_blurb title=&#8221;Mar del plata, Buenos Aires, Argentina&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe081;||divi||400&#8243; icon_color=&#8221;#006ac1&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; _builder_version=&#8221;4.16&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; icon_font_size=&#8221;24px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Lunes &#8211; Viernes : 9am &#8211; 5pm<\/p>\n<p>[\/et_pb_blurb][et_pb_social_media_follow _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_social_media_follow_network social_network=&#8221;facebook&#8221; url=&#8221;https:\/\/www.facebook.com\/talsoftsrl&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#3b5998&#8243; global_colors_info=&#8221;{}&#8221; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221;]facebook[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8221;twitter&#8221; url=&#8221;https:\/\/twitter.com\/talsoft&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#00aced&#8221; global_colors_info=&#8221;{}&#8221; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221;]twitter[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8221;linkedin&#8221; url=&#8221;http:\/\/www.linkedin.com\/company\/talsoft&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#007bb6&#8243; global_colors_info=&#8221;{}&#8221; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221;]linkedin[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8221;youtube&#8221; url=&#8221;https:\/\/www.youtube.com\/channel\/UCnO026Qq-DHx3yHjL6jTO9g&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#a82400&#8243; global_colors_info=&#8221;{}&#8221; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221;]youtube[\/et_pb_social_media_follow_network][\/et_pb_social_media_follow][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_type=&#8221;circular&#8221; background_color_gradient_direction_radial=&#8221;top right&#8221; background_color_gradient_stops=&#8221;#cb0519 0%|#cb0519 100%&#8221; background_color_gradient_start=&#8221;#cb0519&#8243; background_color_gradient_end=&#8221;#cb0519&#8243; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/cyber-security-010-1.png&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;bottom_left&#8221; transform_translate_linked=&#8221;off&#8221; custom_padding=&#8221;60px|40px|60px|20%|true&#8221; custom_padding_tablet=&#8221;80px|||40px&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; background_last_edited=&#8221;on|desktop&#8221; background_image_tablet=&#8221;http:\/\/zaib.sandbox.etdevs.com\/divi\/wp-content\/uploads\/sites\/2\/2019\/06\/cyber-security-11.png&#8221; background_enable_image_tablet=&#8221;on&#8221; background_position_tablet=&#8221;top_left&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#ffffff&#8221; header_text_color=&#8221;#ffffff&#8221; header_2_font=&#8221;Overpass|900|||||||&#8221; header_2_font_size=&#8221;56px&#8221; header_2_line_height=&#8221;1.1em&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; text_text_align=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><span style=\"font-size: x-large;\"><strong><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">Let&#8217;s start protecting your business against computer attacks<\/span><\/span><\/strong><\/span><\/h1>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjkwNyJ9fQ==@&#8221; button_text=&#8221;Contact Us&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _dynamic_attributes=&#8221;button_url&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#000000&#8243; button_bg_use_color_gradient=&#8221;on&#8221; button_bg_color_gradient_type=&#8221;circular&#8221; button_bg_color_gradient_direction=&#8221;140deg&#8221; button_bg_color_gradient_direction_radial=&#8221;top right&#8221; button_bg_color_gradient_stops=&#8221;#ffffff 0%|#ffffff 100%&#8221; button_bg_color_gradient_start=&#8221;#ffffff&#8221; button_bg_color_gradient_end=&#8221;#ffffff&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Overpass|900||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_padding=&#8221;20px|30px|20px|30px|true|true&#8221; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;0px&#8221; box_shadow_spread=&#8221;-10px&#8221; box_shadow_color=&#8221;rgba(25,114,255,0.4)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_color__hover=&#8221;#2585b2&#8243; box_shadow_blur__hover_enabled=&#8221;on&#8221; box_shadow_blur__hover=&#8221;40px&#8221; box_shadow_vertical__hover_enabled=&#8221;on&#8221; box_shadow_vertical__hover=&#8221;10px&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Let&#8217;s start protecting your business against computer attacksOur methodology allows us to periodically audit your business to find vulnerabilities.We audit systems during the software life cycle, which allows us to find vulnerabilities in the early stages of development.The main consequences for your business in a computer attack, causes loss of money, information theft, image \/ [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-4980","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft TS - Consultor\u00eda en Seguridad Inform\u00e1tica - Hacking \u00c9tico<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"18 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Consultor\u00eda en Seguridad Inform\u00e1tica - Hacking \u00c9tico\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2019-03-04T17:15:12+00:00\",\"dateModified\":\"2023-11-27T12:37:11+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft TS - Consultor\u00eda en Seguridad Inform\u00e1tica - Hacking \u00c9tico","description":"Talsoft transforma la visi\u00f3n de las empresas para proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/","twitter_misc":{"Estimated reading time":"18 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Consultor\u00eda en Seguridad Inform\u00e1tica - Hacking \u00c9tico","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2019-03-04T17:15:12+00:00","dateModified":"2023-11-27T12:37:11+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/pages\/4980","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=4980"}],"version-history":[{"count":15,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/pages\/4980\/revisions"}],"predecessor-version":[{"id":6958,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/pages\/4980\/revisions\/6958"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=4980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}