{"id":17,"date":"2020-01-23T14:34:03","date_gmt":"2020-01-23T14:34:03","guid":{"rendered":"https:\/\/prodigitalsecurity.com\/?page_id=17"},"modified":"2023-02-24T11:18:28","modified_gmt":"2023-02-24T11:18:28","slug":"inicio","status":"publish","type":"page","link":"https:\/\/prodigitalsecurity.com\/","title":{"rendered":"Inicio"},"content":{"rendered":"
[et_pb_section fb_built=\u00bb1″ admin_label=\u00bbHeader\u00bb _builder_version=\u00bb4.16″ use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_direction_radial=\u00bbtop right\u00bb background_color_gradient_stops=\u00bb#00ffd8 0%|#0029e2 100%\u00bb background_color_gradient_start=\u00bb#00ffd8″ background_color_gradient_end=\u00bb#0029e2″ background_image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-17.png\u00bb parallax=\u00bbon\u00bb custom_padding=\u00bb10vw||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_2,1_2″ _builder_version=\u00bb4.16″ z_index=\u00bb1″ global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_text admin_label=\u00bbTexto\u00bb _builder_version=\u00bb4.17.4″ text_font=\u00bb||||||||\u00bb header_font=\u00bbOverpass|900|||||||\u00bb header_font_size=\u00bb60px\u00bb header_line_height=\u00bb1.1em\u00bb background_layout=\u00bbdark\u00bb custom_margin=\u00bb0px||||false|false\u00bb custom_margin_tablet=\u00bb50px||||false|false\u00bb custom_margin_phone=\u00bb100px||||false|false\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb header_font_size_tablet=\u00bb54px\u00bb header_font_size_phone=\u00bb42px\u00bb header_font_size_last_edited=\u00bbon|phone\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n
[\/et_pb_text][et_pb_text _builder_version=\u00bb4.16″ text_font=\u00bbOverpass|300|||||||\u00bb text_font_size=\u00bb17px\u00bb text_line_height=\u00bb1.8em\u00bb background_layout=\u00bbdark\u00bb custom_margin_tablet=\u00bb-18px|125px|||false|false\u00bb custom_margin_phone=\u00bb|0px|||false|false\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb text_font_size_tablet=\u00bb16px\u00bb text_font_size_phone=\u00bb14px\u00bb text_font_size_last_edited=\u00bbon|desktop\u00bb text_line_height_tablet=\u00bb1.6em\u00bb text_line_height_phone=\u00bb\u00bb text_line_height_last_edited=\u00bbon|tablet\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n
Somos integradores de distintas soluciones de seguridad del mercado ofreciendo protecci\u00f3n\u00a0frente a los cada vez m\u00e1s complejos ataques cibern\u00e9ticos que encontramos en la actualidad.<\/strong><\/p>\n [\/et_pb_text][et_pb_button button_url=\u00bb\/contacto\/\u00bb button_text=\u00bbCont\u00e1ctanos\u00bb _builder_version=\u00bb4.17.4″ custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#ffffff\u00bb button_bg_color=\u00bb#47d7ff\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb100px\u00bb button_font=\u00bbOverpass|900||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_padding=\u00bb20px|30px|20px|30px|true|true\u00bb box_shadow_style=\u00bbpreset3″ box_shadow_vertical=\u00bb20px\u00bb box_shadow_blur=\u00bb40px\u00bb box_shadow_spread=\u00bb-10px\u00bb box_shadow_color=\u00bbrgba(23,102,193,0.46)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb box_shadow_color__hover=\u00bb#2585b2″ box_shadow_blur__hover_enabled=\u00bbon\u00bb box_shadow_blur__hover=\u00bb20px\u00bb box_shadow_vertical__hover_enabled=\u00bbon\u00bb box_shadow_vertical__hover=\u00bb10px\u00bb]<\/p>\n [\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_2″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-13-3.png\u00bb align=\u00bbright\u00bb _builder_version=\u00bb4.16″ max_width=\u00bb650px\u00bb max_width_tablet=\u00bb400px\u00bb max_width_phone=\u00bb\u00bb max_width_last_edited=\u00bbon|desktop\u00bb custom_margin=\u00bb-6vw|-10vw|2vw||false|false\u00bb custom_margin_tablet=\u00bb-2vw|0vw|-24vw|\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb animation_style=\u00bbzoom\u00bb animation_intensity_zoom=\u00bb5%\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n [\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.16″ z_index=\u00bb0″ width=\u00bb100%\u00bb max_width=\u00bbnone\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-01.png\u00bb show_bottom_space=\u00bboff\u00bb force_fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.16″ custom_margin=\u00bb-46vw||-2px\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n [\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbFeatures\u00bb _builder_version=\u00bb4.16″ custom_padding_tablet=\u00bb0px||0px||false|false\u00bb custom_padding_phone=\u00bb\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_3,1_3,1_3″ custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.16″ max_width=\u00bbnone\u00bb custom_margin=\u00bb-10vw||-10vw||true\u00bb custom_margin_tablet=\u00bb0vw||0vw||true\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb|||20%\u00bb custom_padding_tablet=\u00bb|120px||120px|false|true\u00bb custom_padding_phone=\u00bb|30px||30px|false|true\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbProtecci\u00f3n Integral contra Malware\u00bb image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-icon-2.png\u00bb _builder_version=\u00bb4.17.4″ header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n Ofrecemos soluciones de seguridad basadas en inteligencia artificial que garanticen una protecci\u00f3n avanzada contra malware, virus\u00a0 y ransomware.\u00a0<\/strong><\/p>\n [\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_3″ _builder_version=\u00bb4.16″ transform_scale_tablet=\u00bb\u00bb transform_scale_phone=\u00bb\u00bb transform_scale_last_edited=\u00bbon|desktop\u00bb transform_translate=\u00bb0px|-94px\u00bb transform_translate_tablet=\u00bb0px|0px\u00bb transform_translate_phone=\u00bb\u00bb transform_translate_last_edited=\u00bbon|desktop\u00bb transform_translate_linked=\u00bboff\u00bb transform_rotate_tablet=\u00bb\u00bb transform_rotate_phone=\u00bb\u00bb transform_rotate_last_edited=\u00bbon|desktop\u00bb transform_skew_tablet=\u00bb\u00bb transform_skew_phone=\u00bb\u00bb transform_skew_last_edited=\u00bbon|desktop\u00bb transform_origin_tablet=\u00bb\u00bb transform_origin_phone=\u00bb\u00bb transform_origin_last_edited=\u00bbon|desktop\u00bb transform_styles_last_edited=\u00bbon|desktop\u00bb transform_styles_tablet=\u00bb\u00bb transform_styles_phone=\u00bb\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbSeguridad Avanzada\u00bb image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-icon-18.png\u00bb _builder_version=\u00bb4.16″ header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n Te ofrecemos una soluci\u00f3n global de seguridad mediante el an\u00e1lisis de tus requerimientos y el establecimiento de una pol\u00edtica de ciberseguridad<\/strong>.<\/p>\n [\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_3″ _builder_version=\u00bb4.16″ transform_scale_tablet=\u00bb\u00bb transform_scale_phone=\u00bb\u00bb transform_scale_last_edited=\u00bbon|desktop\u00bb transform_translate=\u00bb0px|-188px\u00bb transform_translate_tablet=\u00bb0px|0px\u00bb transform_translate_phone=\u00bb\u00bb transform_translate_last_edited=\u00bbon|desktop\u00bb transform_translate_linked=\u00bboff\u00bb transform_rotate_tablet=\u00bb\u00bb transform_rotate_phone=\u00bb\u00bb transform_rotate_last_edited=\u00bbon|desktop\u00bb transform_skew_tablet=\u00bb\u00bb transform_skew_phone=\u00bb\u00bb transform_skew_last_edited=\u00bbon|desktop\u00bb transform_origin_tablet=\u00bb\u00bb transform_origin_phone=\u00bb\u00bb transform_origin_last_edited=\u00bbon|desktop\u00bb transform_styles_last_edited=\u00bbon|desktop\u00bb transform_styles_tablet=\u00bb\u00bb transform_styles_phone=\u00bb\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbLimpieza de Plataforma\u00bb image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-icon-7.png\u00bb _builder_version=\u00bb4.16″ header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n Si tu sitio web ha sido infectado o sospechas que lo ha sido podemos ayudarte con nuestros servicios de monitoreo y desinfecci\u00f3n de sitios Web.<\/strong><\/p>\n [\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ prev_background_color=\u00bb#ffffff\u00bb admin_label=\u00bbFeature\u00bb _builder_version=\u00bb4.16″ use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_stops=\u00bb#004183 0%|#001f4c 100%\u00bb background_color_gradient_start=\u00bb#004183″ background_color_gradient_end=\u00bb#001f4c\u00bb background_image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-02.png\u00bb background_size=\u00bbcontain\u00bb background_position=\u00bbbottom_center\u00bb custom_padding=\u00bb||0px|||\u00bb top_divider_style=\u00bbslant\u00bb top_divider_height=\u00bb26vw\u00bb top_divider_flip=\u00bbhorizontal\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_2,1_2″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-14-1.jpg\u00bb _builder_version=\u00bb4.16″ transform_scale=\u00bb250%|250%\u00bb transform_scale_tablet=\u00bb100%|100%\u00bb transform_scale_phone=\u00bb\u00bb transform_scale_last_edited=\u00bbon|desktop\u00bb transform_translate=\u00bb-6vw|4vw\u00bb transform_translate_tablet=\u00bb0vw|0vw\u00bb transform_translate_phone=\u00bb\u00bb transform_translate_last_edited=\u00bbon|desktop\u00bb transform_translate_linked=\u00bboff\u00bb transform_rotate=\u00bb0deg|0deg|57deg\u00bb transform_rotate_tablet=\u00bb0deg|0deg|27deg\u00bb transform_rotate_phone=\u00bb\u00bb transform_rotate_last_edited=\u00bbon|desktop\u00bb transform_skew_tablet=\u00bb\u00bb transform_skew_phone=\u00bb\u00bb transform_skew_last_edited=\u00bbon|desktop\u00bb transform_origin_tablet=\u00bb\u00bb transform_origin_phone=\u00bb\u00bb transform_origin_last_edited=\u00bbon|desktop\u00bb transform_styles_last_edited=\u00bbon|desktop\u00bb custom_margin=\u00bb|||\u00bb transform_styles_tablet=\u00bb\u00bb transform_styles_phone=\u00bb\u00bb border_radii=\u00bbon|500px|500px|500px|500px\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n [\/et_pb_image][\/et_pb_column][et_pb_column type=\u00bb1_2″ _builder_version=\u00bb4.16″ custom_padding=\u00bb18vw||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.16″ text_font=\u00bb||||||||\u00bb header_2_font=\u00bbOverpass|900|||||||\u00bb header_2_font_size=\u00bb56px\u00bb header_2_line_height=\u00bb1.1em\u00bb header_3_font=\u00bbOverpass|600|||||||\u00bb header_3_text_color=\u00bb#00b4ff\u00bb header_3_font_size=\u00bb30px\u00bb header_3_line_height=\u00bb1.2em\u00bb background_layout=\u00bbdark\u00bb custom_margin=\u00bb|-100px|||false|false\u00bb custom_margin_tablet=\u00bb|0px|||false|false\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb header_2_font_size_tablet=\u00bb38px\u00bb header_2_font_size_phone=\u00bb26px\u00bb header_2_font_size_last_edited=\u00bbon|desktop\u00bb header_3_font_tablet=\u00bb\u00bb header_3_font_phone=\u00bbOverpass|700|||||||\u00bb header_3_font_last_edited=\u00bbon|phone\u00bb header_3_font_size_tablet=\u00bb24px\u00bb header_3_font_size_phone=\u00bb18px\u00bb header_3_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n [\/et_pb_text][et_pb_divider color=\u00bb#00b4ff\u00bb divider_weight=\u00bb2px\u00bb _builder_version=\u00bb4.16″ width=\u00bb100px\u00bb custom_margin=\u00bb||0px\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n [\/et_pb_divider][et_pb_text _builder_version=\u00bb4.16″ text_font=\u00bbOverpass|300|||||||\u00bb text_font_size=\u00bb17px\u00bb text_line_height=\u00bb1.8em\u00bb background_layout=\u00bbdark\u00bb text_font_size_tablet=\u00bb\u00bb text_font_size_phone=\u00bb14px\u00bb text_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n Ofrecemos soluciones de seguridad basadas en inteligencia artificial, protecci\u00f3n de activos en l\u00ednea de vanguardia, simulaciones de ataques, as\u00ed como\u00a0metodolog\u00edas\u00a0comprobadas de protecci\u00f3n basadas en un an\u00e1lisis y despliegue estrat\u00e9gico de una pol\u00edtica de seguridad.\u00a0\u00a0<\/p>\n [\/et_pb_text][et_pb_button button_url=\u00bb\/contacto\/\u00bb button_text=\u00bbConoce M\u00e1s\u00bb _builder_version=\u00bb4.16″ custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#ffffff\u00bb button_bg_color=\u00bbrgba(0,0,0,0)\u00bb button_border_width=\u00bb2px\u00bb button_border_color=\u00bb#01bad3″ button_border_radius=\u00bb100px\u00bb button_font=\u00bbOverpass|900||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_padding=\u00bb12px|24px|12px|24px|true|true\u00bb box_shadow_style=\u00bbpreset3″ box_shadow_vertical=\u00bb0px\u00bb box_shadow_blur=\u00bb0px\u00bb box_shadow_spread=\u00bb-10px\u00bb box_shadow_color=\u00bbrgba(25,114,255,0.4)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb box_shadow_color__hover=\u00bb#2585b2″ box_shadow_blur__hover_enabled=\u00bbon\u00bb box_shadow_blur__hover=\u00bb40px\u00bb box_shadow_vertical__hover_enabled=\u00bbon\u00bb box_shadow_vertical__hover=\u00bb10px\u00bb]<\/p>\n [\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb2_5,3_5″ custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.16″ custom_padding=\u00bb0px||||false|false\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb2_5″ _builder_version=\u00bb4.16″ custom_padding=\u00bb380px||\u00bb custom_padding_tablet=\u00bb0px||\u00bb custom_padding_phone=\u00bb\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.16″ text_font=\u00bbOverpass|300|||||||\u00bb text_line_height=\u00bb1.8em\u00bb header_4_font=\u00bbOverpass|900|||||||\u00bb header_4_line_height=\u00bb1.4em\u00bb background_layout_tablet=\u00bbdark\u00bb background_layout_phone=\u00bb\u00bb background_layout_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n A trav\u00e9s del an\u00e1lisis de la necesidades, riesgos y amenazas de una organizaci\u00f3n, podemos llevar a cabo la implementaci\u00f3n de una Pol\u00edtica de Ciberseguridad ISO 27001<\/strong><\/p>\n [\/et_pb_text][et_pb_button button_url=\u00bb\/contacto\/\u00bb button_text=\u00bbCont\u00e1ctanos\u00bb _builder_version=\u00bb4.16″ custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#ffffff\u00bb button_bg_color=\u00bb#01bad3″ button_bg_color_gradient_type=\u00bbcircular\u00bb button_bg_color_gradient_direction=\u00bb140deg\u00bb button_bg_color_gradient_direction_radial=\u00bbtop right\u00bb button_bg_color_gradient_stops=\u00bbrgba(0,0,0,0) 0%|#001f4c 100%\u00bb button_bg_color_gradient_start=\u00bbrgba(0,0,0,0)\u00bb button_bg_color_gradient_end=\u00bb#001f4c\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb100px\u00bb button_font=\u00bbOverpass|900||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb||||false|false\u00bb custom_margin_tablet=\u00bb||-50px||false|false\u00bb custom_margin_phone=\u00bb||-30px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb8px|18px|8px|18px|true|true\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb\u00bb custom_padding_last_edited=\u00bbon|tablet\u00bb box_shadow_style=\u00bbpreset3″ box_shadow_vertical=\u00bb0px\u00bb box_shadow_blur=\u00bb0px\u00bb box_shadow_spread=\u00bb-10px\u00bb box_shadow_color=\u00bbrgba(25,114,255,0.4)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb box_shadow_color__hover=\u00bb#2585b2″ box_shadow_blur__hover_enabled=\u00bbon\u00bb box_shadow_blur__hover=\u00bb40px\u00bb box_shadow_vertical__hover_enabled=\u00bbon\u00bb box_shadow_vertical__hover=\u00bb10px\u00bb]<\/p>\n [\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb3_5″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-14.png\u00bb _builder_version=\u00bb4.16″ custom_padding_tablet=\u00bb0px||||false|false\u00bb custom_padding_phone=\u00bb\u00bb custom_padding_last_edited=\u00bbon|tablet\u00bb animation_style=\u00bbzoom\u00bb animation_intensity_zoom=\u00bb5%\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n [\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbFeature\u00bb _builder_version=\u00bb4.16″ use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_direction_radial=\u00bbtop right\u00bb background_color_gradient_stops=\u00bb#00ffd8 0%|#0029e2 100%\u00bb background_color_gradient_start=\u00bb#00ffd8″ background_color_gradient_end=\u00bb#0029e2″ background_image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-03-1.png\u00bb background_position=\u00bbbottom_center\u00bb custom_margin=\u00bb100px||100px||true\u00bb custom_margin_tablet=\u00bb20px||35px||false|false\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb5vw||10vw||false|false\u00bb custom_padding_tablet=\u00bb||0vw||false|false\u00bb custom_padding_phone=\u00bb\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb2_5,3_5″ _builder_version=\u00bb4.16″ z_index=\u00bb1″ hover_enabled=\u00bb0″ global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0″][et_pb_column type=\u00bb2_5″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.16″ text_font=\u00bb||||||||\u00bb header_2_font=\u00bbOverpass|900|||||||\u00bb header_2_font_size=\u00bb56px\u00bb header_2_line_height=\u00bb1.1em\u00bb header_3_font=\u00bbOverpass|600|||||||\u00bb header_3_text_color=\u00bb#ffffff\u00bb header_3_font_size=\u00bb30px\u00bb header_3_line_height=\u00bb1.2em\u00bb background_layout=\u00bbdark\u00bb custom_padding=\u00bb|||||\u00bb header_2_font_size_tablet=\u00bb38px\u00bb header_2_font_size_phone=\u00bb26px\u00bb header_2_font_size_last_edited=\u00bbon|desktop\u00bb header_3_font_tablet=\u00bb\u00bb header_3_font_phone=\u00bbOverpass|700|||||||\u00bb header_3_font_last_edited=\u00bbon|phone\u00bb header_3_font_size_tablet=\u00bb24px\u00bb header_3_font_size_phone=\u00bb18px\u00bb header_3_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n [\/et_pb_text][et_pb_text _builder_version=\u00bb4.16″ text_font=\u00bbOverpass|300|||||||\u00bb text_font_size=\u00bb17px\u00bb text_line_height=\u00bb1.8em\u00bb background_layout=\u00bbdark\u00bb text_font_size_tablet=\u00bb\u00bb text_font_size_phone=\u00bb14px\u00bb text_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n Somos partners de herramientas de ciberseguridad que permiten la detecci\u00f3n eliminaci\u00f3n , y restablecimientos de sitios web comprometidos por malware.<\/p>\n [\/et_pb_text][et_pb_button button_url=\u00bb\/contacto\/\u00bb button_text=\u00bbM\u00e1s informaci\u00f3n\u00bb _builder_version=\u00bb4.16″ custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#ffffff\u00bb button_bg_color=\u00bb#5bd8dd\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb100px\u00bb button_font=\u00bbOverpass|900||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_padding=\u00bb20px|30px|20px|30px|true|true\u00bb box_shadow_style=\u00bbpreset3″ box_shadow_vertical=\u00bb20px\u00bb box_shadow_blur=\u00bb40px\u00bb box_shadow_spread=\u00bb-10px\u00bb box_shadow_color=\u00bbrgba(0,65,131,0.4)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb box_shadow_color__hover=\u00bb#2585b2″ box_shadow_blur__hover_enabled=\u00bbon\u00bb box_shadow_blur__hover=\u00bb20px\u00bb box_shadow_vertical__hover_enabled=\u00bbon\u00bb box_shadow_vertical__hover=\u00bb10px\u00bb]<\/p>\n [\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb3_5″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbDesinfecci\u00f3n de sitio Web\u00bb image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-illustrated-icons-08.png\u00bb icon_placement=\u00bbleft\u00bb image_icon_width=\u00bb120px\u00bb image_icon_width_tablet=\u00bb120px\u00bb image_icon_width_phone=\u00bb50px\u00bb image_icon_width_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.16″ header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb background_color=\u00bb#ffffff\u00bb text_orientation=\u00bbcenter\u00bb custom_padding=\u00bb24px|20px|24px|20px|true|true\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1″ box_shadow_vertical=\u00bb10px\u00bb box_shadow_blur=\u00bb60px\u00bb box_shadow_color=\u00bbrgba(10,45,97,0.1)\u00bb image_max_width=\u00bb120px\u00bb image_max_width_tablet=\u00bb\u00bb image_max_width_phone=\u00bb50px\u00bb image_max_width_last_edited=\u00bbon|phone\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n Nuestro equipo de programadores son capaces de detectar , contener y eliminar cualquier c\u00f3digo malicioso que se encuentre activo en su sitio web.\u00a0<\/p>\n [\/et_pb_blurb][et_pb_blurb title=\u00bbRespaldos diarios del sitio Web\u00bb image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-illustrated-icons-03.png\u00bb icon_placement=\u00bbleft\u00bb image_icon_width=\u00bb120px\u00bb image_icon_width_tablet=\u00bb120px\u00bb image_icon_width_phone=\u00bb50px\u00bb image_icon_width_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.16″ header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb background_color=\u00bb#ffffff\u00bb text_orientation=\u00bbcenter\u00bb custom_padding=\u00bb24px|20px|24px|20px|true|true\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1″ box_shadow_vertical=\u00bb10px\u00bb box_shadow_blur=\u00bb60px\u00bb box_shadow_color=\u00bbrgba(10,45,97,0.1)\u00bb image_max_width=\u00bb120px\u00bb image_max_width_tablet=\u00bb\u00bb image_max_width_phone=\u00bb50px\u00bb image_max_width_last_edited=\u00bbon|phone\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n Respaldo Diario cifrado protegido del sitio Web, con servicio de restauraci\u00f3n en caso de fallas o hackeo de la plataforma.\u00a0<\/p>\n [\/et_pb_blurb][et_pb_blurb title=\u00bbMonitoreo de seguridad\u00bb image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-illustrated-icons-06.png\u00bb icon_placement=\u00bbleft\u00bb image_icon_width=\u00bb120px\u00bb image_icon_width_tablet=\u00bb120px\u00bb image_icon_width_phone=\u00bb50px\u00bb image_icon_width_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.16″ header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb background_color=\u00bb#ffffff\u00bb text_orientation=\u00bbcenter\u00bb custom_padding=\u00bb24px|20px|24px|20px|true|true\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1″ box_shadow_vertical=\u00bb10px\u00bb box_shadow_blur=\u00bb60px\u00bb box_shadow_color=\u00bbrgba(10,45,97,0.1)\u00bb image_max_width=\u00bb120px\u00bb image_max_width_tablet=\u00bb\u00bb image_max_width_phone=\u00bb50px\u00bb image_max_width_last_edited=\u00bbon|phone\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n Herramienta antivirus para sitios web con monitoreo continuo de amenazas , protecci\u00f3n , y notificaci\u00f3n de componentes con vulnerabilidades.\u00a0<\/p>\n [\/et_pb_blurb][et_pb_blurb title=\u00bbAuditor\u00eda de Seguridad\u00bb image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-icon-15.png\u00bb icon_placement=\u00bbleft\u00bb image_icon_width=\u00bb120px\u00bb image_icon_width_tablet=\u00bb120px\u00bb image_icon_width_phone=\u00bb50px\u00bb image_icon_width_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.16″ header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb background_color=\u00bb#ffffff\u00bb text_orientation=\u00bbcenter\u00bb custom_padding=\u00bb24px|20px|24px|20px|true|true\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1″ box_shadow_vertical=\u00bb10px\u00bb box_shadow_blur=\u00bb60px\u00bb box_shadow_color=\u00bbrgba(10,45,97,0.1)\u00bb image_max_width=\u00bb120px\u00bb image_max_width_tablet=\u00bb\u00bb image_max_width_phone=\u00bb50px\u00bb image_max_width_last_edited=\u00bbon|phone\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n Analizamos tu sitio plataforma para detectar posibles vulnerabilidades, mediante un proceso llamado pentesting.\u00a0<\/strong>En el cual intentamos obtener los accesos a la aplicaci\u00f3n siempre de manera controlada y ver si un posible atacante seria capaz de lograrlo.\u00a0<\/p>\n [\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ disabled_on=\u00bboff|off|off\u00bb admin_label=\u00bbFeatures\u00bb _builder_version=\u00bb4.17.4″ use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_stops=\u00bb#004183 0%|#001f4c 100%\u00bb background_color_gradient_start=\u00bb#004183″ background_color_gradient_end=\u00bb#001f4c\u00bb background_size=\u00bbcontain\u00bb background_position=\u00bbbottom_center\u00bb custom_padding=\u00bb||0px|||\u00bb top_divider_height=\u00bb26vw\u00bb top_divider_flip=\u00bbhorizontal\u00bb bottom_divider_color=\u00bb#dcecff\u00bb bottom_divider_height=\u00bb30vw\u00bb bottom_divider_arrangement=\u00bbabove_content\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_2,1_2″ _builder_version=\u00bb4.16″ z_index=\u00bb1″ global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.17.4″ text_font=\u00bb||||||||\u00bb header_2_font=\u00bbOverpass|900|||||||\u00bb header_2_font_size=\u00bb56px\u00bb header_2_line_height=\u00bb1.1em\u00bb header_3_font=\u00bbOverpass|600|||||||\u00bb header_3_text_color=\u00bb#00b4ff\u00bb header_3_font_size=\u00bb30px\u00bb header_3_line_height=\u00bb1.2em\u00bb background_layout=\u00bbdark\u00bb custom_padding=\u00bb|||||\u00bb header_2_font_size_tablet=\u00bb38px\u00bb header_2_font_size_phone=\u00bb26px\u00bb header_2_font_size_last_edited=\u00bbon|desktop\u00bb header_3_font_tablet=\u00bb\u00bb header_3_font_phone=\u00bbOverpass|700|||||||\u00bb header_3_font_last_edited=\u00bbon|phone\u00bb header_3_font_size_tablet=\u00bb24px\u00bb header_3_font_size_phone=\u00bb18px\u00bb header_3_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n [\/et_pb_text][et_pb_divider color=\u00bb#00b4ff\u00bb divider_weight=\u00bb2px\u00bb _builder_version=\u00bb4.16″ width=\u00bb100px\u00bb custom_margin=\u00bb||0px\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n [\/et_pb_divider][et_pb_text _builder_version=\u00bb4.16″ text_font=\u00bbOverpass|300|||||||\u00bb text_font_size=\u00bb17px\u00bb text_line_height=\u00bb1.8em\u00bb background_layout=\u00bbdark\u00bb text_font_size_tablet=\u00bb\u00bb text_font_size_phone=\u00bb14px\u00bb text_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n Ofrecemos soluciones de respaldo en Cloud y restauraci\u00f3n directa desde la nube, en caso de que los datos se hayan comprometido.\u00a0<\/p>\n Esto garantiza que los datos estar\u00b4\u00e1n disponibles cuando se necesiten, en un repositorio cifrado y protegido contra ransomware.<\/p>\n [\/et_pb_text][et_pb_button button_url=\u00bb\/contacto\/\u00bb button_text=\u00bbServicios de Respaldo\u00bb _builder_version=\u00bb4.16″ custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#00b4ff\u00bb button_bg_color=\u00bbrgba(0,0,0,0)\u00bb button_border_width=\u00bb2px\u00bb button_border_color=\u00bb#00b4ff\u00bb button_border_radius=\u00bb100px\u00bb button_font=\u00bbOverpass|900||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_padding=\u00bb12px|24px|12px|24px|true|true\u00bb box_shadow_style=\u00bbpreset3″ box_shadow_vertical=\u00bb0px\u00bb box_shadow_blur=\u00bb0px\u00bb box_shadow_spread=\u00bb-10px\u00bb box_shadow_color=\u00bbrgba(25,114,255,0.4)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb box_shadow_color__hover=\u00bb#2585b2″ box_shadow_blur__hover_enabled=\u00bbon\u00bb box_shadow_blur__hover=\u00bb40px\u00bb box_shadow_vertical__hover_enabled=\u00bbon\u00bb box_shadow_vertical__hover=\u00bb10px\u00bb]<\/p>\n [\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_2″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-10.png\u00bb _builder_version=\u00bb4.16″ custom_margin=\u00bb-20vw|-9vw||||\u00bb custom_margin_tablet=\u00bb0vw|0vw||\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb animation_style=\u00bbzoom\u00bb animation_intensity_zoom=\u00bb5%\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n [\/et_pb_image][et_pb_text _builder_version=\u00bb4.16″ text_font=\u00bbOverpass|300|||||||\u00bb text_line_height=\u00bb1.8em\u00bb header_4_font=\u00bbOverpass|900|||||||\u00bb header_4_line_height=\u00bb1.4em\u00bb background_layout=\u00bbdark\u00bb max_width=\u00bb400px\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n Panel de control con los respaldos y posibilidad de despliegue solo de los equipos comprometidos<\/p>\n [\/et_pb_text][et_pb_button button_url=\u00bb\/contacto\/\u00bb button_text=\u00bbConoce M\u00e1s\u00bb _builder_version=\u00bb4.16″ custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#ffffff\u00bb button_bg_color=\u00bb#01bad3″ button_bg_color_gradient_type=\u00bbcircular\u00bb button_bg_color_gradient_direction=\u00bb140deg\u00bb button_bg_color_gradient_direction_radial=\u00bbtop right\u00bb button_bg_color_gradient_stops=\u00bbrgba(0,0,0,0) 0%|#001f4c 100%\u00bb button_bg_color_gradient_start=\u00bbrgba(0,0,0,0)\u00bb button_bg_color_gradient_end=\u00bb#001f4c\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb100px\u00bb button_font=\u00bbOverpass|900||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_padding=\u00bb8px|18px|8px|18px|true|true\u00bb box_shadow_style=\u00bbpreset3″ box_shadow_vertical=\u00bb0px\u00bb box_shadow_blur=\u00bb0px\u00bb box_shadow_spread=\u00bb-10px\u00bb box_shadow_color=\u00bbrgba(25,114,255,0.4)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb box_shadow_color__hover=\u00bb#2585b2″ box_shadow_blur__hover_enabled=\u00bbon\u00bb box_shadow_blur__hover=\u00bb40px\u00bb box_shadow_vertical__hover_enabled=\u00bbon\u00bb box_shadow_vertical__hover=\u00bb10px\u00bb]<\/p>\n [\/et_pb_button][et_pb_text _builder_version=\u00bb4.16″ text_font=\u00bbOverpass|300|||||||\u00bb text_line_height=\u00bb1.8em\u00bb header_4_font=\u00bbOverpass|900|||||||\u00bb header_4_line_height=\u00bb1.4em\u00bb background_layout=\u00bbdark\u00bb max_width=\u00bb400px\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n Tus datos se encontrar\u00e1n protegidos en servidores certificados con un alto cifrado.<\/p>\n [\/et_pb_text][et_pb_button button_url=\u00bb\/contacto\/\u00bb button_text=\u00bbConoce M\u00e1s\u00bb _builder_version=\u00bb4.16″ custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#ffffff\u00bb button_bg_color=\u00bb#01bad3″ button_bg_color_gradient_type=\u00bbcircular\u00bb button_bg_color_gradient_direction=\u00bb140deg\u00bb button_bg_color_gradient_direction_radial=\u00bbtop right\u00bb button_bg_color_gradient_stops=\u00bbrgba(0,0,0,0) 0%|#001f4c 100%\u00bb button_bg_color_gradient_start=\u00bbrgba(0,0,0,0)\u00bb button_bg_color_gradient_end=\u00bb#001f4c\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb100px\u00bb button_font=\u00bbOverpass|900||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_padding=\u00bb8px|18px|8px|18px|true|true\u00bb box_shadow_style=\u00bbpreset3″ box_shadow_vertical=\u00bb0px\u00bb box_shadow_blur=\u00bb0px\u00bb box_shadow_spread=\u00bb-10px\u00bb box_shadow_color=\u00bbrgba(25,114,255,0.4)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb box_shadow_color__hover=\u00bb#2585b2″ box_shadow_blur__hover_enabled=\u00bbon\u00bb box_shadow_blur__hover=\u00bb40px\u00bb box_shadow_vertical__hover_enabled=\u00bbon\u00bb box_shadow_vertical__hover=\u00bb10px\u00bb]<\/p>\n [\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb2_5,3_5″ disabled_on=\u00bbon|on|on\u00bb _builder_version=\u00bb4.17.4″ _module_preset=\u00bbdefault\u00bb disabled=\u00bbon\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb2_5″ _builder_version=\u00bb4.17.4″ _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.17.4″ _module_preset=\u00bbdefault\u00bb text_font=\u00bb|800|||||||\u00bb header_font=\u00bb|800|||||||\u00bb header_2_font=\u00bb|800|||||||\u00bb header_2_text_color=\u00bb#00b4ff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n [\/et_pb_text][et_pb_slider arrows_custom_color=\u00bb#000000″ dot_nav_custom_color=\u00bb#000000″ _builder_version=\u00bb4.17.4″ _module_preset=\u00bbdefault\u00bb header_font=\u00bb|700|||||||\u00bb header_text_color=\u00bb#00b4ff\u00bb background_color=\u00bbRGBA(255,255,255,0)\u00bb custom_button=\u00bbon\u00bb button_icon=\u00bb$||divi||400″ button_alignment=\u00bbright\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_slide heading=\u00bbWatchguard EPD\u00bb image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2022\/06\/watchguard-partner-logo.png\u00bb arrows_custom_color=\u00bb#000000″ _builder_version=\u00bb4.17.4″ _module_preset=\u00bbdefault\u00bb header_level=\u00bbh2″ header_text_color=\u00bb#FFFFFF\u00bb text_orientation=\u00bbcenter\u00bb background_layout=\u00bblight\u00bb global_colors_info=\u00bb{}\u00bb sticky_transition=\u00bbon\u00bb][\/et_pb_slide][et_pb_slide heading=\u00bbJumboCopy\u00bb _builder_version=\u00bb4.17.4″ _module_preset=\u00bbdefault\u00bb header_text_color=\u00bb#FFFFFF\u00bb global_colors_info=\u00bb{}\u00bb sticky_transition=\u00bbon\u00bb][\/et_pb_slide][\/et_pb_slider][\/et_pb_column][et_pb_column type=\u00bb3_5″ _builder_version=\u00bb4.17.4″ _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.17.4″ z_index=\u00bb0″ width=\u00bb100%\u00bb max_width=\u00bbnone\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-04.png\u00bb show_bottom_space=\u00bboff\u00bb force_fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.16″ custom_margin=\u00bb-48vw||-2px\u00bb custom_margin_tablet=\u00bb-50vw||\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|tablet\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n [\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ admin_label=\u00bbSection\u00bb _builder_version=\u00bb4.16″ height=\u00bb233px\u00bb height_tablet=\u00bb500px\u00bb height_phone=\u00bb365px\u00bb height_last_edited=\u00bbon|phone\u00bb bottom_divider_style=\u00bbslant\u00bb bottom_divider_color=\u00bb#f1fafe\u00bb bottom_divider_height=\u00bb40vw\u00bb bottom_divider_flip=\u00bbhorizontal\u00bb bottom_divider_arrangement=\u00bbabove_content\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-07-2.png\u00bb _builder_version=\u00bb4.16″ z_index=\u00bb100″ max_width=\u00bb700px\u00bb custom_margin=\u00bb-40vw|||\u00bb custom_margin_tablet=\u00bb-45vw|||\u00bb custom_margin_phone=\u00bb-50vw|||\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb animation_style=\u00bbzoom\u00bb animation_intensity_zoom=\u00bb5%\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n [\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ admin_label=\u00bbFooter\u00bb _builder_version=\u00bb4.16″ use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_direction_radial=\u00bbtop right\u00bb background_color_gradient_stops=\u00bb#3122b2 0%|#00ffd8 100%\u00bb background_color_gradient_start=\u00bb#3122b2″ background_color_gradient_end=\u00bb#00ffd8″ background_image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-17.png\u00bb z_index=\u00bb10″ overflow-x=\u00bbvisible\u00bb overflow-y=\u00bbvisible\u00bb custom_padding=\u00bb||5vw||false|false\u00bb background_color_gradient_stops_tablet=\u00bb#3122b2 0%|#00ffd8 100%\u00bb background_color_gradient_stops_phone=\u00bb#3122b2 0%|#00ffd8 100%\u00bb global_module=\u00bb422″ saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb2_5,3_5″ make_equal=\u00bbon\u00bb _builder_version=\u00bb4.16″ background_color=\u00bb#ffffff\u00bb custom_margin=\u00bb-146px|auto|-2px|auto||\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb||45px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb0px||0px||true\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1″ box_shadow_vertical=\u00bb40px\u00bb box_shadow_blur=\u00bb60px\u00bb box_shadow_spread=\u00bb-8px\u00bb box_shadow_color=\u00bbrgba(10,45,97,0.48)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb2_5″ _builder_version=\u00bb4.16″ custom_padding=\u00bb60px|40px|60px|40px|true|true\u00bb custom_padding_tablet=\u00bb||0px||false|true\u00bb custom_padding_phone=\u00bb\u00bb custom_padding_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.16″ header_2_font=\u00bbOverpass|900|||||||\u00bb header_2_font_size=\u00bb45px\u00bb header_2_line_height=\u00bb1.1em\u00bb custom_margin_tablet=\u00bb-15px||15px||false|false\u00bb custom_margin_phone=\u00bb||5px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb||0px||false|false\u00bb custom_padding_last_edited=\u00bbon|phone\u00bb header_2_font_size_tablet=\u00bb38px\u00bb header_2_font_size_phone=\u00bb26px\u00bb header_2_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n [\/et_pb_text][et_pb_blurb title=\u00bb+58 426 536 8969″ use_icon=\u00bbon\u00bb font_icon=\u00bb||divi||400″ icon_color=\u00bb#006ac1″ icon_placement=\u00bbleft\u00bb image_icon_width=\u00bb24px\u00bb _builder_version=\u00bb4.17.4″ header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb custom_margin=\u00bb||10px||false|false\u00bb custom_margin_tablet=\u00bb||5px||false|false\u00bb custom_margin_phone=\u00bb||5px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb icon_font_size=\u00bb24px\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_blurb][et_pb_blurb title=\u00bb+34 651 088 972″ use_icon=\u00bbon\u00bb font_icon=\u00bb||divi||400″ icon_color=\u00bb#006ac1″ icon_placement=\u00bbleft\u00bb image_icon_width=\u00bb24px\u00bb _builder_version=\u00bb4.17.4″ header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb custom_margin=\u00bb||10px||false|false\u00bb custom_margin_tablet=\u00bb||5px||false|false\u00bb custom_margin_phone=\u00bb||5px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb icon_font_size=\u00bb24px\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_blurb][et_pb_blurb title=\u00bbVenezuela – Espa\u00f1a\u00bb use_icon=\u00bbon\u00bb font_icon=\u00bb||divi||400″ icon_color=\u00bb#006ac1″ icon_placement=\u00bbleft\u00bb image_icon_width=\u00bb24px\u00bb _builder_version=\u00bb4.16″ header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb custom_margin=\u00bb||10px||false|false\u00bb custom_margin_tablet=\u00bb||-25px||false|false\u00bb custom_margin_phone=\u00bb||5px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb||0px||false|false\u00bb icon_font_size=\u00bb24px\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n Lunes-Viernes: 8am – 5pm<\/p>\n [\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb3_5″ _builder_version=\u00bb4.15″ use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_direction_radial=\u00bbtop right\u00bb background_color_gradient_stops=\u00bb#00f6ff 0%|#00ffbf 100%\u00bb background_color_gradient_start=\u00bb#00f6ff\u00bb background_color_gradient_end=\u00bb#00ffbf\u00bb background_image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-010-1.png\u00bb background_size=\u00bbcontain\u00bb background_position=\u00bbbottom_left\u00bb transform_translate_linked=\u00bboff\u00bb custom_padding=\u00bb60px|40px|60px|20%|true\u00bb custom_padding_tablet=\u00bb80px|||40px\u00bb custom_padding_phone=\u00bb\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb background_last_edited=\u00bbon|desktop\u00bb background_image_tablet=\u00bbhttp:\/\/zaib.sandbox.etdevs.com\/divi\/wp-content\/uploads\/sites\/2\/2019\/06\/cyber-security-11.png\u00bb background_enable_image_tablet=\u00bbon\u00bb background_position_tablet=\u00bbtop_left\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.16″ text_font=\u00bb||||||||\u00bb header_text_color=\u00bb#ffffff\u00bb header_2_font=\u00bbOverpass|900|||||||\u00bb header_2_text_color=\u00bb#ffffff\u00bb header_2_font_size=\u00bb56px\u00bb header_2_line_height=\u00bb1.1em\u00bb text_orientation=\u00bbcenter\u00bb custom_margin_tablet=\u00bb||10px||false|false\u00bb custom_margin_phone=\u00bb-20px||5px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding_tablet=\u00bb||0px||false|false\u00bb custom_padding_phone=\u00bb||0px||false|false\u00bb custom_padding_last_edited=\u00bbon|phone\u00bb header_2_font_size_tablet=\u00bb38px\u00bb header_2_font_size_phone=\u00bb30px\u00bb header_2_font_size_last_edited=\u00bbon|desktop\u00bb text_text_align=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n [\/et_pb_text][et_pb_text _builder_version=\u00bb4.16″ text_font=\u00bbOverpass|300|||||||\u00bb text_text_color=\u00bb#0a2d61″ text_font_size=\u00bb17px\u00bb text_orientation=\u00bbcenter\u00bb custom_padding_tablet=\u00bb|75px||75px|false|true\u00bb custom_padding_phone=\u00bb|0px||0px|false|true\u00bb custom_padding_last_edited=\u00bbon|tablet\u00bb text_font_size_tablet=\u00bb\u00bb text_font_size_phone=\u00bb14px\u00bb text_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n Nuestro equipo est\u00e1 siempre dispuesto a atenderte y responderte a la brevedad<\/p>\n [\/et_pb_text][et_pb_button button_url=\u00bb\/contacto\/\u00bb button_text=\u00bbCONTACTO\u00bb button_alignment=\u00bbcenter\u00bb _builder_version=\u00bb4.3.2″ custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#ffffff\u00bb button_bg_use_color_gradient=\u00bbon\u00bb button_bg_color_gradient_type=\u00bbcircular\u00bb button_bg_color_gradient_direction=\u00bb140deg\u00bb button_bg_color_gradient_direction_radial=\u00bbtop right\u00bb button_bg_color_gradient_stops=\u00bb#003070 0%|#001f4c 100%\u00bb button_bg_color_gradient_start=\u00bb#003070″ button_bg_color_gradient_end=\u00bb#001f4c\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb100px\u00bb button_font=\u00bbOverpass|900||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb||-30px||false|false\u00bb custom_padding=\u00bb16px|30px|16px|30px|true|true\u00bb box_shadow_style=\u00bbpreset3″ box_shadow_vertical=\u00bb0px\u00bb box_shadow_blur=\u00bb0px\u00bb box_shadow_spread=\u00bb-10px\u00bb box_shadow_color=\u00bbrgba(25,114,255,0.4)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb box_shadow_color__hover=\u00bb#2585b2″ box_shadow_blur__hover_enabled=\u00bbon\u00bb box_shadow_blur__hover=\u00bb40px\u00bb box_shadow_vertical__hover_enabled=\u00bbon\u00bb box_shadow_vertical__hover=\u00bb10px\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":" Soluciones de CiberseguridadSomos integradores de distintas soluciones de seguridad del mercado ofreciendo protecci\u00f3n\u00a0frente a los cada vez m\u00e1s complejos ataques cibern\u00e9ticos que encontramos en la actualidad. Ofrecemos soluciones de seguridad basadas en inteligencia artificial que garanticen una protecci\u00f3n avanzada contra malware, virus\u00a0 y ransomware.\u00a0Te ofrecemos una soluci\u00f3n global de seguridad mediante el an\u00e1lisis de tus […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false},"yoast_head":"\nProDigital\u00a0<\/span>Security<\/h3>\n
Soluciones basadas en Inteligencia Artificial<\/h2>\n
Sistema de Gesti\u00f3n de la Seguridad de la\u00a0 Informaci\u00f3n.<\/h4>\n
Servicios<\/h3>\n
Orientados a sitios Web<\/h2>\n
Respaldo<\/h3>\n
Respaldamos y aseguramos tu informaci\u00f3n<\/h2>\n
Herramienta de gesti\u00f3n de Respaldo<\/h4>\n
Centro de Datos Cifrados\u00a0<\/h4>\n
Nuestros Partners<\/h2>\n
Cont\u00e1ctanos<\/h2>\n
Empecemos<\/h2>\n