{"id":27038,"date":"2016-04-17T22:00:00","date_gmt":"2016-04-17T20:00:00","guid":{"rendered":"https:\/\/entelgy.com\/ciberseguridad-innovacion\/"},"modified":"2024-11-06T23:44:03","modified_gmt":"2024-11-06T22:44:03","slug":"ciberseguridad-innovacion","status":"publish","type":"post","link":"https:\/\/entelgy.com\/pt-br\/sin-categoria\/ciberseguridad-innovacion\/","title":{"rendered":"Ciberseguridad: Innovaci\u00f3n y Desarrollo Propio"},"content":{"rendered":"<img fetchpriority=\"high\" decoding=\"async\" class=\" size-full wp-image-27035\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2016\/04\/671a36f83857969bb089544f1d0f6a6d.jpg\" alt=\"\" class=\"caption\" title=\"Ciberseguridad: Innovaci\u00f3n y Desarrollo Propio\" width=\"400\" height=\"299\" srcset=\"https:\/\/entelgy.com\/wp-content\/uploads\/2016\/04\/671a36f83857969bb089544f1d0f6a6d.jpg 400w, https:\/\/entelgy.com\/wp-content\/uploads\/2016\/04\/671a36f83857969bb089544f1d0f6a6d-300x224.jpg 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>\n<div class=\"post_wp\">\n<h1 ><span >Destacamos en este post sobre Innovaci\u00f3n las <span ><strong>Herramientas de Ciberseguridad<\/strong><\/span> que en colaboraci\u00f3n con el <span ><strong>CCN<\/strong><\/span> (Centro Criptol\u00f3gico Nacional) se han desarrollado para garantizar la seguridad de los sistemas y su gesti\u00f3n, permitiendo una mejor defensa frente a los ciberataques.<\/span><\/h1>\n<p>&nbsp;<\/p>\n<p ><span ><strong><\/p>\n<div class=\"clearfix box grey rounded\"><\/strong><\/span><\/p>\n<blockquote>\n<p ><span ><strong><a href=\"\/actualidad\/ciberseguridad-innovacion\/ciberseguridad-reyes\/\" target=\"_blank\" rel=\"attachment wp-att-18044 noopener\"><img decoding=\"async\" class=\"wp-image-18044 size-full alignleft\" title=\"Ciberseguridad - Reyes\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2016\/04\/Ciberseguridad-Reyes.jpg\" alt=\"Ciberseguridad - Reyes\" width=\"208\" height=\"59\" \/><\/a>REpositorio com\u00fan Y EStructurado de amenazas y c\u00f3digo da\u00f1ino<\/strong><\/span> es una herramienta desarrollada en colaboraci\u00f3n con el <span ><strong>CCN<\/strong><\/span> en la implantaci\u00f3n de este <span ><strong>sistema de intercambio de informaci\u00f3n y conocimiento<\/strong><\/span> sobre ciberamenazas.<\/p>\n<p ><em>Puesta en marcha a finales de 2015, actualmente pueden solicitar acceso a REYES aquellos organismos que est\u00e9n dados de alta en el Sistema de Alerta Temprana. <\/em><\/p>\n<\/blockquote>\n<p ><\/div>\n<\/p>\n<p ><span ><strong><\/p>\n<div class=\"clearfix box grey rounded\"><\/strong><\/span><\/p>\n<blockquote>\n<p ><span ><strong><a href=\"\/actualidad\/ciberseguridad-innovacion\/ciberseguridad-marta\/\" target=\"_blank\" rel=\"attachment wp-att-18045 noopener\"><img decoding=\"async\" class=\"alignleft wp-image-18045 size-full\" title=\"Ciberseguridad - Marta\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2016\/04\/Ciberseguridad-Marta.jpg\" alt=\"Ciberseguridad - Marta\" width=\"209\" height=\"59\" \/><\/a>Motor de An\u00e1lisis Remoto de Troyanos Avanzados<\/strong><\/span><\/p>\n<p >Herramienta desarrollada por <span ><strong>InnoTec<\/strong><\/span> para el Centro Criptol\u00f3gico Nacional (<span ><strong>CCN<\/strong><\/span>) que permite el an\u00e1lisis avanzado de malware: la detecci\u00f3n temprana de c\u00f3digo da\u00f1ino, el an\u00e1lisis y clasificaci\u00f3n de las amenazas de forma autom\u00e1tica a trav\u00e9s de su motor inteligente y la generaci\u00f3n de informes personalizados y detallados.<\/p>\n<p ><em>Esta herramienta se encuentra en fase de desarrollo y se implantar\u00e1 en 2016.<\/em><\/p>\n<p ><\/div>\n<\/p>\n<\/blockquote>\n<p ><strong><a href=\"\/actualidad\/ciberseguridad-innovacion\/ciberseguridad_innovacion-y-darrrollo-propio-2\/\" target=\"_blank\" rel=\"attachment wp-att-18061 noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18061 size-full\" title=\"Ciberseguridad: Innovaci\u00f3n y Desarrrollo Propio\" src=\"\/media\/k2\/items\/src\/Entelgy\/2016\/04\/Ciberseguridad_Innovaci\u00f3n-y-Darrrollo-Propio-1.jpg\" alt=\"Ciberseguridad: Innovaci\u00f3n y Desarrrollo Propio\" width=\"400\" height=\"299\" \/><\/a>M\u00e1s informaci\u00f3n en nuestra web: <\/strong><a href=\"https:\/\/www.entelgy.com\/oferta-diferencial\/areas-de-especializacion\/security-risk-management\/innovacion-y-desarrollo-propio\/\" target=\"_blank\" rel=\"noopener\"><strong>Entelgy: Innovaci\u00f3n y Desarrollo Propio<\/strong><\/a><\/p>\n<p ><strong>Tambi\u00e9n en nuestro blog<\/strong>:<\/p>\n<ul>\n<li ><a href=\"\/actualidad\/entelgy-innovadora-oferta-cybersecurity-intelligence\/\" target=\"_blank\" rel=\"noopener\">Entelgy: Innovadora Oferta en Cybersecurity Intelligence<\/a><\/li>\n<\/ul>\n<\/div>\n<p><!--more--><\/p>\n<div class=\"post_wp\">\n<h1 ><span >Destacamos en este post sobre Innovaci\u00f3n las <span ><strong>Herramientas de Ciberseguridad<\/strong><\/span> que en colaboraci\u00f3n con el <span ><strong>CCN<\/strong><\/span> (Centro Criptol\u00f3gico Nacional) se han desarrollado para garantizar la seguridad de los sistemas y su gesti\u00f3n, permitiendo una mejor defensa frente a los ciberataques.<\/span><\/h1>\n<p>&nbsp;<\/p>\n<p ><span ><strong><\/p>\n<div class=\"clearfix box grey rounded\"><\/strong><\/span><\/p>\n<blockquote>\n<p ><span ><strong><a href=\"\/actualidad\/ciberseguridad-innovacion\/ciberseguridad-reyes\/\" target=\"_blank\" rel=\"attachment wp-att-18044 noopener\"><img decoding=\"async\" class=\"wp-image-18044 size-full alignleft\" title=\"Ciberseguridad - Reyes\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2016\/04\/Ciberseguridad-Reyes.jpg\" alt=\"Ciberseguridad - Reyes\" width=\"208\" height=\"59\" \/><\/a>REpositorio com\u00fan Y EStructurado de amenazas y c\u00f3digo da\u00f1ino<\/strong><\/span> es una herramienta desarrollada en colaboraci\u00f3n con el <span ><strong>CCN<\/strong><\/span> en la implantaci\u00f3n de este <span ><strong>sistema de intercambio de informaci\u00f3n y conocimiento<\/strong><\/span> sobre ciberamenazas.<\/p>\n<p ><em>Puesta en marcha a finales de 2015, actualmente pueden solicitar acceso a REYES aquellos organismos que est\u00e9n dados de alta en el Sistema de Alerta Temprana. <\/em><\/p>\n<\/blockquote>\n<p ><\/div>\n<\/p>\n<p ><span ><strong><\/p>\n<div class=\"clearfix box grey rounded\"><\/strong><\/span><\/p>\n<blockquote>\n<p ><span ><strong><a href=\"\/actualidad\/ciberseguridad-innovacion\/ciberseguridad-marta\/\" target=\"_blank\" rel=\"attachment wp-att-18045 noopener\"><img decoding=\"async\" class=\"alignleft wp-image-18045 size-full\" title=\"Ciberseguridad - Marta\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2016\/04\/Ciberseguridad-Marta.jpg\" alt=\"Ciberseguridad - Marta\" width=\"209\" height=\"59\" \/><\/a>Motor de An\u00e1lisis Remoto de Troyanos Avanzados<\/strong><\/span><\/p>\n<p >Herramienta desarrollada por <span ><strong>InnoTec<\/strong><\/span> para el Centro Criptol\u00f3gico Nacional (<span ><strong>CCN<\/strong><\/span>) que permite el an\u00e1lisis avanzado de malware: la detecci\u00f3n temprana de c\u00f3digo da\u00f1ino, el an\u00e1lisis y clasificaci\u00f3n de las amenazas de forma autom\u00e1tica a trav\u00e9s de su motor inteligente y la generaci\u00f3n de informes personalizados y detallados.<\/p>\n<p ><em>Esta herramienta se encuentra en fase de desarrollo y se implantar\u00e1 en 2016.<\/em><\/p>\n<p ><\/div>\n<\/p>\n<\/blockquote>\n<p ><strong><a href=\"\/actualidad\/ciberseguridad-innovacion\/ciberseguridad_innovacion-y-darrrollo-propio-2\/\" target=\"_blank\" rel=\"attachment wp-att-18061 noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18061 size-full\" title=\"Ciberseguridad: Innovaci\u00f3n y Desarrrollo Propio\" src=\"\/media\/k2\/items\/src\/Entelgy\/2016\/04\/Ciberseguridad_Innovaci\u00f3n-y-Darrrollo-Propio-1.jpg\" alt=\"Ciberseguridad: Innovaci\u00f3n y Desarrrollo Propio\" width=\"400\" height=\"299\" \/><\/a>M\u00e1s informaci\u00f3n en nuestra web: <\/strong><a href=\"https:\/\/www.entelgy.com\/oferta-diferencial\/areas-de-especializacion\/security-risk-management\/innovacion-y-desarrollo-propio\/\" target=\"_blank\" rel=\"noopener\"><strong>Entelgy: Innovaci\u00f3n y Desarrollo Propio<\/strong><\/a><\/p>\n<p ><strong>Tambi\u00e9n en nuestro blog<\/strong>:<\/p>\n<ul>\n<li ><a href=\"\/actualidad\/entelgy-innovadora-oferta-cybersecurity-intelligence\/\" target=\"_blank\" rel=\"noopener\">Entelgy: Innovadora Oferta en Cybersecurity Intelligence<\/a><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Destacamos en este post sobre Innovaci\u00f3n las Herramientas de Ciberseguridad que en colaboraci\u00f3n con el CCN (Centro Criptol\u00f3gico Nacional) se [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":27035,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[21],"tags":[5261],"class_list":["post-27038","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sin-categoria","tag-ciberseguridad-es"],"acf":[],"_links":{"self":[{"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/posts\/27038","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/comments?post=27038"}],"version-history":[{"count":0,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/posts\/27038\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/media\/27035"}],"wp:attachment":[{"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/media?parent=27038"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/categories?post=27038"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/tags?post=27038"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}