
{"id":5105,"date":"2019-03-05T13:04:29","date_gmt":"2019-03-05T16:04:29","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?page_id=5105"},"modified":"2024-07-20T15:49:52","modified_gmt":"2024-07-20T18:49:52","slug":"about-us","status":"publish","type":"page","link":"https:\/\/www.talsoft-security.com\/site\/about-us\/","title":{"rendered":"About Us"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Header&#8221; _builder_version=&#8221;4.16&#8243; background_color=&#8221;rgba(0,0,0,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_type=&#8221;circular&#8221; background_color_gradient_direction_radial=&#8221;top&#8221; background_color_gradient_stops=&#8221;#cb0519 37%|#ffffff 100%&#8221; background_color_gradient_start=&#8221;#cb0519&#8243; background_color_gradient_start_position=&#8221;37%&#8221; background_color_gradient_end=&#8221;#ffffff&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/cyber-security-08.png&#8221; custom_padding=&#8221;||0px|||&#8221; background_last_edited=&#8221;on|phone&#8221; background_position_tablet=&#8221;center_right&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.16&#8243; custom_margin=&#8221;|114px||auto||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; header_font=&#8221;Overpass|900|||||||&#8221; header_font_size=&#8221;84px&#8221; header_font_size_tablet=&#8221;54px&#8221; header_font_size_phone=&#8221;32px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><strong>About Us<br \/><\/strong><\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;|300|||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;17px&#8221; text_line_height=&#8221;1.8em&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; background_enable_image=&#8221;off&#8221; background_repeat=&#8221;repeat&#8221; background_layout=&#8221;dark&#8221; width=&#8221;100%&#8221; custom_padding=&#8221;|0px||||&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div style=\"font-family: 'open sans',arial,helvetica,sans-serif; font-size: 14px; background-color: #ffffff; text-align: justify;\" dir=\"auto\">\n<p style=\"margin: 0px 0px 20px;\"><strong><\/strong><\/p>\n<\/div>\n<p style=\"text-align: justify;\"><strong>TalSoft TS is a company specialized in consulting and services in business computing and trainning security<\/strong>, which respond to the needs of outsourcing services of medium and large companies, nationally and internationally.<\/p>\n<p style=\"text-align: justify;\"><strong>Talsoft TS is creating pro-active awareness, control and decision-making power for companies to protect their critical and confidential information against computer attacks.<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 lang=\"en-US\" align=\"left\">Our Mission<\/h2>\n<p style=\"text-align: justify;\"><strong>Our job is to provide technological services and solutions at national and international level<\/strong>, attending the market increasing need for computers safety with expertise<\/p>\n<ol>\n<li style=\"text-align: justify;\"><strong>We are involved with prevention, protection and solution of incidents taking place in companies computer resources<\/strong> and we face our commitment through constant update, over-training and detailed system analysis.<\/li>\n<li style=\"text-align: justify;\"><strong>Our team works with international prototypes which guide service performance<\/strong>. We pursue long term commercial relationships with our customers providing quality and support.<\/li>\n<li style=\"text-align: justify;\"><strong>We have wide experience in business and academic fields as we had the opportunity of being part of university training and research projects<\/strong>, new technology development and the possibility of learning about new phenomena affecting computers safety<\/li>\n<li style=\"text-align: justify;\"><strong>We favour exchange with colleague companies which allows us to find better and more varied solutions<\/strong>. Our team takes part in important decisions tending to enhance Talsoft growth and development.<\/li>\n<\/ol>\n<h2><span class=\"tlid-translation translation\"><span title=\"\">Vision<\/span><\/span><\/h2>\n<p style=\"text-align: justify;\"><span class=\"tlid-translation translation\"><span title=\"\"><strong>Consolidate as a technology services and solutions company with excellence and local and international support<\/strong>.<\/span> <span class=\"\" title=\"\"><strong>Foster alliances between companies, organizations and universities<\/strong>, which interact with the objective of <strong>contributing to society, in the formation of an awareness in Information Security<\/strong>.<\/span><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; next_background_color=&#8221;#ffffff&#8221; admin_label=&#8221;Feedback&#8221; _builder_version=&#8221;4.16&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;243deg&#8221; background_color_gradient_stops=&#8221;#cb0519 49%|#ffffff 100%&#8221; background_color_gradient_start=&#8221;#cb0519&#8243; background_color_gradient_start_position=&#8221;49%&#8221; background_color_gradient_end=&#8221;#ffffff&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/cyber-security-12.png&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;top_left&#8221; min_height=&#8221;1549px&#8221; overflow-x=&#8221;hidden&#8221; overflow-y=&#8221;hidden&#8221; custom_margin=&#8221;||&#8221; custom_padding=&#8221;13vw|||||&#8221; top_divider_height=&#8221;26vw&#8221; top_divider_flip=&#8221;horizontal&#8221; bottom_divider_style=&#8221;asymmetric&#8221; bottom_divider_height=&#8221;22vw&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_testimonial author=&#8221;David Casta\u00f1eda&#8221; company_name=&#8221;Proyectos Millennium&#8221; portrait_url=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/foto4.jpeg&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; custom_padding=&#8221;||73px|||&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">Very grateful, a very professional service and with immediate results on a very sensitive issue, such as computer security.<\/span><\/span><\/p>\n<p>[\/et_pb_testimonial][et_pb_testimonial author=&#8221;Rodrigo Alfaro &#8221; job_title=&#8221;CEO&#8221; company_name=&#8221;Gemforce&#8221; portrait_url=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/foto5.jpeg&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">&#8220;We were receiving attacks on our website, from the moment we contacted Talsoft they attended us instantly and were involved in solving the problem, what impressed me the most was their availability and determination to help us solve the problem.&#8221;<\/span><\/span><\/p>\n<p>[\/et_pb_testimonial][et_pb_testimonial company_name=&#8221;AvisLatam&#8221; portrait_url=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/foto1.jpeg&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; custom_padding=&#8221;||96px|||&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">&#8220;They delivered a quality service and accommodated the project delivery times, as they were quite limited.&#8221;<\/span><\/span><\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_testimonial author=&#8221;Carlos Bergia&#8221; job_title=&#8221;SysAdmin&#8221; company_name=&#8221;Wcentrix&#8221; portrait_url=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/foto3.jpeg&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span class=\"tlid-translation translation\"><span title=\"\"><\/span><\/span><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">&#8220;Very easy to contact Talsoft, either by mail or skype, communication was very fast. With regard to vulnerability scanning, very satisfied with the tool.&#8221;<\/span><\/span><\/p>\n<p>[\/et_pb_testimonial][et_pb_testimonial author=&#8221;Ricardo May&#8221; company_name=&#8221;Nexuscom Arg.&#8221; portrait_url=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/foto2.jpeg&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221; custom_padding=&#8221;||70px|||&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span class=\"tlid-translation translation\"><span title=\"\"><\/span><\/span><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">&#8220;With your consulting services we managed to improve the computer security of our systems, allowing us to reach a level of excellence and thus certify PCI-DSS.&#8221;<\/span><\/span><\/p>\n<p>[\/et_pb_testimonial][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|900|||||||&#8221; header_2_font_size=&#8221;56px&#8221; header_2_line_height=&#8221;1.1em&#8221; header_3_font=&#8221;Overpass|600|||||||&#8221; header_3_text_color=&#8221;#00b4ff&#8221; header_3_font_size=&#8221;30px&#8221; header_3_line_height=&#8221;1.2em&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_3_font_tablet=&#8221;&#8221; header_3_font_phone=&#8221;Overpass|700|||||||&#8221; header_3_font_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;24px&#8221; header_3_font_size_phone=&#8221;18px&#8221; header_3_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><\/h3>\n<h2><span style=\"font-size: xx-large;\"><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">Why control and know the computer security of your company?<\/span><\/span><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#00b4ff&#8221; divider_weight=&#8221;2px&#8221; _builder_version=&#8221;4.16&#8243; width=&#8221;100px&#8221; custom_margin=&#8221;||0px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;Overpass|300|||||||&#8221; text_font_size=&#8221;17px&#8221; text_line_height=&#8221;1.8em&#8221; background_layout=&#8221;dark&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"text-wrap tlid-copy-target\">\n<div class=\"result-shield-container tlid-copy-target\" tabindex=\"0\"><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">The main consequences for your business in a computer attack, causes loss of money, information theft, image \/ reputation damage, legal problems.<\/span><\/span><span class=\"tlid-translation-gender-indicator translation-gender-indicator\"><\/span><\/div>\n<\/div>\n<div class=\"tlid-result-transliteration-container result-transliteration-container transliteration-container\">\n<div class=\"tlid-transliteration-content transliteration-content full\"><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjUwMTgifX0=@&#8221; button_text=&#8221;Contact Us&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.21.0&#8243; _dynamic_attributes=&#8221;button_url&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;19px&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;rgba(0,0,0,0)&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;#ffffff&#8221; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Overpass|900||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_padding=&#8221;17px|52px|17px|52px|true|true&#8221; hover_enabled=&#8221;0&#8243; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;0px&#8221; box_shadow_spread=&#8221;-10px&#8221; box_shadow_color=&#8221;rgba(25,114,255,0.4)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_color__hover=&#8221;#2585b2&#8243; box_shadow_blur__hover_enabled=&#8221;on&#8221; box_shadow_blur__hover=&#8221;40px&#8221; box_shadow_vertical__hover_enabled=&#8221;on&#8221; box_shadow_vertical__hover=&#8221;10px&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;0px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2020\/08\/cyber-security-15.jpg&#8221; _builder_version=&#8221;4.16&#8243; transform_scale_tablet=&#8221;100%|100%&#8221; transform_scale_phone=&#8221;&#8221; transform_scale_last_edited=&#8221;on|desktop&#8221; transform_translate=&#8221;10vw|0px&#8221; transform_translate_tablet=&#8221;0vw|0vw&#8221; transform_translate_phone=&#8221;&#8221; transform_translate_last_edited=&#8221;on|desktop&#8221; transform_translate_linked=&#8221;off&#8221; transform_rotate=&#8221;0deg|0deg|318deg&#8221; transform_rotate_tablet=&#8221;0deg|0deg|14deg&#8221; transform_rotate_phone=&#8221;&#8221; transform_rotate_last_edited=&#8221;on|desktop&#8221; transform_skew_tablet=&#8221;&#8221; transform_skew_phone=&#8221;&#8221; transform_skew_last_edited=&#8221;on|desktop&#8221; transform_origin_tablet=&#8221;&#8221; transform_origin_phone=&#8221;&#8221; transform_origin_last_edited=&#8221;on|desktop&#8221; transform_styles_last_edited=&#8221;on|desktop&#8221; custom_margin=&#8221;|-30vw|8vw||false&#8221; transform_styles_tablet=&#8221;&#8221; transform_styles_phone=&#8221;&#8221; border_radii=&#8221;on|500px|500px|500px|500px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>About Us TalSoft TS is a company specialized in consulting and services in business computing and trainning security, which respond to the needs of outsourcing services of medium and large companies, nationally and internationally. Talsoft TS is creating pro-active awareness, control and decision-making power for companies to protect their critical and confidential information against computer [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p style=\"text-align: justify;\"><b><\/b><strong>TalSoft TS is a company specialized in consulting and services in business computing and trainning security<\/strong>, which respond to the needs of outsourcing services of medium and large companies, nationally and internationally.<\/p>\n<p style=\"text-align: justify;\"><strong>Talsoft TS is creating pro-active awareness, control and decision-making power for companies to protect their critical and confidential information against computer attacks.<\/strong><\/p>\n\n<h2 lang=\"en-US\" align=\"left\">Our Mission<\/h2>\n<p style=\"text-align: justify;\"><strong>Our job is to provide technological services and solutions at national and international level<\/strong>, attending the market increasing need for computers safety with expertise<\/p>\n\n<ol>\n \t<li style=\"text-align: justify;\"><strong>We are involved with prevention, protection and solution of incidents taking place in companies computer resources<\/strong> and we face our commitment through constant update, over-training and detailed system analysis.<\/li>\n \t<li style=\"text-align: justify;\"><strong>Our team works with international prototypes which guide service performance<\/strong>. We pursue long term commercial relationships with our customers providing quality and support.<\/li>\n \t<li style=\"text-align: justify;\"><strong>We have wide experience in business and academic fields as we had the opportunity of being part of university training and research projects<\/strong>, new technology development and the possibility of learning about new phenomena affecting computers safety<\/li>\n \t<li style=\"text-align: justify;\"><strong>We favour exchange with colleague companies which allows us to find better and more varied solutions<\/strong>. Our team takes part in important decisions tending to enhance Talsoft growth and development.<\/li>\n<\/ol>\n<h2><span class=\"tlid-translation translation\"><span title=\"\">Vision<\/span><\/span><\/h2>\n<p style=\"text-align: justify;\"><span class=\"tlid-translation translation\"><span title=\"\"><strong>Consolidate as a technology services and solutions company with excellence and local and international support<\/strong>.<\/span> <span class=\"\" title=\"\"><strong>Foster alliances between companies, organizations and universities<\/strong>, which interact with the objective of <strong>contributing to society, in the formation of an awareness in Information Security<\/strong>.<\/span><\/span><\/p>\n\n<h2><span class=\"tlid-translation translation\"><span class=\"\" title=\"\">Benefits for your company<\/span><\/span><\/h2>\n<p style=\"text-align: justify;\"><span class=\"tlid-translation translation\"><span class=\"\" title=\"\"><strong>The investment made by the company with our services<\/strong>, <strong>minimizes the loss of money and maximizes profits<\/strong>, even when cyber attacks occur.<\/span> <span title=\"\"><strong>It will increase its image, prestige, loyalty<\/strong> because it will protect confidential information and <strong>the relationship with customers, investors, suppliers<\/strong>.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span title=\"\"><strong>We guarantee that with our services, you will be able to control and know the state of the computer security of your company and concentrate on the growth and prosperity of your business<\/strong>.<\/span> <span title=\"\">Our professionals work in a traditional way, in the same way as an intruder but in an authorized way.<\/span> <span title=\"\"><strong>Computer security experts will be available to help you in responding to incidents and taking decisions in a personalized way<\/strong>.<\/span><\/p>\n<p style=\"text-align: justify;\"><strong><span class=\"tlid-translation translation\"><span title=\"\">It's time to start protecting your business.<\/span> <span class=\"\" title=\"\">Get your personalized quote at no cost with our experts, right now ...<\/span><\/span><\/strong><\/p>\n\n<h2><span class=\"tlid-translation translation\"><span class=\"\" title=\"\">Know the opinion of our clients<\/span><\/span><\/h2>\n[tw_divider type=\"space\" height=\"20\"]\n\n[tw_testimonials test_style=\"style_2\" category_ids=\"\" count=\"5\" bg_color=\" \" text_color=\" \" name_color=\" \" direction=\"right\" duration=\"1000\" timeout=\"2000\"]\n\n[tw_divider type=\"space\" height=\"20\"]\n<p style=\"text-align: center;\">[tw_button icon=\"\" link=\"https:\/\/www.talsoft-security.com\/site\/contact-us\/\" size=\"medium\" rounded=\"true\" style=\"flat\" hover=\"default\" color=\"#f01d1d\" target=\"_blank\"]Get a Quote[\/tw_button]<\/p>","_et_gb_content_width":"","footnotes":""},"class_list":["post-5105","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - About Us<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/about-us\/\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/about-us\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/about-us\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - About Us\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2019-03-05T16:04:29+00:00\",\"dateModified\":\"2024-07-20T18:49:52+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/about-us\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - About Us","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/about-us\/","twitter_misc":{"Estimated reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/about-us\/","url":"https:\/\/www.talsoft-security.com\/site\/about-us\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - About Us","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2019-03-05T16:04:29+00:00","dateModified":"2024-07-20T18:49:52+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/about-us\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/pages\/5105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=5105"}],"version-history":[{"count":14,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/pages\/5105\/revisions"}],"predecessor-version":[{"id":6959,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/pages\/5105\/revisions\/6959"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=5105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}