{"id":2726,"date":"2022-07-20T19:48:23","date_gmt":"2022-07-20T17:48:23","guid":{"rendered":"https:\/\/www.citiesanalytics.com\/?page_id=2726"},"modified":"2024-05-10T12:37:45","modified_gmt":"2024-05-10T10:37:45","slug":"gestion-de-vulnerabilidades","status":"publish","type":"page","link":"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/gestion-de-vulnerabilidades\/","title":{"rendered":"Gestion de Vulnerabilidades"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bbrgba(214,214,214,0.89)\u00bb background_image=\u00bbhttps:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/head-Gestion-Vulnerabilidades-Tenable-tiny.png\u00bb background_enable_video_mp4=\u00bboff\u00bb custom_padding=\u00bb||||false|false\u00bb border_radii=\u00bboff|||169px|\u00bb box_shadow_style=\u00bbpreset2&#8243; box_shadow_spread=\u00bb-7px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_fullwidth_slider show_arrows=\u00bboff\u00bb show_pagination=\u00bboff\u00bb use_text_overlay=\u00bboff\u00bb _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bb||||||||\u00bb text_orientation=\u00bbright\u00bb custom_padding=\u00bb126px||143px||false|false\u00bb auto=\u00bbon\u00bb auto_speed=\u00bb2000&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_slide button_link=\u00bbhttps:\/\/www.citiesanalytics.com\/#Soluciones\u00bb use_text_overlay=\u00bboff\u00bb content_tablet=\u00bb<\/p>\n<p style=%22text-align: left;%22>Gesti\u00f3n de vulnerabilidades<br \/>tenable one<\/p>\n<p>\u00bb content_phone=\u00bb<\/p>\n<p style=%22text-align: center;%22>Gesti\u00f3n de vulnerabilidades<br \/>tenable one<\/p>\n<p>\u00bb content_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb header_level=\u00bbh1&#8243; header_font=\u00bb|600|||||||\u00bb body_font=\u00bb||||||||\u00bb body_text_align=\u00bbleft\u00bb body_font_size=\u00bb38px\u00bb body_line_height=\u00bb1.1em\u00bb background_enable_color=\u00bboff\u00bb background_enable_image=\u00bboff\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_bg_color=\u00bb#144f9b\u00bb button_border_width=\u00bb0px\u00bb button_border_color=\u00bb#0C71C3&#8243; button_border_radius=\u00bb30px\u00bb button_font=\u00bb|300|||||||\u00bb button_use_icon=\u00bboff\u00bb button_alignment=\u00bbleft\u00bb custom_padding=\u00bb|21%||14%|false|false\u00bb body_text_align_tablet=\u00bbcenter\u00bb body_text_align_phone=\u00bbcenter\u00bb body_text_align_last_edited=\u00bbon|tablet\u00bb body_font_size_tablet=\u00bb27px\u00bb body_font_size_phone=\u00bb180%\u00bb body_font_size_last_edited=\u00bbon|phone\u00bb background_last_edited=\u00bboff|desktop\u00bb custom_css_slide_description=\u00bbanimation-name: none;\u00bb global_colors_info=\u00bb{}\u00bb button_bg_color__hover_enabled=\u00bbon|hover\u00bb button_bg_color__hover=\u00bbrgba(214,214,214,0.58)\u00bb button_bg_enable_color__hover=\u00bbon\u00bb button_text_color__hover_enabled=\u00bbon|hover\u00bb button_text_color__hover=\u00bb#144f9b\u00bb button_border_color__hover_enabled=\u00bboff|desktop\u00bb button_border_color__hover=\u00bb#FFFFFF\u00bb content__hover_enabled=\u00bboff|desktop\u00bb header_font_size__hover_enabled=\u00bboff|hover\u00bb background__hover_enabled=\u00bboff|desktop\u00bb sticky_transition=\u00bbon\u00bb]<\/p>\n<p style=\"text-align: left;\">Gesti\u00f3n de vulnerabilidades<br \/>tenable one<\/p>\n<p>[\/et_pb_slide][et_pb_slide button_link=\u00bbhttps:\/\/www.citiesanalytics.com\/#Soluciones\u00bb use_text_overlay=\u00bboff\u00bb content_tablet=\u00bb<\/p>\n<p style=%22text-align: left;%22>Gesti\u00f3n de vulnerabilidades<br \/>tenable.sc<\/p>\n<p>\u00bb content_phone=\u00bb<\/p>\n<p style=%22text-align: center;%22>Gesti\u00f3n de vulnerabilidades<br \/>tenable.sc<\/p>\n<p>\u00bb content_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb header_level=\u00bbh1&#8243; header_font=\u00bb|600|||||||\u00bb body_font=\u00bb||||||||\u00bb body_text_align=\u00bbleft\u00bb body_font_size=\u00bb38px\u00bb body_line_height=\u00bb1.1em\u00bb background_enable_color=\u00bboff\u00bb background_enable_image=\u00bboff\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_bg_color=\u00bb#144f9b\u00bb button_border_width=\u00bb0px\u00bb button_border_color=\u00bb#0C71C3&#8243; button_border_radius=\u00bb30px\u00bb button_font=\u00bb|300|||||||\u00bb button_use_icon=\u00bboff\u00bb button_alignment=\u00bbleft\u00bb custom_padding=\u00bb|21%||14%|false|false\u00bb body_text_align_tablet=\u00bbcenter\u00bb body_text_align_phone=\u00bbcenter\u00bb body_text_align_last_edited=\u00bbon|tablet\u00bb body_font_size_tablet=\u00bb27px\u00bb body_font_size_phone=\u00bb180%\u00bb body_font_size_last_edited=\u00bbon|phone\u00bb background_last_edited=\u00bboff|desktop\u00bb custom_css_slide_description=\u00bbanimation-name: none;\u00bb global_colors_info=\u00bb{}\u00bb button_bg_color__hover_enabled=\u00bbon|hover\u00bb button_bg_color__hover=\u00bbrgba(214,214,214,0.58)\u00bb button_bg_enable_color__hover=\u00bbon\u00bb button_text_color__hover_enabled=\u00bbon|hover\u00bb button_text_color__hover=\u00bb#144f9b\u00bb button_border_color__hover_enabled=\u00bboff|desktop\u00bb button_border_color__hover=\u00bb#FFFFFF\u00bb content__hover_enabled=\u00bboff|desktop\u00bb header_font_size__hover_enabled=\u00bboff|hover\u00bb background__hover_enabled=\u00bboff|desktop\u00bb sticky_transition=\u00bbon\u00bb]<\/p>\n<p style=\"text-align: left;\">Gesti\u00f3n de vulnerabilidades<br \/>tenable.sc<\/p>\n<p>[\/et_pb_slide][et_pb_slide button_link=\u00bbhttps:\/\/www.citiesanalytics.com\/#Soluciones\u00bb use_text_overlay=\u00bboff\u00bb content_tablet=\u00bb<\/p>\n<p style=%22text-align: left;%22>Gesti\u00f3n de vulnerabilidades<br \/>tenable.ad<\/p>\n<p>\u00bb content_phone=\u00bb<\/p>\n<p style=%22text-align: center;%22>Gesti\u00f3n de vulnerabilidades<br \/>tenable.ad<\/p>\n<p>\u00bb content_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb header_level=\u00bbh1&#8243; header_font=\u00bb|600|||||||\u00bb body_font=\u00bb||||||||\u00bb body_text_align=\u00bbleft\u00bb body_font_size=\u00bb38px\u00bb body_line_height=\u00bb1.1em\u00bb background_enable_color=\u00bboff\u00bb background_enable_image=\u00bboff\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_bg_color=\u00bb#144f9b\u00bb button_border_width=\u00bb0px\u00bb button_border_color=\u00bb#0C71C3&#8243; button_border_radius=\u00bb30px\u00bb button_font=\u00bb|300|||||||\u00bb button_use_icon=\u00bboff\u00bb button_alignment=\u00bbleft\u00bb custom_padding=\u00bb|21%||14%|false|false\u00bb body_text_align_tablet=\u00bbcenter\u00bb body_text_align_phone=\u00bbcenter\u00bb body_text_align_last_edited=\u00bbon|tablet\u00bb body_font_size_tablet=\u00bb27px\u00bb body_font_size_phone=\u00bb180%\u00bb body_font_size_last_edited=\u00bbon|phone\u00bb background_last_edited=\u00bboff|desktop\u00bb custom_css_slide_description=\u00bbanimation-name: none;\u00bb global_colors_info=\u00bb{}\u00bb button_bg_color__hover_enabled=\u00bbon|hover\u00bb button_bg_color__hover=\u00bbrgba(214,214,214,0.58)\u00bb button_bg_enable_color__hover=\u00bbon\u00bb button_text_color__hover_enabled=\u00bbon|hover\u00bb button_text_color__hover=\u00bb#144f9b\u00bb button_border_color__hover_enabled=\u00bboff|desktop\u00bb button_border_color__hover=\u00bb#FFFFFF\u00bb content__hover_enabled=\u00bboff|desktop\u00bb header_font_size__hover_enabled=\u00bboff|hover\u00bb background__hover_enabled=\u00bboff|desktop\u00bb sticky_transition=\u00bbon\u00bb]<\/p>\n<p style=\"text-align: left;\">Gesti\u00f3n de vulnerabilidades<br \/>tenable.ad<\/p>\n<p>[\/et_pb_slide][et_pb_slide button_link=\u00bbhttps:\/\/www.citiesanalytics.com\/#Soluciones\u00bb use_text_overlay=\u00bboff\u00bb content_tablet=\u00bb<\/p>\n<p style=%22text-align: left;%22>Gesti\u00f3n de vulnerabilidades<br \/>tenable.io<\/p>\n<p>\u00bb content_phone=\u00bb<\/p>\n<p style=%22text-align: center;%22>Gesti\u00f3n de vulnerabilidades<br \/>tenable.io<\/p>\n<p>\u00bb content_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb header_level=\u00bbh1&#8243; header_font=\u00bb|600|||||||\u00bb body_font=\u00bb||||||||\u00bb body_text_align=\u00bbleft\u00bb body_font_size=\u00bb38px\u00bb body_line_height=\u00bb1.1em\u00bb background_enable_color=\u00bboff\u00bb background_enable_image=\u00bboff\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_bg_color=\u00bb#144f9b\u00bb button_border_width=\u00bb0px\u00bb button_border_color=\u00bb#0C71C3&#8243; button_border_radius=\u00bb30px\u00bb button_font=\u00bb|300|||||||\u00bb button_use_icon=\u00bboff\u00bb button_alignment=\u00bbleft\u00bb custom_padding=\u00bb|21%||14%|false|false\u00bb body_text_align_tablet=\u00bbcenter\u00bb body_text_align_phone=\u00bbcenter\u00bb body_text_align_last_edited=\u00bbon|tablet\u00bb body_font_size_tablet=\u00bb27px\u00bb body_font_size_phone=\u00bb180%\u00bb body_font_size_last_edited=\u00bbon|phone\u00bb background_last_edited=\u00bboff|desktop\u00bb custom_css_slide_description=\u00bbanimation-name: none;\u00bb global_colors_info=\u00bb{}\u00bb button_bg_color__hover_enabled=\u00bbon|hover\u00bb button_bg_color__hover=\u00bbrgba(214,214,214,0.58)\u00bb button_bg_enable_color__hover=\u00bbon\u00bb button_text_color__hover_enabled=\u00bbon|hover\u00bb button_text_color__hover=\u00bb#144f9b\u00bb button_border_color__hover_enabled=\u00bboff|desktop\u00bb button_border_color__hover=\u00bb#FFFFFF\u00bb content__hover_enabled=\u00bboff|desktop\u00bb header_font_size__hover_enabled=\u00bboff|hover\u00bb background__hover_enabled=\u00bboff|desktop\u00bb sticky_transition=\u00bbon\u00bb]<\/p>\n<p style=\"text-align: left;\">Gesti\u00f3n de vulnerabilidades<br \/>tenable.io<\/p>\n<p>[\/et_pb_slide][\/et_pb_fullwidth_slider][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.17.6&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb5px||10px||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb||2px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb|||\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][lwp_divi_breadcrumbs use_before_icon=\u00bboff\u00bb _builder_version=\u00bb4.18.1&#8243; _module_preset=\u00bbdefault\u00bb module_font=\u00bb|300|||||||\u00bb module_font_size=\u00bb13px\u00bb module_line_height=\u00bb1em\u00bb custom_padding=\u00bb||||false|false\u00bb module_font_size_tablet=\u00bb\u00bb module_font_size_phone=\u00bb11px\u00bb module_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb][\/lwp_divi_breadcrumbs][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb||20px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.19.1&#8243; _module_preset=\u00bbdefault\u00bb text_font_size=\u00bb23px\u00bb header_font_size=\u00bb23px\u00bb text_font_size_tablet=\u00bb23px\u00bb text_font_size_phone=\u00bb15px\u00bb text_font_size_last_edited=\u00bbon|phone\u00bb header_font_size_tablet=\u00bb23px\u00bb header_font_size_phone=\u00bb15px\u00bb header_font_size_last_edited=\u00bbon|desktop\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h1 style=\"text-align: center;\"><span style=\"color: #144f9b;\"><em><strong>md<\/strong><\/em><\/span><span style=\"color: #000000;\">te<\/span>l <span style=\"color: #808080;\">es la empresa l\u00edder en gesti\u00f3n de vulnerabilidades<\/span><\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb3_5,2_5&#8243; _builder_version=\u00bb4.17.6&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb9px||15px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb3_5&#8243; _builder_version=\u00bb4.17.6&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.25.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bb|300|||||||\u00bb text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.6em\u00bb header_font=\u00bb||||||||\u00bb header_text_align=\u00bbleft\u00bb header_2_font=\u00bb||||||||\u00bb header_2_font_size=\u00bb28px\u00bb header_2_line_height=\u00bb1.4em\u00bb header_3_font=\u00bb||||||||\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||13px||false|false\u00bb custom_padding=\u00bb9px||0px|||\u00bb text_font_size_tablet=\u00bb15px\u00bb text_font_size_phone=\u00bb13px\u00bb text_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #144f9b;\"><strong>Somos Platinum Partner<\/strong> <strong>de Tenable Network Security <\/strong><\/span>en Espa\u00f1a. L\u00edder en auditor\u00eda de seguridad en el mundo. Esto nos permite ofrecer a las empresas espa\u00f1olas respuestas en soluciones complejas de seguridad corporativa, adem\u00e1s de mantener un coste muy competitivo.<\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"color: #144f9b;\">Damos servicio en todo el proceso<\/span><\/strong> abarcando Seguridad Perimetral, Gesti\u00f3n de Vulnerabilidades y Cloud Security.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb2_5&#8243; _builder_version=\u00bb4.17.6&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/07\/descarga.png\u00bb title_text=\u00bbdescarga\u00bb align=\u00bbcenter\u00bb _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.17.6&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bbrgba(163,163,163,0.13)\u00bb custom_margin=\u00bb|3%|||false|false\u00bb custom_padding=\u00bb19px||15px|||\u00bb animation_style=\u00bbslide\u00bb animation_direction=\u00bbleft\u00bb border_radii=\u00bboff||60px|120px|\u00bb box_shadow_style=\u00bbpreset2&#8243; box_shadow_spread=\u00bb-7px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.17.6&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb||0px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.17.6&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.25.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bb||||||||\u00bb text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bb||||||||\u00bb header_2_font=\u00bb||||||||\u00bb header_2_text_color=\u00bb#8F8F8F\u00bb header_2_font_size=\u00bb28px\u00bb header_2_line_height=\u00bb1.4em\u00bb header_3_font=\u00bb||||||||\u00bb text_orientation=\u00bbcenter\u00bb max_width=\u00bb700px\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||5px|||\u00bb custom_padding=\u00bb1px|||||\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<h2>Productos tenable<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.17.6&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.17.6&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_tabs active_tab_background_color=\u00bb#144f9b\u00bb inactive_tab_background_color=\u00bb#aaaaaa\u00bb _builder_version=\u00bb4.25.0&#8243; tab_text_color=\u00bb#ffffff\u00bb body_font=\u00bb||||||||\u00bb body_font_size=\u00bb15px\u00bb body_line_height=\u00bb1.5em\u00bb tab_font=\u00bb|300|||||||\u00bb tab_font_size=\u00bb17px\u00bb tab_line_height=\u00bb1.6em\u00bb background_color=\u00bb#FFFFFF\u00bb max_width_last_edited=\u00bboff|desktop\u00bb module_alignment=\u00bbright\u00bb custom_margin=\u00bb|||\u00bb custom_margin_last_edited=\u00bboff|desktop\u00bb custom_padding=\u00bb|||\u00bb hover_enabled=\u00bb0&#8243; border_radii=\u00bboff||40px|120px|\u00bb border_width_all=\u00bb0px\u00bb border_color_all=\u00bb#ffffff\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;][et_pb_tab title=\u00bbTenable Network Security\u00bb _builder_version=\u00bb4.25.0&#8243; body_font=\u00bb|300|||||||\u00bb body_font_size=\u00bb16px\u00bb body_line_height=\u00bb1.5em\u00bb tab_font=\u00bb||||||||\u00bb tab_font_size=\u00bb16px\u00bb tab_line_height=\u00bb1.4em\u00bb background_color=\u00bbRGBA(255,255,255,0)\u00bb background_enable_color=\u00bbon\u00bb body_font_size_tablet=\u00bb15px\u00bb body_font_size_phone=\u00bb13px\u00bb body_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb background__hover_enabled=\u00bbon|desktop\u00bb]<\/p>\n<p><strong><br \/><img loading=\"lazy\" decoding=\"async\" data-src=\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/07\/Tenable-Logo2021.png\" width=\"241\" height=\"55\" alt=\"\" class=\"wp-image-3222 alignnone size-full lazyload\" style=\"--smush-placeholder-width: 241px; --smush-placeholder-aspect-ratio: 241\/55;display: block; margin-left: auto; margin-right: auto;\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" \/><noscript><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/07\/Tenable-Logo2021.png\" width=\"241\" height=\"55\" alt=\"\" class=\"wp-image-3222 alignnone size-full\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/noscript><\/strong><\/p>\n<p><strong><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #144f9b;\"><strong>Tenable Network Security<\/strong><\/span>, como uno de los l\u00edderes en auditor\u00eda de seguridad en el mundo, est\u00e1 entrando en las grandes corporaciones espa\u00f1olas gracias a <em><span style=\"color: #144f9b;\"><strong>SEC<\/strong><\/span><\/em><span style=\"color: #000000;\">Unit<\/span>, la divisi\u00f3n de ciberseguridad de <span style=\"color: #144f9b;\"><strong><em>md<\/em><\/strong><\/span><span style=\"color: #000000;\">tel<\/span>.<\/p>\n<p style=\"text-align: justify;\">Dicha relaci\u00f3n se enmarca dentro del exigente programa<span style=\"color: #144f9b;\"><strong> Global Partner Network de Tenable<\/strong><\/span> que, a trav\u00e9s de ingenieros certificados, ofrece a las empresas espa\u00f1olas respuestas en soluciones complejas de seguridad corporativa con un alto n\u00famero de direcciones IP, con multitud de equipos, servidores y tipos de acceso.<\/p>\n<p style=\"text-align: justify;\">Todo ello con la opci\u00f3n de mantenerlo en alta disponibilidad 24&#215;7 a trav\u00e9s del <span style=\"color: #144f9b;\"><strong>Security Operation Center (SOC)<\/strong><\/span> de<span style=\"color: #144f9b;\"> <em><strong>md<\/strong><\/em><\/span><span style=\"color: #000000;\">tel<\/span>.<\/p>\n<p>[\/et_pb_tab][et_pb_tab title=\u00bbtenable one\u00bb _builder_version=\u00bb4.25.0&#8243; body_font=\u00bb|300|||||||\u00bb body_font_size=\u00bb16px\u00bb body_line_height=\u00bb1.5em\u00bb body_font_size_tablet=\u00bb15px\u00bb body_font_size_phone=\u00bb13px\u00bb body_font_size_last_edited=\u00bbon|desktop\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" data-src=\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/tenable-one.jpg\" width=\"321\" height=\"75\" alt=\"\" class=\"wp-image-7058 alignnone size-full lazyload\" style=\"--smush-placeholder-width: 321px; --smush-placeholder-aspect-ratio: 321\/75;display: block; margin-left: auto; margin-right: auto;\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" \/><noscript><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/tenable-one.jpg\" width=\"321\" height=\"75\" alt=\"\" class=\"wp-image-7058 alignnone size-full\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/noscript><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #144f9b;\"><strong>Gesti\u00f3n de vulnerabilidades basada en el riesgo.<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #144f9b;\"><strong>tenable one<\/strong><\/span>\u00a0es una soluci\u00f3n completa de gesti\u00f3n de vulnerabilidades basada en el riesgo que permite conocer la ciber exposici\u00f3n de todos tus activos, en todo lugar, en cualquier plataforma y en todo momento.<\/p>\n<p style=\"text-align: justify;\">Con <span style=\"color: #144f9b;\"><strong>tenable one<\/strong><\/span> puedes ver todos los activos y todas las vulnerabilidades a lo largo de toda su superficie de ataque, predecir qu\u00e9 vulnerabilidades tienen m\u00e1s probabilidades de ser explotadas por los atacantes en un futuro cercano y actuar de acuerdo a lo que m\u00e1s importa.<\/p>\n<p style=\"text-align: justify;\">Permite reducir la mayor cantidad de riesgos del negocio con el m\u00ednimo esfuerzo.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #144f9b;\"><strong>Beneficios:<\/strong><\/span><\/p>\n<ul>\n<li style=\"text-align: justify;\">Conocer la exposici\u00f3n de todos los activos en cualquier plataforma.<\/li>\n<li style=\"text-align: justify;\">Visibilidad completa. Elimina puntos ciegos en toda su superficie de ataque, incluyendo activos TI tradicionales, servicios en la nube, tecnolog\u00edas operativas, aplicaciones web, dominios de directorio activo y conexi\u00f3n remota.<\/li>\n<li style=\"text-align: justify;\">Un modelo de licencia flexible y basado en activos que le permite reubicar activos entre TI, nube, contenedores y aplicaciones web a medida que los negocios evolucionan.<\/li>\n<li style=\"text-align: justify;\">Acceso a herramientas y capacidades adicionales de VM basada en el riesgo, sin las molestias de adquisici\u00f3n e implementaci\u00f3n.<\/li>\n<li style=\"text-align: justify;\">Referencias de Cyber Exposure que revelan c\u00f3mo se compara su programa de seguridad con la competencia y d\u00f3nde se necesitan las mejoras.<\/li>\n<\/ul>\n<p>[\/et_pb_tab][et_pb_tab title=\u00bbtenable.ad\u00bb _builder_version=\u00bb4.25.0&#8243; body_font=\u00bb|300|||||||\u00bb body_font_size=\u00bb16px\u00bb body_line_height=\u00bb1.5em\u00bb body_font_size_tablet=\u00bb15px\u00bb body_font_size_phone=\u00bb13px\u00bb body_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" data-src=\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/07\/Tenable-ad.png\" width=\"351\" height=\"85\" alt=\"\" class=\"wp-image-3226 alignnone size-full lazyload\" style=\"--smush-placeholder-width: 351px; --smush-placeholder-aspect-ratio: 351\/85;display: block; margin-left: auto; margin-right: auto;\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" \/><noscript><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/07\/Tenable-ad.png\" width=\"351\" height=\"85\" alt=\"\" class=\"wp-image-3226 alignnone size-full\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/noscript><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #144f9b;\"><strong>Asegura el Directorio Activo. Interrumpe las v\u00edas de ataque.<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"color: #144f9b;\">tenable.ad<\/span>.<\/strong> El Directorio Activo se ha convertido en el blanco favorito de los atacantes para elevar privilegios y facilitar el movimiento lateral al aprovechar fallas y configuraciones incorrectas.<\/p>\n<p style=\"text-align: justify;\">Al combinar la gesti\u00f3n de vulnerabilidades basada en el riesgo y la seguridad de Directorio Activo, Tenable permite desestabilizar la ruta de ataque, asegurando que los atacantes tengan dificultades para encontrar un punto de apoyo y que no tengan hacia d\u00f3nde ir si lo encuentran.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #144f9b;\"><strong>Beneficios:<\/strong><\/span><\/p>\n<ul>\n<li style=\"text-align: justify;\">Descubre los problemas subyacentes que afectan al Directorio Activo.<br \/>Identifica relaciones de confianza peligrosas.<\/li>\n<li style=\"text-align: justify;\">Detecta todos los cambios en el Directorio Activo.<\/li>\n<li style=\"text-align: justify;\">Descubre la conexi\u00f3n entre los cambios en Directorio Activo y las acciones maliciosas.<\/li>\n<li style=\"text-align: justify;\">Analiza en profundidad los detalles de un ataque.<\/li>\n<li style=\"text-align: justify;\">Explora descripciones de MITRE ATT&amp;CK directamente desde los detalles del incidente.<\/li>\n<\/ul>\n<p>[\/et_pb_tab][et_pb_tab title=\u00bbtenable.sc\u00bb _builder_version=\u00bb4.25.0&#8243; body_font=\u00bb|300|||||||\u00bb body_font_size=\u00bb16px\u00bb body_line_height=\u00bb1.5em\u00bb hover_enabled=\u00bb0&#8243; body_font_size_tablet=\u00bb15px\u00bb body_font_size_phone=\u00bb13px\u00bb body_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<p><strong> <img loading=\"lazy\" decoding=\"async\" data-src=\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/07\/Tenable-sc.png\" width=\"335\" height=\"83\" alt=\"\" class=\"wp-image-3225 alignnone size-full lazyload\" style=\"--smush-placeholder-width: 335px; --smush-placeholder-aspect-ratio: 335\/83;display: block; margin-left: auto; margin-right: auto;\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" \/><noscript><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/07\/Tenable-sc.png\" width=\"335\" height=\"83\" alt=\"\" class=\"wp-image-3225 alignnone size-full\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/noscript><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #144f9b;\"><strong>Seguridad en la nube. Protege cada paso, desde el c\u00f3digo hasta la nube.<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #144f9b;\"><strong>tenable.sc<\/strong><\/span> proporciona una visi\u00f3n basada en el riesgo de su postura de TI, seguridad y cumplimiento para que pueda r\u00e1pidamente identificar, investigar y priorizar sus activos y vulnerabilidades m\u00e1s cr\u00edticos.<\/p>\n<p style=\"text-align: justify;\">La suite de productos de <span style=\"color: #144f9b;\"><strong>tenable.sc<\/strong><\/span>, gestionada localmente y con tecnolog\u00eda <span style=\"color: #144f9b;\"><strong>Nessus<\/strong><\/span>, proporciona la cobertura de vulnerabilidad m\u00e1s completa de la industria, con una evaluaci\u00f3n continua y en tiempo real de su red. Se trata de una soluci\u00f3n completa en gesti\u00f3n de vulnerabilidades, de extremo a extremo.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #144f9b;\"><strong>Beneficios:<\/strong><\/span><\/p>\n<ul>\n<li style=\"text-align: justify;\">Gesti\u00f3n local de vulnerabilidades basada en el riesgo.<br \/>Visibilidad inmediata hacia su red con una cantidad ilimitada de Nessus Scanners.<\/li>\n<li style=\"text-align: justify;\">Informaci\u00f3n clara y procesable con tableros de control, informes y flujos de trabajo altamente personalizables.<\/li>\n<li style=\"text-align: justify;\">Identifiqua y prioriza las vulnerabilidades instant\u00e1neamente mediante inteligencia de amenazas y puntuaciones de riesgo incorporadas.<\/li>\n<li style=\"text-align: justify;\">Acelera la respuesta ante incidentes con alertas de configuraci\u00f3n, notificaciones y emisi\u00f3n de tickets personalizables.<\/li>\n<li style=\"text-align: justify;\">Acceso gratuito a la API para integraci\u00f3n de clientes, adquisici\u00f3n de datos y enriquecimiento de datos.<\/li>\n<\/ul>\n<p style=\"text-align: center;\">[\/et_pb_tab][et_pb_tab title=\u00bbtenable.io\u00bb _builder_version=\u00bb4.25.0&#8243; body_font=\u00bb|300|||||||\u00bb body_font_size=\u00bb16px\u00bb body_font_size_tablet=\u00bb15px\u00bb body_font_size_phone=\u00bb13px\u00bb body_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" data-src=\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/07\/Tenable-io.png\" width=\"271\" height=\"71\" alt=\"\" class=\"wp-image-3227 alignnone size-full lazyload\" style=\"--smush-placeholder-width: 271px; --smush-placeholder-aspect-ratio: 271\/71;display: block; margin-left: auto; margin-right: auto;\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" \/><noscript><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/07\/Tenable-io.png\" width=\"271\" height=\"71\" alt=\"\" class=\"wp-image-3227 alignnone size-full\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/noscript><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #144f9b;\"><strong>Seguridad integrada en DevOps. Verificaci\u00f3n simplificada del cumplimiento del Est\u00e1ndar de Seguridad de Datos PCI. Escaneo de vulnerabilidades para aplicaciones web.<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #144f9b;\"><strong>tenable.io<\/strong><\/span> ofrece una visi\u00f3n basada en el riesgo de toda su superficie de ataque desde los activos de TI hasta la nube, los activos de TO y los contenedores para poder identificar, investigar y priorizar r\u00e1pidamente las vulnerabilidades.<\/p>\n<p style=\"text-align: justify;\">Cuenta con la tecnolog\u00eda de <span style=\"color: #144f9b;\"><strong>Nessus <\/strong><\/span>y se gestiona en la nube. Proporciona la cobertura de vulnerabilidad m\u00e1s completa en la industria, con la capacidad de predecir qu\u00e9 problemas de seguridad se deben corregir primero.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #144f9b;\"><strong>Beneficios:<\/strong><\/span><\/p>\n<ul>\n<li style=\"text-align: justify;\">Visibilidad continua: Realiza un seguimiento continuo de los activos conocidos y desconocidos, as\u00ed como de sus vulnerabilidades. Identifique amenazas y cambios de red inesperados antes de que se conviertan en filtraciones de datos.<\/li>\n<li style=\"text-align: justify;\">Incentiva la productividad: Aprovecha la soluci\u00f3n basada en SaaS para ejecutar sus evaluaciones iniciales en menos de 5 minutos, sin la carga de hardware de TI o de mantenimiento.<\/li>\n<li style=\"text-align: justify;\">Prioriza las vulnerabilidades: Combina datos de vulnerabilidades, inteligencia de amenazas y ciencia de datos para obtener puntuaciones de riesgo f\u00e1ciles de comprender, a fin de identificar r\u00e1pidamente el mayor riesgo para el negocio.<\/li>\n<li style=\"text-align: justify;\">Automatiza los procesos: Aprovecha una API totalmente documentada e integraciones desarrolladas previamente para importar datos de terceros, automatizar los escaneos y compartir datos con sus sistemas de TI.<\/li>\n<li style=\"text-align: justify;\">Maximiza el retorno de la inversi\u00f3n (ROI): Con el primer modelo de licencias basado en activos de la industria, elimine el doble o el triple conteo de activos que tienen m\u00faltiples direcciones IP.<\/li>\n<\/ul>\n<p>[\/et_pb_tab][\/et_pb_tabs][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bbhttps:\/\/www.mdtel.es\/tech\/contacto_mdtel\/\u00bb button_text=\u00bbContactar\u00bb button_alignment=\u00bbright\u00bb button_alignment_tablet=\u00bbcenter\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bbon|tablet\u00bb _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#144f9b\u00bb button_border_width=\u00bb1px\u00bb button_border_color=\u00bb#0C71C3&#8243; button_border_radius=\u00bb30px\u00bb button_font=\u00bb|300|||||||\u00bb button_use_icon=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb button_bg_color__hover_enabled=\u00bbon|desktop\u00bb button_bg_color__hover=\u00bb#d6d6d6&#8243; button_bg_enable_color__hover=\u00bbon\u00bb button_border_color__hover_enabled=\u00bbon|hover\u00bb button_border_color__hover=\u00bbrgba(165,165,165,0.09)\u00bb button_text_color__hover_enabled=\u00bbon|hover\u00bb button_text_color__hover=\u00bb#144f9b\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbFeatures\u00bb _builder_version=\u00bb4.17.6&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bbRGBA(255,255,255,0)\u00bb custom_padding=\u00bb11px||20px||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb||2px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb|||\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bb||||||||\u00bb text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bb||||||||\u00bb header_2_font=\u00bb||||||||\u00bb header_2_text_color=\u00bb#8F8F8F\u00bb header_2_font_size=\u00bb28px\u00bb header_2_line_height=\u00bb1.4em\u00bb header_3_font=\u00bb||||||||\u00bb text_orientation=\u00bbcenter\u00bb max_width=\u00bb700px\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||5px|||\u00bb custom_padding=\u00bb1px|||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h2>Servicios detallados<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb14px|||||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb|||\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_toggle title=\u00bbCVMIS\u00bb open_toggle_text_color=\u00bb#6B6B6B\u00bb open_toggle_background_color=\u00bbRGBA(255,255,255,0)\u00bb closed_toggle_background_color=\u00bbRGBA(255,255,255,0)\u00bb icon_color=\u00bb#0C71C3&#8243; use_icon_font_size=\u00bbon\u00bb icon_font_size=\u00bb21px\u00bb open_icon_color=\u00bb#0C71C3&#8243; open_use_icon_font_size=\u00bbon\u00bb open_icon_font_size=\u00bb21px\u00bb _builder_version=\u00bb4.25.0&#8243; _module_preset=\u00bbdefault\u00bb title_text_color=\u00bb#6b6b6b\u00bb title_font=\u00bb||||||||\u00bb title_text_align=\u00bbleft\u00bb title_font_size=\u00bb18px\u00bb body_font=\u00bb|300|||||||\u00bb body_font_size=\u00bb16px\u00bb body_line_height=\u00bb1.2em\u00bb custom_margin=\u00bb||9px|||\u00bb title_font_size_tablet=\u00bb17px\u00bb title_font_size_phone=\u00bb15px\u00bb title_font_size_last_edited=\u00bbon|phone\u00bb body_font_size_tablet=\u00bb15px\u00bb body_font_size_phone=\u00bb13px\u00bb body_font_size_last_edited=\u00bbon|phone\u00bb border_width_all=\u00bb0px\u00bb border_width_bottom=\u00bb1px\u00bb border_color_bottom=\u00bb#0C71C3&#8243; global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #144f9b;\"><strong>CVMIS (Corporate Vulnerability Management Information System)<\/strong> <span style=\"color: #333333;\">contempla la<\/span> <strong>gesti\u00f3n integral de las vulnerabilidades<\/strong><span style=\"color: #333333;\"> en los activos de una organizaci\u00f3n<\/span><\/span>, ayudando a controlar el riesgo en toda la superficie de ataque de una compa\u00f1\u00eda. Con ese prop\u00f3sito, el servicio emplea herramientas de fabricantes l\u00edderes en detecci\u00f3n de vulnerabilidades, junto con la capacidad de aplicar informaci\u00f3n de contexto y t\u00e9cnicas de <em>machine learning<\/em> que permiten disponer de un an\u00e1lisis de riesgo adaptado al cliente.<\/p>\n<p style=\"text-align: justify;\">La implantaci\u00f3n de un <span style=\"color: #144f9b;\"><strong>proceso de gesti\u00f3n de vulnerabilidades global<\/strong><\/span> en una organizaci\u00f3n, permite unificar y coordinar la informaci\u00f3n proveniente de los sistemas para priorizar las acciones necesarias conducentes a reducir el riesgo.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #144f9b;\"><strong>El servicio contempla cubrir todo tipo de activos con especial atenci\u00f3n a los activos cr\u00edticos<\/strong><\/span> de la organizaci\u00f3n. Se ofrece un alcance global, en modalidad 24\u00d77 \/ 12\u00d75, que contempla la gesti\u00f3n integral de las soluciones t\u00e9cnicas y procesos necesarios para disponer de una informaci\u00f3n de vulnerabilidades actualizada, unificada y que refleje el ciber riesgo real del cliente.<\/p>\n<p style=\"text-align: justify;\">Incluye de igual modo, todas las <span style=\"color: #144f9b;\"><strong>tareas necesarias para automatizar esta labor<\/strong><\/span>, as\u00ed como los servicios de notificaci\u00f3n y gesti\u00f3n de situaciones cr\u00edticas derivadas de la aparici\u00f3n de vulnerabilidades graves que afecten a la organizaci\u00f3n.<\/p>\n<p style=\"text-align: justify;\">Los servicios de respuesta incluyen la generaci\u00f3n de reportes espec\u00edficos en funci\u00f3n del nivel de criticidad, as\u00ed como la realizaci\u00f3n de escaneos con un mayor nivel de frecuencia que permitan dar un seguimiento \u00f3ptimo de las vulnerabilidades m\u00e1s cr\u00edticas.<\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=\u00bbSWAS\u00bb open_toggle_text_color=\u00bb#6B6B6B\u00bb open_toggle_background_color=\u00bbRGBA(255,255,255,0)\u00bb closed_toggle_background_color=\u00bbRGBA(255,255,255,0)\u00bb icon_color=\u00bb#0C71C3&#8243; use_icon_font_size=\u00bbon\u00bb icon_font_size=\u00bb21px\u00bb open_icon_color=\u00bb#0C71C3&#8243; open_use_icon_font_size=\u00bbon\u00bb open_icon_font_size=\u00bb21px\u00bb _builder_version=\u00bb4.25.0&#8243; _module_preset=\u00bbdefault\u00bb title_text_color=\u00bb#6b6b6b\u00bb title_font=\u00bb||||||||\u00bb title_text_align=\u00bbleft\u00bb title_font_size=\u00bb18px\u00bb body_font=\u00bb|300|||||||\u00bb body_font_size=\u00bb16px\u00bb body_line_height=\u00bb1.2em\u00bb custom_margin=\u00bb||9px|||\u00bb title_font_size_tablet=\u00bb17px\u00bb title_font_size_phone=\u00bb15px\u00bb title_font_size_last_edited=\u00bbon|phone\u00bb body_font_size_tablet=\u00bb15px\u00bb body_font_size_phone=\u00bb13px\u00bb body_font_size_last_edited=\u00bbon|phone\u00bb border_width_all=\u00bb0px\u00bb border_width_bottom=\u00bb1px\u00bb border_color_bottom=\u00bb#0C71C3&#8243; global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: justify;\">Ofrecemos un <strong><span style=\"color: #144f9b;\">servicio avanzado de detecci\u00f3n de vulnerabilidades en aplicaciones web<\/span>.<\/strong> Realizamos auditor\u00edas con diferentes motores a trav\u00e9s de soluciones y fabricantes l\u00edderes con el objetivo de incrementar el ratio de detecci\u00f3n y fiabilidad:<\/p>\n<p style=\"text-align: justify;\">\n<ul>\n<li style=\"text-align: justify;\">Auditor\u00eda continua de aplicativos web como servicio gestionado (CMS, intranets, aplicaciones corporativas, etc.).<\/li>\n<li style=\"text-align: justify;\">Pruebas de seguridad SSL.<\/li>\n<li style=\"text-align: justify;\">Posibilidad de an\u00e1lisis manual para validaci\u00f3n de amenazas cr\u00edticas.<\/li>\n<li style=\"text-align: justify;\">Cumplimiento PCI DSS y GDPR.<\/li>\n<li style=\"text-align: justify;\">Revisi\u00f3n de certificados, fechas de expiraci\u00f3n, cifrado y presencia en listas negras.<\/li>\n<li style=\"text-align: justify;\">Motores espec\u00edficos de CMS (WordPress, Drupal, Joomla, etc.).<\/li>\n<li style=\"text-align: justify;\">Integraci\u00f3n en entornos DEVOPS.<\/li>\n<li style=\"text-align: justify;\">An\u00e1lisis bajo demanda o mediante automatizaci\u00f3n.<\/li>\n<\/ul>\n<p>[\/et_pb_toggle][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbFeatures\u00bb _builder_version=\u00bb4.17.6&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bbRGBA(255,255,255,0)\u00bb custom_margin=\u00bb||||false|false\u00bb custom_padding=\u00bb12px||10px||false|false\u00bb animation_direction=\u00bbleft\u00bb border_radii=\u00bboff||||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.17.6&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb7px||17px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.17.6&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bb||||||||\u00bb text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.5em\u00bb header_font=\u00bb||||||||\u00bb header_text_align=\u00bbleft\u00bb header_2_font=\u00bb||||||||\u00bb header_2_font_size=\u00bb23px\u00bb header_2_line_height=\u00bb1.4em\u00bb header_3_font=\u00bb||||||||\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb20px|||||\u00bb header_2_font_size_tablet=\u00bb14px\u00bb header_2_font_size_phone=\u00bb13px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h2 style=\"text-align: center;\"><span style=\"color: #0b83b7;\"><span style=\"color: #808080;\">Tambi\u00e9n te puede interesar<\/span><\/span><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb||76px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb|||\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bb||||||||\u00bb text_text_color=\u00bb#144f9b\u00bb text_font_size=\u00bb15px\u00bb text_line_height=\u00bb2.2em\u00bb link_option_url=\u00bbhttps:\/\/www.mdtel.es\/tech\/ciberseguridad\/\u00bb text_font_size_tablet=\u00bb14px\u00bb text_font_size_phone=\u00bb13px\u00bb text_font_size_last_edited=\u00bbon|phone\u00bb border_radii=\u00bbon|20px|20px|20px|20px\u00bb border_width_all=\u00bb2px\u00bb border_color_all=\u00bb#144f9b\u00bb global_colors_info=\u00bb{}\u00bb text_text_color__hover_enabled=\u00bboff|hover\u00bb text_text_color__hover=\u00bb#144f9b\u00bb transform_styles__hover_enabled=\u00bbon|hover\u00bb transform_scale__hover=\u00bb105%|105%\u00bb transform_scale__hover_enabled=\u00bbon|hover\u00bb transform_translate__hover_enabled=\u00bbon|desktop\u00bb transform_rotate__hover_enabled=\u00bbon|desktop\u00bb transform_skew__hover_enabled=\u00bbon|desktop\u00bb transform_origin__hover_enabled=\u00bbon|desktop\u00bb]<\/p>\n<p style=\"text-align: center;\">Ciberseguridad<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb|||\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bb||||||||\u00bb text_text_color=\u00bb#144f9b\u00bb text_font_size=\u00bb15px\u00bb text_line_height=\u00bb2.2em\u00bb link_option_url=\u00bbhttps:\/\/www.mdtel.es\/tech\/empresa\/\u00bb text_font_size_tablet=\u00bb14px\u00bb text_font_size_phone=\u00bb13px\u00bb text_font_size_last_edited=\u00bbon|phone\u00bb border_radii=\u00bbon|20px|20px|20px|20px\u00bb border_width_all=\u00bb2px\u00bb border_color_all=\u00bb#144f9b\u00bb global_colors_info=\u00bb{}\u00bb text_text_color__hover_enabled=\u00bboff|hover\u00bb text_text_color__hover=\u00bb#144f9b\u00bb transform_styles__hover_enabled=\u00bbon|hover\u00bb transform_scale__hover=\u00bb105%|105%\u00bb transform_scale__hover_enabled=\u00bbon|hover\u00bb transform_translate__hover_enabled=\u00bbon|desktop\u00bb transform_rotate__hover_enabled=\u00bbon|desktop\u00bb transform_skew__hover_enabled=\u00bbon|desktop\u00bb transform_origin__hover_enabled=\u00bbon|desktop\u00bb]<\/p>\n<p style=\"text-align: center;\">Empresa<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb|||\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bb||||||||\u00bb text_text_color=\u00bb#144f9b\u00bb text_font_size=\u00bb15px\u00bb text_line_height=\u00bb2.2em\u00bb link_option_url=\u00bbhttps:\/\/www.mdtel.es\/tech\/empresa\/calidad-y-compliance\/\u00bb text_font_size_tablet=\u00bb14px\u00bb text_font_size_phone=\u00bb13px\u00bb text_font_size_last_edited=\u00bbon|phone\u00bb border_radii=\u00bbon|20px|20px|20px|20px\u00bb border_width_all=\u00bb2px\u00bb border_color_all=\u00bb#144f9b\u00bb global_colors_info=\u00bb{}\u00bb text_text_color__hover_enabled=\u00bboff|hover\u00bb text_text_color__hover=\u00bb#144f9b\u00bb transform_styles__hover_enabled=\u00bbon|hover\u00bb transform_scale__hover=\u00bb105%|105%\u00bb transform_scale__hover_enabled=\u00bbon|hover\u00bb transform_translate__hover_enabled=\u00bbon|desktop\u00bb transform_rotate__hover_enabled=\u00bbon|desktop\u00bb transform_skew__hover_enabled=\u00bbon|desktop\u00bb transform_origin__hover_enabled=\u00bbon|desktop\u00bb]<\/p>\n<p style=\"text-align: center;\">Calidad y Compliance<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gesti\u00f3n de vulnerabilidadestenable oneGesti\u00f3n de vulnerabilidadestenable.scGesti\u00f3n de vulnerabilidadestenable.adGesti\u00f3n de vulnerabilidadestenable.io<div class=\"et_pb_module lwp_divi_breadcrumbs lwp_divi_breadcrumbs_0\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"et_pb_module_inner\">\n\t\t\t\t\t<div class=\"lwp-breadcrumbs\"> <span class=\"before\"><\/span> <span vocab=\"https:\/\/schema.org\/\" typeof=\"BreadcrumbList\"><span property=\"itemListElement\" typeof=\"ListItem\"><a property=\"item\" typeof=\"WebPage\" href=\"https:\/\/www.mdtel.es\/tech\/\" class=\"home\"><span property=\"name\">Home<\/span><\/a><meta property=\"position\" content=\"1\"><\/span> <span class=\"separator et-pb-icon\">&amp;#x39;<\/span> <\/span><\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>mdtel es la empresa l\u00edder en gesti\u00f3n de vulnerabilidadesSomos Platinum Partner de Tenable Network Security en Espa\u00f1a. L\u00edder en auditor\u00eda de seguridad en el mundo. Esto nos permite ofrecer a las empresas espa\u00f1olas respuestas en [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":2645,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-2726","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Gestion de Vulnerabilidades | mdtel<\/title>\n<meta name=\"description\" content=\"mdtel es la empresa l\u00edder en gesti\u00f3n de vulnerabilidades\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/gestion-de-vulnerabilidades\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gestion de Vulnerabilidades | mdtel\" \/>\n<meta property=\"og:description\" content=\"mdtel es la empresa l\u00edder en gesti\u00f3n de vulnerabilidades\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/gestion-de-vulnerabilidades\/\" \/>\n<meta property=\"og:site_name\" content=\"mdtel\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-10T10:37:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/07\/Tenable-Logo2021.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/gestion-de-vulnerabilidades\/\",\"url\":\"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/gestion-de-vulnerabilidades\/\",\"name\":\"Gestion de Vulnerabilidades | mdtel\",\"isPartOf\":{\"@id\":\"https:\/\/www.mdtel.es\/tech\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/gestion-de-vulnerabilidades\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/gestion-de-vulnerabilidades\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/07\/Tenable-Logo2021.png\",\"datePublished\":\"2022-07-20T17:48:23+00:00\",\"dateModified\":\"2024-05-10T10:37:45+00:00\",\"description\":\"mdtel es la empresa l\u00edder en gesti\u00f3n de vulnerabilidades\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/gestion-de-vulnerabilidades\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/gestion-de-vulnerabilidades\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/gestion-de-vulnerabilidades\/#primaryimage\",\"url\":\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/07\/Tenable-Logo2021.png\",\"contentUrl\":\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/07\/Tenable-Logo2021.png\",\"width\":1515,\"height\":345,\"caption\":\"logo-tenable\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/gestion-de-vulnerabilidades\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Ciberseguridad\",\"item\":\"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gestion de Vulnerabilidades\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mdtel.es\/tech\/#website\",\"url\":\"https:\/\/www.mdtel.es\/tech\/\",\"name\":\"mdtel\",\"description\":\"Telecomunicaciones para empresas\",\"publisher\":{\"@id\":\"https:\/\/www.mdtel.es\/tech\/#organization\"},\"alternateName\":\"Telecomunicaciones para empresas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mdtel.es\/tech\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mdtel.es\/tech\/#organization\",\"name\":\"mdtel\",\"alternateName\":\"Telecomunicaciones para empresas\",\"url\":\"https:\/\/www.mdtel.es\/tech\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.mdtel.es\/tech\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/logo-mdtel.png\",\"contentUrl\":\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/logo-mdtel.png\",\"width\":177,\"height\":83,\"caption\":\"mdtel\"},\"image\":{\"@id\":\"https:\/\/www.mdtel.es\/tech\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/es.linkedin.com\/company\/mdtelsa\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gestion de Vulnerabilidades | mdtel","description":"mdtel es la empresa l\u00edder en gesti\u00f3n de vulnerabilidades","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/gestion-de-vulnerabilidades\/","og_locale":"es_ES","og_type":"article","og_title":"Gestion de Vulnerabilidades | mdtel","og_description":"mdtel es la empresa l\u00edder en gesti\u00f3n de vulnerabilidades","og_url":"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/gestion-de-vulnerabilidades\/","og_site_name":"mdtel","article_modified_time":"2024-05-10T10:37:45+00:00","og_image":[{"url":"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/07\/Tenable-Logo2021.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"11 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/gestion-de-vulnerabilidades\/","url":"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/gestion-de-vulnerabilidades\/","name":"Gestion de Vulnerabilidades | mdtel","isPartOf":{"@id":"https:\/\/www.mdtel.es\/tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/gestion-de-vulnerabilidades\/#primaryimage"},"image":{"@id":"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/gestion-de-vulnerabilidades\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/07\/Tenable-Logo2021.png","datePublished":"2022-07-20T17:48:23+00:00","dateModified":"2024-05-10T10:37:45+00:00","description":"mdtel es la empresa l\u00edder en gesti\u00f3n de vulnerabilidades","breadcrumb":{"@id":"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/gestion-de-vulnerabilidades\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mdtel.es\/tech\/ciberseguridad\/gestion-de-vulnerabilidades\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/gestion-de-vulnerabilidades\/#primaryimage","url":"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/07\/Tenable-Logo2021.png","contentUrl":"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/07\/Tenable-Logo2021.png","width":1515,"height":345,"caption":"logo-tenable"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/gestion-de-vulnerabilidades\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Ciberseguridad","item":"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/"},{"@type":"ListItem","position":2,"name":"Gestion de Vulnerabilidades"}]},{"@type":"WebSite","@id":"https:\/\/www.mdtel.es\/tech\/#website","url":"https:\/\/www.mdtel.es\/tech\/","name":"mdtel","description":"Telecomunicaciones para empresas","publisher":{"@id":"https:\/\/www.mdtel.es\/tech\/#organization"},"alternateName":"Telecomunicaciones para empresas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mdtel.es\/tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.mdtel.es\/tech\/#organization","name":"mdtel","alternateName":"Telecomunicaciones para empresas","url":"https:\/\/www.mdtel.es\/tech\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.mdtel.es\/tech\/#\/schema\/logo\/image\/","url":"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/logo-mdtel.png","contentUrl":"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/logo-mdtel.png","width":177,"height":83,"caption":"mdtel"},"image":{"@id":"https:\/\/www.mdtel.es\/tech\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/es.linkedin.com\/company\/mdtelsa"]}]}},"_links":{"self":[{"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/pages\/2726","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/comments?post=2726"}],"version-history":[{"count":40,"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/pages\/2726\/revisions"}],"predecessor-version":[{"id":9433,"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/pages\/2726\/revisions\/9433"}],"up":[{"embeddable":true,"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/pages\/2645"}],"wp:attachment":[{"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/media?parent=2726"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}