{"id":27041,"date":"2016-04-14T22:00:00","date_gmt":"2016-04-14T20:00:00","guid":{"rendered":"https:\/\/entelgy.com\/entelgy-cybersecurity-intelligence\/"},"modified":"2024-11-06T23:44:04","modified_gmt":"2024-11-06T22:44:04","slug":"entelgy-cybersecurity-intelligence","status":"publish","type":"post","link":"https:\/\/entelgy.com\/en\/sin-categoria\/entelgy-cybersecurity-intelligence\/","title":{"rendered":"Entelgy: Innovadora Oferta en Cybersecurity Intelligence"},"content":{"rendered":"<img fetchpriority=\"high\" decoding=\"async\" class=\" size-full wp-image-27039\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2016\/04\/1eb0236ad91dc3d393cb81b1a197a6ee.jpg\" alt=\"\" class=\"caption\" title=\"Entelgy: Innovadora Oferta en Cybersecurity Intelligence\" width=\"334\" height=\"474\" srcset=\"https:\/\/entelgy.com\/wp-content\/uploads\/2016\/04\/1eb0236ad91dc3d393cb81b1a197a6ee.jpg 334w, https:\/\/entelgy.com\/wp-content\/uploads\/2016\/04\/1eb0236ad91dc3d393cb81b1a197a6ee-211x300.jpg 211w\" sizes=\"(max-width: 334px) 100vw, 334px\" \/>\n<div class=\"post_wp\">\n<h1 ><span ><a href=\"\/actualidad\/entelgy-innovadora-oferta-cybersecurity-intelligence\/cybersecurity-intelligence-imagen-1\/\" target=\"_blank\" rel=\"attachment wp-att-18030 noopener\"><img decoding=\"async\" class=\"alignright wp-image-18030 size-full\" title=\"Cybersecurity Intelligence\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2016\/04\/Cybersecurity-Intelligence-Imagen-1-e1460627532964.jpg\" alt=\"Cybersecurity Intelligence\" width=\"250\" height=\"621\" \/><\/a>Nuevo Cat\u00e1logo <strong>\u201cCybersecurity Intelligence\u201d<\/strong> con nuestra oferta en Ciberseguridad y las capacidades de <strong><span >Entelgy<\/span><\/strong> como empresa de Innovaci\u00f3n IT.<\/span><\/h1>\n<ul >\n<li >M\u00e1s de <span ><strong>350 profesionales altamente cualificado<span >s<\/span><\/strong><\/span>.<\/li>\n<li >Nuestra experiencia y dedicaci\u00f3n viene avalada por <span ><strong>m\u00e1s de 250 clientes<\/strong><\/span>, entre los que se encuentran organismos p\u00fablicos y el 80% de las principales empresas espa\u00f1olas.<\/li>\n<li >Nuestra esencia reside en la b\u00fasqueda constante de la <strong><span >excelencia<\/span><\/strong> y la <span ><strong>m\u00e1xima productividad<\/strong><\/span>.<br \/>\nDisponemos de una amplia cartera de productos y herramientas desarrolladas en nuestro \u00e1rea de I+D+i.<\/li>\n<li >Mantenemos <span ><strong>acuerdos de colaboraci\u00f3n con los principales fabricantes del mercad<\/strong><strong>o<\/strong><\/span>, lo que nos garantiza la independencia tecnol\u00f3gica y un soporte de m\u00e1xima calidad.<\/li>\n<\/ul>\n<p >A trav\u00e9s de <span ><strong>InnoTec<\/strong><\/span>, empresa del <strong><span >Grupo Entelgy<\/span><\/strong> especializada en <span ><strong>ciberseguridad<\/strong><\/span>, <span ><strong>inteligencia<\/strong><\/span>, <span ><strong>prevenci\u00f3n<\/strong><\/span> y <span ><strong>gesti\u00f3n de riesgos<\/strong><\/span>, ofrecemos a nuestros clientes una amplia Oferta de Servicios y Soluciones en <em>Cybersecurity<\/em>\u00a0<em>Intelligence<\/em>.<\/p>\n<p ><span ><strong>Para m\u00e1s informaci\u00f3n<\/strong>, <strong><a href=\"https:\/\/www.entelgy.com\/oferta-diferencial\/areas-de-especializacion\/security-risk-management-3\/\" target=\"_blank\" rel=\"noopener\">consulte nuestra web<\/a><\/strong>.<\/span><\/p>\n<p ><strong>Otras noticias relacionadas en nuestro blog<\/strong>:<\/p>\n<ul>\n<li><em><a href=\"https:\/\/entelgy.com\/entelgy-evento-ciberseguridad-colombia\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Intelligence: Entelgy celebra su primer evento de Ciberseguridad en Colombia<\/a><\/em><\/li>\n<li><em><a href=\"https:\/\/entelgy.com\/expansion-publica-la-tribuna-felix-munoz-open-data-ciberseguridad-documentos-abiertos-e-informacion-publica\/\" target=\"_blank\" rel=\"noopener\">Expansi\u00f3n publica la tribuna de F\u00e9lix Mu\u00f1oz sobre Open Data: Ciberseguridad, documentos abiertos e informaci\u00f3n p\u00fablica<\/a><\/em><\/li>\n<li><em><a href=\"https:\/\/entelgy.com\/cuales-seran-las-prioridades-en-materia-de-ciberseguridad-en-2016\/\" target=\"_blank\" rel=\"noopener\">\u00bfCu\u00e1les ser\u00e1n las prioridades en materia de Ciberseguridad en 2016?<\/a><\/em><\/li>\n<\/ul>\n<\/div>\n<p><!--more--><\/p>\n<div class=\"post_wp\">\n<h1 ><span ><a href=\"\/actualidad\/entelgy-innovadora-oferta-cybersecurity-intelligence\/cybersecurity-intelligence-imagen-1\/\" target=\"_blank\" rel=\"attachment wp-att-18030 noopener\"><img decoding=\"async\" class=\"alignright wp-image-18030 size-full\" title=\"Cybersecurity Intelligence\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2016\/04\/Cybersecurity-Intelligence-Imagen-1-e1460627532964.jpg\" alt=\"Cybersecurity Intelligence\" width=\"250\" height=\"621\" \/><\/a>Nuevo Cat\u00e1logo <strong>\u201cCybersecurity Intelligence\u201d<\/strong> con nuestra oferta en Ciberseguridad y las capacidades de <strong><span >Entelgy<\/span><\/strong> como empresa de Innovaci\u00f3n IT.<\/span><\/h1>\n<ul >\n<li >M\u00e1s de <span ><strong>350 profesionales altamente cualificado<span >s<\/span><\/strong><\/span>.<\/li>\n<li >Nuestra experiencia y dedicaci\u00f3n viene avalada por <span ><strong>m\u00e1s de 250 clientes<\/strong><\/span>, entre los que se encuentran organismos p\u00fablicos y el 80% de las principales empresas espa\u00f1olas.<\/li>\n<li >Nuestra esencia reside en la b\u00fasqueda constante de la <strong><span >excelencia<\/span><\/strong> y la <span ><strong>m\u00e1xima productividad<\/strong><\/span>.<br \/>\nDisponemos de una amplia cartera de productos y herramientas desarrolladas en nuestro \u00e1rea de I+D+i.<\/li>\n<li >Mantenemos <span ><strong>acuerdos de colaboraci\u00f3n con los principales fabricantes del mercad<\/strong><strong>o<\/strong><\/span>, lo que nos garantiza la independencia tecnol\u00f3gica y un soporte de m\u00e1xima calidad.<\/li>\n<\/ul>\n<p >A trav\u00e9s de <span ><strong>InnoTec<\/strong><\/span>, empresa del <strong><span >Grupo Entelgy<\/span><\/strong> especializada en <span ><strong>ciberseguridad<\/strong><\/span>, <span ><strong>inteligencia<\/strong><\/span>, <span ><strong>prevenci\u00f3n<\/strong><\/span> y <span ><strong>gesti\u00f3n de riesgos<\/strong><\/span>, ofrecemos a nuestros clientes una amplia Oferta de Servicios y Soluciones en <em>Cybersecurity<\/em>\u00a0<em>Intelligence<\/em>.<\/p>\n<p ><span ><strong>Para m\u00e1s informaci\u00f3n<\/strong>, <strong><a href=\"https:\/\/www.entelgy.com\/oferta-diferencial\/areas-de-especializacion\/security-risk-management-3\/\" target=\"_blank\" rel=\"noopener\">consulte nuestra web<\/a><\/strong>.<\/span><\/p>\n<p ><strong>Otras noticias relacionadas en nuestro blog<\/strong>:<\/p>\n<ul>\n<li><em><a href=\"https:\/\/entelgy.com\/entelgy-evento-ciberseguridad-colombia\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Intelligence: Entelgy celebra su primer evento de Ciberseguridad en Colombia<\/a><\/em><\/li>\n<li><em><a href=\"https:\/\/entelgy.com\/expansion-publica-la-tribuna-felix-munoz-open-data-ciberseguridad-documentos-abiertos-e-informacion-publica\/\" target=\"_blank\" rel=\"noopener\">Expansi\u00f3n publica la tribuna de F\u00e9lix Mu\u00f1oz sobre Open Data: Ciberseguridad, documentos abiertos e informaci\u00f3n p\u00fablica<\/a><\/em><\/li>\n<li><em><a href=\"https:\/\/entelgy.com\/cuales-seran-las-prioridades-en-materia-de-ciberseguridad-en-2016\/\" target=\"_blank\" rel=\"noopener\">\u00bfCu\u00e1les ser\u00e1n las prioridades en materia de Ciberseguridad en 2016?<\/a><\/em><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Nuevo Cat\u00e1logo \u201cCybersecurity Intelligence\u201d con nuestra oferta en Ciberseguridad y las capacidades de Entelgy como empresa de Innovaci\u00f3n IT. M\u00e1s [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":27039,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[21],"tags":[5261,8104],"class_list":["post-27041","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sin-categoria","tag-ciberseguridad-es","tag-cybersecurity-intelligence-es"],"acf":[],"_links":{"self":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts\/27041","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/comments?post=27041"}],"version-history":[{"count":0,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts\/27041\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/media\/27039"}],"wp:attachment":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/media?parent=27041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/categories?post=27041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/tags?post=27041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}