{"id":4725,"date":"2022-03-29T21:22:56","date_gmt":"2022-03-29T21:22:56","guid":{"rendered":"http:\/\/ggit.ca\/servicios-de-soporte-tecnico\/"},"modified":"2022-08-22T22:39:12","modified_gmt":"2022-08-22T22:39:12","slug":"servicios-de-soporte-tecnico","status":"publish","type":"page","link":"https:\/\/ggit.ca\/es\/servicios-de-soporte-tecnico\/","title":{"rendered":"Soluciones de seguridad"},"content":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/2&#8243;]<div class=\"clearboth\"><\/div><div class=\"gem-divider \" style=\"margin-top: 40px;\"><\/div>[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<div class=\"title-h2\">\u00bfEs su empresa vulnerable a las amenazas cibern\u00e9ticas?<\/div>\n<p>[\/vc_column_text]<div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-xs\" style=\"margin-top: 30px;\"><\/div>[vc_separator color=&#8221;custom&#8221; align=&#8221;align_left&#8221; border_width=&#8221;2&#8243; el_width=&#8221;20&#8243; css_animation=&#8221;none&#8221; accent_color=&#8221;#ffb600&#8243;][vc_single_image image=&#8221;4628&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;none&#8221; el_class=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;]<div class=\"clearboth\"><\/div><div class=\"gem-divider \" style=\"margin-top: 40px;\"><\/div>[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: justify;\"><strong>Nuestros servicios de TI gestionados:<br \/>\n<\/strong><br \/>\nOfrecemos servicios de seguridad de TI, as\u00ed como servicios de recuperaci\u00f3n de desastres de TI dise\u00f1ados para proteger su entorno de TI cr\u00edtico de da\u00f1os. Desde evaluar el estado de sus vulnerabilidades hasta proporcionar funciones de seguridad diarias, nuestro equipo tiene el conocimiento y la experiencia para brindar tranquilidad a su organizaci\u00f3n.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_hidden-xs&#8221;][vc_single_image image=&#8221;4628&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;none&#8221; css=&#8221;.vc_custom_1658878916313{padding-right: 20px !important;padding-left: 20px !important;}&#8221;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_hidden-xs&#8221;][vc_single_image image=&#8221;4636&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;none&#8221; css=&#8221;.vc_custom_1658879033114{padding-right: 20px !important;padding-left: 20px !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-lg vc_hidden-md vc_hidden-sm\" style=\"margin-top: 50px;\"><\/div><div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-xs\" style=\"margin-top: 30px;\"><\/div>[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: justify;\"><strong>Te ayudaremos a:<\/strong><\/p>\n<p>[\/vc_column_text]<div class=\"gem-icon-with-text gem-icon-with-text-icon-size-small disable-mobile-centered\" ><div style=\"margin-bottom:0px;margin-top:0px; \" class=\"gem-icon-with-text-icon\"><div class=\"gem-icon gem-icon-pack-material gem-icon-size-small  gem-icon-shape-hexagon\"  style=\"border-color: #ffffff;border-color: #ffb600;opacity: 1;\"><div class=\"gem-icon-shape-hexagon-back\"><div class=\"gem-icon-shape-hexagon-back-inner\"><div class=\"gem-icon-shape-hexagon-back-inner-before\" style=\"background-color: #ffb600\"><\/div><\/div><\/div><div class=\"gem-icon-shape-hexagon-top\"><div class=\"gem-icon-shape-hexagon-top-inner\"><div class=\"gem-icon-shape-hexagon-top-inner-before\" style=\"background-color: #ffffff;\"><\/div><\/div><\/div><div class=\"gem-icon-inner\" style=\"background-color: #ffffff;\"><span class=\"gem-icon-half-1\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf191;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf191;<\/span><\/span><\/div><\/div><\/div><div class=\"gem-icon-with-text-content\" ><div class=\"gem-icon-with-text-text\">[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: justify;\">Reducir el riesgo que representan amenazas como phishing, ransomware, filtraciones de datos y otras ciberamenazas.<\/p>\n<p>[\/vc_column_text]<\/div><\/div><div class=\"clearboth\"><\/div><\/div><div class=\"gem-icon-with-text gem-icon-with-text-icon-size-small disable-mobile-centered\" ><div style=\"margin-bottom:0px;margin-top:0px; \" class=\"gem-icon-with-text-icon\"><div class=\"gem-icon gem-icon-pack-elegant gem-icon-size-small  gem-icon-shape-hexagon\"  style=\"border-color: #ffffff;border-color: #ffb600;opacity: 1;\"><div class=\"gem-icon-shape-hexagon-back\"><div class=\"gem-icon-shape-hexagon-back-inner\"><div class=\"gem-icon-shape-hexagon-back-inner-before\" style=\"background-color: #ffb600\"><\/div><\/div><\/div><div class=\"gem-icon-shape-hexagon-top\"><div class=\"gem-icon-shape-hexagon-top-inner\"><div class=\"gem-icon-shape-hexagon-top-inner-before\" style=\"background-color: #ffffff;\"><\/div><\/div><\/div><div class=\"gem-icon-inner\" style=\"background-color: #ffffff;\"><span class=\"gem-icon-half-1\" style=\"color: #000000;\"><span class=\"back-angle\">&#xe072;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #000000;\"><span class=\"back-angle\">&#xe072;<\/span><\/span><\/div><\/div><\/div><div class=\"gem-icon-with-text-content\" ><div class=\"gem-icon-with-text-text\"><div class=\"clearboth\"><\/div><div class=\"gem-divider \" style=\"margin-top: 10px;\"><\/div>[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: justify;\">Resaltar cualquier vulnerabilidad en sus sistemas y procesos existentes<\/p>\n<p>[\/vc_column_text]<\/div><\/div><div class=\"clearboth\"><\/div><\/div><div class=\"gem-icon-with-text gem-icon-with-text-icon-size-small disable-mobile-centered\" ><div style=\"margin-bottom:0px;margin-top:0px; \" class=\"gem-icon-with-text-icon\"><div class=\"gem-icon gem-icon-pack-material gem-icon-size-small  gem-icon-shape-hexagon\"  style=\"border-color: #ffffff;border-color: #ffb600;opacity: 1;\"><div class=\"gem-icon-shape-hexagon-back\"><div class=\"gem-icon-shape-hexagon-back-inner\"><div class=\"gem-icon-shape-hexagon-back-inner-before\" style=\"background-color: #ffb600\"><\/div><\/div><\/div><div class=\"gem-icon-shape-hexagon-top\"><div class=\"gem-icon-shape-hexagon-top-inner\"><div class=\"gem-icon-shape-hexagon-top-inner-before\" style=\"background-color: #ffffff;\"><\/div><\/div><\/div><div class=\"gem-icon-inner\" style=\"background-color: #ffffff;\"><span class=\"gem-icon-half-1\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf4e1;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf4e1;<\/span><\/span><\/div><\/div><\/div><div class=\"gem-icon-with-text-content\" ><div class=\"gem-icon-with-text-text\"><div class=\"clearboth\"><\/div><div class=\"gem-divider \" style=\"margin-top: 10px;\"><\/div>[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: justify;\">Producir una hoja de ruta hacia un entorno seguro y estable<\/p>\n<p>[\/vc_column_text]<\/div><\/div><div class=\"clearboth\"><\/div><\/div><div class=\"gem-icon-with-text gem-icon-with-text-icon-size-small disable-mobile-centered\" ><div style=\"margin-bottom:0px;margin-top:0px; \" class=\"gem-icon-with-text-icon\"><div class=\"gem-icon gem-icon-pack-material gem-icon-size-small  gem-icon-shape-hexagon\"  style=\"border-color: #ffffff;border-color: #ffb600;opacity: 1;\"><div class=\"gem-icon-shape-hexagon-back\"><div class=\"gem-icon-shape-hexagon-back-inner\"><div class=\"gem-icon-shape-hexagon-back-inner-before\" style=\"background-color: #ffb600\"><\/div><\/div><\/div><div class=\"gem-icon-shape-hexagon-top\"><div class=\"gem-icon-shape-hexagon-top-inner\"><div class=\"gem-icon-shape-hexagon-top-inner-before\" style=\"background-color: #ffffff;\"><\/div><\/div><\/div><div class=\"gem-icon-inner\" style=\"background-color: #ffffff;\"><span class=\"gem-icon-half-1\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf4e2;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf4e2;<\/span><\/span><\/div><\/div><\/div><div class=\"gem-icon-with-text-content\" ><div class=\"gem-icon-with-text-text\"><div class=\"clearboth\"><\/div><div class=\"gem-divider \" style=\"margin-top: 10px;\"><\/div>[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: justify;\">Capacitar a sus empleados para detectar y evitar amenazas cibern\u00e9ticas<\/p>\n<p>[\/vc_column_text]<\/div><\/div><div class=\"clearboth\"><\/div><\/div><div class=\"gem-icon-with-text gem-icon-with-text-icon-size-small disable-mobile-centered\" ><div style=\"margin-bottom:0px;margin-top:0px; \" class=\"gem-icon-with-text-icon\"><div class=\"gem-icon gem-icon-pack-material gem-icon-size-small  gem-icon-shape-hexagon\"  style=\"border-color: #ffffff;border-color: #ffb600;opacity: 1;\"><div class=\"gem-icon-shape-hexagon-back\"><div class=\"gem-icon-shape-hexagon-back-inner\"><div class=\"gem-icon-shape-hexagon-back-inner-before\" style=\"background-color: #ffb600\"><\/div><\/div><\/div><div class=\"gem-icon-shape-hexagon-top\"><div class=\"gem-icon-shape-hexagon-top-inner\"><div class=\"gem-icon-shape-hexagon-top-inner-before\" style=\"background-color: #ffffff;\"><\/div><\/div><\/div><div class=\"gem-icon-inner\" style=\"background-color: #ffffff;\"><span class=\"gem-icon-half-1\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf102;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf102;<\/span><\/span><\/div><\/div><\/div><div class=\"gem-icon-with-text-content\" ><div class=\"gem-icon-with-text-text\"><div class=\"clearboth\"><\/div><div class=\"gem-divider \" style=\"margin-top: 10px;\"><\/div>[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: justify;\">Implementar medidas y tecnolog\u00eda para proteger su negocio<\/p>\n<p>[\/vc_column_text]<\/div><\/div><div class=\"clearboth\"><\/div><\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-lg vc_hidden-md vc_hidden-sm\" style=\"margin-top: 30px;\"><\/div>[\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;]<div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-lg vc_hidden-md vc_hidden-sm\" style=\"margin-top: 50px;\"><\/div>[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<div class=\"title-h2\">Nuestros servicios de seguridad de TI y soluciones de seguridad cibern\u00e9tica:<\/div>\n<p>[\/vc_column_text]<div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-xs\" style=\"margin-top: 30px;\"><\/div>[vc_separator color=&#8221;custom&#8221; align=&#8221;align_left&#8221; border_width=&#8221;2&#8243; el_width=&#8221;20&#8243; css_animation=&#8221;none&#8221; accent_color=&#8221;#ffb600&#8243;]<div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-xs\" style=\"margin-top: 30px;\"><\/div>[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<ul>\n<li style=\"text-align: justify;\">Reducir el riesgo que representan amenazas como phishing, ransomware, filtraciones de datos y otras ciberamenazas.<\/li>\n<li style=\"text-align: justify;\">Evaluaciones de vulnerabilidad<\/li>\n<li style=\"text-align: justify;\"><span class=\"eael-tab-title\">Evaluaci\u00f3n de Pr\u00e1cticas y Controles<\/span><\/li>\n<li style=\"text-align: justify;\">Pruebas de penetraci\u00f3n<\/li>\n<li style=\"text-align: justify;\">Servicios de seguridad de TI gestionados<\/li>\n<li style=\"text-align: justify;\">Capacitaci\u00f3n de concientizaci\u00f3n sobre seguridad<\/li>\n<li style=\"text-align: justify;\">Detecci\u00f3n de intrusos<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_hidden-xs&#8221;]<div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-lg vc_hidden-md vc_hidden-sm\" style=\"margin-top: 30px;\"><\/div>[vc_single_image image=&#8221;6069&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;none&#8221; css=&#8221;.vc_custom_1660453988026{padding-right: 20px !important;padding-left: 20px !important;}&#8221;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_hidden-xs&#8221;][vc_single_image image=&#8221;4636&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;none&#8221; css=&#8221;.vc_custom_1658879033114{padding-right: 20px !important;padding-left: 20px !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"clearboth\"><\/div><div class=\"gem-divider \" style=\"margin-top: 90px;\"><\/div>[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<div class=\"title-h2\">Evaluaci\u00f3n de vulnerabilidad<\/div>\n<p>[\/vc_column_text][vc_separator color=&#8221;custom&#8221; align=&#8221;align_left&#8221; border_width=&#8221;2&#8243; el_width=&#8221;20&#8243; css_animation=&#8221;none&#8221; accent_color=&#8221;#ffb600&#8243;]<div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-xs\" style=\"margin-top: 30px;\"><\/div>[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<ul>\n<li style=\"text-align: justify;\">Escaneo de infraestructura<\/li>\n<li style=\"text-align: justify;\">Escaneo de seguridad del sitio web<\/li>\n<li style=\"text-align: justify;\">An\u00e1lisis de configuraci\u00f3n de cortafuegos<\/li>\n<li style=\"text-align: justify;\">Revisi\u00f3n de sus est\u00e1ndares antivirus, proceso de aplicaci\u00f3n de parches y configuraci\u00f3n de red inal\u00e1mbrica<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;]<div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-lg vc_hidden-md vc_hidden-sm\" style=\"margin-top: 50px;\"><\/div>[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<div class=\"title-h2\">Servicios de consultor\u00eda de seguridad de TI<\/div>\n<p>[\/vc_column_text]<div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-xs\" style=\"margin-top: 30px;\"><\/div>[vc_separator color=&#8221;custom&#8221; align=&#8221;align_left&#8221; border_width=&#8221;2&#8243; el_width=&#8221;20&#8243; css_animation=&#8221;none&#8221; accent_color=&#8221;#ffb600&#8243;]<div class=\"clearboth\"><\/div><div class=\"gem-divider \" style=\"margin-top: 40px;\"><\/div>[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: justify;\">Nuestros servicios de consultor\u00eda de seguridad de TI est\u00e1n dise\u00f1ados para determinar su nivel de riesgo y asesorarlo sobre los pasos recomendados para reforzar su seguridad. Ellos incluyen:<\/p>\n<p>[\/vc_column_text][vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: justify;\"><strong>Evaluaciones e implementaci\u00f3n de seguridad<br \/>\n<\/strong><br \/>\nPodemos realizar evaluaciones de seguridad de su organizaci\u00f3n para brindarle informaci\u00f3n vital sobre la seguridad general de su entorno de TI. Nuestros especialistas en seguridad conocen las amenazas actuales y las \u00faltimas medidas que puede tomar para prevenirlas.<\/p>\n<p>[\/vc_column_text][vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: justify;\"><strong>Informes y auditor\u00edas de seguridad cibern\u00e9tica<\/strong><\/p>\n<p style=\"text-align: justify;\">Realizamos una auditor\u00eda exhaustiva de sus sistemas y procesos con informes completos. Se hacen recomendaciones basadas en los hallazgos, con orientaci\u00f3n sobre los pr\u00f3ximos pasos que conducen a la implementaci\u00f3n de medidas de seguridad.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_hidden-xs&#8221;][vc_single_image image=&#8221;4632&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;none&#8221; css=&#8221;.vc_custom_1658879153589{padding-right: 20px !important;padding-left: 20px !important;}&#8221;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_hidden-xs&#8221;]<div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-lg vc_hidden-md vc_hidden-sm\" style=\"margin-top: 50px;\"><\/div>[vc_single_image image=&#8221;5820&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;none&#8221; css=&#8221;.vc_custom_1660456040056{padding-right: 20px !important;padding-left: 20px !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-xs vc_hidden-sm\" style=\"margin-top: 40px;\"><\/div><div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-lg vc_hidden-md vc_hidden-sm\" style=\"margin-top: 50px;\"><\/div>[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<div class=\"title-h2\">Servicios de seguridad informatica:<\/div>\n<p>[\/vc_column_text]<div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-xs\" style=\"margin-top: 30px;\"><\/div>[vc_separator color=&#8221;custom&#8221; align=&#8221;align_left&#8221; border_width=&#8221;2&#8243; el_width=&#8221;20&#8243; css_animation=&#8221;none&#8221; accent_color=&#8221;#ffb600&#8243;]<div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-xs\" style=\"margin-top: 30px;\"><\/div>[vc_column_text css_animation=&#8221;none&#8221;]<strong>Soluciones de seguridad administrada<\/strong><\/p>\n<p>Protecci\u00f3n integral para toda su pila de TI con monitoreo de amenazas en tiempo real, informes detallados y el mejor software de seguridad de su clase.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Auditor\u00edas de seguridad<\/strong><\/p>\n<p>Obtenga visibilidad de su preparaci\u00f3n de seguridad con evaluaciones trimestrales de vulnerabilidades internas\/externas, incomparables con otras empresas de seguridad cibern\u00e9tica en Canad\u00e1.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Seguridad en la nube<\/strong><\/p>\n<p>Proteja los datos confidenciales y las aplicaciones comerciales en la nube contra la eliminaci\u00f3n, el robo y otras amenazas de seguridad. Protegemos los sistemas de nube p\u00fablicos y privados.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;]<div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-xs vc_hidden-sm\" style=\"margin-top: 40px;\"><\/div><div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-lg vc_hidden-md vc_hidden-sm\" style=\"margin-top: 50px;\"><\/div>[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<div class=\"title-h2\">Servicios de seguridad informatica:<\/div>\n<p>[\/vc_column_text]<div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-xs\" style=\"margin-top: 30px;\"><\/div>[vc_separator color=&#8221;custom&#8221; align=&#8221;align_left&#8221; border_width=&#8221;2&#8243; el_width=&#8221;20&#8243; css_animation=&#8221;none&#8221; accent_color=&#8221;#ffb600&#8243;]<div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-xs\" style=\"margin-top: 30px;\"><\/div>[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: justify;\"><strong>Dise\u00f1o de arquitectura de seguridad<\/strong><\/p>\n<p style=\"text-align: justify;\">Transforme su infraestructura de TI en una fortaleza impenetrable con un programa de respuesta a incidentes dedicado y orientaci\u00f3n sobre pol\u00edticas y procedimientos.<\/p>\n<p style=\"text-align: justify;\"><strong>Seguridad de la red<\/strong><\/p>\n<p style=\"text-align: justify;\">Proteja su red de inyecciones SQL, ataques DoS, intermediarios y otras infracciones para minimizar el riesgo de p\u00e9rdida de datos y mal uso de la informaci\u00f3n.<\/p>\n<p style=\"text-align: justify;\"><strong>Detecci\u00f3n de intrusos<\/strong><\/p>\n<p style=\"text-align: justify;\">Detecte actividades maliciosas y violaciones de pol\u00edticas en tiempo real con Detecci\u00f3n de intrusiones\/Protecci\u00f3n contra intrusiones (IDS\/IPS) l\u00edder en la industria que supera con creces las de otras empresas canadienses de ciberseguridad.<\/p>\n<p style=\"text-align: justify;\">Servicios de TI administrados con monitoreo y soporte de TI completos en una soluci\u00f3n f\u00e1cil<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_hidden-xs&#8221;][vc_single_image image=&#8221;6025&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;none&#8221; css=&#8221;.vc_custom_1660454017980{padding-right: 20px !important;padding-left: 20px !important;}&#8221;][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-xs\" style=\"margin-top: 100px;\"><\/div><div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-lg vc_hidden-md vc_hidden-sm\" style=\"margin-top: 80px;\"><\/div>[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<div class=\"title-h2\" style=\"text-align: center;\">\n<p><strong>El valor del servicio gestionado+<\/strong><\/p>\n<\/div>\n<p>[\/vc_column_text]<div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-xs\" style=\"margin-top: 30px;\"><\/div>[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<div style=\"width: 10%; height: 2px; background: #ffb600; text-indent: 9999px; margin: auto;\"><\/div>\n<p>[\/vc_column_text]<div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-xs\" style=\"margin-top: 80px;\"><\/div><div class=\"clearboth\"><\/div><div class=\"gem-divider vc_hidden-lg vc_hidden-md vc_hidden-sm\" style=\"margin-top: 50px;\"><\/div>[vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;]<div class=\"gem-icon-with-text gem-icon-with-text-icon-size-large centered-box\" ><div style=\"margin-bottom:0px;margin-top:0px; \" class=\"gem-icon-with-text-icon\"><div class=\"gem-icon gem-icon-pack-material gem-icon-size-large  gem-icon-shape-hexagon\"  style=\"border-color: #ffffff;border-color: #0000af;opacity: 1;\"><div class=\"gem-icon-shape-hexagon-back\"><div class=\"gem-icon-shape-hexagon-back-inner\"><div class=\"gem-icon-shape-hexagon-back-inner-before\" style=\"background-color: #0000af\"><\/div><\/div><\/div><div class=\"gem-icon-shape-hexagon-top\"><div class=\"gem-icon-shape-hexagon-top-inner\"><div class=\"gem-icon-shape-hexagon-top-inner-before\" style=\"background-color: #ffffff;\"><\/div><\/div><\/div><div class=\"gem-icon-inner\" style=\"background-color: #ffffff;\"><span class=\"gem-icon-half-1\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf113;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf113;<\/span><\/span><\/div><\/div><\/div><div class=\"gem-icon-with-text-content\" ><div class=\"gem-icon-with-text-text\">[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: center; font-size: 20px;\"><strong>Productividad ininterrumpida<br \/>\n<\/strong><\/p>\n<p>[\/vc_column_text][vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: center;\">Los eventos de seguridad a menudo resultan en tiempo de inactividad, lo que resulta en una p\u00e9rdida de productividad cuando sus sistemas no est\u00e1n disponibles. Cuando estas ocurrencias se mitigan de manera proactiva, la mayor disponibilidad conduce a un mayor rendimiento.<\/p>\n<p>[\/vc_column_text]<\/div><\/div><div class=\"clearboth\"><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;]<div class=\"gem-icon-with-text gem-icon-with-text-icon-size-large centered-box\" ><div style=\"margin-bottom:0px;margin-top:0px; \" class=\"gem-icon-with-text-icon\"><div class=\"gem-icon gem-icon-pack-material gem-icon-size-large  gem-icon-shape-hexagon\"  style=\"border-color: #ffffff;border-color: #0000af;opacity: 1;\"><div class=\"gem-icon-shape-hexagon-back\"><div class=\"gem-icon-shape-hexagon-back-inner\"><div class=\"gem-icon-shape-hexagon-back-inner-before\" style=\"background-color: #0000af\"><\/div><\/div><\/div><div class=\"gem-icon-shape-hexagon-top\"><div class=\"gem-icon-shape-hexagon-top-inner\"><div class=\"gem-icon-shape-hexagon-top-inner-before\" style=\"background-color: #ffffff;\"><\/div><\/div><\/div><div class=\"gem-icon-inner\" style=\"background-color: #ffffff;\"><span class=\"gem-icon-half-1\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf13c;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf13c;<\/span><\/span><\/div><\/div><\/div><div class=\"gem-icon-with-text-content\" ><div class=\"gem-icon-with-text-text\">[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: center; font-size: 20px;\"><strong>Costos reducidos<br \/>\n<\/strong><\/p>\n<p>[\/vc_column_text][vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: center;\">Sin la necesidad de seguridad de TI a tiempo completo Reserve una consulta gratuita con un experto en TI que trabaje en su industria<\/p>\n<p>[\/vc_column_text]<\/div><\/div><div class=\"clearboth\"><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;]<div class=\"gem-icon-with-text gem-icon-with-text-icon-size-large centered-box\" ><div style=\"margin-bottom:0px;margin-top:0px; \" class=\"gem-icon-with-text-icon\"><div class=\"gem-icon gem-icon-pack-material gem-icon-size-large  gem-icon-shape-hexagon\"  style=\"border-color: #ffffff;border-color: #0000af;opacity: 1;\"><div class=\"gem-icon-shape-hexagon-back\"><div class=\"gem-icon-shape-hexagon-back-inner\"><div class=\"gem-icon-shape-hexagon-back-inner-before\" style=\"background-color: #0000af\"><\/div><\/div><\/div><div class=\"gem-icon-shape-hexagon-top\"><div class=\"gem-icon-shape-hexagon-top-inner\"><div class=\"gem-icon-shape-hexagon-top-inner-before\" style=\"background-color: #ffffff;\"><\/div><\/div><\/div><div class=\"gem-icon-inner\" style=\"background-color: #ffffff;\"><span class=\"gem-icon-half-1\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf4ef;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf4ef;<\/span><\/span><\/div><\/div><\/div><div class=\"gem-icon-with-text-content\" ><div class=\"gem-icon-with-text-text\">[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: center; font-size: 20px;\"><strong>\u00daltimas medidas de seguridad<br \/>\n<\/strong><\/p>\n<p>[\/vc_column_text][vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: center;\">Podemos proporcionarle las medidas de seguridad m\u00e1s actualizadas dise\u00f1adas para combatir las amenazas a su entorno de TI. Mantenerse a la vanguardia es la mejor manera de evitar posibles problemas de seguridad.<\/p>\n<p>[\/vc_column_text]<\/div><\/div><div class=\"clearboth\"><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;]<div class=\"gem-icon-with-text gem-icon-with-text-icon-size-large centered-box\" ><div style=\"margin-bottom:0px;margin-top:0px; \" class=\"gem-icon-with-text-icon\"><div class=\"gem-icon gem-icon-pack-material gem-icon-size-large  gem-icon-shape-hexagon\"  style=\"border-color: #ffffff;border-color: #0000af;opacity: 1;\"><div class=\"gem-icon-shape-hexagon-back\"><div class=\"gem-icon-shape-hexagon-back-inner\"><div class=\"gem-icon-shape-hexagon-back-inner-before\" style=\"background-color: #0000af\"><\/div><\/div><\/div><div class=\"gem-icon-shape-hexagon-top\"><div class=\"gem-icon-shape-hexagon-top-inner\"><div class=\"gem-icon-shape-hexagon-top-inner-before\" style=\"background-color: #ffffff;\"><\/div><\/div><\/div><div class=\"gem-icon-inner\" style=\"background-color: #ffffff;\"><span class=\"gem-icon-half-1\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf221;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf221;<\/span><\/span><\/div><\/div><\/div><div class=\"gem-icon-with-text-content\" ><div class=\"gem-icon-with-text-text\">[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: center; font-size: 20px;\"><strong>Uso eficiente de sus recursos<\/strong><\/p>\n<p>[\/vc_column_text][vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: center;\">Nuestros servicios de seguridad significan que su personal de TI puede hacer un uso m\u00e1s eficaz de su tiempo, centr\u00e1ndose en \u00e1reas de crecimiento y rendimiento en lugar de dedicar tiempo a la supervisi\u00f3n de la seguridad.<\/p>\n<p>[\/vc_column_text]<\/div><\/div><div class=\"clearboth\"><\/div><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;]<div class=\"gem-icon-with-text gem-icon-with-text-icon-size-large centered-box\" ><div style=\"margin-bottom:0px;margin-top:0px; \" class=\"gem-icon-with-text-icon\"><div class=\"gem-icon gem-icon-pack-material gem-icon-size-large  gem-icon-shape-hexagon\"  style=\"border-color: #ffffff;border-color: #0000af;opacity: 1;\"><div class=\"gem-icon-shape-hexagon-back\"><div class=\"gem-icon-shape-hexagon-back-inner\"><div class=\"gem-icon-shape-hexagon-back-inner-before\" style=\"background-color: #0000af\"><\/div><\/div><\/div><div class=\"gem-icon-shape-hexagon-top\"><div class=\"gem-icon-shape-hexagon-top-inner\"><div class=\"gem-icon-shape-hexagon-top-inner-before\" style=\"background-color: #ffffff;\"><\/div><\/div><\/div><div class=\"gem-icon-inner\" style=\"background-color: #ffffff;\"><span class=\"gem-icon-half-1\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf4e1;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf4e1;<\/span><\/span><\/div><\/div><\/div><div class=\"gem-icon-with-text-content\" ><div class=\"gem-icon-with-text-text\">[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: center; font-size: 20px;\"><strong>Riesgo reducido<\/strong><\/p>\n<p>[\/vc_column_text][vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: center;\">Al identificar las vulnerabilidades en su sistema y el nivel de riesgo para su empresa, puede reforzar estrat\u00e9gicamente la seguridad.<\/p>\n<p>[\/vc_column_text]<\/div><\/div><div class=\"clearboth\"><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;]<div class=\"gem-icon-with-text gem-icon-with-text-icon-size-large centered-box\" ><div style=\"margin-bottom:0px;margin-top:0px; \" class=\"gem-icon-with-text-icon\"><div class=\"gem-icon gem-icon-pack-material gem-icon-size-large  gem-icon-shape-hexagon\"  style=\"border-color: #ffffff;border-color: #0000af;opacity: 1;\"><div class=\"gem-icon-shape-hexagon-back\"><div class=\"gem-icon-shape-hexagon-back-inner\"><div class=\"gem-icon-shape-hexagon-back-inner-before\" style=\"background-color: #0000af\"><\/div><\/div><\/div><div class=\"gem-icon-shape-hexagon-top\"><div class=\"gem-icon-shape-hexagon-top-inner\"><div class=\"gem-icon-shape-hexagon-top-inner-before\" style=\"background-color: #ffffff;\"><\/div><\/div><\/div><div class=\"gem-icon-inner\" style=\"background-color: #ffffff;\"><span class=\"gem-icon-half-1\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf105;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf105;<\/span><\/span><\/div><\/div><\/div><div class=\"gem-icon-with-text-content\" ><div class=\"gem-icon-with-text-text\">[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: center; font-size: 20px;\"><strong>Asesoramiento Certificado<\/strong><\/p>\n<p>[\/vc_column_text][vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: center;\">Nuestro equipo de seguridad de TI tiene experiencia y certificaciones est\u00e1ndar de la industria.<\/p>\n<p>[\/vc_column_text]<\/div><\/div><div class=\"clearboth\"><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;]<div class=\"gem-icon-with-text gem-icon-with-text-icon-size-large centered-box\" ><div style=\"margin-bottom:0px;margin-top:0px; \" class=\"gem-icon-with-text-icon\"><div class=\"gem-icon gem-icon-pack-material gem-icon-size-large  gem-icon-shape-hexagon\"  style=\"border-color: #ffffff;border-color: #0000af;opacity: 1;\"><div class=\"gem-icon-shape-hexagon-back\"><div class=\"gem-icon-shape-hexagon-back-inner\"><div class=\"gem-icon-shape-hexagon-back-inner-before\" style=\"background-color: #0000af\"><\/div><\/div><\/div><div class=\"gem-icon-shape-hexagon-top\"><div class=\"gem-icon-shape-hexagon-top-inner\"><div class=\"gem-icon-shape-hexagon-top-inner-before\" style=\"background-color: #ffffff;\"><\/div><\/div><\/div><div class=\"gem-icon-inner\" style=\"background-color: #ffffff;\"><span class=\"gem-icon-half-1\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf1a3;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf1a3;<\/span><\/span><\/div><\/div><\/div><div class=\"gem-icon-with-text-content\" ><div class=\"gem-icon-with-text-text\">[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: center; font-size: 20px;\"><strong>Tiempos de respuesta garantizados<\/strong><\/p>\n<p>[\/vc_column_text][vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: center;\">Nuestros servicios de TI administrados se rigen por SLA para que sepa cu\u00e1nto tiempo llevar\u00e1 resolver los problemas<\/p>\n<p>[\/vc_column_text]<\/div><\/div><div class=\"clearboth\"><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;]<div class=\"gem-icon-with-text gem-icon-with-text-icon-size-large centered-box\" ><div style=\"margin-bottom:0px;margin-top:0px; \" class=\"gem-icon-with-text-icon\"><div class=\"gem-icon gem-icon-pack-material gem-icon-size-large  gem-icon-shape-hexagon\"  style=\"border-color: #ffffff;border-color: #0000af;opacity: 1;\"><div class=\"gem-icon-shape-hexagon-back\"><div class=\"gem-icon-shape-hexagon-back-inner\"><div class=\"gem-icon-shape-hexagon-back-inner-before\" style=\"background-color: #0000af\"><\/div><\/div><\/div><div class=\"gem-icon-shape-hexagon-top\"><div class=\"gem-icon-shape-hexagon-top-inner\"><div class=\"gem-icon-shape-hexagon-top-inner-before\" style=\"background-color: #ffffff;\"><\/div><\/div><\/div><div class=\"gem-icon-inner\" style=\"background-color: #ffffff;\"><span class=\"gem-icon-half-1\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf2a6;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #000000;\"><span class=\"back-angle\">&#xf2a6;<\/span><\/span><\/div><\/div><\/div><div class=\"gem-icon-with-text-content\" ><div class=\"gem-icon-with-text-text\">[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: center; font-size: 20px;\"><strong>Soporte fuera de horario<\/strong><\/p>\n<p>[\/vc_column_text][vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<p style=\"text-align: center;\">Admitimos diferentes zonas horarias y contamos con personal de guardia en caso de que haya problemas importantes fuera del horario de atenci\u00f3n<\/p>\n<p>[\/vc_column_text]<\/div><\/div><div class=\"clearboth\"><\/div><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"clearboth\"><\/div><div class=\"gem-divider \" style=\"margin-top: 80px;\"><\/div>[vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<div class=\"title-h2\" style=\"text-align: center;\">Cont\u00e1ctenos hoy para obtener m\u00e1s informaci\u00f3n sobre lo que GGIT ofrece como su equipo de tecnolog\u00eda.<\/div>\n<p style=\"text-align: center;\"><span style=\"color: #838383;\">Para saber c\u00f3mo nuestros servicios pueden beneficiar a su empresa<\/span><\/p>\n<p>[\/vc_column_text]<div class=\"clearboth\"><\/div><div class=\"gem-divider \" style=\"margin-top: 55px;\"><\/div>[\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/6&#8243; offset=&#8221;vc_hidden-md vc_hidden-sm vc_hidden-xs&#8221;][\/vc_column][vc_column offset=&#8221;vc_col-lg-8&#8243;]\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f6423-o1\" lang=\"es-ES\" dir=\"ltr\" data-wpcf7-id=\"6423\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/es\/wp-json\/wp\/v2\/pages\/4725#wpcf7-f6423-o1\" method=\"post\" class=\"wpcf7-form init gem-contact-form-white gem-contact-form-simple-line\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"6423\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"es_ES\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f6423-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<div class=\"contact-form-style-6\">\n\t<p class=\"col-md-6 cf-style6-name\"><span class=\"wpcf7-form-control-wrap\" data-name=\"nombre\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Nombre*\" value=\"\" type=\"text\" name=\"nombre\" \/><\/span>\n\t<\/p>\n\t<p class=\"col-md-6 cf-style6-email\"><span class=\"wpcf7-form-control-wrap\" data-name=\"tel\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Tel\u00e9fono*\" value=\"\" type=\"tel\" name=\"tel\" \/><\/span>\n\t<\/p>\n\t<p class=\"col-md-6 cf-style6-select-box\"><span class=\"wpcf7-form-control-wrap\" data-name=\"asunto\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Asunto\" value=\"\" type=\"text\" name=\"asunto\" \/><\/span>\n\t<\/p>\n\t<p class=\"col-md-6 cf-style6-select-box\"><span class=\"wpcf7-form-control-wrap\" data-name=\"email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Correo electr\u00f3nico\" value=\"\" type=\"email\" name=\"email\" \/><\/span>\n\t<\/p>\n\t<div class=\"gem-button-container gem-button-position-fullwidth thegem-button-6a0be59ed68319074\"  ><input class=\"gem-button gem-button-size-medium gem-button-style-flat gem-button-text-weight-normal wpcf7-form-control wpcf7-submit has-spinner gem-button-wpcf-custom\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 30px;background-color: #FFB600FF;color: #FFFFFFFF;\" onmouseleave=\"this.style.backgroundColor='#FFB600FF';this.style.color='#FFFFFFFF';\" onmouseenter=\"this.style.backgroundColor='#0000AFFF';this.style.color='#FFFFFFFF';\" id=\"\" tabindex=\"\" type=\"submit\" value=\"Enviar\" \/><\/div>\n<\/div><input type=\"hidden\" id=\"ct_checkjs_cf7_ab233b682ec355648e7891e66c54191b\" name=\"ct_checkjs_cf7\" value=\"0\" \/><script >setTimeout(function(){var ct_input_name = \"ct_checkjs_cf7_ab233b682ec355648e7891e66c54191b\";if (document.getElementById(ct_input_name) !== null) {var ct_input_value = document.getElementById(ct_input_name).value;document.getElementById(ct_input_name).value = document.getElementById(ct_input_name).value.replace(ct_input_value, 'e71aba7f2c9a7135a53c75921643d83c91970c79883aa23b04bfa4618ebb4671');}}, 1000);<\/script><input\n                    class=\"apbct_special_field apbct_email_id__wp_contact_form_7\"\n                    name=\"apbct__email_id__wp_contact_form_7\"\n                    aria-label=\"apbct__label_id__wp_contact_form_7\"\n                    type=\"text\" size=\"30\" maxlength=\"200\" autocomplete=\"off\"\n                    value=\"\"\n                \/><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n[\/vc_column][vc_column width=&#8221;1\/6&#8243; offset=&#8221;vc_hidden-md vc_hidden-sm vc_hidden-xs&#8221;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text css_animation=&#8221;none&#8221;] \u00bfEs su empresa vulnerable a las amenazas cibern\u00e9ticas? [\/vc_column_text][vc_separator color=&#8221;custom&#8221; align=&#8221;align_left&#8221; border_width=&#8221;2&#8243; el_width=&#8221;20&#8243; css_animation=&#8221;none&#8221; accent_color=&#8221;#ffb600&#8243;][vc_single_image image=&#8221;4628&#8243; img_size=&#8221;full&#8221;&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4725","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/ggit.ca\/es\/wp-json\/wp\/v2\/pages\/4725","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ggit.ca\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ggit.ca\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ggit.ca\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ggit.ca\/es\/wp-json\/wp\/v2\/comments?post=4725"}],"version-history":[{"count":17,"href":"https:\/\/ggit.ca\/es\/wp-json\/wp\/v2\/pages\/4725\/revisions"}],"predecessor-version":[{"id":6552,"href":"https:\/\/ggit.ca\/es\/wp-json\/wp\/v2\/pages\/4725\/revisions\/6552"}],"wp:attachment":[{"href":"https:\/\/ggit.ca\/es\/wp-json\/wp\/v2\/media?parent=4725"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}