{"id":29100,"date":"2009-03-22T23:00:00","date_gmt":"2009-03-22T22:00:00","guid":{"rendered":"https:\/\/entelgy.com\/entel-en-el-catalogo-de-empresas-y-soluciones-de-seguridad-tic-de-inteco\/"},"modified":"2024-11-06T23:12:19","modified_gmt":"2024-11-06T22:12:19","slug":"entel-en-el-catalogo-de-empresas-y-soluciones-de-seguridad-tic-de-inteco","status":"publish","type":"post","link":"https:\/\/entelgy.com\/pt-br\/actualidad-es\/entel-en-el-catalogo-de-empresas-y-soluciones-de-seguridad-tic-de-inteco\/","title":{"rendered":"Entel en el Cat\u00e1logo de Empresas y Soluciones de Seguridad TIC de Inteco"},"content":{"rendered":"<p><img decoding=\"async\" src=\"media\/k2\/items\/src\/17af8af12bc80985c6eca0cd9ca4f76b.jpg\" alt=\"\" class=\"caption\" title=\"Entel en el Cat\u00e1logo de Empresas y Soluciones de Seguridad TIC de Inteco\" \/><\/p>\n<div class=\"post_wp\">El Instituto Nacional de Tecnolog\u00edas de la Comunicaci\u00f3n del Ministerio de Industria, Comercio y Turismo ha publicado su Cat\u00e1logo de Empresas y Soluciones de Seguridad TIC.<\/p>\n<p><strong>Entel <\/strong>aparece en cat\u00e1logo, en el que se publica la informaci\u00f3n de contacto de las principales empresas que ofrecen <strong>soluciones y servicios en Seguridad TIC<\/strong>.<\/p>\n<p>Estamos referenciados como Consultor Tecnol\u00f3gico y los servicios que ofrecemos son: pol\u00edticas de seguridad, planificaci\u00f3n e implantaci\u00f3n de infraestructuras, gesti\u00f3n de incidentes, detecci\u00f3n de intrusiones, auditor\u00eda t\u00e9cnica, Outsourcing, seguridad gestionada, formaci\u00f3n y cumplimiento normativo.<\/p><\/div>\n<p><!--more--><\/p>\n<div class=\"post_wp\">El Instituto Nacional de Tecnolog\u00edas de la Comunicaci\u00f3n del Ministerio de Industria, Comercio y Turismo ha publicado su Cat\u00e1logo de Empresas y Soluciones de Seguridad TIC.<\/p>\n<p><strong>Entel <\/strong>aparece en cat\u00e1logo, en el que se publica la informaci\u00f3n de contacto de las principales empresas que ofrecen <strong>soluciones y servicios en Seguridad TIC<\/strong>.<\/p>\n<p>Estamos referenciados como Consultor Tecnol\u00f3gico y los servicios que ofrecemos son: pol\u00edticas de seguridad, planificaci\u00f3n e implantaci\u00f3n de infraestructuras, gesti\u00f3n de incidentes, detecci\u00f3n de intrusiones, auditor\u00eda t\u00e9cnica, Outsourcing, seguridad gestionada, formaci\u00f3n y cumplimiento normativo.<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>El Instituto Nacional de Tecnolog\u00edas de la Comunicaci\u00f3n del Ministerio de Industria, Comercio y Turismo ha publicado su Cat\u00e1logo de [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[40,111],"tags":[5261],"class_list":["post-29100","post","type-post","status-publish","format-standard","hentry","category-actualidad-es","category-noticias-corporativas-es","tag-ciberseguridad-es"],"acf":[],"_links":{"self":[{"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/posts\/29100","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/comments?post=29100"}],"version-history":[{"count":0,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/posts\/29100\/revisions"}],"wp:attachment":[{"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/media?parent=29100"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/categories?post=29100"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/tags?post=29100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}