{"id":6545,"date":"2022-11-10T11:39:29","date_gmt":"2022-11-10T10:39:29","guid":{"rendered":"https:\/\/www.mdtel.es\/tech\/?page_id=6545"},"modified":"2022-11-22T20:01:43","modified_gmt":"2022-11-22T19:01:43","slug":"endpoint-security","status":"publish","type":"page","link":"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/endpoint-security\/","title":{"rendered":"Endpoint Security"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#144f9b\u00bb background_image=\u00bbhttps:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/end-point-security-s.png\u00bb parallax=\u00bbon\u00bb background_enable_video_mp4=\u00bboff\u00bb custom_padding=\u00bb||||false|false\u00bb border_radii=\u00bboff|||169px|\u00bb box_shadow_style=\u00bbpreset2&#8243; box_shadow_spread=\u00bb-7px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_fullwidth_slider show_arrows=\u00bboff\u00bb show_pagination=\u00bboff\u00bb use_text_overlay=\u00bboff\u00bb _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bb||||||||\u00bb background_enable_image=\u00bboff\u00bb text_orientation=\u00bbright\u00bb custom_padding=\u00bb136px||127px||false|false\u00bb auto=\u00bbon\u00bb auto_speed=\u00bb2000&#8243; hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;][et_pb_slide button_link=\u00bbhttps:\/\/www.citiesanalytics.com\/#Soluciones\u00bb use_text_overlay=\u00bboff\u00bb content_tablet=\u00bb<\/p>\n<p style=%22text-align: left;%22>Somos especialistas en <br \/>Endpoint Security<\/p>\n<p>\u00bb content_phone=\u00bb<\/p>\n<p style=%22text-align: center;%22>Somos especialistas en <br \/>Endpoint Security<\/p>\n<p>\u00bb content_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb header_level=\u00bbh1&#8243; header_font=\u00bb|600|||||||\u00bb body_font=\u00bb||||||||\u00bb body_text_align=\u00bbleft\u00bb body_font_size=\u00bb38px\u00bb body_line_height=\u00bb1.1em\u00bb background_enable_color=\u00bboff\u00bb background_enable_image=\u00bboff\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_bg_color=\u00bb#144f9b\u00bb button_border_width=\u00bb0px\u00bb button_border_color=\u00bb#0C71C3&#8243; button_border_radius=\u00bb30px\u00bb button_font=\u00bb|300|||||||\u00bb button_use_icon=\u00bboff\u00bb button_alignment=\u00bbleft\u00bb custom_padding=\u00bb|21%||14%|false|false\u00bb hover_enabled=\u00bb0&#8243; body_text_align_tablet=\u00bbcenter\u00bb body_text_align_phone=\u00bbcenter\u00bb body_text_align_last_edited=\u00bbon|phone\u00bb body_font_size_tablet=\u00bb27px\u00bb body_font_size_phone=\u00bb180%\u00bb body_font_size_last_edited=\u00bbon|phone\u00bb background_last_edited=\u00bboff|desktop\u00bb custom_css_slide_description=\u00bbanimation-name: none;\u00bb global_colors_info=\u00bb{}\u00bb button_bg_color__hover_enabled=\u00bbon|hover\u00bb button_bg_color__hover=\u00bbrgba(214,214,214,0.58)\u00bb button_bg_enable_color__hover=\u00bbon\u00bb button_text_color__hover_enabled=\u00bbon|hover\u00bb button_text_color__hover=\u00bb#144f9b\u00bb button_border_color__hover_enabled=\u00bboff|desktop\u00bb button_border_color__hover=\u00bb#FFFFFF\u00bb content__hover_enabled=\u00bboff|desktop\u00bb header_font_size__hover_enabled=\u00bboff|hover\u00bb background__hover_enabled=\u00bboff|desktop\u00bb sticky_transition=\u00bbon\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<p style=\"text-align: left;\">Somos especialistas en<br \/>Endpoint Security<\/p>\n<p>[\/et_pb_slide][et_pb_slide button_link=\u00bbhttps:\/\/www.citiesanalytics.com\/#Soluciones\u00bb use_text_overlay=\u00bboff\u00bb content_tablet=\u00bb<\/p>\n<p style=%22text-align: left;%22>Somos especialistas en<br \/>detecci\u00f3n temprana de ciberataques<\/p>\n<p>\u00bb content_phone=\u00bb<\/p>\n<p style=%22text-align: center;%22>Somos especialistas en<br \/>detecci\u00f3n temprana de ciberataques<\/p>\n<p>\u00bb content_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb header_level=\u00bbh1&#8243; header_font=\u00bb|600|||||||\u00bb body_font=\u00bb||||||||\u00bb body_text_align=\u00bbleft\u00bb body_font_size=\u00bb38px\u00bb body_line_height=\u00bb1.1em\u00bb background_enable_color=\u00bboff\u00bb background_enable_image=\u00bboff\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_bg_color=\u00bb#144f9b\u00bb button_border_width=\u00bb0px\u00bb button_border_color=\u00bb#0C71C3&#8243; button_border_radius=\u00bb30px\u00bb button_font=\u00bb|300|||||||\u00bb button_use_icon=\u00bboff\u00bb button_alignment=\u00bbleft\u00bb custom_padding=\u00bb|21%||14%|false|false\u00bb body_text_align_tablet=\u00bbcenter\u00bb body_text_align_phone=\u00bbcenter\u00bb body_text_align_last_edited=\u00bbon|phone\u00bb body_font_size_tablet=\u00bb27px\u00bb body_font_size_phone=\u00bb180%\u00bb body_font_size_last_edited=\u00bbon|phone\u00bb background_last_edited=\u00bboff|desktop\u00bb custom_css_slide_description=\u00bbanimation-name: none;\u00bb global_colors_info=\u00bb{}\u00bb button_bg_color__hover_enabled=\u00bbon|hover\u00bb button_bg_color__hover=\u00bbrgba(214,214,214,0.58)\u00bb button_bg_enable_color__hover=\u00bbon\u00bb button_text_color__hover_enabled=\u00bbon|hover\u00bb button_text_color__hover=\u00bb#144f9b\u00bb button_border_color__hover_enabled=\u00bboff|desktop\u00bb button_border_color__hover=\u00bb#FFFFFF\u00bb content__hover_enabled=\u00bboff|desktop\u00bb header_font_size__hover_enabled=\u00bboff|hover\u00bb background__hover_enabled=\u00bboff|desktop\u00bb sticky_transition=\u00bbon\u00bb]<\/p>\n<p style=\"text-align: left;\">Somos especialistas en<br \/>detecci\u00f3n temprana de ciberataques<\/p>\n<p>[\/et_pb_slide][et_pb_slide button_link=\u00bbhttps:\/\/www.citiesanalytics.com\/#Soluciones\u00bb use_text_overlay=\u00bboff\u00bb content_tablet=\u00bb<\/p>\n<p style=%22text-align: left;%22>Somos especialistas en<br \/>detecci\u00f3n temprana de ransomware<\/p>\n<p>\u00bb content_phone=\u00bb<\/p>\n<p style=%22text-align: center;%22>Somos especialistas en<br \/>detecci\u00f3n temprana de ransomware<\/p>\n<p>\u00bb content_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb header_level=\u00bbh1&#8243; header_font=\u00bb|600|||||||\u00bb body_font=\u00bb||||||||\u00bb body_text_align=\u00bbleft\u00bb body_font_size=\u00bb38px\u00bb body_line_height=\u00bb1.1em\u00bb background_enable_color=\u00bboff\u00bb background_enable_image=\u00bboff\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_bg_color=\u00bb#144f9b\u00bb button_border_width=\u00bb0px\u00bb button_border_color=\u00bb#0C71C3&#8243; button_border_radius=\u00bb30px\u00bb button_font=\u00bb|300|||||||\u00bb button_use_icon=\u00bboff\u00bb button_alignment=\u00bbleft\u00bb custom_padding=\u00bb|21%||14%|false|false\u00bb body_text_align_tablet=\u00bbcenter\u00bb body_text_align_phone=\u00bbcenter\u00bb body_text_align_last_edited=\u00bbon|phone\u00bb body_font_size_tablet=\u00bb27px\u00bb body_font_size_phone=\u00bb180%\u00bb body_font_size_last_edited=\u00bbon|phone\u00bb background_last_edited=\u00bboff|desktop\u00bb custom_css_slide_description=\u00bbanimation-name: none;\u00bb global_colors_info=\u00bb{}\u00bb button_bg_color__hover_enabled=\u00bbon|hover\u00bb button_bg_color__hover=\u00bbrgba(214,214,214,0.58)\u00bb button_bg_enable_color__hover=\u00bbon\u00bb button_text_color__hover_enabled=\u00bbon|hover\u00bb button_text_color__hover=\u00bb#144f9b\u00bb button_border_color__hover_enabled=\u00bboff|desktop\u00bb button_border_color__hover=\u00bb#FFFFFF\u00bb content__hover_enabled=\u00bboff|desktop\u00bb header_font_size__hover_enabled=\u00bboff|hover\u00bb background__hover_enabled=\u00bboff|desktop\u00bb sticky_transition=\u00bbon\u00bb]<\/p>\n<p style=\"text-align: left;\">Somos especialistas en<br \/>detecci\u00f3n temprana de ransomware<\/p>\n<p>[\/et_pb_slide][et_pb_slide button_link=\u00bbhttps:\/\/www.citiesanalytics.com\/#Soluciones\u00bb use_text_overlay=\u00bboff\u00bb content_tablet=\u00bb<\/p>\n<p style=%22text-align: left;%22>Somos especialistas en<br \/>detecci\u00f3n temprana de phising<\/p>\n<p>\u00bb content_phone=\u00bb<\/p>\n<p style=%22text-align: center;%22>Somos especialistas en<br \/>detecci\u00f3n temprana de phising<\/p>\n<p>\u00bb content_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb header_level=\u00bbh1&#8243; header_font=\u00bb|600|||||||\u00bb body_font=\u00bb||||||||\u00bb body_text_align=\u00bbleft\u00bb body_font_size=\u00bb38px\u00bb body_line_height=\u00bb1.1em\u00bb background_enable_color=\u00bboff\u00bb background_enable_image=\u00bboff\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_bg_color=\u00bb#144f9b\u00bb button_border_width=\u00bb0px\u00bb button_border_color=\u00bb#0C71C3&#8243; button_border_radius=\u00bb30px\u00bb button_font=\u00bb|300|||||||\u00bb button_use_icon=\u00bboff\u00bb button_alignment=\u00bbleft\u00bb custom_padding=\u00bb|21%||14%|false|false\u00bb body_text_align_tablet=\u00bbcenter\u00bb body_text_align_phone=\u00bbcenter\u00bb body_text_align_last_edited=\u00bbon|phone\u00bb body_font_size_tablet=\u00bb27px\u00bb body_font_size_phone=\u00bb180%\u00bb body_font_size_last_edited=\u00bbon|phone\u00bb background_last_edited=\u00bboff|desktop\u00bb custom_css_slide_description=\u00bbanimation-name: none;\u00bb global_colors_info=\u00bb{}\u00bb button_bg_color__hover_enabled=\u00bbon|hover\u00bb button_bg_color__hover=\u00bbrgba(214,214,214,0.58)\u00bb button_bg_enable_color__hover=\u00bbon\u00bb button_text_color__hover_enabled=\u00bbon|hover\u00bb button_text_color__hover=\u00bb#144f9b\u00bb button_border_color__hover_enabled=\u00bboff|desktop\u00bb button_border_color__hover=\u00bb#FFFFFF\u00bb content__hover_enabled=\u00bboff|desktop\u00bb header_font_size__hover_enabled=\u00bboff|hover\u00bb background__hover_enabled=\u00bboff|desktop\u00bb sticky_transition=\u00bbon\u00bb]<\/p>\n<p style=\"text-align: left;\">Somos especialistas en<br \/>detecci\u00f3n temprana de phising<\/p>\n<p>[\/et_pb_slide][\/et_pb_fullwidth_slider][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.17.6&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb5px||10px||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.18.1&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb19px|||||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][lwp_divi_breadcrumbs use_before_icon=\u00bboff\u00bb _builder_version=\u00bb4.18.1&#8243; _module_preset=\u00bbdefault\u00bb module_font=\u00bb|300|||||||\u00bb module_font_size=\u00bb13px\u00bb module_line_height=\u00bb1em\u00bb custom_padding=\u00bb||||false|false\u00bb module_font_size_tablet=\u00bb\u00bb module_font_size_phone=\u00bb11px\u00bb module_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb][\/lwp_divi_breadcrumbs][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb-8px|auto||auto||\u00bb custom_padding=\u00bb10px||2px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb|||\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb header_font_size=\u00bb23px\u00bb header_line_height=\u00bb1.2em\u00bb text_font_size_phone=\u00bb11px\u00bb text_font_size_last_edited=\u00bboff|phone\u00bb header_font_last_edited=\u00bboff|phone\u00bb header_font_size_tablet=\u00bb\u00bb header_font_size_phone=\u00bb15px\u00bb header_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h1 style=\"text-align: center;\"><span style=\"color: #0b83b7;\"><span style=\"color: #808080;\">En <span style=\"color: #144f9b;\"><em><strong>md<\/strong><\/em><\/span><span style=\"color: #000000;\">tel<\/span> abordamos Endpoint Security (Crowdstrike)<\/span><\/span><\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.17.6&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb5px||10px||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb3_5,2_5&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb||15px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb3_5&#8243; _builder_version=\u00bb4.17.6&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bb|300|||||||\u00bb text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.6em\u00bb header_font=\u00bb||||||||\u00bb header_text_align=\u00bbleft\u00bb header_2_font=\u00bb||||||||\u00bb header_2_font_size=\u00bb28px\u00bb header_2_line_height=\u00bb1.4em\u00bb header_3_font=\u00bb||||||||\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||13px||false|false\u00bb custom_padding=\u00bb9px||0px|||\u00bb text_font_size_tablet=\u00bb15px\u00bb text_font_size_phone=\u00bb13px\u00bb text_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>El<strong><span style=\"color: #144f9b;\"> panorama de amenazas creciente es cada vez m\u00e1s sofisticado<\/span><\/strong> y requiere que los dispositivos cuenten con sistemas de seguridad avanzados para que los usuarios de las organizaciones no terminen siendo v\u00edctimas de ciberataques como Ransomware, Phising, etc\u2026<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb2_5&#8243; _builder_version=\u00bb4.17.6&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_slider show_arrows=\u00bboff\u00bb show_pagination=\u00bboff\u00bb _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bb||||||||\u00bb body_font_size=\u00bb18px\u00bb body_line_height=\u00bb1.1em\u00bb background_image=\u00bbhttps:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/09\/blue-points-ok.png\u00bb background_enable_video_mp4=\u00bboff\u00bb custom_margin=\u00bb13px||||false|false\u00bb custom_padding=\u00bb53px||70px||false|false\u00bb auto=\u00bbon\u00bb auto_speed=\u00bb2000&#8243; body_font_size_tablet=\u00bb18px\u00bb body_font_size_phone=\u00bb16px\u00bb body_font_size_last_edited=\u00bbon|phone\u00bb border_radii=\u00bboff||10px|30px|\u00bb box_shadow_style=\u00bbpreset2&#8243; box_shadow_horizontal=\u00bb3px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_slide _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb body_text_color=\u00bb#FFFFFF\u00bb background_enable_color=\u00bboff\u00bb background_layout=\u00bblight\u00bb custom_css_main_element=\u00bbopacity: 1!important;\u00bb custom_css_slide_description=\u00bbanimation-name: none;\u00bb custom_css_slide_image=\u00bbanimation-name: none;\u00bb global_colors_info=\u00bb{}\u00bb sticky_transition=\u00bbon\u00bb]<\/p>\n<p>Detecci\u00f3n autom\u00e1tica<br \/>de posibles amenazas<\/p>\n<p>[\/et_pb_slide][et_pb_slide _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb body_text_color=\u00bb#FFFFFF\u00bb background_enable_color=\u00bboff\u00bb background_layout=\u00bblight\u00bb custom_css_main_element=\u00bbopacity: 1!important;\u00bb custom_css_slide_description=\u00bbanimation-name: none;\u00bb custom_css_slide_image=\u00bbanimation-name: none;\u00bb global_colors_info=\u00bb{}\u00bb sticky_transition=\u00bbon\u00bb]<\/p>\n<p>Priorizaci\u00f3n autom\u00e1tica<br \/>de posibles amenazas<\/p>\n<p>[\/et_pb_slide][\/et_pb_slider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.17.6&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bbrgba(163,163,163,0.13)\u00bb custom_margin=\u00bb|3%|||false|false\u00bb custom_padding=\u00bb19px||15px|||\u00bb animation_style=\u00bbslide\u00bb animation_direction=\u00bbleft\u00bb border_radii=\u00bboff||60px|120px|\u00bb box_shadow_style=\u00bbpreset2&#8243; box_shadow_spread=\u00bb-7px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.18.1&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb||0px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.17.6&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bb||||||||\u00bb text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bb||||||||\u00bb header_2_font=\u00bb||||||||\u00bb header_2_text_color=\u00bbrgba(0,0,0,0.53)\u00bb header_2_font_size=\u00bb23px\u00bb header_2_line_height=\u00bb1.4em\u00bb header_3_font=\u00bb||||||||\u00bb text_orientation=\u00bbcenter\u00bb max_width=\u00bb700px\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||5px|||\u00bb custom_padding=\u00bb1px|||||\u00bb header_2_font_size_tablet=\u00bb23px\u00bb header_2_font_size_phone=\u00bb15px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h2>Herramientas para la gesti\u00f3n del riesgo<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bb|300|||||||\u00bb text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.6em\u00bb header_font=\u00bb||||||||\u00bb header_text_align=\u00bbleft\u00bb header_2_font=\u00bb||||||||\u00bb header_2_font_size=\u00bb28px\u00bb header_2_line_height=\u00bb1.4em\u00bb header_3_font=\u00bb||||||||\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||13px||false|false\u00bb custom_padding=\u00bb9px||0px|||\u00bb text_font_size_tablet=\u00bb15px\u00bb text_font_size_phone=\u00bb13px\u00bb text_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Nuestras soluciones permiten a los equipos de seguridad optimizar la priorizaci\u00f3n de parches y reducir la carga de trabajo de parches.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_tabs active_tab_background_color=\u00bb#144f9b\u00bb inactive_tab_background_color=\u00bb#aaaaaa\u00bb _builder_version=\u00bb4.19.0&#8243; tab_text_color=\u00bb#ffffff\u00bb body_font=\u00bb||||||||\u00bb body_font_size=\u00bb15px\u00bb body_line_height=\u00bb1.5em\u00bb tab_font=\u00bb|300|||||||\u00bb tab_font_size=\u00bb17px\u00bb tab_line_height=\u00bb1.6em\u00bb background_color=\u00bb#FFFFFF\u00bb max_width_last_edited=\u00bboff|desktop\u00bb module_alignment=\u00bbright\u00bb custom_margin=\u00bb|||\u00bb custom_margin_last_edited=\u00bboff|desktop\u00bb custom_padding=\u00bb|||\u00bb border_radii=\u00bboff||40px|120px|\u00bb border_width_all=\u00bb0px\u00bb border_color_all=\u00bb#ffffff\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_tab title=\u00bbSophos\u00bb _builder_version=\u00bb4.19.0&#8243; body_font=\u00bb|300|||||||\u00bb body_font_size=\u00bb16px\u00bb body_line_height=\u00bb1.5em\u00bb tab_font=\u00bb||||||||\u00bb tab_font_size=\u00bb16px\u00bb tab_line_height=\u00bb1.4em\u00bb background_color=\u00bbRGBA(255,255,255,0)\u00bb background_enable_color=\u00bbon\u00bb body_font_size_tablet=\u00bb15px\u00bb body_font_size_phone=\u00bb13px\u00bb body_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb background__hover_enabled=\u00bbon|desktop\u00bb]<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-src=\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/sophos.jpg\" width=\"183\" height=\"42\" alt=\"\" class=\"wp-image-6550 alignnone size-full lazyload\" style=\"--smush-placeholder-width: 183px; --smush-placeholder-aspect-ratio: 183\/42;display: block; margin-left: auto; margin-right: auto;\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" \/><noscript><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/sophos.jpg\" width=\"183\" height=\"42\" alt=\"\" class=\"wp-image-6550 alignnone size-full\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/noscript><\/p>\n<p><strong>Sophos<\/strong> es una soluci\u00f3n que <span style=\"color: #144f9b;\"><strong>integra una potente detecci\u00f3n y respuesta para endpoints (EDR) Intercept X<\/strong>,<\/span> dise\u00f1ado tanto para las operaciones de seguridad TI como para la b\u00fasqueda de amenazas, detecta e investiga la actividad sospechosa con un an\u00e1lisis basado en IA.<\/p>\n<p>Principales funciones:<\/p>\n<ul>\n<li><span style=\"color: #144f9b;\"><strong>Detecta, prioriza autom\u00e1ticamente posibles amenazas<\/strong><\/span> y muestra qu\u00e9 equipos han podido verse afectados<\/li>\n<li><span style=\"color: #144f9b;\"><strong>Protege contra archivos de ransomware,<\/strong><\/span> recuperaci\u00f3n autom\u00e1tica de archivos y an\u00e1lisis de comportamiento para detener los ataques<\/li>\n<li><span style=\"color: #144f9b;\"><strong>Inteligencia artificial integrada<\/strong><\/span> que detecta el malware tanto conocido como el desconocido sin necesidad de firmas<\/li>\n<li><span style=\"color: #144f9b;\"><strong>Prevenci\u00f3n de exploits<\/strong><\/span> que repelen a los atacantes bloqueando los exploits, y t\u00e9cnicas de distribuci\u00f3n de malware<\/li>\n<li>La <span style=\"color: #144f9b;\"><strong>mitigaci\u00f3n de adversarios activos<\/strong><\/span> evita la persistencia en los equipos, protege del robo de credenciales y detecta tr\u00e1fico malicioso.<\/li>\n<\/ul>\n<p>[\/et_pb_tab][et_pb_tab title=\u00bbCrowdStrike\u00bb _builder_version=\u00bb4.19.0&#8243; body_font=\u00bb|300|||||||\u00bb body_font_size=\u00bb16px\u00bb body_line_height=\u00bb1.5em\u00bb tab_font=\u00bb||||||||\u00bb tab_font_size=\u00bb16px\u00bb tab_line_height=\u00bb1.4em\u00bb background_color=\u00bbRGBA(255,255,255,0)\u00bb background_enable_color=\u00bbon\u00bb body_font_size_tablet=\u00bb15px\u00bb body_font_size_phone=\u00bb13px\u00bb body_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb background__hover_enabled=\u00bbon|desktop\u00bb]<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-src=\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/crowdstrike.jpg\" width=\"209\" height=\"115\" alt=\"\" class=\"wp-image-6554 alignnone size-full lazyload\" style=\"--smush-placeholder-width: 209px; --smush-placeholder-aspect-ratio: 209\/115;display: block; margin-left: auto; margin-right: auto;\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" \/><noscript><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/crowdstrike.jpg\" width=\"209\" height=\"115\" alt=\"\" class=\"wp-image-6554 alignnone size-full\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/noscript><\/p>\n<p><strong> CrowdStrike Falcon<\/strong> ofrece capacidades de seguridad y operaciones de TI, incluida la higiene de TI, la gesti\u00f3n de vulnerabilidades y la aplicaci\u00f3n de parches. Todo esto <span style=\"color: #144f9b;\"><strong>se enriquece con inteligencia de amenazas de clase mundial<\/strong><\/span>, incluidas capacidades para realizar b\u00fasquedas de malware y an\u00e1lisis de sandbox. \u00c9stas est\u00e1n <span style=\"color: #144f9b;\"><strong>completamente integrados y automatizados<\/strong><\/span> para ofrecer a los equipos de seguridad un contexto profundo y capacidades predictivas.<\/p>\n<p>CrowdStrike aprovecha la<span style=\"color: #144f9b;\"> <strong>inteligencia artificial a escala de la nube<\/strong><\/span> y el an\u00e1lisis de enlaces profundos para ofrecer XDR, EDR, AV de \u00faltima generaci\u00f3n, control de dispositivos y administraci\u00f3n de firewalls de primera clase.<\/p>\n<p>[\/et_pb_tab][\/et_pb_tabs][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bbhttps:\/\/www.mdtel.es\/tech\/contacto_mdtel\/\u00bb button_text=\u00bbContactar\u00bb button_alignment=\u00bbright\u00bb button_alignment_tablet=\u00bbright\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#144f9b\u00bb button_border_width=\u00bb1px\u00bb button_border_color=\u00bb#0C71C3&#8243; button_border_radius=\u00bb30px\u00bb button_font=\u00bb|300|||||||\u00bb button_use_icon=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb button_bg_color__hover_enabled=\u00bbon|desktop\u00bb button_bg_color__hover=\u00bb#d6d6d6&#8243; button_bg_enable_color__hover=\u00bbon\u00bb button_border_color__hover_enabled=\u00bbon|hover\u00bb button_border_color__hover=\u00bbrgba(165,165,165,0.09)\u00bb button_text_color__hover_enabled=\u00bbon|hover\u00bb button_text_color__hover=\u00bb#144f9b\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbFeatures\u00bb _builder_version=\u00bb4.17.6&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bbRGBA(255,255,255,0)\u00bb custom_margin=\u00bb||||false|false\u00bb custom_padding=\u00bb12px||10px||false|false\u00bb animation_direction=\u00bbleft\u00bb border_radii=\u00bboff||||\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_row _builder_version=\u00bb4.17.6&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb7px||17px|||\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.17.6&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_text _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bb||||||||\u00bb text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.5em\u00bb header_font=\u00bb||||||||\u00bb header_text_align=\u00bbleft\u00bb header_2_font=\u00bb||||||||\u00bb header_2_font_size=\u00bb23px\u00bb header_2_line_height=\u00bb1.4em\u00bb header_3_font=\u00bb||||||||\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb47px|||||\u00bb header_2_font_size_tablet=\u00bb14px\u00bb header_2_font_size_phone=\u00bb13px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb]<\/p>\n<h2 style=\"text-align: center;\"><span style=\"color: #0b83b7;\"><span style=\"color: #808080;\">Tambi\u00e9n te puede interesar<\/span><\/span><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb||76px|||\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb|||\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_text _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bb||||||||\u00bb text_text_color=\u00bb#144f9b\u00bb text_font_size=\u00bb15px\u00bb text_line_height=\u00bb2.2em\u00bb link_option_url=\u00bbhttps:\/\/www.mdtel.es\/tech\/ciberseguridad\/\u00bb text_font_size_tablet=\u00bb14px\u00bb text_font_size_phone=\u00bb13px\u00bb text_font_size_last_edited=\u00bbon|phone\u00bb border_radii=\u00bbon|20px|20px|20px|20px\u00bb border_width_all=\u00bb2px\u00bb border_color_all=\u00bb#144f9b\u00bb global_colors_info=\u00bb{}\u00bb text_text_color__hover_enabled=\u00bboff|hover\u00bb text_text_color__hover=\u00bb#144f9b\u00bb transform_styles__hover_enabled=\u00bbon|hover\u00bb transform_scale__hover=\u00bb105%|105%\u00bb transform_scale__hover_enabled=\u00bbon|hover\u00bb transform_translate__hover_enabled=\u00bbon|desktop\u00bb transform_rotate__hover_enabled=\u00bbon|desktop\u00bb transform_skew__hover_enabled=\u00bbon|desktop\u00bb transform_origin__hover_enabled=\u00bbon|desktop\u00bb theme_builder_area=\u00bbpost_content\u00bb]<\/p>\n<p style=\"text-align: center;\">Ciberseguridad<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb|||\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_text _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bb||||||||\u00bb text_text_color=\u00bb#144f9b\u00bb text_font_size=\u00bb15px\u00bb text_line_height=\u00bb2.2em\u00bb link_option_url=\u00bbhttps:\/\/www.mdtel.es\/tech\/empresa\/\u00bb text_font_size_tablet=\u00bb14px\u00bb text_font_size_phone=\u00bb13px\u00bb text_font_size_last_edited=\u00bbon|phone\u00bb border_radii=\u00bbon|20px|20px|20px|20px\u00bb border_width_all=\u00bb2px\u00bb border_color_all=\u00bb#144f9b\u00bb global_colors_info=\u00bb{}\u00bb text_text_color__hover_enabled=\u00bboff|hover\u00bb text_text_color__hover=\u00bb#144f9b\u00bb transform_styles__hover_enabled=\u00bbon|hover\u00bb transform_scale__hover=\u00bb105%|105%\u00bb transform_scale__hover_enabled=\u00bbon|hover\u00bb transform_translate__hover_enabled=\u00bbon|desktop\u00bb transform_rotate__hover_enabled=\u00bbon|desktop\u00bb transform_skew__hover_enabled=\u00bbon|desktop\u00bb transform_origin__hover_enabled=\u00bbon|desktop\u00bb theme_builder_area=\u00bbpost_content\u00bb]<\/p>\n<p style=\"text-align: center;\">Empresa<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb|||\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_text _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bb||||||||\u00bb text_text_color=\u00bb#144f9b\u00bb text_font_size=\u00bb15px\u00bb text_line_height=\u00bb2.2em\u00bb link_option_url=\u00bbhttps:\/\/www.mdtel.es\/tech\/empresa\/calidad-y-compliance\/\u00bb text_font_size_tablet=\u00bb14px\u00bb text_font_size_phone=\u00bb13px\u00bb text_font_size_last_edited=\u00bbon|phone\u00bb border_radii=\u00bbon|20px|20px|20px|20px\u00bb border_width_all=\u00bb2px\u00bb border_color_all=\u00bb#144f9b\u00bb global_colors_info=\u00bb{}\u00bb text_text_color__hover_enabled=\u00bboff|hover\u00bb text_text_color__hover=\u00bb#144f9b\u00bb transform_styles__hover_enabled=\u00bbon|hover\u00bb transform_scale__hover=\u00bb105%|105%\u00bb transform_scale__hover_enabled=\u00bbon|hover\u00bb transform_translate__hover_enabled=\u00bbon|desktop\u00bb transform_rotate__hover_enabled=\u00bbon|desktop\u00bb transform_skew__hover_enabled=\u00bbon|desktop\u00bb transform_origin__hover_enabled=\u00bbon|desktop\u00bb theme_builder_area=\u00bbpost_content\u00bb]<\/p>\n<p style=\"text-align: center;\">Calidad y Compliance<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Somos especialistas enEndpoint SecuritySomos especialistas endetecci\u00f3n temprana de ciberataquesSomos especialistas endetecci\u00f3n temprana de ransomwareSomos especialistas endetecci\u00f3n temprana de phising<div class=\"et_pb_module lwp_divi_breadcrumbs lwp_divi_breadcrumbs_0\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"et_pb_module_inner\">\n\t\t\t\t\t<div class=\"lwp-breadcrumbs\"> <span class=\"before\"><\/span> <span vocab=\"https:\/\/schema.org\/\" typeof=\"BreadcrumbList\"><span property=\"itemListElement\" typeof=\"ListItem\"><a property=\"item\" typeof=\"WebPage\" href=\"https:\/\/www.mdtel.es\/tech\/\" class=\"home\"><span property=\"name\">Home<\/span><\/a><meta property=\"position\" content=\"1\"><\/span> <span class=\"separator et-pb-icon\">&amp;#x39;<\/span> <\/span><\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>En mdtel abordamos Endpoint Security (Crowdstrike)El panorama de amenazas creciente es cada vez m\u00e1s sofisticado y requiere que los dispositivos cuenten con sistemas de seguridad avanzados [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":2645,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-6545","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Endpoint Security | mdtel<\/title>\n<meta name=\"description\" content=\"En mdtel abordamos Endpoint Security (Crowdstrike)\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/endpoint-security\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Endpoint Security | mdtel\" \/>\n<meta property=\"og:description\" content=\"En mdtel abordamos Endpoint Security (Crowdstrike)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/endpoint-security\/\" \/>\n<meta property=\"og:site_name\" content=\"mdtel\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-22T19:01:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/sophos.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/endpoint-security\/\",\"url\":\"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/endpoint-security\/\",\"name\":\"Endpoint Security | mdtel\",\"isPartOf\":{\"@id\":\"https:\/\/www.mdtel.es\/tech\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/endpoint-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/endpoint-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/sophos.jpg\",\"datePublished\":\"2022-11-10T10:39:29+00:00\",\"dateModified\":\"2022-11-22T19:01:43+00:00\",\"description\":\"En mdtel abordamos Endpoint Security (Crowdstrike)\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/endpoint-security\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/endpoint-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/endpoint-security\/#primaryimage\",\"url\":\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/sophos.jpg\",\"contentUrl\":\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/sophos.jpg\",\"width\":489,\"height\":112},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/endpoint-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Ciberseguridad\",\"item\":\"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Endpoint Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mdtel.es\/tech\/#website\",\"url\":\"https:\/\/www.mdtel.es\/tech\/\",\"name\":\"mdtel\",\"description\":\"Telecomunicaciones para empresas\",\"publisher\":{\"@id\":\"https:\/\/www.mdtel.es\/tech\/#organization\"},\"alternateName\":\"Telecomunicaciones para empresas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mdtel.es\/tech\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mdtel.es\/tech\/#organization\",\"name\":\"mdtel\",\"alternateName\":\"Telecomunicaciones para empresas\",\"url\":\"https:\/\/www.mdtel.es\/tech\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.mdtel.es\/tech\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/logo-mdtel.png\",\"contentUrl\":\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/logo-mdtel.png\",\"width\":177,\"height\":83,\"caption\":\"mdtel\"},\"image\":{\"@id\":\"https:\/\/www.mdtel.es\/tech\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/es.linkedin.com\/company\/mdtelsa\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Endpoint Security | mdtel","description":"En mdtel abordamos Endpoint Security (Crowdstrike)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/endpoint-security\/","og_locale":"es_ES","og_type":"article","og_title":"Endpoint Security | mdtel","og_description":"En mdtel abordamos Endpoint Security (Crowdstrike)","og_url":"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/endpoint-security\/","og_site_name":"mdtel","article_modified_time":"2022-11-22T19:01:43+00:00","og_image":[{"url":"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/sophos.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/endpoint-security\/","url":"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/endpoint-security\/","name":"Endpoint Security | mdtel","isPartOf":{"@id":"https:\/\/www.mdtel.es\/tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/endpoint-security\/#primaryimage"},"image":{"@id":"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/endpoint-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/sophos.jpg","datePublished":"2022-11-10T10:39:29+00:00","dateModified":"2022-11-22T19:01:43+00:00","description":"En mdtel abordamos Endpoint Security (Crowdstrike)","breadcrumb":{"@id":"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/endpoint-security\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mdtel.es\/tech\/ciberseguridad\/endpoint-security\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/endpoint-security\/#primaryimage","url":"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/sophos.jpg","contentUrl":"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/sophos.jpg","width":489,"height":112},{"@type":"BreadcrumbList","@id":"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/endpoint-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Ciberseguridad","item":"https:\/\/www.mdtel.es\/tech\/ciberseguridad\/"},{"@type":"ListItem","position":2,"name":"Endpoint Security"}]},{"@type":"WebSite","@id":"https:\/\/www.mdtel.es\/tech\/#website","url":"https:\/\/www.mdtel.es\/tech\/","name":"mdtel","description":"Telecomunicaciones para empresas","publisher":{"@id":"https:\/\/www.mdtel.es\/tech\/#organization"},"alternateName":"Telecomunicaciones para empresas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mdtel.es\/tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.mdtel.es\/tech\/#organization","name":"mdtel","alternateName":"Telecomunicaciones para empresas","url":"https:\/\/www.mdtel.es\/tech\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.mdtel.es\/tech\/#\/schema\/logo\/image\/","url":"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/logo-mdtel.png","contentUrl":"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/logo-mdtel.png","width":177,"height":83,"caption":"mdtel"},"image":{"@id":"https:\/\/www.mdtel.es\/tech\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/es.linkedin.com\/company\/mdtelsa"]}]}},"_links":{"self":[{"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/pages\/6545","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/comments?post=6545"}],"version-history":[{"count":16,"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/pages\/6545\/revisions"}],"predecessor-version":[{"id":7671,"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/pages\/6545\/revisions\/7671"}],"up":[{"embeddable":true,"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/pages\/2645"}],"wp:attachment":[{"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/media?parent=6545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}