{"id":17,"date":"2020-01-23T14:34:03","date_gmt":"2020-01-23T14:34:03","guid":{"rendered":"https:\/\/prodigitalsecurity.com\/?page_id=17"},"modified":"2023-02-24T11:18:28","modified_gmt":"2023-02-24T11:18:28","slug":"inicio","status":"publish","type":"page","link":"https:\/\/prodigitalsecurity.com\/","title":{"rendered":"Inicio"},"content":{"rendered":"

[et_pb_section fb_built=\u00bb1″ admin_label=\u00bbHeader\u00bb _builder_version=\u00bb4.16″ use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_direction_radial=\u00bbtop right\u00bb background_color_gradient_stops=\u00bb#00ffd8 0%|#0029e2 100%\u00bb background_color_gradient_start=\u00bb#00ffd8″ background_color_gradient_end=\u00bb#0029e2″ background_image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-17.png\u00bb parallax=\u00bbon\u00bb custom_padding=\u00bb10vw||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_2,1_2″ _builder_version=\u00bb4.16″ z_index=\u00bb1″ global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_text admin_label=\u00bbTexto\u00bb _builder_version=\u00bb4.17.4″ text_font=\u00bb||||||||\u00bb header_font=\u00bbOverpass|900|||||||\u00bb header_font_size=\u00bb60px\u00bb header_line_height=\u00bb1.1em\u00bb background_layout=\u00bbdark\u00bb custom_margin=\u00bb0px||||false|false\u00bb custom_margin_tablet=\u00bb50px||||false|false\u00bb custom_margin_phone=\u00bb100px||||false|false\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb header_font_size_tablet=\u00bb54px\u00bb header_font_size_phone=\u00bb42px\u00bb header_font_size_last_edited=\u00bbon|phone\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

Soluciones de Ciberseguridad<\/h1>\n

[\/et_pb_text][et_pb_text _builder_version=\u00bb4.16″ text_font=\u00bbOverpass|300|||||||\u00bb text_font_size=\u00bb17px\u00bb text_line_height=\u00bb1.8em\u00bb background_layout=\u00bbdark\u00bb custom_margin_tablet=\u00bb-18px|125px|||false|false\u00bb custom_margin_phone=\u00bb|0px|||false|false\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb text_font_size_tablet=\u00bb16px\u00bb text_font_size_phone=\u00bb14px\u00bb text_font_size_last_edited=\u00bbon|desktop\u00bb text_line_height_tablet=\u00bb1.6em\u00bb text_line_height_phone=\u00bb\u00bb text_line_height_last_edited=\u00bbon|tablet\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

Somos integradores de distintas soluciones de seguridad del mercado ofreciendo protecci\u00f3n\u00a0frente a los cada vez m\u00e1s complejos ataques cibern\u00e9ticos que encontramos en la actualidad.<\/strong><\/p>\n

[\/et_pb_text][et_pb_button button_url=\u00bb\/contacto\/\u00bb button_text=\u00bbCont\u00e1ctanos\u00bb _builder_version=\u00bb4.17.4″ custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#ffffff\u00bb button_bg_color=\u00bb#47d7ff\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb100px\u00bb button_font=\u00bbOverpass|900||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_padding=\u00bb20px|30px|20px|30px|true|true\u00bb box_shadow_style=\u00bbpreset3″ box_shadow_vertical=\u00bb20px\u00bb box_shadow_blur=\u00bb40px\u00bb box_shadow_spread=\u00bb-10px\u00bb box_shadow_color=\u00bbrgba(23,102,193,0.46)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb box_shadow_color__hover=\u00bb#2585b2″ box_shadow_blur__hover_enabled=\u00bbon\u00bb box_shadow_blur__hover=\u00bb20px\u00bb box_shadow_vertical__hover_enabled=\u00bbon\u00bb box_shadow_vertical__hover=\u00bb10px\u00bb]<\/p>\n

[\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_2″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-13-3.png\u00bb align=\u00bbright\u00bb _builder_version=\u00bb4.16″ max_width=\u00bb650px\u00bb max_width_tablet=\u00bb400px\u00bb max_width_phone=\u00bb\u00bb max_width_last_edited=\u00bbon|desktop\u00bb custom_margin=\u00bb-6vw|-10vw|2vw||false|false\u00bb custom_margin_tablet=\u00bb-2vw|0vw|-24vw|\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb animation_style=\u00bbzoom\u00bb animation_intensity_zoom=\u00bb5%\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

[\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.16″ z_index=\u00bb0″ width=\u00bb100%\u00bb max_width=\u00bbnone\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-01.png\u00bb show_bottom_space=\u00bboff\u00bb force_fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.16″ custom_margin=\u00bb-46vw||-2px\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

[\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbFeatures\u00bb _builder_version=\u00bb4.16″ custom_padding_tablet=\u00bb0px||0px||false|false\u00bb custom_padding_phone=\u00bb\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_3,1_3,1_3″ custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.16″ max_width=\u00bbnone\u00bb custom_margin=\u00bb-10vw||-10vw||true\u00bb custom_margin_tablet=\u00bb0vw||0vw||true\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb|||20%\u00bb custom_padding_tablet=\u00bb|120px||120px|false|true\u00bb custom_padding_phone=\u00bb|30px||30px|false|true\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbProtecci\u00f3n Integral contra Malware\u00bb image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-icon-2.png\u00bb _builder_version=\u00bb4.17.4″ header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

Ofrecemos soluciones de seguridad basadas en inteligencia artificial que garanticen una protecci\u00f3n avanzada contra malware, virus\u00a0 y ransomware.\u00a0<\/strong><\/p>\n

[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_3″ _builder_version=\u00bb4.16″ transform_scale_tablet=\u00bb\u00bb transform_scale_phone=\u00bb\u00bb transform_scale_last_edited=\u00bbon|desktop\u00bb transform_translate=\u00bb0px|-94px\u00bb transform_translate_tablet=\u00bb0px|0px\u00bb transform_translate_phone=\u00bb\u00bb transform_translate_last_edited=\u00bbon|desktop\u00bb transform_translate_linked=\u00bboff\u00bb transform_rotate_tablet=\u00bb\u00bb transform_rotate_phone=\u00bb\u00bb transform_rotate_last_edited=\u00bbon|desktop\u00bb transform_skew_tablet=\u00bb\u00bb transform_skew_phone=\u00bb\u00bb transform_skew_last_edited=\u00bbon|desktop\u00bb transform_origin_tablet=\u00bb\u00bb transform_origin_phone=\u00bb\u00bb transform_origin_last_edited=\u00bbon|desktop\u00bb transform_styles_last_edited=\u00bbon|desktop\u00bb transform_styles_tablet=\u00bb\u00bb transform_styles_phone=\u00bb\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbSeguridad Avanzada\u00bb image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-icon-18.png\u00bb _builder_version=\u00bb4.16″ header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

Te ofrecemos una soluci\u00f3n global de seguridad mediante el an\u00e1lisis de tus requerimientos y el establecimiento de una pol\u00edtica de ciberseguridad<\/strong>.<\/p>\n

[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_3″ _builder_version=\u00bb4.16″ transform_scale_tablet=\u00bb\u00bb transform_scale_phone=\u00bb\u00bb transform_scale_last_edited=\u00bbon|desktop\u00bb transform_translate=\u00bb0px|-188px\u00bb transform_translate_tablet=\u00bb0px|0px\u00bb transform_translate_phone=\u00bb\u00bb transform_translate_last_edited=\u00bbon|desktop\u00bb transform_translate_linked=\u00bboff\u00bb transform_rotate_tablet=\u00bb\u00bb transform_rotate_phone=\u00bb\u00bb transform_rotate_last_edited=\u00bbon|desktop\u00bb transform_skew_tablet=\u00bb\u00bb transform_skew_phone=\u00bb\u00bb transform_skew_last_edited=\u00bbon|desktop\u00bb transform_origin_tablet=\u00bb\u00bb transform_origin_phone=\u00bb\u00bb transform_origin_last_edited=\u00bbon|desktop\u00bb transform_styles_last_edited=\u00bbon|desktop\u00bb transform_styles_tablet=\u00bb\u00bb transform_styles_phone=\u00bb\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbLimpieza de Plataforma\u00bb image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-icon-7.png\u00bb _builder_version=\u00bb4.16″ header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

Si tu sitio web ha sido infectado o sospechas que lo ha sido podemos ayudarte con nuestros servicios de monitoreo y desinfecci\u00f3n de sitios Web.<\/strong><\/p>\n

[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ prev_background_color=\u00bb#ffffff\u00bb admin_label=\u00bbFeature\u00bb _builder_version=\u00bb4.16″ use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_stops=\u00bb#004183 0%|#001f4c 100%\u00bb background_color_gradient_start=\u00bb#004183″ background_color_gradient_end=\u00bb#001f4c\u00bb background_image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-02.png\u00bb background_size=\u00bbcontain\u00bb background_position=\u00bbbottom_center\u00bb custom_padding=\u00bb||0px|||\u00bb top_divider_style=\u00bbslant\u00bb top_divider_height=\u00bb26vw\u00bb top_divider_flip=\u00bbhorizontal\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_2,1_2″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-14-1.jpg\u00bb _builder_version=\u00bb4.16″ transform_scale=\u00bb250%|250%\u00bb transform_scale_tablet=\u00bb100%|100%\u00bb transform_scale_phone=\u00bb\u00bb transform_scale_last_edited=\u00bbon|desktop\u00bb transform_translate=\u00bb-6vw|4vw\u00bb transform_translate_tablet=\u00bb0vw|0vw\u00bb transform_translate_phone=\u00bb\u00bb transform_translate_last_edited=\u00bbon|desktop\u00bb transform_translate_linked=\u00bboff\u00bb transform_rotate=\u00bb0deg|0deg|57deg\u00bb transform_rotate_tablet=\u00bb0deg|0deg|27deg\u00bb transform_rotate_phone=\u00bb\u00bb transform_rotate_last_edited=\u00bbon|desktop\u00bb transform_skew_tablet=\u00bb\u00bb transform_skew_phone=\u00bb\u00bb transform_skew_last_edited=\u00bbon|desktop\u00bb transform_origin_tablet=\u00bb\u00bb transform_origin_phone=\u00bb\u00bb transform_origin_last_edited=\u00bbon|desktop\u00bb transform_styles_last_edited=\u00bbon|desktop\u00bb custom_margin=\u00bb|||\u00bb transform_styles_tablet=\u00bb\u00bb transform_styles_phone=\u00bb\u00bb border_radii=\u00bbon|500px|500px|500px|500px\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

[\/et_pb_image][\/et_pb_column][et_pb_column type=\u00bb1_2″ _builder_version=\u00bb4.16″ custom_padding=\u00bb18vw||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.16″ text_font=\u00bb||||||||\u00bb header_2_font=\u00bbOverpass|900|||||||\u00bb header_2_font_size=\u00bb56px\u00bb header_2_line_height=\u00bb1.1em\u00bb header_3_font=\u00bbOverpass|600|||||||\u00bb header_3_text_color=\u00bb#00b4ff\u00bb header_3_font_size=\u00bb30px\u00bb header_3_line_height=\u00bb1.2em\u00bb background_layout=\u00bbdark\u00bb custom_margin=\u00bb|-100px|||false|false\u00bb custom_margin_tablet=\u00bb|0px|||false|false\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb header_2_font_size_tablet=\u00bb38px\u00bb header_2_font_size_phone=\u00bb26px\u00bb header_2_font_size_last_edited=\u00bbon|desktop\u00bb header_3_font_tablet=\u00bb\u00bb header_3_font_phone=\u00bbOverpass|700|||||||\u00bb header_3_font_last_edited=\u00bbon|phone\u00bb header_3_font_size_tablet=\u00bb24px\u00bb header_3_font_size_phone=\u00bb18px\u00bb header_3_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

ProDigital\u00a0<\/span>Security<\/h3>\n

Soluciones basadas en Inteligencia Artificial<\/h2>\n

[\/et_pb_text][et_pb_divider color=\u00bb#00b4ff\u00bb divider_weight=\u00bb2px\u00bb _builder_version=\u00bb4.16″ width=\u00bb100px\u00bb custom_margin=\u00bb||0px\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

[\/et_pb_divider][et_pb_text _builder_version=\u00bb4.16″ text_font=\u00bbOverpass|300|||||||\u00bb text_font_size=\u00bb17px\u00bb text_line_height=\u00bb1.8em\u00bb background_layout=\u00bbdark\u00bb text_font_size_tablet=\u00bb\u00bb text_font_size_phone=\u00bb14px\u00bb text_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

Ofrecemos soluciones de seguridad basadas en inteligencia artificial, protecci\u00f3n de activos en l\u00ednea de vanguardia, simulaciones de ataques, as\u00ed como\u00a0metodolog\u00edas\u00a0comprobadas de protecci\u00f3n basadas en un an\u00e1lisis y despliegue estrat\u00e9gico de una pol\u00edtica de seguridad.\u00a0\u00a0<\/p>\n

[\/et_pb_text][et_pb_button button_url=\u00bb\/contacto\/\u00bb button_text=\u00bbConoce M\u00e1s\u00bb _builder_version=\u00bb4.16″ custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#ffffff\u00bb button_bg_color=\u00bbrgba(0,0,0,0)\u00bb button_border_width=\u00bb2px\u00bb button_border_color=\u00bb#01bad3″ button_border_radius=\u00bb100px\u00bb button_font=\u00bbOverpass|900||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_padding=\u00bb12px|24px|12px|24px|true|true\u00bb box_shadow_style=\u00bbpreset3″ box_shadow_vertical=\u00bb0px\u00bb box_shadow_blur=\u00bb0px\u00bb box_shadow_spread=\u00bb-10px\u00bb box_shadow_color=\u00bbrgba(25,114,255,0.4)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb box_shadow_color__hover=\u00bb#2585b2″ box_shadow_blur__hover_enabled=\u00bbon\u00bb box_shadow_blur__hover=\u00bb40px\u00bb box_shadow_vertical__hover_enabled=\u00bbon\u00bb box_shadow_vertical__hover=\u00bb10px\u00bb]<\/p>\n

[\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb2_5,3_5″ custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.16″ custom_padding=\u00bb0px||||false|false\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb2_5″ _builder_version=\u00bb4.16″ custom_padding=\u00bb380px||\u00bb custom_padding_tablet=\u00bb0px||\u00bb custom_padding_phone=\u00bb\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.16″ text_font=\u00bbOverpass|300|||||||\u00bb text_line_height=\u00bb1.8em\u00bb header_4_font=\u00bbOverpass|900|||||||\u00bb header_4_line_height=\u00bb1.4em\u00bb background_layout_tablet=\u00bbdark\u00bb background_layout_phone=\u00bb\u00bb background_layout_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

Sistema de Gesti\u00f3n de la Seguridad de la\u00a0 Informaci\u00f3n.<\/h4>\n

A trav\u00e9s del an\u00e1lisis de la necesidades, riesgos y amenazas de una organizaci\u00f3n, podemos llevar a cabo la implementaci\u00f3n de una Pol\u00edtica de Ciberseguridad ISO 27001<\/strong><\/p>\n

[\/et_pb_text][et_pb_button button_url=\u00bb\/contacto\/\u00bb button_text=\u00bbCont\u00e1ctanos\u00bb _builder_version=\u00bb4.16″ custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#ffffff\u00bb button_bg_color=\u00bb#01bad3″ button_bg_color_gradient_type=\u00bbcircular\u00bb button_bg_color_gradient_direction=\u00bb140deg\u00bb button_bg_color_gradient_direction_radial=\u00bbtop right\u00bb button_bg_color_gradient_stops=\u00bbrgba(0,0,0,0) 0%|#001f4c 100%\u00bb button_bg_color_gradient_start=\u00bbrgba(0,0,0,0)\u00bb button_bg_color_gradient_end=\u00bb#001f4c\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb100px\u00bb button_font=\u00bbOverpass|900||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb||||false|false\u00bb custom_margin_tablet=\u00bb||-50px||false|false\u00bb custom_margin_phone=\u00bb||-30px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb8px|18px|8px|18px|true|true\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb\u00bb custom_padding_last_edited=\u00bbon|tablet\u00bb box_shadow_style=\u00bbpreset3″ box_shadow_vertical=\u00bb0px\u00bb box_shadow_blur=\u00bb0px\u00bb box_shadow_spread=\u00bb-10px\u00bb box_shadow_color=\u00bbrgba(25,114,255,0.4)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb box_shadow_color__hover=\u00bb#2585b2″ box_shadow_blur__hover_enabled=\u00bbon\u00bb box_shadow_blur__hover=\u00bb40px\u00bb box_shadow_vertical__hover_enabled=\u00bbon\u00bb box_shadow_vertical__hover=\u00bb10px\u00bb]<\/p>\n

[\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb3_5″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-14.png\u00bb _builder_version=\u00bb4.16″ custom_padding_tablet=\u00bb0px||||false|false\u00bb custom_padding_phone=\u00bb\u00bb custom_padding_last_edited=\u00bbon|tablet\u00bb animation_style=\u00bbzoom\u00bb animation_intensity_zoom=\u00bb5%\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

[\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbFeature\u00bb _builder_version=\u00bb4.16″ use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_direction_radial=\u00bbtop right\u00bb background_color_gradient_stops=\u00bb#00ffd8 0%|#0029e2 100%\u00bb background_color_gradient_start=\u00bb#00ffd8″ background_color_gradient_end=\u00bb#0029e2″ background_image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-03-1.png\u00bb background_position=\u00bbbottom_center\u00bb custom_margin=\u00bb100px||100px||true\u00bb custom_margin_tablet=\u00bb20px||35px||false|false\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb5vw||10vw||false|false\u00bb custom_padding_tablet=\u00bb||0vw||false|false\u00bb custom_padding_phone=\u00bb\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb2_5,3_5″ _builder_version=\u00bb4.16″ z_index=\u00bb1″ hover_enabled=\u00bb0″ global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0″][et_pb_column type=\u00bb2_5″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.16″ text_font=\u00bb||||||||\u00bb header_2_font=\u00bbOverpass|900|||||||\u00bb header_2_font_size=\u00bb56px\u00bb header_2_line_height=\u00bb1.1em\u00bb header_3_font=\u00bbOverpass|600|||||||\u00bb header_3_text_color=\u00bb#ffffff\u00bb header_3_font_size=\u00bb30px\u00bb header_3_line_height=\u00bb1.2em\u00bb background_layout=\u00bbdark\u00bb custom_padding=\u00bb|||||\u00bb header_2_font_size_tablet=\u00bb38px\u00bb header_2_font_size_phone=\u00bb26px\u00bb header_2_font_size_last_edited=\u00bbon|desktop\u00bb header_3_font_tablet=\u00bb\u00bb header_3_font_phone=\u00bbOverpass|700|||||||\u00bb header_3_font_last_edited=\u00bbon|phone\u00bb header_3_font_size_tablet=\u00bb24px\u00bb header_3_font_size_phone=\u00bb18px\u00bb header_3_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

Servicios<\/h3>\n

Orientados a sitios Web<\/h2>\n

[\/et_pb_text][et_pb_text _builder_version=\u00bb4.16″ text_font=\u00bbOverpass|300|||||||\u00bb text_font_size=\u00bb17px\u00bb text_line_height=\u00bb1.8em\u00bb background_layout=\u00bbdark\u00bb text_font_size_tablet=\u00bb\u00bb text_font_size_phone=\u00bb14px\u00bb text_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

Somos partners de herramientas de ciberseguridad que permiten la detecci\u00f3n eliminaci\u00f3n , y restablecimientos de sitios web comprometidos por malware.<\/p>\n

[\/et_pb_text][et_pb_button button_url=\u00bb\/contacto\/\u00bb button_text=\u00bbM\u00e1s informaci\u00f3n\u00bb _builder_version=\u00bb4.16″ custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#ffffff\u00bb button_bg_color=\u00bb#5bd8dd\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb100px\u00bb button_font=\u00bbOverpass|900||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_padding=\u00bb20px|30px|20px|30px|true|true\u00bb box_shadow_style=\u00bbpreset3″ box_shadow_vertical=\u00bb20px\u00bb box_shadow_blur=\u00bb40px\u00bb box_shadow_spread=\u00bb-10px\u00bb box_shadow_color=\u00bbrgba(0,65,131,0.4)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb box_shadow_color__hover=\u00bb#2585b2″ box_shadow_blur__hover_enabled=\u00bbon\u00bb box_shadow_blur__hover=\u00bb20px\u00bb box_shadow_vertical__hover_enabled=\u00bbon\u00bb box_shadow_vertical__hover=\u00bb10px\u00bb]<\/p>\n

[\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb3_5″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbDesinfecci\u00f3n de sitio Web\u00bb image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-illustrated-icons-08.png\u00bb icon_placement=\u00bbleft\u00bb image_icon_width=\u00bb120px\u00bb image_icon_width_tablet=\u00bb120px\u00bb image_icon_width_phone=\u00bb50px\u00bb image_icon_width_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.16″ header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb background_color=\u00bb#ffffff\u00bb text_orientation=\u00bbcenter\u00bb custom_padding=\u00bb24px|20px|24px|20px|true|true\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1″ box_shadow_vertical=\u00bb10px\u00bb box_shadow_blur=\u00bb60px\u00bb box_shadow_color=\u00bbrgba(10,45,97,0.1)\u00bb image_max_width=\u00bb120px\u00bb image_max_width_tablet=\u00bb\u00bb image_max_width_phone=\u00bb50px\u00bb image_max_width_last_edited=\u00bbon|phone\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

Nuestro equipo de programadores son capaces de detectar , contener y eliminar cualquier c\u00f3digo malicioso que se encuentre activo en su sitio web.\u00a0<\/p>\n

[\/et_pb_blurb][et_pb_blurb title=\u00bbRespaldos diarios del sitio Web\u00bb image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-illustrated-icons-03.png\u00bb icon_placement=\u00bbleft\u00bb image_icon_width=\u00bb120px\u00bb image_icon_width_tablet=\u00bb120px\u00bb image_icon_width_phone=\u00bb50px\u00bb image_icon_width_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.16″ header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb background_color=\u00bb#ffffff\u00bb text_orientation=\u00bbcenter\u00bb custom_padding=\u00bb24px|20px|24px|20px|true|true\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1″ box_shadow_vertical=\u00bb10px\u00bb box_shadow_blur=\u00bb60px\u00bb box_shadow_color=\u00bbrgba(10,45,97,0.1)\u00bb image_max_width=\u00bb120px\u00bb image_max_width_tablet=\u00bb\u00bb image_max_width_phone=\u00bb50px\u00bb image_max_width_last_edited=\u00bbon|phone\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

Respaldo Diario cifrado protegido del sitio Web, con servicio de restauraci\u00f3n en caso de fallas o hackeo de la plataforma.\u00a0<\/p>\n

[\/et_pb_blurb][et_pb_blurb title=\u00bbMonitoreo de seguridad\u00bb image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-illustrated-icons-06.png\u00bb icon_placement=\u00bbleft\u00bb image_icon_width=\u00bb120px\u00bb image_icon_width_tablet=\u00bb120px\u00bb image_icon_width_phone=\u00bb50px\u00bb image_icon_width_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.16″ header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb background_color=\u00bb#ffffff\u00bb text_orientation=\u00bbcenter\u00bb custom_padding=\u00bb24px|20px|24px|20px|true|true\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1″ box_shadow_vertical=\u00bb10px\u00bb box_shadow_blur=\u00bb60px\u00bb box_shadow_color=\u00bbrgba(10,45,97,0.1)\u00bb image_max_width=\u00bb120px\u00bb image_max_width_tablet=\u00bb\u00bb image_max_width_phone=\u00bb50px\u00bb image_max_width_last_edited=\u00bbon|phone\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

Herramienta antivirus para sitios web con monitoreo continuo de amenazas , protecci\u00f3n , y notificaci\u00f3n de componentes con vulnerabilidades.\u00a0<\/p>\n

[\/et_pb_blurb][et_pb_blurb title=\u00bbAuditor\u00eda de Seguridad\u00bb image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-icon-15.png\u00bb icon_placement=\u00bbleft\u00bb image_icon_width=\u00bb120px\u00bb image_icon_width_tablet=\u00bb120px\u00bb image_icon_width_phone=\u00bb50px\u00bb image_icon_width_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.16″ header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb background_color=\u00bb#ffffff\u00bb text_orientation=\u00bbcenter\u00bb custom_padding=\u00bb24px|20px|24px|20px|true|true\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1″ box_shadow_vertical=\u00bb10px\u00bb box_shadow_blur=\u00bb60px\u00bb box_shadow_color=\u00bbrgba(10,45,97,0.1)\u00bb image_max_width=\u00bb120px\u00bb image_max_width_tablet=\u00bb\u00bb image_max_width_phone=\u00bb50px\u00bb image_max_width_last_edited=\u00bbon|phone\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

Analizamos tu sitio plataforma para detectar posibles vulnerabilidades, mediante un proceso llamado pentesting.\u00a0<\/strong>En el cual intentamos obtener los accesos a la aplicaci\u00f3n siempre de manera controlada y ver si un posible atacante seria capaz de lograrlo.\u00a0<\/p>\n

[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ disabled_on=\u00bboff|off|off\u00bb admin_label=\u00bbFeatures\u00bb _builder_version=\u00bb4.17.4″ use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_stops=\u00bb#004183 0%|#001f4c 100%\u00bb background_color_gradient_start=\u00bb#004183″ background_color_gradient_end=\u00bb#001f4c\u00bb background_size=\u00bbcontain\u00bb background_position=\u00bbbottom_center\u00bb custom_padding=\u00bb||0px|||\u00bb top_divider_height=\u00bb26vw\u00bb top_divider_flip=\u00bbhorizontal\u00bb bottom_divider_color=\u00bb#dcecff\u00bb bottom_divider_height=\u00bb30vw\u00bb bottom_divider_arrangement=\u00bbabove_content\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_2,1_2″ _builder_version=\u00bb4.16″ z_index=\u00bb1″ global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.17.4″ text_font=\u00bb||||||||\u00bb header_2_font=\u00bbOverpass|900|||||||\u00bb header_2_font_size=\u00bb56px\u00bb header_2_line_height=\u00bb1.1em\u00bb header_3_font=\u00bbOverpass|600|||||||\u00bb header_3_text_color=\u00bb#00b4ff\u00bb header_3_font_size=\u00bb30px\u00bb header_3_line_height=\u00bb1.2em\u00bb background_layout=\u00bbdark\u00bb custom_padding=\u00bb|||||\u00bb header_2_font_size_tablet=\u00bb38px\u00bb header_2_font_size_phone=\u00bb26px\u00bb header_2_font_size_last_edited=\u00bbon|desktop\u00bb header_3_font_tablet=\u00bb\u00bb header_3_font_phone=\u00bbOverpass|700|||||||\u00bb header_3_font_last_edited=\u00bbon|phone\u00bb header_3_font_size_tablet=\u00bb24px\u00bb header_3_font_size_phone=\u00bb18px\u00bb header_3_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

Respaldo<\/h3>\n

Respaldamos y aseguramos tu informaci\u00f3n<\/h2>\n

[\/et_pb_text][et_pb_divider color=\u00bb#00b4ff\u00bb divider_weight=\u00bb2px\u00bb _builder_version=\u00bb4.16″ width=\u00bb100px\u00bb custom_margin=\u00bb||0px\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

[\/et_pb_divider][et_pb_text _builder_version=\u00bb4.16″ text_font=\u00bbOverpass|300|||||||\u00bb text_font_size=\u00bb17px\u00bb text_line_height=\u00bb1.8em\u00bb background_layout=\u00bbdark\u00bb text_font_size_tablet=\u00bb\u00bb text_font_size_phone=\u00bb14px\u00bb text_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

Ofrecemos soluciones de respaldo en Cloud y restauraci\u00f3n directa desde la nube, en caso de que los datos se hayan comprometido.\u00a0<\/p>\n

Esto garantiza que los datos estar\u00b4\u00e1n disponibles cuando se necesiten, en un repositorio cifrado y protegido contra ransomware.<\/p>\n

[\/et_pb_text][et_pb_button button_url=\u00bb\/contacto\/\u00bb button_text=\u00bbServicios de Respaldo\u00bb _builder_version=\u00bb4.16″ custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#00b4ff\u00bb button_bg_color=\u00bbrgba(0,0,0,0)\u00bb button_border_width=\u00bb2px\u00bb button_border_color=\u00bb#00b4ff\u00bb button_border_radius=\u00bb100px\u00bb button_font=\u00bbOverpass|900||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_padding=\u00bb12px|24px|12px|24px|true|true\u00bb box_shadow_style=\u00bbpreset3″ box_shadow_vertical=\u00bb0px\u00bb box_shadow_blur=\u00bb0px\u00bb box_shadow_spread=\u00bb-10px\u00bb box_shadow_color=\u00bbrgba(25,114,255,0.4)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb box_shadow_color__hover=\u00bb#2585b2″ box_shadow_blur__hover_enabled=\u00bbon\u00bb box_shadow_blur__hover=\u00bb40px\u00bb box_shadow_vertical__hover_enabled=\u00bbon\u00bb box_shadow_vertical__hover=\u00bb10px\u00bb]<\/p>\n

[\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_2″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-10.png\u00bb _builder_version=\u00bb4.16″ custom_margin=\u00bb-20vw|-9vw||||\u00bb custom_margin_tablet=\u00bb0vw|0vw||\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb animation_style=\u00bbzoom\u00bb animation_intensity_zoom=\u00bb5%\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

[\/et_pb_image][et_pb_text _builder_version=\u00bb4.16″ text_font=\u00bbOverpass|300|||||||\u00bb text_line_height=\u00bb1.8em\u00bb header_4_font=\u00bbOverpass|900|||||||\u00bb header_4_line_height=\u00bb1.4em\u00bb background_layout=\u00bbdark\u00bb max_width=\u00bb400px\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

Herramienta de gesti\u00f3n de Respaldo<\/h4>\n

Panel de control con los respaldos y posibilidad de despliegue solo de los equipos comprometidos<\/p>\n

[\/et_pb_text][et_pb_button button_url=\u00bb\/contacto\/\u00bb button_text=\u00bbConoce M\u00e1s\u00bb _builder_version=\u00bb4.16″ custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#ffffff\u00bb button_bg_color=\u00bb#01bad3″ button_bg_color_gradient_type=\u00bbcircular\u00bb button_bg_color_gradient_direction=\u00bb140deg\u00bb button_bg_color_gradient_direction_radial=\u00bbtop right\u00bb button_bg_color_gradient_stops=\u00bbrgba(0,0,0,0) 0%|#001f4c 100%\u00bb button_bg_color_gradient_start=\u00bbrgba(0,0,0,0)\u00bb button_bg_color_gradient_end=\u00bb#001f4c\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb100px\u00bb button_font=\u00bbOverpass|900||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_padding=\u00bb8px|18px|8px|18px|true|true\u00bb box_shadow_style=\u00bbpreset3″ box_shadow_vertical=\u00bb0px\u00bb box_shadow_blur=\u00bb0px\u00bb box_shadow_spread=\u00bb-10px\u00bb box_shadow_color=\u00bbrgba(25,114,255,0.4)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb box_shadow_color__hover=\u00bb#2585b2″ box_shadow_blur__hover_enabled=\u00bbon\u00bb box_shadow_blur__hover=\u00bb40px\u00bb box_shadow_vertical__hover_enabled=\u00bbon\u00bb box_shadow_vertical__hover=\u00bb10px\u00bb]<\/p>\n

[\/et_pb_button][et_pb_text _builder_version=\u00bb4.16″ text_font=\u00bbOverpass|300|||||||\u00bb text_line_height=\u00bb1.8em\u00bb header_4_font=\u00bbOverpass|900|||||||\u00bb header_4_line_height=\u00bb1.4em\u00bb background_layout=\u00bbdark\u00bb max_width=\u00bb400px\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

Centro de Datos Cifrados\u00a0<\/h4>\n

Tus datos se encontrar\u00e1n protegidos en servidores certificados con un alto cifrado.<\/p>\n

[\/et_pb_text][et_pb_button button_url=\u00bb\/contacto\/\u00bb button_text=\u00bbConoce M\u00e1s\u00bb _builder_version=\u00bb4.16″ custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#ffffff\u00bb button_bg_color=\u00bb#01bad3″ button_bg_color_gradient_type=\u00bbcircular\u00bb button_bg_color_gradient_direction=\u00bb140deg\u00bb button_bg_color_gradient_direction_radial=\u00bbtop right\u00bb button_bg_color_gradient_stops=\u00bbrgba(0,0,0,0) 0%|#001f4c 100%\u00bb button_bg_color_gradient_start=\u00bbrgba(0,0,0,0)\u00bb button_bg_color_gradient_end=\u00bb#001f4c\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb100px\u00bb button_font=\u00bbOverpass|900||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_padding=\u00bb8px|18px|8px|18px|true|true\u00bb box_shadow_style=\u00bbpreset3″ box_shadow_vertical=\u00bb0px\u00bb box_shadow_blur=\u00bb0px\u00bb box_shadow_spread=\u00bb-10px\u00bb box_shadow_color=\u00bbrgba(25,114,255,0.4)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb box_shadow_color__hover=\u00bb#2585b2″ box_shadow_blur__hover_enabled=\u00bbon\u00bb box_shadow_blur__hover=\u00bb40px\u00bb box_shadow_vertical__hover_enabled=\u00bbon\u00bb box_shadow_vertical__hover=\u00bb10px\u00bb]<\/p>\n

[\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb2_5,3_5″ disabled_on=\u00bbon|on|on\u00bb _builder_version=\u00bb4.17.4″ _module_preset=\u00bbdefault\u00bb disabled=\u00bbon\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb2_5″ _builder_version=\u00bb4.17.4″ _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.17.4″ _module_preset=\u00bbdefault\u00bb text_font=\u00bb|800|||||||\u00bb header_font=\u00bb|800|||||||\u00bb header_2_font=\u00bb|800|||||||\u00bb header_2_text_color=\u00bb#00b4ff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

Nuestros Partners<\/h2>\n

[\/et_pb_text][et_pb_slider arrows_custom_color=\u00bb#000000″ dot_nav_custom_color=\u00bb#000000″ _builder_version=\u00bb4.17.4″ _module_preset=\u00bbdefault\u00bb header_font=\u00bb|700|||||||\u00bb header_text_color=\u00bb#00b4ff\u00bb background_color=\u00bbRGBA(255,255,255,0)\u00bb custom_button=\u00bbon\u00bb button_icon=\u00bb$||divi||400″ button_alignment=\u00bbright\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_slide heading=\u00bbWatchguard EPD\u00bb image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2022\/06\/watchguard-partner-logo.png\u00bb arrows_custom_color=\u00bb#000000″ _builder_version=\u00bb4.17.4″ _module_preset=\u00bbdefault\u00bb header_level=\u00bbh2″ header_text_color=\u00bb#FFFFFF\u00bb text_orientation=\u00bbcenter\u00bb background_layout=\u00bblight\u00bb global_colors_info=\u00bb{}\u00bb sticky_transition=\u00bbon\u00bb][\/et_pb_slide][et_pb_slide heading=\u00bbJumboCopy\u00bb _builder_version=\u00bb4.17.4″ _module_preset=\u00bbdefault\u00bb header_text_color=\u00bb#FFFFFF\u00bb global_colors_info=\u00bb{}\u00bb sticky_transition=\u00bbon\u00bb][\/et_pb_slide][\/et_pb_slider][\/et_pb_column][et_pb_column type=\u00bb3_5″ _builder_version=\u00bb4.17.4″ _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.17.4″ z_index=\u00bb0″ width=\u00bb100%\u00bb max_width=\u00bbnone\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-04.png\u00bb show_bottom_space=\u00bboff\u00bb force_fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.16″ custom_margin=\u00bb-48vw||-2px\u00bb custom_margin_tablet=\u00bb-50vw||\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|tablet\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

[\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ admin_label=\u00bbSection\u00bb _builder_version=\u00bb4.16″ height=\u00bb233px\u00bb height_tablet=\u00bb500px\u00bb height_phone=\u00bb365px\u00bb height_last_edited=\u00bbon|phone\u00bb bottom_divider_style=\u00bbslant\u00bb bottom_divider_color=\u00bb#f1fafe\u00bb bottom_divider_height=\u00bb40vw\u00bb bottom_divider_flip=\u00bbhorizontal\u00bb bottom_divider_arrangement=\u00bbabove_content\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4″ _builder_version=\u00bb4.16″ global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-07-2.png\u00bb _builder_version=\u00bb4.16″ z_index=\u00bb100″ max_width=\u00bb700px\u00bb custom_margin=\u00bb-40vw|||\u00bb custom_margin_tablet=\u00bb-45vw|||\u00bb custom_margin_phone=\u00bb-50vw|||\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb animation_style=\u00bbzoom\u00bb animation_intensity_zoom=\u00bb5%\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

[\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ admin_label=\u00bbFooter\u00bb _builder_version=\u00bb4.16″ use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_direction_radial=\u00bbtop right\u00bb background_color_gradient_stops=\u00bb#3122b2 0%|#00ffd8 100%\u00bb background_color_gradient_start=\u00bb#3122b2″ background_color_gradient_end=\u00bb#00ffd8″ background_image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-17.png\u00bb z_index=\u00bb10″ overflow-x=\u00bbvisible\u00bb overflow-y=\u00bbvisible\u00bb custom_padding=\u00bb||5vw||false|false\u00bb background_color_gradient_stops_tablet=\u00bb#3122b2 0%|#00ffd8 100%\u00bb background_color_gradient_stops_phone=\u00bb#3122b2 0%|#00ffd8 100%\u00bb global_module=\u00bb422″ saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb2_5,3_5″ make_equal=\u00bbon\u00bb _builder_version=\u00bb4.16″ background_color=\u00bb#ffffff\u00bb custom_margin=\u00bb-146px|auto|-2px|auto||\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb||45px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb0px||0px||true\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1″ box_shadow_vertical=\u00bb40px\u00bb box_shadow_blur=\u00bb60px\u00bb box_shadow_spread=\u00bb-8px\u00bb box_shadow_color=\u00bbrgba(10,45,97,0.48)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb2_5″ _builder_version=\u00bb4.16″ custom_padding=\u00bb60px|40px|60px|40px|true|true\u00bb custom_padding_tablet=\u00bb||0px||false|true\u00bb custom_padding_phone=\u00bb\u00bb custom_padding_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.16″ header_2_font=\u00bbOverpass|900|||||||\u00bb header_2_font_size=\u00bb45px\u00bb header_2_line_height=\u00bb1.1em\u00bb custom_margin_tablet=\u00bb-15px||15px||false|false\u00bb custom_margin_phone=\u00bb||5px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb||0px||false|false\u00bb custom_padding_last_edited=\u00bbon|phone\u00bb header_2_font_size_tablet=\u00bb38px\u00bb header_2_font_size_phone=\u00bb26px\u00bb header_2_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

Cont\u00e1ctanos<\/h2>\n

[\/et_pb_text][et_pb_blurb title=\u00bb+58 426 536 8969″ use_icon=\u00bbon\u00bb font_icon=\u00bb||divi||400″ icon_color=\u00bb#006ac1″ icon_placement=\u00bbleft\u00bb image_icon_width=\u00bb24px\u00bb _builder_version=\u00bb4.17.4″ header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb custom_margin=\u00bb||10px||false|false\u00bb custom_margin_tablet=\u00bb||5px||false|false\u00bb custom_margin_phone=\u00bb||5px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb icon_font_size=\u00bb24px\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_blurb][et_pb_blurb title=\u00bb+34 651 088 972″ use_icon=\u00bbon\u00bb font_icon=\u00bb||divi||400″ icon_color=\u00bb#006ac1″ icon_placement=\u00bbleft\u00bb image_icon_width=\u00bb24px\u00bb _builder_version=\u00bb4.17.4″ header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb custom_margin=\u00bb||10px||false|false\u00bb custom_margin_tablet=\u00bb||5px||false|false\u00bb custom_margin_phone=\u00bb||5px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb icon_font_size=\u00bb24px\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_blurb][et_pb_blurb title=\u00bbVenezuela – Espa\u00f1a\u00bb use_icon=\u00bbon\u00bb font_icon=\u00bb||divi||400″ icon_color=\u00bb#006ac1″ icon_placement=\u00bbleft\u00bb image_icon_width=\u00bb24px\u00bb _builder_version=\u00bb4.16″ header_font=\u00bbOverpass|900|||||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb custom_margin=\u00bb||10px||false|false\u00bb custom_margin_tablet=\u00bb||-25px||false|false\u00bb custom_margin_phone=\u00bb||5px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb||0px||false|false\u00bb icon_font_size=\u00bb24px\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

Lunes-Viernes: 8am – 5pm<\/p>\n

[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb3_5″ _builder_version=\u00bb4.15″ use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_direction_radial=\u00bbtop right\u00bb background_color_gradient_stops=\u00bb#00f6ff 0%|#00ffbf 100%\u00bb background_color_gradient_start=\u00bb#00f6ff\u00bb background_color_gradient_end=\u00bb#00ffbf\u00bb background_image=\u00bbhttps:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2020\/01\/cyber-security-010-1.png\u00bb background_size=\u00bbcontain\u00bb background_position=\u00bbbottom_left\u00bb transform_translate_linked=\u00bboff\u00bb custom_padding=\u00bb60px|40px|60px|20%|true\u00bb custom_padding_tablet=\u00bb80px|||40px\u00bb custom_padding_phone=\u00bb\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb background_last_edited=\u00bbon|desktop\u00bb background_image_tablet=\u00bbhttp:\/\/zaib.sandbox.etdevs.com\/divi\/wp-content\/uploads\/sites\/2\/2019\/06\/cyber-security-11.png\u00bb background_enable_image_tablet=\u00bbon\u00bb background_position_tablet=\u00bbtop_left\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.16″ text_font=\u00bb||||||||\u00bb header_text_color=\u00bb#ffffff\u00bb header_2_font=\u00bbOverpass|900|||||||\u00bb header_2_text_color=\u00bb#ffffff\u00bb header_2_font_size=\u00bb56px\u00bb header_2_line_height=\u00bb1.1em\u00bb text_orientation=\u00bbcenter\u00bb custom_margin_tablet=\u00bb||10px||false|false\u00bb custom_margin_phone=\u00bb-20px||5px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding_tablet=\u00bb||0px||false|false\u00bb custom_padding_phone=\u00bb||0px||false|false\u00bb custom_padding_last_edited=\u00bbon|phone\u00bb header_2_font_size_tablet=\u00bb38px\u00bb header_2_font_size_phone=\u00bb30px\u00bb header_2_font_size_last_edited=\u00bbon|desktop\u00bb text_text_align=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

Empecemos<\/h2>\n

[\/et_pb_text][et_pb_text _builder_version=\u00bb4.16″ text_font=\u00bbOverpass|300|||||||\u00bb text_text_color=\u00bb#0a2d61″ text_font_size=\u00bb17px\u00bb text_orientation=\u00bbcenter\u00bb custom_padding_tablet=\u00bb|75px||75px|false|true\u00bb custom_padding_phone=\u00bb|0px||0px|false|true\u00bb custom_padding_last_edited=\u00bbon|tablet\u00bb text_font_size_tablet=\u00bb\u00bb text_font_size_phone=\u00bb14px\u00bb text_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n

Nuestro equipo est\u00e1 siempre dispuesto a atenderte y responderte a la brevedad<\/p>\n

[\/et_pb_text][et_pb_button button_url=\u00bb\/contacto\/\u00bb button_text=\u00bbCONTACTO\u00bb button_alignment=\u00bbcenter\u00bb _builder_version=\u00bb4.3.2″ custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#ffffff\u00bb button_bg_use_color_gradient=\u00bbon\u00bb button_bg_color_gradient_type=\u00bbcircular\u00bb button_bg_color_gradient_direction=\u00bb140deg\u00bb button_bg_color_gradient_direction_radial=\u00bbtop right\u00bb button_bg_color_gradient_stops=\u00bb#003070 0%|#001f4c 100%\u00bb button_bg_color_gradient_start=\u00bb#003070″ button_bg_color_gradient_end=\u00bb#001f4c\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb100px\u00bb button_font=\u00bbOverpass|900||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb||-30px||false|false\u00bb custom_padding=\u00bb16px|30px|16px|30px|true|true\u00bb box_shadow_style=\u00bbpreset3″ box_shadow_vertical=\u00bb0px\u00bb box_shadow_blur=\u00bb0px\u00bb box_shadow_spread=\u00bb-10px\u00bb box_shadow_color=\u00bbrgba(25,114,255,0.4)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb box_shadow_color__hover=\u00bb#2585b2″ box_shadow_blur__hover_enabled=\u00bbon\u00bb box_shadow_blur__hover=\u00bb40px\u00bb box_shadow_vertical__hover_enabled=\u00bbon\u00bb box_shadow_vertical__hover=\u00bb10px\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

Soluciones de CiberseguridadSomos integradores de distintas soluciones de seguridad del mercado ofreciendo protecci\u00f3n\u00a0frente a los cada vez m\u00e1s complejos ataques cibern\u00e9ticos que encontramos en la actualidad. Ofrecemos soluciones de seguridad basadas en inteligencia artificial que garanticen una protecci\u00f3n avanzada contra malware, virus\u00a0 y ransomware.\u00a0Te ofrecemos una soluci\u00f3n global de seguridad mediante el an\u00e1lisis de tus […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false},"yoast_head":"\nInicio - ProDigital Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/prodigitalsecurity.com\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Inicio - ProDigital Security\" \/>\n<meta property=\"og:description\" content=\"Soluciones de CiberseguridadSomos integradores de distintas soluciones de seguridad del mercado ofreciendo protecci\u00f3n\u00a0frente a los cada vez m\u00e1s complejos ataques cibern\u00e9ticos que encontramos en la actualidad. Ofrecemos soluciones de seguridad basadas en inteligencia artificial que garanticen una protecci\u00f3n avanzada contra malware, virus\u00a0 y ransomware.\u00a0Te ofrecemos una soluci\u00f3n global de seguridad mediante el an\u00e1lisis de tus […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/prodigitalsecurity.com\/\" \/>\n<meta property=\"og:site_name\" content=\"ProDigital Security\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-24T11:18:28+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/prodigitalsecurity.com\/\",\"url\":\"https:\/\/prodigitalsecurity.com\/\",\"name\":\"Inicio - ProDigital Security\",\"isPartOf\":{\"@id\":\"https:\/\/prodigitalsecurity.com\/#website\"},\"datePublished\":\"2020-01-23T14:34:03+00:00\",\"dateModified\":\"2023-02-24T11:18:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/prodigitalsecurity.com\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/prodigitalsecurity.com\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/prodigitalsecurity.com\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/prodigitalsecurity.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Inicio\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/prodigitalsecurity.com\/#website\",\"url\":\"https:\/\/prodigitalsecurity.com\/\",\"name\":\"ProDigital Security\",\"description\":\"Equipo de Ciberseguridad Avanzado\",\"publisher\":{\"@id\":\"https:\/\/prodigitalsecurity.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/prodigitalsecurity.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/prodigitalsecurity.com\/#organization\",\"name\":\"ProDigital Security\",\"url\":\"https:\/\/prodigitalsecurity.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/prodigitalsecurity.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2023\/02\/Logotipo-PRO-Digital-Security.png\",\"contentUrl\":\"https:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2023\/02\/Logotipo-PRO-Digital-Security.png\",\"width\":150,\"height\":40,\"caption\":\"ProDigital Security\"},\"image\":{\"@id\":\"https:\/\/prodigitalsecurity.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Inicio - ProDigital Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/prodigitalsecurity.com\/","og_locale":"es_ES","og_type":"article","og_title":"Inicio - ProDigital Security","og_description":"Soluciones de CiberseguridadSomos integradores de distintas soluciones de seguridad del mercado ofreciendo protecci\u00f3n\u00a0frente a los cada vez m\u00e1s complejos ataques cibern\u00e9ticos que encontramos en la actualidad. Ofrecemos soluciones de seguridad basadas en inteligencia artificial que garanticen una protecci\u00f3n avanzada contra malware, virus\u00a0 y ransomware.\u00a0Te ofrecemos una soluci\u00f3n global de seguridad mediante el an\u00e1lisis de tus […]","og_url":"https:\/\/prodigitalsecurity.com\/","og_site_name":"ProDigital Security","article_modified_time":"2023-02-24T11:18:28+00:00","twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"8 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/prodigitalsecurity.com\/","url":"https:\/\/prodigitalsecurity.com\/","name":"Inicio - ProDigital Security","isPartOf":{"@id":"https:\/\/prodigitalsecurity.com\/#website"},"datePublished":"2020-01-23T14:34:03+00:00","dateModified":"2023-02-24T11:18:28+00:00","breadcrumb":{"@id":"https:\/\/prodigitalsecurity.com\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/prodigitalsecurity.com\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/prodigitalsecurity.com\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/prodigitalsecurity.com\/"},{"@type":"ListItem","position":2,"name":"Inicio"}]},{"@type":"WebSite","@id":"https:\/\/prodigitalsecurity.com\/#website","url":"https:\/\/prodigitalsecurity.com\/","name":"ProDigital Security","description":"Equipo de Ciberseguridad Avanzado","publisher":{"@id":"https:\/\/prodigitalsecurity.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/prodigitalsecurity.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/prodigitalsecurity.com\/#organization","name":"ProDigital Security","url":"https:\/\/prodigitalsecurity.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/prodigitalsecurity.com\/#\/schema\/logo\/image\/","url":"https:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2023\/02\/Logotipo-PRO-Digital-Security.png","contentUrl":"https:\/\/prodigitalsecurity.com\/wp-content\/uploads\/2023\/02\/Logotipo-PRO-Digital-Security.png","width":150,"height":40,"caption":"ProDigital Security"},"image":{"@id":"https:\/\/prodigitalsecurity.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/prodigitalsecurity.com\/wp-json\/wp\/v2\/pages\/17"}],"collection":[{"href":"https:\/\/prodigitalsecurity.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/prodigitalsecurity.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/prodigitalsecurity.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/prodigitalsecurity.com\/wp-json\/wp\/v2\/comments?post=17"}],"version-history":[{"count":10,"href":"https:\/\/prodigitalsecurity.com\/wp-json\/wp\/v2\/pages\/17\/revisions"}],"predecessor-version":[{"id":1482,"href":"https:\/\/prodigitalsecurity.com\/wp-json\/wp\/v2\/pages\/17\/revisions\/1482"}],"wp:attachment":[{"href":"https:\/\/prodigitalsecurity.com\/wp-json\/wp\/v2\/media?parent=17"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}