
{"id":3879,"date":"2017-06-06T09:30:39","date_gmt":"2017-06-06T12:30:39","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=3879"},"modified":"2017-05-31T15:59:28","modified_gmt":"2017-05-31T18:59:28","slug":"servicio-hacking-etico","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/servicio-hacking-etico\/","title":{"rendered":"\u00bfQue es un servicio de Hacking \u00c9tico?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-3880 alignleft\" src=\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/05\/18814006_10154985191739843_8184283738826799595_n-400x176.png\" alt=\"\" width=\"400\" height=\"176\" srcset=\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/05\/18814006_10154985191739843_8184283738826799595_n-400x176.png 400w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/05\/18814006_10154985191739843_8184283738826799595_n-300x132.png 300w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/05\/18814006_10154985191739843_8184283738826799595_n-260x114.png 260w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/05\/18814006_10154985191739843_8184283738826799595_n.png 531w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/p>\n<p style=\"text-align: justify;\">Un proyecto de<strong> Hacking \u00c9tico<\/strong> consiste en un testeo de seguridad\u00a0controlada en los sistemas inform\u00e1ticos de una empresa, de <em><strong>la misma forma que lo har\u00eda un intruso o pirata inform\u00e1tico pero de forma \u00e9tica, previa autorizaci\u00f3n de un convenio de confidencialidad por escrito<\/strong><\/em>. El resultado es un informe donde se identifican los sistemas en los que se ha logrado penetrar y la informaci\u00f3n confidencial y\/o secreta conseguida. <strong>E<em>ste servicio tambi\u00e9n puede utilizarse para garantizar el cumplimiento de PCI DSS<\/em>.<\/strong><\/p>\n<p style=\"text-align: justify;\">Comprende un conjunto de <strong><em>metodolog\u00edas y t\u00e9cnicas para realizar un diagn\u00f3stico integral de las debilidades de los sistemas inform\u00e1ticos de la organizaci\u00f3n<\/em>.<\/strong> Consiste en un modelo que reproduce intentos de acceso a cualquier entorno inform\u00e1tico de un intruso potencial desde los diferentes puntos de entrada que existan, tanto internos como remotos. Detectando las debilidades de la organizaci\u00f3n antes de que se produzcan los ingresos indebidos de intrusos. <a href=\"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/testeo-de-seguridad-informatica\/\">M\u00e1s info <\/a><\/p>\n<p style=\"text-align: center;\">[tw_button icon=&#8221;&#8221; link=&#8221;https:\/\/www.talsoft-security.com\/site\/obtener-una-cotizacion\/&#8221; size=&#8221;medium&#8221; rounded=&#8221;false&#8221; style=&#8221;border&#8221; hover=&#8221;hover2&#8243; color=&#8221; &#8221; target=&#8221;_self&#8221;]Cont\u00e1ctanos para m\u00e1s informaci\u00f3n[\/tw_button]<\/p>\n<h2 style=\"text-align: justify;\">Lo que nuestros clientes nos dicen<\/h2>\n<p>[tw_testimonials test_style=&#8221;style_1&#8243; category_ids=&#8221;&#8221; count=&#8221;9&#8243; bg_color=&#8221; &#8221; text_color=&#8221; &#8221; name_color=&#8221; &#8221; direction=&#8221;up&#8221; duration=&#8221;1000&#8243; timeout=&#8221;2000&#8243;]<\/p>\n<h2>Valor de propuesta<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2774 size-full\" src=\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2012\/11\/beneficios_1200.png\" alt=\"\" width=\"1200\" height=\"459\" srcset=\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2012\/11\/beneficios_1200.png 1200w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2012\/11\/beneficios_1200-300x115.png 300w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2012\/11\/beneficios_1200-400x153.png 400w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2012\/11\/beneficios_1200-1024x392.png 1024w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2012\/11\/beneficios_1200-260x99.png 260w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<p style=\"text-align: center;\">[tw_button icon=&#8221;&#8221; link=&#8221;https:\/\/www.talsoft-security.com\/site\/obtener-una-cotizacion\/&#8221; size=&#8221;medium&#8221; rounded=&#8221;false&#8221; style=&#8221;border&#8221; hover=&#8221;hover2&#8243; color=&#8221; &#8221; target=&#8221;_self&#8221;]Cont\u00e1ctanos para m\u00e1s informaci\u00f3n[\/tw_button]<\/p>\n<p><span id=\"fbPhotoSnowliftCaption\" class=\"fbPhotosPhotoCaption\" tabindex=\"0\" data-ft=\"{&quot;tn&quot;:&quot;K&quot;}\"><span class=\"hasCaption\"><strong class=\"markup--strong markup--p-strong\">Si quieres saber m\u00e1s sobre como proteger Tu negocio frente ataques inform\u00e1ticos,<\/strong><strong class=\"markup--strong markup--p-strong\"> subscr\u00edbete a nuestro <\/strong><a class=\"markup--anchor markup--p-anchor\" href=\"http:\/\/eepurl.com\/cq0c_j\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-href=\"http:\/\/lateralview.us1.list-manage2.com\/subscribe?u=1bb89edb08b35c2b3aae6f015&amp;id=31ad94f616\"><strong class=\"markup--strong markup--p-strong\">Newsletter<\/strong><\/a><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Un proyecto de Hacking \u00c9tico consiste en un testeo de seguridad\u00a0controlada en los sistemas inform\u00e1ticos de una empresa, de la misma forma que lo har\u00eda un intruso o pirata inform\u00e1tico pero de forma \u00e9tica, previa autorizaci\u00f3n de un convenio de confidencialidad por escrito. El resultado es un informe donde se identifican los sistemas en los [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-3879","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfQue es un servicio de Hacking \u00c9tico?<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/servicio-hacking-etico\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/servicio-hacking-etico\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/servicio-hacking-etico\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"\u00bfQue es un servicio de Hacking \u00c9tico?\",\"datePublished\":\"2017-06-06T12:30:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/servicio-hacking-etico\/\"},\"wordCount\":277,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/servicio-hacking-etico\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/05\/18814006_10154985191739843_8184283738826799595_n-400x176.png\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/servicio-hacking-etico\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/servicio-hacking-etico\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfQue es un servicio de Hacking \u00c9tico?\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/servicio-hacking-etico\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/servicio-hacking-etico\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/05\/18814006_10154985191739843_8184283738826799595_n-400x176.png\",\"datePublished\":\"2017-06-06T12:30:39+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/servicio-hacking-etico\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/servicio-hacking-etico\/#primaryimage\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/05\/18814006_10154985191739843_8184283738826799595_n.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/05\/18814006_10154985191739843_8184283738826799595_n.png\",\"width\":531,\"height\":233},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfQue es un servicio de Hacking \u00c9tico?","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/servicio-hacking-etico\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/servicio-hacking-etico\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/servicio-hacking-etico\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"\u00bfQue es un servicio de Hacking \u00c9tico?","datePublished":"2017-06-06T12:30:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/servicio-hacking-etico\/"},"wordCount":277,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/servicio-hacking-etico\/#primaryimage"},"thumbnailUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/05\/18814006_10154985191739843_8184283738826799595_n-400x176.png","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/servicio-hacking-etico\/","url":"https:\/\/www.talsoft-security.com\/site\/servicio-hacking-etico\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfQue es un servicio de Hacking \u00c9tico?","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/servicio-hacking-etico\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/servicio-hacking-etico\/#primaryimage"},"thumbnailUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/05\/18814006_10154985191739843_8184283738826799595_n-400x176.png","datePublished":"2017-06-06T12:30:39+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/servicio-hacking-etico\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/servicio-hacking-etico\/#primaryimage","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/05\/18814006_10154985191739843_8184283738826799595_n.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/05\/18814006_10154985191739843_8184283738826799595_n.png","width":531,"height":233},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/3879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=3879"}],"version-history":[{"count":6,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/3879\/revisions"}],"predecessor-version":[{"id":3886,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/3879\/revisions\/3886"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=3879"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=3879"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=3879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}