{"id":22279,"date":"2021-04-13T16:13:28","date_gmt":"2021-04-13T14:13:28","guid":{"rendered":"https:\/\/www.tecsens.com\/business-internet-services\/computer-security\/"},"modified":"2023-09-19T13:40:43","modified_gmt":"2023-09-19T11:40:43","slug":"computer-security","status":"publish","type":"page","link":"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/","title":{"rendered":"Computer security"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; admin_label=&#8221;01 Curva superior&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; background_image=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/ondaazuloscura.png&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;top_center&#8221; background_repeat=&#8221;repeat-x&#8221; min_height=&#8221;176px&#8221; custom_margin=&#8221;||||false|false&#8221; custom_css_main_element=&#8221;z-index:10;&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; admin_label=&#8221;01 slider&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-170px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_slider _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; height=&#8221;550px&#8221; height_tablet=&#8221;500px&#8221; height_phone=&#8221;400px&#8221; height_last_edited=&#8221;off|phone&#8221; animation_direction=&#8221;right&#8221; auto=&#8221;on&#8221; auto_speed=&#8221;3000&#8243; auto_ignore_hover=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_slide heading=&#8221;COMPUTER SECURITY COMPANIES&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h1&#8243; header_font=&#8221;Raleway|700|||||||&#8221; header_text_color=&#8221;#0075b2&#8243; header_font_size=&#8221;36px&#8221; body_font=&#8221;|600|||||||&#8221; body_text_color=&#8221;#5f5e5d&#8221; body_font_size=&#8221;28px&#8221; background_color=&#8221;#FFFFFF&#8221; background_enable_color=&#8221;on&#8221; background_enable_image=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_transition=&#8221;on&#8221;]<\/p>\n<p style=\"text-align: center;\">We offer you the best IT security solutions<\/p>\n<hr style=\"color: #fff; max-width: 900px; margin-bottom: 30px;\">\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\" alt=\"tecsens logo\" class=\"wp-image-18991 alignnone size-full\" width=\"100\" height=\"100\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg 100w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens-24x24.jpg 24w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens-36x36.jpg 36w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens-48x48.jpg 48w\" sizes=\"(max-width: 100px) 100vw, 100px\" \/><\/p>\n<p>[\/et_pb_slide][\/et_pb_fullwidth_slider][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;06&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;30px||1px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; global_colors_info=&#8221;{}&#8221; custom_padding=&#8221;||0px|||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;19px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||37px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\"><strong>Focused on protecting your infrastructures, networks and business information, mitigating<\/strong><br \/><strong>  risks that can affect them.<\/strong><\/p>\n<p style=\"text-align: justify;\">-Managed perimeter security services for each headquarters.<br \/>  -Possibility to install architectures in H.A.<\/p>\n<p style=\"text-align: justify;\">Our services will allow you to monitor your internet access, as well as protection against viruses and external threats, blocking of unwanted access, mail filtering (AntiSpam), IDS\/IPS and permanent update.<\/p>\n<p style=\"text-align: justify;\">Prepare for a new generation of threats based on our services and expertise.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1100px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;37px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;#eeeeee&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;17&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;30px||1px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">UTM Solutions<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; module_id=&#8221;tecsensprotect&#8221; module_class=&#8221;reverse&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#0076B2&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_3_font=&#8221;Maven Pro||||||||&#8221; header_3_font_size=&#8221;16px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||12px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 class=\"titulo\" style=\"text-align: left;\">TECSENS PROTECT<\/h3>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||19px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">Protect is a cloud mail filtering service (SaaS mode) <strong>that protects user data by assembling the latest technologies in email security.<\/strong><\/p>\n<p style=\"text-align: justify;\">No infrastructure changes are required, Tecsens Protect is ahead of the mail server.<\/p>\n<p>[\/et_pb_text][et_pb_code _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;38px|||||&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"contenedorflex\"><!-- [et_pb_line_break_holder] -->  <\/p>\n<div><!-- [et_pb_line_break_holder] -->    <img decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/03\/seguridad-informatica-personalizado-06.jpg\"><!-- [et_pb_line_break_holder] -->    <span style=\"text-align:center\"><!-- [et_pb_line_break_holder] --> custom<!-- [et_pb_line_break_holder] -->    <\/span><!-- [et_pb_line_break_holder] -->  <\/div>\n<p><!-- [et_pb_line_break_holder] -->  <\/p>\n<div><!-- [et_pb_line_break_holder] -->   <img decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-orden-ideas-1.jpg\"><!-- [et_pb_line_break_holder] -->    <span style=\"text-align:center\"><!-- [et_pb_line_break_holder] -->  agile<!-- [et_pb_line_break_holder] -->    <\/span><!-- [et_pb_line_break_holder] -->  <\/div>\n<p><!-- [et_pb_line_break_holder] -->  <\/p>\n<div><!-- [et_pb_line_break_holder] -->    <img decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/03\/seguridad-informatica-rapido-06.jpg\"><!-- [et_pb_line_break_holder] -->    <span style=\"text-align:center\"><!-- [et_pb_line_break_holder] -->  fast<!-- [et_pb_line_break_holder] -->    <\/span><!-- [et_pb_line_break_holder] -->  <\/div>\n<p><!-- [et_pb_line_break_holder] --><\/div>\n<p>[\/et_pb_code][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/seguridad-informatica-email-03.jpg&#8221; alt=&#8221;email informatic security&#8221; title_text=&#8221;email informatic security&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1100px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;18px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;#eeeeee&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||20px|||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; module_id=&#8221;dnsfilter&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_padding=&#8221;6px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/seguridad-informatica-dns-04.jpg&#8221; alt=&#8221;security informatica dns&#8221; title_text=&#8221;security informatica dns&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#0076B2&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_3_font=&#8221;Maven Pro||||||||&#8221; header_3_font_size=&#8221;16px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||12px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 class=\"titulo\" style=\"text-align: left;\">TECSENS DNS FILTER<\/h3>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||19px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">TECSENS DNS Filter <strong>makes it easy to implement comprehensive and customizable Internet content and URL filtering policies in minutes.<\/strong><\/p>\n<p style=\"text-align: justify;\">Our algorithms intelligently categorize sites so you don&#8217;t have to constantly maintain a list of domains.<\/p>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;lista listatick&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li style=\"text-align: justify;\">Provides support for networks with dynamic IP addresses.<\/li>\n<li style=\"text-align: justify;\">Protect your users and networks from command and control (botnet), malware, phishing, viruses, and other threats by simply applying our security policies.<\/li>\n<li style=\"text-align: justify;\">Complete reports with activity, security, billing and query logging.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1100px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;18px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;#eeeeee&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; module_id=&#8221;idsips&#8221; module_class=&#8221;reverse&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_padding=&#8221;11px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#0076B2&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_3_font=&#8221;Maven Pro||||||||&#8221; header_3_font_size=&#8221;16px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||12px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 class=\"titulo\" style=\"text-align: left;\">IDS\/IPS<\/h3>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||19px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">Snort IDS\/IPS is software that <strong>implements an attack detection and port scanning engine that allows you to record, alert and respond to any previously defined failures.<\/strong><\/p>\n<p style=\"text-align: justify;\">The method of registering and updating rules is done daily, receiving, thanks to the subscription level that TECSENS has real-time updates.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||-2px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"titulo\" style=\"text-align: left;\">IDS (INTRUDER DETECTION SYSTEMS)<\/p>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||19px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">IDSs contain an extensive updated database, with a multitude of known attack signatures.<br \/>\nThis solution monitors incoming traffic through a thorough network analysis and port sweep, all of which compares it to the information it has about malicious elements.<br \/>\nIn the face of any suspicious activity, this detection system issues an early warning, which directs system administrators. And it is these IT managers who must take appropriate action.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||-2px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"titulo\" style=\"text-align: left;\">IPS (INTRUSION PREVENTION SYSTEMS)<\/p>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||19px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">The IPS is located between the firewall and the rest of the enterprise network, monitoring the input packets.<br \/>\nAnd before you let them in, check what they&#8217;re actually used for, preventing suspicious traffic from accessing the rest of the corporate network.<br \/>\nDepending on the form of detection, it may signal malicious traffic based on signatures (such as an antivirus).<br \/>\nYou can also do this if it is anomaly-based, depending on the pattern of normal traffic behavior.<br \/>\nOr you can even intervene on the basis of very specific security policies.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/03\/seguridad-informatica-ips-ids-05.jpg&#8221; alt=&#8221;informatic security ips ids&#8221; title_text=&#8221;informatic security ips ids&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;17&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;30px||1px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1100px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;18px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Other solutions in computer security<\/h2>\n<p>[\/et_pb_text][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; module_id=&#8221;firewall&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_margin=&#8221;|auto|-45px|auto||&#8221; custom_padding=&#8221;6px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/seguridad-informatica-firewall-06.jpg&#8221; alt=&#8221;firewall informatic security&#8221; title_text=&#8221;firewall informatic security&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#0076B2&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_3_font=&#8221;Maven Pro||||||||&#8221; header_3_font_size=&#8221;16px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||12px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 class=\"titulo\" style=\"text-align: left;\">firewall<\/h3>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||19px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\"><strong>Through our market-leading edge security solutions, we are able to address very complex architectures by competing directly with large manufacturers.<\/strong><\/p>\n<p style=\"text-align: justify;\">  Customized installations, from the simplest to the most specific and robust functionalities.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1100px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;18px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;#eeeeee&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_padding=&#8221;11px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text module_class=&#8221;lista listatick&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li style=\"text-align: justify;\">Virtual Private Networks using IPsec, OpenVPN, Wireguard.<\/li>\n<li style=\"text-align: justify;\">High availability cluster; redundancy and failover.<\/li>\n<li style=\"text-align: justify;\">Inbound and outbound load balancer.<\/li>\n<li style=\"text-align: justify;\">Quality of Service (QoS).<\/li>\n<li style=\"text-align: justify;\">Package debugger.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text module_class=&#8221;lista listatick&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li style=\"text-align: justify;\">Multi-WAN.<\/li>\n<li style=\"text-align: justify;\">Stateful firewall.<\/li>\n<li style=\"text-align: justify;\">Source\/destination IP filtering.<\/li>\n<li style=\"text-align: justify;\">Configurable registration by rule and limiters per rule.<\/li>\n<li style=\"text-align: justify;\">Multi-WAN and Stateful firewall.<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; make_equal=&#8221;on&#8221; module_id=&#8221;vpn&#8221; module_class=&#8221;reverse&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_padding=&#8221;11px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;#eeeeee&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||35px|||&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#0076B2&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_3_font=&#8221;Maven Pro||||||||&#8221; header_3_font_size=&#8221;16px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||12px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 class=\"titulo\" style=\"text-align: left;\">Vpn<\/h3>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||19px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\"><strong>Virtual private networks (VPNs) enable remote connection, securely in the organization, or in a relocated manner to facilitate telework.<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||-2px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"titulo\" style=\"text-align: left;\">ACCESS VPN:<\/p>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||19px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">They allow direct remote connection to the local home or enterprise network, and access to all shares as if they were physically in the enterprise.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||-2px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"titulo\" style=\"text-align: left;\">POINT-TO-POINT VPN:<\/p>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||19px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">They allow you to connect remote offices to an organization&#8217;s headquarters and have access to all the shares, as if we were physically in all of them. The VPN server is the one that has a permanent link to the Internet, accepts all connections that come from the sites, and establishes the VPN tunnel through a type of encryption and authentication.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/seguridad-informatica-vpn-07.jpg&#8221; alt=&#8221;security informatica vpn&#8221; title_text=&#8221;security informatica vpn&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;55px|||||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1100px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;18px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;#eeeeee&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; module_id=&#8221;monitorizacion&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_padding=&#8221;6px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/seguridad-informatica-monitorizacion-08.jpg&#8221; alt=&#8221;informational security monitoring&#8221; title_text=&#8221;informational security monitoring&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#0076B2&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_3_font=&#8221;Maven Pro||||||||&#8221; header_3_font_size=&#8221;16px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||12px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 class=\"titulo\" style=\"text-align: left;\">monitoring<\/h3>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||19px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\"><strong>Performance monitoring solution for DevOps and IT Operations teams, which allows you to have a 360-degree view of your entire infrastructure and makes the job easier.<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;lista listatick&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||-1px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li style=\"text-align: justify;\">automation.<\/li>\n<li style=\"text-align: justify;\">Transparency.<\/li>\n<li style=\"text-align: justify;\">Proactive incident detection.<\/li>\n<li style=\"text-align: justify;\">Performance reports.<\/li>\n<li style=\"text-align: justify;\">Capacity planning.<\/li>\n<li style=\"text-align: justify;\">Ensures availability and performance.<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||19px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\"><strong>Types of monitoring:<\/strong><\/p>\n<p style=\"text-align: justify;\">Websites and servers.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1100px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;18px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;#eeeeee&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; make_equal=&#8221;on&#8221; module_id=&#8221;proxyinverso&#8221; module_class=&#8221;reverse&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_padding=&#8221;11px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#0076B2&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_3_font=&#8221;Maven Pro||||||||&#8221; header_3_font_size=&#8221;16px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||12px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 class=\"titulo\" style=\"text-align: left;\">Reverse proxy or load balancer<\/h3>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||19px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">High availability load balancer and proxy server for <strong>L4 and L7 layer HTTP and TCP-based applications.<\/strong><\/p>\n<p style=\"text-align: justify;\">It <strong>aims to distribute incoming requests across multiple servers, significantly improving infrastructure availability, resiliency, and scalability.<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/seguridad-informatica-proxy-inverso-19.jpg&#8221; alt=&#8221;reverse proxy informatic security&#8221; title_text=&#8221;reverse proxy informatic security&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1100px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;18px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;#eeeeee&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; module_id=&#8221;waf&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_padding=&#8221;6px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/seguridad-informatica-waf-20.jpg&#8221; alt=&#8221;informatic security waf&#8221; title_text=&#8221;informatic security waf&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#0076B2&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_3_font=&#8221;Maven Pro||||||||&#8221; header_3_font_size=&#8221;16px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||12px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 class=\"titulo\" style=\"text-align: left;\">WAF(Web aplication firewall)<\/h3>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||19px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\"><strong>Firewall that helps mitigate attacks on web applications by filtering and monitoring HTTP traffic between web applications and the Internet network.<\/strong><\/p>\n<p style=\"text-align: justify;\">It acts as a reverse proxy protecting the server, getting users to pass through it before reaching it.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1100px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;18px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;#eeeeee&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; make_equal=&#8221;on&#8221; module_id=&#8221;ssl&#8221; module_class=&#8221;reverse&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_padding=&#8221;11px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#0076B2&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; header_3_font=&#8221;Maven Pro||||||||&#8221; header_3_font_size=&#8221;16px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||12px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 class=\"titulo\" style=\"text-align: left;\">SSL certificates<\/h3>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||19px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\"><strong>We provide SSL (Secure Connection Layer) certificates, a security standard that encrypts information that is transferred between a web server and the browser.<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/seguridad-informatica-ssl-21.jpg&#8221; alt=&#8221;informatic security ssl&#8221; title_text=&#8221;informatic security ssl&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_margin=&#8221;-21px|auto||auto||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/01\/kitdigital-logo.png&#8221; alt=&#8221;kit digital logo&#8221; title_text=&#8221;kit digital logo&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; transform_scale=&#8221;62%|62%&#8221; custom_margin=&#8221;|||-7px||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;19px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;26px||19px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"color: #0076b2;\"><strong>SOLUTIONS AVAILABLE IN THE DIGITAL KIT AID PROGRAM<\/strong><\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;13px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;3px||40px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #0076b2;\"><strong>*Check available solutions on the Digital Kit page<\/strong><\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.tecsens.com\/en\/?page_id=26959&#8243; button_text=&#8221;more about digital kit&#8221; button_alignment=&#8221;center&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.16&#8243; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#0076bc&#8221; button_bg_color_gradient_direction=&#8221;243deg&#8221; button_bg_color_gradient_stops=&#8221;#3D72E7 0%|#53a0fe 100%&#8221; button_bg_color_gradient_start=&#8221;#3D72E7&#8243; button_bg_color_gradient_end=&#8221;#53a0fe&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;#0076bc&#8221; button_border_radius=&#8221;34px&#8221; button_letter_spacing=&#8221;1px&#8221; button_font=&#8221;Maven Pro|500||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;-4px||11px||false|false&#8221; custom_padding=&#8221;9px|15px|9px|15px|false|false&#8221; saved_tabs=&#8221;all&#8221; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_text_size__hover=&#8221;null&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover=&#8221;null&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover=&#8221;null&#8221; button_text_color__hover_enabled=&#8221;on&#8221; button_text_color__hover=&#8221;#ffffff&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover=&#8221;null&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover=&#8221;null&#8221; button_border_width__hover_enabled=&#8221;on|hover&#8221; button_border_width__hover=&#8221;2px&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover=&#8221;null&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover=&#8221;null&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_border_color__hover=&#8221;null&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover=&#8221;null&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover=&#8221;null&#8221; button_border_radius__hover_enabled=&#8221;on|desktop&#8221; button_border_radius__hover=&#8221;12px&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover=&#8221;null&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover=&#8221;null&#8221; button_letter_spacing__hover_enabled=&#8221;on|desktop&#8221; button_letter_spacing__hover=&#8221;1px&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover=&#8221;null&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover=&#8221;null&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_bg_color__hover=&#8221;null&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover=&#8221;null&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover=&#8221;null&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;24&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-1px|||||&#8221; custom_padding=&#8221;13px||39px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-plan-tecnologia-1.jpg&#8221; alt=&#8221;cybersecurity audit technology plan&#8221; title_text=&#8221;cybersecurity audit technology plan&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_button _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||44px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Common cyberattacks and solutions<\/h2>\n<p>[\/et_pb_text][et_pb_button _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][et_pb_button _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][et_pb_text module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||19px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">DoS and DDoS (Denial of Service Attack or Distributed Denial of Service Attack) attacks: <strong>Attack on devices, servers, networks, or whose primary objective is to have them blocked and inaccessible to proprietary users.<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_accordion closed_toggle_text_color=&#8221;#5f5e5d&#8221; closed_toggle_background_color=&#8221;RGBA(0,0,0,0)&#8221; icon_color=&#8221;#0076b2&#8243; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;19px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; toggle_text_color=&#8221;#5f5e5d&#8221; toggle_font=&#8221;Maven Pro|500|||||||&#8221; toggle_letter_spacing=&#8221;1px&#8221; closed_toggle_font=&#8221;Maven Pro|500|||||||&#8221; closed_toggle_letter_spacing=&#8221;1px&#8221; border_width_all=&#8221;0px&#8221; border_color_all=&#8221;#eeeeee&#8221; border_width_top=&#8221;2px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_accordion_item title=&#8221;What solutions are there?&#8221; open=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_css_main_element=&#8221;display:none&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What solutions are there?&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221;]<\/p>\n<p>\u2022 Protect and configure edge security teams in the best possible way.  <a href=\"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/#firewall\" data-et-has-event-already=\"true\">(FIREWALL)<\/a><br \/>  \u2022 Protect web or internet-exposed servers with Layer 7 WAF solutions.  <a href=\"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/#waf\" data-et-has-event-already=\"true\">(WAF)<\/a><br \/>  \u2022 Configure a request balancer (Proxy) computer to load balance and take action against the attack.  <a href=\"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/#proxyinverso\" data-et-has-event-already=\"true\">(REVERSE PROXY OR LOAD BALANCER)<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_text module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||19px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\"><strong>Social engineering:<\/strong> Technique that persuades and manipulates people in an organization to obtain confidential information or perform a certain malicious action that benefits the cybercriminal.<\/p>\n<p>[\/et_pb_text][et_pb_accordion closed_toggle_text_color=&#8221;#5f5e5d&#8221; closed_toggle_background_color=&#8221;RGBA(0,0,0,0)&#8221; icon_color=&#8221;#0076b2&#8243; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;19px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; toggle_text_color=&#8221;#5f5e5d&#8221; toggle_font=&#8221;Maven Pro|500|||||||&#8221; toggle_letter_spacing=&#8221;1px&#8221; closed_toggle_font=&#8221;Maven Pro|500|||||||&#8221; closed_toggle_letter_spacing=&#8221;1px&#8221; border_width_all=&#8221;0px&#8221; border_color_all=&#8221;#eeeeee&#8221; border_width_top=&#8221;2px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_accordion_item title=&#8221;What solutions are there?&#8221; open=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_css_main_element=&#8221;display:none&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What solutions are there?&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221;]<\/p>\n<p>\u2022 Employee training <a href=\"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/\">(CIBERSECURITY AUDIT)<\/a><br \/>\u2022 Apply security solutions such as anti-spam or content filters.  <a href=\"#dnsfilter\">(TECSENS PROTECT OR DNS FILTER)<\/a><br \/>\u2022 Enable dual authentication factor.<br \/>\u2022 Always back up your data.  <a href=\"https:\/\/www.tecsens.com\/en\/enterprise-cloud-services-2\/cloud-backup-2\/\">(BACKUP BaaS or DraaS)<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;10&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#F1F6F8&#8243; background_enable_image=&#8221;off&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;bottom_center&#8221; background_repeat=&#8221;repeat-x&#8221; custom_padding=&#8221;30px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Find out more&#8230;<\/h2>\n<p style=\"text-align: center;\">[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;775px&#8221; custom_padding=&#8221;75px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blog posts_number=&#8221;1&#8243; show_author=&#8221;off&#8221; show_date=&#8221;off&#8221; show_categories=&#8221;off&#8221; show_pagination=&#8221;off&#8221; module_class=&#8221;adelantoblog&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Maven Pro|500|||||||&#8221; header_text_color=&#8221;#5F5E5D&#8221; header_font_size=&#8221;16px&#8221; body_font=&#8221;Maven Pro||||||||&#8221; body_font_size=&#8221;16px&#8221; background_color=&#8221;RGBA(0,0,0,0)&#8221; text_orientation=&#8221;justified&#8221; custom_padding=&#8221;||||false|false&#8221; border_radii_fullwidth=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blog posts_number=&#8221;1&#8243; show_author=&#8221;off&#8221; show_date=&#8221;off&#8221; show_categories=&#8221;off&#8221; show_pagination=&#8221;off&#8221; offset_number=&#8221;1&#8243; module_class=&#8221;adelantoblog&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Maven Pro|500|||||||&#8221; header_text_color=&#8221;#5F5E5D&#8221; header_font_size=&#8221;16px&#8221; body_font=&#8221;Maven Pro||||||||&#8221; body_text_align=&#8221;justify&#8221; body_font_size=&#8221;16px&#8221; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_padding=&#8221;||||false|false&#8221; border_radii_fullwidth=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; theme_builder_area=&#8221;post_content&#8221; _builder_version=&#8221;4.21.2&#8243; _module_preset=&#8221;default&#8221; alt=&#8221;onda azul clara&#8221; title_text=&#8221;onda azul clara&#8221; background_image=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/ondaazulclara.jpg&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243; background_size=&#8221;contain&#8221; background_position=&#8221;top_right&#8221; custom_padding=&#8221;||19px|||&#8221;][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; theme_builder_area=&#8221;post_content&#8221; _builder_version=&#8221;4.21.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; module_id=&#8221;consulting&#8221; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;19px|auto||auto||&#8221; custom_padding=&#8221;0px||55px|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_code _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;30px|30px|30px|30px|false|false&#8221; custom_css_before=&#8221;span.wpcf7-list-item {display:block;}&#8221; border_radii=&#8221;on|8px|8px|8px|8px&#8221; box_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f34141-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"34141\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/22279#wpcf7-f34141-o1\" method=\"post\" class=\"wpcf7-form init wpcf7-acceptance-as-validation\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"34141\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.4\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f34141-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<p><b><span class=\"wpcf7-form-control-wrap\" data-name=\"radio-106\"><span class=\"wpcf7-form-control wpcf7-radio\"><span class=\"wpcf7-list-item first last\"><label><input type=\"radio\" name=\"radio-106\" value=\"Commercial advisor\" checked=\"checked\" \/><span class=\"wpcf7-list-item-label\">Commercial advisor<\/span><\/label><\/span><\/span><\/span><\/b> - Yes, you already have it clear<br \/>\n<b><span class=\"wpcf7-form-control-wrap\" data-name=\"radio-106\"><span class=\"wpcf7-form-control wpcf7-radio\"><span class=\"wpcf7-list-item first last\"><label><input type=\"radio\" name=\"radio-106\" value=\"Technical advisor\" checked=\"checked\" \/><span class=\"wpcf7-list-item-label\">Technical advisor<\/span><\/label><\/span><\/span><\/span><\/b> - We guide you to the best solution<br \/>\n<b><span class=\"wpcf7-form-control-wrap\" data-name=\"radio-106\"><span class=\"wpcf7-form-control wpcf7-radio\"><span class=\"wpcf7-list-item first last\"><label><input type=\"radio\" name=\"radio-106\" value=\"General information\" checked=\"checked\" \/><span class=\"wpcf7-list-item-label\">General information<\/span><\/label><\/span><\/span><\/span><\/b><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"nombre\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required campo\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Name*\" value=\"\" type=\"text\" name=\"nombre\" \/><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"text-274\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required campo\" aria-required=\"true\" aria-invalid=\"false\" value=\"Company\" type=\"text\" name=\"text-274\" \/><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email campo\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"E-mail*\" value=\"\" type=\"email\" name=\"email\" \/><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"telefono\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel campo\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Phone*\" value=\"\" type=\"tel\" name=\"telefono\" \/><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"mensaje\"><textarea cols=\"40\" rows=\"6\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required campo\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Message*\" name=\"mensaje\"><\/textarea><\/span>\n<\/p>\n<p><span class=\"wpcf7-form-control-wrap\" data-name=\"aceptacion\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><input type=\"checkbox\" name=\"aceptacion\" value=\"1\" aria-invalid=\"false\" \/><\/span><\/span><\/span> \u00a0I have read and accept the <a href=\"https:\/\/www.tecsens.com\/en\/data-protection\/\" target=\"_blank\">privacy notice.<\/a>\n<\/p>\n<p><span class=\"wpcf7-form-control-wrap\" data-name=\"acepta-recibir-info\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"acepta-recibir-info\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\">\u00a0I wish to receive commercial information by email about TECSENS products and services.<\/span><\/label><\/span><\/span><\/span>\n<\/p>\n<span class=\"wpcf7-form-control-wrap recaptcha\" data-name=\"recaptcha\"><span data-sitekey=\"6LfURk4gAAAAAEZGOFb7aVgEGBWHEQecGNbaKJCa\" class=\"wpcf7-form-control wpcf7-recaptcha g-recaptcha\"><\/span>\r\n<noscript>\r\n\t<div class=\"grecaptcha-noscript\">\r\n\t\t<iframe loading=\"lazy\" src=\"https:\/\/www.google.com\/recaptcha\/api\/fallback?k=6LfURk4gAAAAAEZGOFb7aVgEGBWHEQecGNbaKJCa\" frameborder=\"0\" scrolling=\"no\" width=\"310\" height=\"430\">\r\n\t\t<\/iframe>\r\n\t\t<textarea name=\"g-recaptcha-response\" rows=\"3\" cols=\"40\" placeholder=\"reCaptcha Response Here\">\r\n\t\t<\/textarea>\r\n\t<\/div>\r\n<\/noscript>\r\n<\/span>\n<p style=\"text-align:center\"><input class=\"wpcf7-form-control wpcf7-submit has-spinner boton\" type=\"submit\" value=\"SEND\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n[\/et_pb_code][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5f5e5d&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;35px||36px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Need to talk to an expert?<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;19px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;52px||7px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p style=\"text-align: left;\"><strong>Our offices<\/strong><\/p>\n<p style=\"text-align: left;\">\n<ul>\n<li style=\"text-align: left;\">Paseo de la Castellana 171, 4\u00ba Izq, 28046 (Madrid)<\/li>\n<li style=\"text-align: left;\">C\/Figueres 8 Despacho 12, 08022 (Barcelona)<\/li>\n<li style=\"text-align: left;\">Edisonstra\u00dfe 63 House A, 1st Floor, 12459 (Berlin)<span style=\"font-size: 19px;\"><\/span> <span style=\"text-align: justify;\"><\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_divider _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||3px|||&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;19px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;7px||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p style=\"text-align: left;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/05\/icono_llamar-1.png\" width=\"20\" height=\"20\" alt=\"icon call\" class=\"wp-image-28495 alignnone size-full\" style=\"float: left;\"><span style=\"font-size: 19px;\"><\/span> <a href=\"tel:%20+34917914400\" title=\"  (+34) 917 914 400\"> <\/a><span style=\"color: #333333;\"><a href=\"tel:%20+34917914400\" title=\" (+34) 917 914 400\">(+34) 917 914<\/a><\/span> 400 \/ (+<a href=\"tel:+34935455600\" style=\"color: #333333;\"> <\/a><a href=\"tel:%20+34935455600\" title=\" (+34) 935 455 600\"> 34) 935 455 600 \/ (+<\/a><a href=\"tel:+493086323849\" data-auth=\"NotApplicable\">49) 30 863 238 49<\/a><\/p>\n<p>[\/et_pb_text][et_pb_divider _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||3px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;19px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;4px||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p style=\"text-align: left;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/05\/icono_email.png\" width=\"20\" height=\"20\" alt=\"email icono\" class=\"wp-image-28499 alignnone size-full\">  <a href=\"mailto:info@tecsens.com\">info@tecsens.com<\/a><\/p>\n<p>[\/et_pb_text][et_pb_divider _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||3px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;19px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;2px||52px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/05\/icono_hora.png\" width=\"20\" height=\"20\" alt=\"icon time\" class=\"wp-image-28503 alignnone size-full\">  <strong>Monday to Thursday<\/strong> 9.00-18.30h <strong>Friday<\/strong> 9.00-15.00h<\/span><\/p>\n<p>[\/et_pb_text][et_pb_social_media_follow icon_color=&#8221;#FFFFFF&#8221; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_social_media_follow_network social_network=&#8221;linkedin&#8221; url=&#8221;https:\/\/www.linkedin.com\/company\/tecsens\/mycompany\/verification\/?viewAsMember=true&#8221; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#007bb6&#8243; global_colors_info=&#8221;{}&#8221; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221; theme_builder_area=&#8221;post_content&#8221;]linkedin[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8221;twitter&#8221; url=&#8221;https:\/\/twitter.com\/Tecsens&#8221; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#00aced&#8221; global_colors_info=&#8221;{}&#8221; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221; theme_builder_area=&#8221;post_content&#8221;]twitter[\/et_pb_social_media_follow_network][\/et_pb_social_media_follow][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We offer you the best IT security solutions Focused on protecting your infrastructures, networks and business information, mitigating risks that can affect them. -Managed perimeter security services for each headquarters. -Possibility to install architectures in H.A. Our services will allow you to monitor your internet access, as well as protection against viruses and external threats, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":22274,"menu_order":118,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-22279","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Computer security - Tecsens<\/title>\n<meta name=\"description\" content=\"IT security solutions for companies. We focus on protecting your infrastructures, networks and information, mitigating risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computer security - Tecsens\" \/>\n<meta property=\"og:description\" content=\"IT security solutions for companies. We focus on protecting your infrastructures, networks and information, mitigating risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Tecsens\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-19T11:40:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"37 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/\"},\"author\":{\"name\":\"Admin\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/1f72960a60140421bab7c0c55b923859\"},\"headline\":\"Computer security\",\"datePublished\":\"2021-04-13T14:13:28+00:00\",\"dateModified\":\"2023-09-19T11:40:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/\"},\"wordCount\":7305,\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/\",\"url\":\"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/\",\"name\":\"Computer security - Tecsens\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\",\"datePublished\":\"2021-04-13T14:13:28+00:00\",\"dateModified\":\"2023-09-19T11:40:43+00:00\",\"description\":\"IT security solutions for companies. We focus on protecting your infrastructures, networks and information, mitigating risks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/#primaryimage\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.tecsens.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business internet services\",\"item\":\"https:\/\/www.tecsens.com\/en\/business-internet-services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Computer security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tecsens.com\/#website\",\"url\":\"https:\/\/www.tecsens.com\/\",\"name\":\"TECSENS - Empowering companies\",\"description\":\"Sense &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tecsens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tecsens.com\/#organization\",\"name\":\"TECSENS\",\"url\":\"https:\/\/www.tecsens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"width\":411,\"height\":85,\"caption\":\"TECSENS\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/tecsens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/1f72960a60140421bab7c0c55b923859\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cef66946068415daaf1178cd189f6c18?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cef66946068415daaf1178cd189f6c18?s=96&d=mm&r=g\",\"caption\":\"Admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Computer security - Tecsens","description":"IT security solutions for companies. We focus on protecting your infrastructures, networks and information, mitigating risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/","og_locale":"en_US","og_type":"article","og_title":"Computer security - Tecsens","og_description":"IT security solutions for companies. We focus on protecting your infrastructures, networks and information, mitigating risks.","og_url":"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/","og_site_name":"Tecsens","article_modified_time":"2023-09-19T11:40:43+00:00","og_image":[{"url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"37 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/#article","isPartOf":{"@id":"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/"},"author":{"name":"Admin","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/1f72960a60140421bab7c0c55b923859"},"headline":"Computer security","datePublished":"2021-04-13T14:13:28+00:00","dateModified":"2023-09-19T11:40:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/"},"wordCount":7305,"publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"image":{"@id":"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/","url":"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/","name":"Computer security - Tecsens","isPartOf":{"@id":"https:\/\/www.tecsens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/#primaryimage"},"image":{"@id":"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg","datePublished":"2021-04-13T14:13:28+00:00","dateModified":"2023-09-19T11:40:43+00:00","description":"IT security solutions for companies. We focus on protecting your infrastructures, networks and information, mitigating risks.","breadcrumb":{"@id":"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/#primaryimage","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.tecsens.com\/en\/"},{"@type":"ListItem","position":2,"name":"Business internet services","item":"https:\/\/www.tecsens.com\/en\/business-internet-services\/"},{"@type":"ListItem","position":3,"name":"Computer security"}]},{"@type":"WebSite","@id":"https:\/\/www.tecsens.com\/#website","url":"https:\/\/www.tecsens.com\/","name":"TECSENS - Empowering companies","description":"Sense &amp; Technology","publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecsens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.tecsens.com\/#organization","name":"TECSENS","url":"https:\/\/www.tecsens.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","width":411,"height":85,"caption":"TECSENS"},"image":{"@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/tecsens\/"]},{"@type":"Person","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/1f72960a60140421bab7c0c55b923859","name":"Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cef66946068415daaf1178cd189f6c18?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cef66946068415daaf1178cd189f6c18?s=96&d=mm&r=g","caption":"Admin"}}]}},"_links":{"self":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/pages\/22279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/comments?post=22279"}],"version-history":[{"count":11,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/pages\/22279\/revisions"}],"predecessor-version":[{"id":45374,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/pages\/22279\/revisions\/45374"}],"up":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/pages\/22274"}],"wp:attachment":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/media?parent=22279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}