{"id":1083,"date":"2021-05-10T21:23:41","date_gmt":"2021-05-10T21:23:41","guid":{"rendered":"http:\/\/www2.seguridadar.com\/?page_id=1083"},"modified":"2021-06-09T20:49:55","modified_gmt":"2021-06-09T20:49:55","slug":"beyondtrust-2","status":"publish","type":"page","link":"https:\/\/www.seguridadar.com\/?page_id=1083","title":{"rendered":"beyondTrust"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/www.seguridadar.com\/wp-content\/uploads\/2021\/05\/earth-3866609_1280.jpg&#8221;][et_pb_row _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.seguridadar.com\/wp-content\/uploads\/2021\/04\/BeyondTrust_Horiz.png&#8221; title_text=&#8221;BeyondTrust_Horiz&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_row _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; text_font=&#8221;Share Tech||||||||&#8221; text_text_color=&#8221;rgba(0,0,0,0.02)&#8221; text_font_size=&#8221;100px&#8221; text_line_height=&#8221;0.2em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Share Tech||||||||&#8221; header_2_font_size=&#8221;48px&#8221; header_2_line_height=&#8221;1.4em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||30px||false&#8221; custom_margin_tablet=&#8221;||0px|&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; text_font_size_tablet=&#8221;80px&#8221; text_font_size_phone=&#8221;60px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;36px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221;]<\/p>\n<h2><\/h2>\n<h2><\/h2>\n<h2 class=\"section-heading\" id=\"el-enfoque-moderno-para-la-gesti\u00f3n-de-privilegios\">El Enfoque Moderno para la Gesti\u00f3n de Privilegios<\/h2>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;3.27.4&#8243; text_font=&#8221;Open Sans||||||||&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; max_width_last_edited=&#8221;off|desktop&#8221;]<\/p>\n<p style=\"text-align: center;\">El enfoque de Gesti\u00f3n Universal de Privilegios de BeyondTrust crea una experiencia \u00fanica para los usuarios, ofreciendo el nivel de acceso que necesitan, en el momento adecuado. Conozca las soluciones que Seguridad Inform\u00e1tica le brinda a trav\u00e9s de BeyondTrust<\/p>\n<p><strong><\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-2px|||||&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Password Safe&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%202%%&#8221; icon_color=&#8221;#ffa727&#8243; icon_placement=&#8221;left&#8221; content_max_width=&#8221;1100px&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;28px&#8221; _builder_version=&#8221;4.9.0&#8243; header_font=&#8221;Share Tech||||||||&#8221; header_text_color=&#8221;#515a58&#8243; header_font_size=&#8221;24px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Open Sans||||||||&#8221; body_text_color=&#8221;#515a58&#8243; body_line_height=&#8221;1.8em&#8221; background_layout=&#8221;dark&#8221; custom_padding=&#8221;|||&#8221; animation_style=&#8221;fold&#8221; animation_delay=&#8221;150ms&#8221; animation=&#8221;off&#8221; locked=&#8221;off&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">Administraci\u00f3n de Cuentas Privilegiadas. Controla y audita el acceso a cuentas privilegiadas tales como cuentas administrativas compartidas, cuentas de aplicaciones, cuentas administrativas locales, cuentas de servicio, cuentas de bases de datos, cuentas en la nube y redes sociales, dispositivos y claves SSH.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><span>Opciones: On-Premise, SaaS<\/span>\u00a0<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.seguridadar.com\/wp-content\/uploads\/2021\/05\/solutions-password-management-750.png&#8221; title_text=&#8221;solutions-password-management-750&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.seguridadar.com\/wp-content\/uploads\/2021\/05\/pexels-dids-2675055.jpg&#8221; title_text=&#8221;pexels-dids-2675055&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Privilege Management for Windows and MAC&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%202%%&#8221; icon_color=&#8221;#ffa727&#8243; icon_placement=&#8221;left&#8221; content_max_width=&#8221;1100px&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;28px&#8221; _builder_version=&#8221;4.9.4&#8243; header_font=&#8221;Share Tech||||||||&#8221; header_text_color=&#8221;#515a58&#8243; header_font_size=&#8221;24px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Open Sans||||||||&#8221; body_text_color=&#8221;#515a58&#8243; body_line_height=&#8221;1.8em&#8221; background_layout=&#8221;dark&#8221; custom_padding=&#8221;|||&#8221; animation_style=&#8221;fold&#8221; animation_delay=&#8221;150ms&#8221; animation=&#8221;off&#8221; locked=&#8221;off&#8221;]<\/p>\n<p>Gesti\u00f3n integral de privilegios para proteger los sistemas Windows y MAC. Es una soluci\u00f3n de administraci\u00f3n de privilegios que le brinda visibilidad y control sobre estaciones de trabajo y servidores, f\u00edsicos y virtuales de la empresa, adicionalmente permite administrar dispositivos en red, como IoT, ICS y SCADA.<\/p>\n<p>Opciones: On-Premise , SaaS<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Privilege Management for Unix \/ Linux Server\u00b4s and Network Devices&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%202%%&#8221; icon_color=&#8221;#ffa727&#8243; icon_placement=&#8221;left&#8221; content_max_width=&#8221;1100px&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;28px&#8221; _builder_version=&#8221;4.9.4&#8243; header_font=&#8221;Share Tech||||||||&#8221; header_text_color=&#8221;#515a58&#8243; header_font_size=&#8221;24px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Open Sans||||||||&#8221; body_text_color=&#8221;#515a58&#8243; body_line_height=&#8221;1.8em&#8221; background_layout=&#8221;dark&#8221; custom_padding=&#8221;27px|||||&#8221; animation_style=&#8221;fold&#8221; animation_delay=&#8221;150ms&#8221; animation=&#8221;off&#8221; locked=&#8221;off&#8221;]<\/p>\n<p>Gesti\u00f3n integral de privilegios y sesiones para proteger los sistemas Unix Linux y dispositivos de red, IoT, ICS y SCADA. Controla qu\u00e9 comandos pueden ejecutar los usuarios, graba sesiones y proporciona un seguimiento de auditor\u00eda completo de la actividad del usuario. Ayuda a las \u00e1reas de Seguridad y TI de la Empresa a lograr el cumplimiento leyes y regulaciones, controlar el acceso privilegiado y prevenir y contener acciones que pueden afectar los sistemas Unix, Linux, y dispositivos de red. En el caso de SUDO maneja una Pol\u00edtica centralizada, registro y control de versiones con gesti\u00f3n de cambios para m\u00faltiples archivos que requieren privilegios administrativos.<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; module_class=&#8221; et_pb_row_fullwidth&#8221; _builder_version=&#8221;4.9.0&#8243; width=&#8221;89%&#8221; width_tablet=&#8221;80%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|desktop&#8221; max_width=&#8221;89%&#8221; max_width_tablet=&#8221;80%&#8221; max_width_phone=&#8221;&#8221; max_width_last_edited=&#8221;on|desktop&#8221; module_alignment=&#8221;center&#8221; make_fullwidth=&#8221;on&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/www.seguridadar.com\/wp-content\/uploads\/2021\/05\/AD.jpg&#8221; title_text=&#8221;AD&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;center&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#efefef&#8221;][\/et_pb_image][et_pb_blurb title=&#8221;AD Bridge&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%202%%&#8221; icon_color=&#8221;#ffa727&#8243; icon_placement=&#8221;left&#8221; content_max_width=&#8221;1100px&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;28px&#8221; _builder_version=&#8221;4.9.4&#8243; header_font=&#8221;Share Tech||||||||&#8221; header_text_color=&#8221;#515a58&#8243; header_font_size=&#8221;24px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Open Sans||||||||&#8221; body_text_color=&#8221;#515a58&#8243; body_line_height=&#8221;1.8em&#8221; background_layout=&#8221;dark&#8221; custom_padding=&#8221;|||&#8221; animation_style=&#8221;fold&#8221; animation_delay=&#8221;150ms&#8221; animation=&#8221;off&#8221; locked=&#8221;off&#8221;]<\/p>\n<p><span>Centraliza la autenticaci\u00f3n para entornos Unix, Linux y Mac al extender la autenticaci\u00f3n Kerberos de Active Directory y las capacidades de inicio de sesi\u00f3n \u00fanico a estas plataformas. Al extender la Pol\u00edtica de grupo a plataformas que no son de Windows, proporciona administraci\u00f3n de configuraci\u00f3n centralizada.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/www.seguridadar.com\/wp-content\/uploads\/2021\/05\/remote-a.jpg&#8221; title_text=&#8221;remote a&#8221; align=&#8221;center&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;center&#8221;][\/et_pb_image][et_pb_blurb title=&#8221;Privilege Remote Access&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%202%%&#8221; icon_color=&#8221;#ffa727&#8243; icon_placement=&#8221;left&#8221; content_max_width=&#8221;1100px&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;28px&#8221; _builder_version=&#8221;4.9.4&#8243; header_font=&#8221;Share Tech||||||||&#8221; header_text_color=&#8221;#515a58&#8243; header_font_size=&#8221;24px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Open Sans||||||||&#8221; body_text_color=&#8221;#515a58&#8243; body_line_height=&#8221;1.8em&#8221; background_layout=&#8221;dark&#8221; custom_padding=&#8221;|||&#8221; animation_style=&#8221;fold&#8221; animation_delay=&#8221;150ms&#8221; animation=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Es una soluci\u00f3n de gesti\u00f3n de acceso remoto que permite dar acceso a los recursos internos de TI desde fuera de la red. Est\u00e1 pensado para empleados, proveedores externos o colaboradores que necesitan acceder de forma totalmente segura, sin recurrir a accesos VPN. Aporta trazabilidad completa y un control total sobre lo que los usuarios pueden hacer durante las conexiones.<\/p>\n<p><a href=\"https:\/\/www.seguridadar.com\/?page_id=858\"><span style=\"text-decoration: underline;\"><strong><span style=\"color: #ff6600; text-decoration: underline;\">Conozca m\u00e1s<\/span><\/strong><\/span><\/a><\/p>\n<p><strong><span style=\"color: #e09900;\">\u00a0<\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/www.seguridadar.com\/wp-content\/uploads\/2021\/05\/remote-support.jpg&#8221; title_text=&#8221;remote-support&#8221; align=&#8221;center&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;center&#8221;][\/et_pb_image][et_pb_blurb title=&#8221;Remote Support&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%202%%&#8221; icon_color=&#8221;#ffa727&#8243; icon_placement=&#8221;left&#8221; content_max_width=&#8221;1100px&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;28px&#8221; _builder_version=&#8221;4.9.4&#8243; header_font=&#8221;Share Tech||||||||&#8221; header_text_color=&#8221;#515a58&#8243; header_font_size=&#8221;24px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Open Sans||||||||&#8221; body_text_color=&#8221;#515a58&#8243; body_line_height=&#8221;1.8em&#8221; background_layout=&#8221;dark&#8221; custom_padding=&#8221;|||&#8221; animation_style=&#8221;fold&#8221; animation_delay=&#8221;150ms&#8221; animation=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Es una soluci\u00f3n de asistencia t\u00e9cnica que facilita la conexi\u00f3n remota para asistencia t\u00e9cnica a clientes externos. Permite que los t\u00e9cnicos de soporte se conecten en remoto con la m\u00e1xima rapidez y seguridad, otorgando tambi\u00e9n una trazabilidad completa sobre las acciones realizadas durante la sesi\u00f3n remota.<\/p>\n<p><a href=\"https:\/\/www.seguridadar.com\/?page_id=854\"><span style=\"text-decoration: underline;\"><strong><span style=\"color: #ff6600; text-decoration: underline;\">Conozca m\u00e1s<\/span><\/strong><\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/www.seguridadar.com\/wp-content\/uploads\/2021\/05\/DEVOPS-SECRETS-SAFE.jpg&#8221; title_text=&#8221;DEVOPS SECRETS SAFE&#8221; align=&#8221;center&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;center&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#efefef&#8221;][\/et_pb_image][et_pb_blurb title=&#8221;Devops Secrets Safe&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%202%%&#8221; icon_color=&#8221;#ffa727&#8243; icon_placement=&#8221;left&#8221; content_max_width=&#8221;1100px&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;28px&#8221; _builder_version=&#8221;4.9.0&#8243; header_font=&#8221;Share Tech||||||||&#8221; header_text_color=&#8221;#515a58&#8243; header_font_size=&#8221;24px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Open Sans||||||||&#8221; body_text_color=&#8221;#515a58&#8243; body_line_height=&#8221;1.8em&#8221; background_layout=&#8221;dark&#8221; custom_padding=&#8221;|||&#8221; animation_style=&#8221;fold&#8221; animation_delay=&#8221;150ms&#8221; animation=&#8221;off&#8221; locked=&#8221;off&#8221;]<\/p>\n<p><span>DevOps Secrets Safe es una soluci\u00f3n altamente escalable que se adapta a la velocidad y agilidad requeridas en los flujos de trabajo din\u00e1micos de DevOps. Ayudar\u00e1 a las organizaciones a limitar el riesgo asociado con credenciales y secretos privilegiados no administrados sustanciales sin causar fricciones en entornos altamente din\u00e1micos como DevOps.<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f9f9f9&#8243; custom_padding=&#8221;|||30px|false|false&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/www.seguridadar.com\/wp-content\/uploads\/2021\/05\/pexels-lisa-1957477.jpg&#8221;][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|600|||||||&#8221;]<\/p>\n\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f1230-o1\" lang=\"es-ES\" dir=\"ltr\" data-wpcf7-id=\"1230\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/index.php?rest_route=%2Fwp%2Fv2%2Fpages%2F1083#wpcf7-f1230-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"1230\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"es_ES\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f1230-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<p><label> Nombre (requerido)<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span> <\/label>\n<\/p>\n<p><label> Apellido (requerido)<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"tu-apellido\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"tu-apellido\" \/><\/span> <\/label>\n<\/p>\n<p><label> Cargo (requerido)<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"tu-cargo\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"tu-cargo\" \/><\/span> <\/label>\n<\/p>\n<p><label> Empresa (requerido)<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"tu-empresa\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"tu-empresa\" \/><\/span> <\/label>\n<\/p>\n<p><label> Correo electr\u00f3nico (requerido)<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span> <\/label>\n<\/p>\n<p><label> Tel\u00e9fono (requerido)<br \/>\n[text* tel\u00e9fono] <\/label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"tel-638\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"tel\" name=\"tel-638\" \/><\/span>\n<\/p>\n<p><label> \u00bfTe gustar\u00eda solicitar una Demo?<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"Tegustarasolicitarunademo\"><span class=\"wpcf7-form-control wpcf7-checkbox\"><span class=\"wpcf7-list-item first\"><input type=\"checkbox\" name=\"Tegustarasolicitarunademo[]\" value=\"S\u00ed\" \/><span class=\"wpcf7-list-item-label\">S\u00ed<\/span><\/span><span class=\"wpcf7-list-item last\"><input type=\"checkbox\" name=\"Tegustarasolicitarunademo[]\" value=\"No\" \/><span class=\"wpcf7-list-item-label\">No<\/span><\/span><\/span><\/span><br \/>\n<\/label><label> \u00bfC\u00f3mo te gustar\u00eda que nos pongamos en contacto?<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"checkbox-145\"><span class=\"wpcf7-form-control wpcf7-checkbox wpcf7-validates-as-required\"><span class=\"wpcf7-list-item first\"><input type=\"checkbox\" name=\"checkbox-145[]\" value=\"Tel\u00e9fono\" \/><span class=\"wpcf7-list-item-label\">Tel\u00e9fono<\/span><\/span><span class=\"wpcf7-list-item\"><input type=\"checkbox\" name=\"checkbox-145[]\" value=\"Correo Electr\u00f3nico\" \/><span class=\"wpcf7-list-item-label\">Correo Electr\u00f3nico<\/span><\/span><span class=\"wpcf7-list-item last\"><input type=\"checkbox\" name=\"checkbox-145[]\" value=\"Suscripci\u00f3n a novedades\" \/><span class=\"wpcf7-list-item-label\">Suscripci\u00f3n a novedades<\/span><\/span><\/span><\/span><br \/>\n<input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Enviar\" \/><\/label>\n<\/p><p style=\"display: none !important;\" class=\"akismet-fields-container\" data-prefix=\"_wpcf7_ak_\"><label>&#916;<textarea name=\"_wpcf7_ak_hp_textarea\" cols=\"45\" rows=\"8\" maxlength=\"100\"><\/textarea><\/label><input type=\"hidden\" id=\"ak_js_1\" name=\"_wpcf7_ak_js\" value=\"233\"\/><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\ndocument.getElementById( \"ak_js_1\" ).setAttribute( \"value\", ( new Date() ).getTime() );\n\/* ]]> *\/\n<\/script>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;off|desktop&#8221; admin_label=&#8221;Footer&#8221; _builder_version=&#8221;3.22&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#004872&#8243; background_color_gradient_end=&#8221;rgba(41,17,96,0.8)&#8221; background_color_gradient_direction=&#8221;140deg&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_image=&#8221;https:\/\/www.seguridadar.com\/wp-content\/uploads\/2018\/10\/it-services-04.jpg&#8221; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;120px|0px|120px|0px|true|false&#8221; custom_padding_tablet=&#8221;10vw||10vw||true&#8221; custom_padding_phone=&#8221;5vw||5vw||true&#8221; locked=&#8221;off&#8221;][et_pb_row column_structure=&#8221;2_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;27px|0px|13px|0px|false|false&#8221; use_custom_width=&#8221;on&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_contact_form captcha=&#8221;off&#8221; email=&#8221; info@seguridadar.com&#8221; title=&#8221;\u00a1Estamos aqu\u00ed para ayudarlo!&#8221; success_message=&#8221;Su mensaje ha sido enviado con \u00e9xito. En breve lo contactaremos.&#8221; submit_button_text=&#8221;ENVIAR&#8221; module_id=&#8221;et_pb_contact_form_0&#8243; _builder_version=&#8221;3.23&#8243; form_field_background_color=&#8221;rgba(255,255,255,0.07)&#8221; form_field_text_color=&#8221;#ffffff&#8221; title_level=&#8221;h2&#8243; title_font=&#8221;Share Tech||||||||&#8221; title_text_color=&#8221;#ffffff&#8221; title_font_size=&#8221;50px&#8221; title_line_height=&#8221;1.2em&#8221; form_field_font=&#8221;|700|||||||&#8221; form_field_font_size=&#8221;18px&#8221; form_field_letter_spacing=&#8221;2px&#8221; form_field_line_height=&#8221;1.8em&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;15px&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#ffa727&#8243; button_border_width=&#8221;10px&#8221; button_border_color=&#8221;#ffa727&#8243; button_border_radius=&#8221;100px&#8221; button_letter_spacing=&#8221;5px&#8221; button_font=&#8221;Open Sans|700||on|||||&#8221; button_use_icon=&#8221;off&#8221; button_text_size_last_edited=&#8221;off|desktop&#8221; border_width_bottom=&#8221;2px&#8221; border_color_bottom=&#8221;#ffffff&#8221; form_background_color=&#8221;rgba(255,255,255,0.07)&#8221; button_bg_color_hover=&#8221;#ff8a3d&#8221; button_border_color_hover=&#8221;#ff8a3d&#8221; button_border_radius_hover=&#8221;100px&#8221; button_letter_spacing_hover=&#8221;5px&#8221;][et_pb_contact_field field_id=&#8221;Name&#8221; field_title=&#8221;Nombre&#8221; _builder_version=&#8221;3.16&#8243; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Email&#8221; field_title=&#8221;Correo electr\u00f3nico&#8221; field_type=&#8221;email&#8221; _builder_version=&#8221;3.19.5&#8243; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Field_4&#8243; field_title=&#8221;Empresa&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;3.19.5&#8243;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Message&#8221; field_title=&#8221;Escriba su consulta&#8221; field_type=&#8221;text&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;3.16&#8243; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;120px|||&#8221; custom_padding_tablet=&#8221;0px|||&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;Nuestras Oficinas&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%249%%&#8221; icon_color=&#8221;#ffa727&#8243; icon_placement=&#8221;left&#8221; content_max_width=&#8221;1100px&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;28px&#8221; _builder_version=&#8221;3.8&#8243; header_font=&#8221;Share Tech||||||||&#8221; header_font_size=&#8221;24px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Open Sans||||||||&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_layout=&#8221;dark&#8221; custom_padding=&#8221;|||&#8221; animation_style=&#8221;fold&#8221; animation_delay=&#8221;150ms&#8221; animation=&#8221;off&#8221; locked=&#8221;off&#8221;]<\/p>\n<p>Av. Cabildo 1030, (C1426AAX), C.A.B.A., Argentina.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Horario&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%227%%&#8221; icon_color=&#8221;#ffa727&#8243; icon_placement=&#8221;left&#8221; content_max_width=&#8221;1100px&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;28px&#8221; _builder_version=&#8221;3.8&#8243; header_font=&#8221;Share Tech||||||||&#8221; header_font_size=&#8221;24px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Open Sans||||||||&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_layout=&#8221;dark&#8221; custom_padding=&#8221;|||&#8221; animation_style=&#8221;fold&#8221; animation_delay=&#8221;150ms&#8221; animation=&#8221;off&#8221; locked=&#8221;off&#8221;]L-V: 9 am &#8211; 6 pm<br \/>\n[\/et_pb_blurb][et_pb_blurb title=&#8221;Ll\u00e1menos&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%264%%&#8221; icon_color=&#8221;#ffa727&#8243; icon_placement=&#8221;left&#8221; content_max_width=&#8221;1100px&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;28px&#8221; _builder_version=&#8221;3.8&#8243; header_font=&#8221;Share Tech||||||||&#8221; header_font_size=&#8221;24px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Open Sans||||||||&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; background_layout=&#8221;dark&#8221; custom_padding=&#8221;|||&#8221; animation_style=&#8221;fold&#8221; animation_delay=&#8221;150ms&#8221; animation=&#8221;off&#8221; locked=&#8221;off&#8221;]+ 54 11 4784-4352<br \/>\n[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243; background_color=&#8221;#171717&#8243; custom_padding=&#8221;0px||0px|||&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; custom_margin=&#8221;-13px|||||&#8221; custom_padding=&#8221;0px|||||&#8221;]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\">Copyright \u00a9 2021 Seguridad Inform\u00e1tica SRL |\u00a0 <\/span><a href=\"mailto:info@seguridadar.com\" data-rawhref=\"mailto:info@seguridadar.com\" target=\"_blank\" rel=\"noopener noreferrer\" style=\"font-size: 14px; color: #ffffff;\">info@seguridadar.com<\/a><\/p>\n<p style=\"text-align: center;\"><span color=\"#ffffff\" style=\"color: #ffffff;\">Dise\u00f1ado por <a href=\"https:\/\/www.juicyminds.com.ar\/\">Juicy Minds<\/a><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>El Enfoque Moderno para la Gesti\u00f3n de Privilegios &nbsp;El enfoque de Gesti\u00f3n Universal de Privilegios de BeyondTrust crea una experiencia \u00fanica para los usuarios, ofreciendo el nivel de acceso que necesitan, en el momento adecuado. Conozca las soluciones que Seguridad Inform\u00e1tica le brinda a trav\u00e9s de BeyondTrust Administraci\u00f3n de Cuentas Privilegiadas. Controla y audita el [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-1083","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>beyondTrust - Seguridad Informatica<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.seguridadar.com\/?page_id=1083\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"beyondTrust - Seguridad Informatica\" \/>\n<meta property=\"og:description\" content=\"El Enfoque Moderno para la Gesti\u00f3n de Privilegios &nbsp;El enfoque de Gesti\u00f3n Universal de Privilegios de BeyondTrust crea una experiencia \u00fanica para los usuarios, ofreciendo el nivel de acceso que necesitan, en el momento adecuado. Conozca las soluciones que Seguridad Inform\u00e1tica le brinda a trav\u00e9s de BeyondTrust Administraci\u00f3n de Cuentas Privilegiadas. Controla y audita el [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.seguridadar.com\/?page_id=1083\" \/>\n<meta property=\"og:site_name\" content=\"Seguridad Informatica\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-09T20:49:55+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.seguridadar.com\\\/?page_id=1083\",\"url\":\"https:\\\/\\\/www.seguridadar.com\\\/?page_id=1083\",\"name\":\"beyondTrust - Seguridad Informatica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.seguridadar.com\\\/#website\"},\"datePublished\":\"2021-05-10T21:23:41+00:00\",\"dateModified\":\"2021-06-09T20:49:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.seguridadar.com\\\/?page_id=1083#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.seguridadar.com\\\/?page_id=1083\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.seguridadar.com\\\/?page_id=1083#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.seguridadar.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"beyondTrust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.seguridadar.com\\\/#website\",\"url\":\"https:\\\/\\\/www.seguridadar.com\\\/\",\"name\":\"Seguridad Informatica\",\"description\":\"Seguridad Informatica\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.seguridadar.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"beyondTrust - Seguridad Informatica","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.seguridadar.com\/?page_id=1083","og_locale":"en_US","og_type":"article","og_title":"beyondTrust - Seguridad Informatica","og_description":"El Enfoque Moderno para la Gesti\u00f3n de Privilegios &nbsp;El enfoque de Gesti\u00f3n Universal de Privilegios de BeyondTrust crea una experiencia \u00fanica para los usuarios, ofreciendo el nivel de acceso que necesitan, en el momento adecuado. Conozca las soluciones que Seguridad Inform\u00e1tica le brinda a trav\u00e9s de BeyondTrust Administraci\u00f3n de Cuentas Privilegiadas. Controla y audita el [&hellip;]","og_url":"https:\/\/www.seguridadar.com\/?page_id=1083","og_site_name":"Seguridad Informatica","article_modified_time":"2021-06-09T20:49:55+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.seguridadar.com\/?page_id=1083","url":"https:\/\/www.seguridadar.com\/?page_id=1083","name":"beyondTrust - Seguridad Informatica","isPartOf":{"@id":"https:\/\/www.seguridadar.com\/#website"},"datePublished":"2021-05-10T21:23:41+00:00","dateModified":"2021-06-09T20:49:55+00:00","breadcrumb":{"@id":"https:\/\/www.seguridadar.com\/?page_id=1083#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.seguridadar.com\/?page_id=1083"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.seguridadar.com\/?page_id=1083#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.seguridadar.com\/"},{"@type":"ListItem","position":2,"name":"beyondTrust"}]},{"@type":"WebSite","@id":"https:\/\/www.seguridadar.com\/#website","url":"https:\/\/www.seguridadar.com\/","name":"Seguridad Informatica","description":"Seguridad Informatica","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.seguridadar.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.seguridadar.com\/index.php?rest_route=\/wp\/v2\/pages\/1083","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.seguridadar.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.seguridadar.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.seguridadar.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.seguridadar.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1083"}],"version-history":[{"count":19,"href":"https:\/\/www.seguridadar.com\/index.php?rest_route=\/wp\/v2\/pages\/1083\/revisions"}],"predecessor-version":[{"id":1317,"href":"https:\/\/www.seguridadar.com\/index.php?rest_route=\/wp\/v2\/pages\/1083\/revisions\/1317"}],"wp:attachment":[{"href":"https:\/\/www.seguridadar.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1083"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}