
{"id":3899,"date":"2017-06-20T09:30:43","date_gmt":"2017-06-20T12:30:43","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=3899"},"modified":"2017-05-31T16:25:45","modified_gmt":"2017-05-31T19:25:45","slug":"una-auditoria-seguridad-iot","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/una-auditoria-seguridad-iot\/","title":{"rendered":"\u00bfQue es una auditor\u00eda de seguridad en IoT?"},"content":{"rendered":"<p style=\"text-align: justify;\"><span class=\"notranslate\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-3641 alignleft\" src=\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/02\/communication-1927697_1920-400x256.png\" alt=\"\" width=\"400\" height=\"256\" srcset=\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/02\/communication-1927697_1920-400x256.png 400w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/02\/communication-1927697_1920-300x192.png 300w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/02\/communication-1927697_1920-768x491.png 768w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/02\/communication-1927697_1920-1024x655.png 1024w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/02\/communication-1927697_1920-260x166.png 260w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/02\/communication-1927697_1920.png 1920w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/>Con el auge de <strong>IoT (Internet de las cosas)<\/strong> tambi\u00e9n aparecen<strong> nuevas amenazas<\/strong> para utilizar estos dispositivos para realizar diversos <strong>ataques en conjunto contra un objetivo<\/strong>, hasta el <strong>robo de informaci\u00f3n<\/strong> de los usuarios para una posterior venta en el mercado negro o para utilizarse para ejecutar otros ataques.<\/span><\/p>\n<p style=\"text-align: justify;\"><span class=\"notranslate\">Este servicio permite realizar una <strong>auditor\u00eda de seguridad del dispositivo IoT y su interacci\u00f3n con su infraestructura<\/strong>, con el objetivo de <strong>analizar las vulnerabilidades que generen un riesgo en el negocio del cliente\/usuario<\/strong>.<\/span> <a href=\"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/auditoria-seguridad-iot\/\">M\u00e1s info <\/a><\/p>\n<p style=\"text-align: center;\">[tw_button icon=&#8221;&#8221; link=&#8221;https:\/\/www.talsoft-security.com\/site\/obtener-una-cotizacion\/&#8221; size=&#8221;medium&#8221; rounded=&#8221;false&#8221; style=&#8221;border&#8221; hover=&#8221;hover2&#8243; color=&#8221; &#8221; target=&#8221;_self&#8221;]Cont\u00e1ctanos para m\u00e1s informaci\u00f3n[\/tw_button]<\/p>\n<p style=\"text-align: justify;\">\u00a0[tw_divider type=&#8221;line&#8221; height=&#8221;20&#8243;]<\/p>\n<h2 style=\"text-align: justify;\">Lo que nuestros clientes nos dicen<\/h2>\n<p>[tw_testimonials test_style=&#8221;style_1&#8243; category_ids=&#8221;&#8221; count=&#8221;9&#8243; bg_color=&#8221; &#8221; text_color=&#8221; &#8221; name_color=&#8221; &#8221; direction=&#8221;up&#8221; duration=&#8221;1000&#8243; timeout=&#8221;2000&#8243;]<\/p>\n<h2>Valor de propuesta<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2774 size-full\" src=\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2012\/11\/beneficios_1200.png\" alt=\"\" width=\"1200\" height=\"459\" srcset=\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2012\/11\/beneficios_1200.png 1200w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2012\/11\/beneficios_1200-300x115.png 300w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2012\/11\/beneficios_1200-400x153.png 400w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2012\/11\/beneficios_1200-1024x392.png 1024w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2012\/11\/beneficios_1200-260x99.png 260w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<p style=\"text-align: center;\">[tw_button icon=&#8221;&#8221; link=&#8221;https:\/\/www.talsoft-security.com\/site\/obtener-una-cotizacion\/&#8221; size=&#8221;medium&#8221; rounded=&#8221;false&#8221; style=&#8221;border&#8221; hover=&#8221;hover2&#8243; color=&#8221; &#8221; target=&#8221;_self&#8221;]Cont\u00e1ctanos para m\u00e1s informaci\u00f3n[\/tw_button]<\/p>\n<p><span id=\"fbPhotoSnowliftCaption\" class=\"fbPhotosPhotoCaption\" tabindex=\"0\" data-ft=\"{&quot;tn&quot;:&quot;K&quot;}\"><span class=\"hasCaption\"><strong class=\"markup--strong markup--p-strong\">Si quieres saber m\u00e1s sobre como proteger Tu negocio frente ataques inform\u00e1ticos,<\/strong><strong class=\"markup--strong markup--p-strong\"> subscr\u00edbete a nuestro <\/strong><a class=\"markup--anchor markup--p-anchor\" href=\"http:\/\/eepurl.com\/cq0c_j\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-href=\"http:\/\/lateralview.us1.list-manage2.com\/subscribe?u=1bb89edb08b35c2b3aae6f015&amp;id=31ad94f616\"><strong class=\"markup--strong markup--p-strong\">Newsletter<\/strong><\/a><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Con el auge de IoT (Internet de las cosas) tambi\u00e9n aparecen nuevas amenazas para utilizar estos dispositivos para realizar diversos ataques en conjunto contra un objetivo, hasta el robo de informaci\u00f3n de los usuarios para una posterior venta en el mercado negro o para utilizarse para ejecutar otros ataques. Este servicio permite realizar una auditor\u00eda [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-3899","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfQue es una auditor\u00eda de seguridad en IoT?<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/una-auditoria-seguridad-iot\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/una-auditoria-seguridad-iot\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/una-auditoria-seguridad-iot\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"\u00bfQue es una auditor\u00eda de seguridad en IoT?\",\"datePublished\":\"2017-06-20T12:30:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/una-auditoria-seguridad-iot\/\"},\"wordCount\":210,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/una-auditoria-seguridad-iot\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/02\/communication-1927697_1920-400x256.png\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/una-auditoria-seguridad-iot\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/una-auditoria-seguridad-iot\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfQue es una auditor\u00eda de seguridad en IoT?\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/una-auditoria-seguridad-iot\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/una-auditoria-seguridad-iot\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/02\/communication-1927697_1920-400x256.png\",\"datePublished\":\"2017-06-20T12:30:43+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/una-auditoria-seguridad-iot\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/una-auditoria-seguridad-iot\/#primaryimage\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/02\/communication-1927697_1920.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/02\/communication-1927697_1920.png\",\"width\":1920,\"height\":1228},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfQue es una auditor\u00eda de seguridad en IoT?","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/una-auditoria-seguridad-iot\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/una-auditoria-seguridad-iot\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/una-auditoria-seguridad-iot\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"\u00bfQue es una auditor\u00eda de seguridad en IoT?","datePublished":"2017-06-20T12:30:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/una-auditoria-seguridad-iot\/"},"wordCount":210,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/una-auditoria-seguridad-iot\/#primaryimage"},"thumbnailUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/02\/communication-1927697_1920-400x256.png","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/una-auditoria-seguridad-iot\/","url":"https:\/\/www.talsoft-security.com\/site\/una-auditoria-seguridad-iot\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfQue es una auditor\u00eda de seguridad en IoT?","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/una-auditoria-seguridad-iot\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/una-auditoria-seguridad-iot\/#primaryimage"},"thumbnailUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/02\/communication-1927697_1920-400x256.png","datePublished":"2017-06-20T12:30:43+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/una-auditoria-seguridad-iot\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/una-auditoria-seguridad-iot\/#primaryimage","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/02\/communication-1927697_1920.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/02\/communication-1927697_1920.png","width":1920,"height":1228},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/3899","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=3899"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/3899\/revisions"}],"predecessor-version":[{"id":3900,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/3899\/revisions\/3900"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=3899"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=3899"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=3899"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}