{"id":1565,"date":"2023-09-07T12:34:40","date_gmt":"2023-09-07T10:34:40","guid":{"rendered":"http:\/\/beroot.es\/?page_id=1565"},"modified":"2024-01-10T14:01:41","modified_gmt":"2024-01-10T13:01:41","slug":"seguridad-informatica","status":"publish","type":"page","link":"https:\/\/beroot.es\/index.php\/services\/seguridad-informatica\/","title":{"rendered":"Seguridad Inform\u00e1tica"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1565\" class=\"elementor elementor-1565\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7eb0977 e-flex e-con-boxed e-con e-parent\" data-id=\"7eb0977\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-04b2b8f e-flex e-con-boxed e-con e-child\" data-id=\"04b2b8f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-80ae0a5 e-con-full e-flex e-con e-child\" data-id=\"80ae0a5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-62a15c5 e-con-full e-flex e-con e-child\" data-id=\"62a15c5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f3fe419 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"f3fe419\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1600\" height=\"1200\" src=\"https:\/\/beroot.es\/wp-content\/uploads\/2023\/09\/wp2691519-3876227056.jpg\" class=\"attachment-full size-full wp-image-1820\" alt=\"\" srcset=\"https:\/\/beroot.es\/wp-content\/uploads\/2023\/09\/wp2691519-3876227056.jpg 1600w, https:\/\/beroot.es\/wp-content\/uploads\/2023\/09\/wp2691519-3876227056-300x225.jpg 300w, https:\/\/beroot.es\/wp-content\/uploads\/2023\/09\/wp2691519-3876227056-1024x768.jpg 1024w, https:\/\/beroot.es\/wp-content\/uploads\/2023\/09\/wp2691519-3876227056-768x576.jpg 768w, https:\/\/beroot.es\/wp-content\/uploads\/2023\/09\/wp2691519-3876227056-1536x1152.jpg 1536w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7dbac85 e-con-full e-flex e-con e-child\" data-id=\"7dbac85\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b29c7c8 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"b29c7c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-small\">Servicios de Ciberseguridad<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9cce70e elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"9cce70e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Hoy en d\u00eda internet se ha convertido en un espacio fundamental para nuestra sociedad. Es el lugar del que dependen negocios y relaciones personales alrededor de todo el mundo. Una parte de nuestra identidad se construye en el espacio digital. Si bien esto es una revoluci\u00f3n tecnologica con una ingente cantidad de posibilidades, el ciberespacio no est\u00e1 exento de riesgos, que en muchos casos desconocemos, lo cual los hace a\u00fan m\u00e1s peligrosos.<\/p><p>En un mundo donde los ciberataques y las estafas por internet son cada vez m\u00e1s comunes, pretendo acercar los servicios de seguridad a diferentes personas, proyectos y negocios para que puedan prevenir los riesgos a los que estamos expuestos en una sociedad digital.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e4ba80 e-flex e-con-boxed e-con e-parent\" data-id=\"3e4ba80\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eaa7b27 elementor-widget elementor-widget-heading\" data-id=\"eaa7b27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Como puedo ayudarte a mejorar la seguridad<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e37dcce elementor-widget__width-initial elementor-widget-tablet__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"e37dcce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Si tienes dudas o quieres saber mejor de que tratan estos servicios puedes contactar conmigo sin ning\u00fan compromiso<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-82e3c64 e-flex e-con-boxed e-con e-parent\" data-id=\"82e3c64\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0428d73 e-con-full ct-iconbox e-flex e-con e-child\" data-id=\"0428d73\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-671df86 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"671df86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-user-secret\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAuditor\u00eda y PenTesting\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tServicios de auditoria a sistemas y aplicaciones o sitios web. Realizamos pruebas de penetraci\u00f3n para encontrar las vias de explotaci\u00f3n antes que los atacantes.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c43ebc elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"4c43ebc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#pentesting\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 18 18\"><path d=\"M15 3.6c0-.4-.4-.6-.7-.6H4C2.7 3 2.7 5 4 5h7.6l-8.3 8.3c-.9 1 .6 2.4 1.5 1.3l8.3-8.2v7.5c0 1.4 1.9 1.4 1.9 0z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">M\u00e1s informaci\u00f3n<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8137297 e-con-full ct-iconbox e-flex e-con e-child\" data-id=\"8137297\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1611710 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"1611710\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-bug\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAnalisis de Vulnerabilidades\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tEvaluac\u00edan del estado de seguridad de un sistema, web o dispositivo. Evaluaci\u00f3n de las vulnerabilidades existentes y elaboraci\u00f3n de propuestas de mitigaci\u00f3n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-460c3e3 elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"460c3e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#analisis-vuln\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 18 18\"><path d=\"M15 3.6c0-.4-.4-.6-.7-.6H4C2.7 3 2.7 5 4 5h7.6l-8.3 8.3c-.9 1 .6 2.4 1.5 1.3l8.3-8.2v7.5c0 1.4 1.9 1.4 1.9 0z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">M\u00e1s informaci\u00f3n<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b312cf e-con-full ct-iconbox e-flex e-con e-child\" data-id=\"6b312cf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d308cd elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"5d308cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chalkboard-teacher\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tFormaci\u00f3n y sensibilizaci\u00f3n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tServicios de formaci\u00f3n y sensibilizaci\u00f3n en materia de ciberseguridad para usuarios y equipos de trabajo\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-502c497 elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"502c497\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"http:\/\/192.168.0https:\/\/beroot.es\/index.php\/services\/formacion-y-sensibilizacion\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 18 18\"><path d=\"M15 3.6c0-.4-.4-.6-.7-.6H4C2.7 3 2.7 5 4 5h7.6l-8.3 8.3c-.9 1 .6 2.4 1.5 1.3l8.3-8.2v7.5c0 1.4 1.9 1.4 1.9 0z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">M\u00e1s informaci\u00f3n<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f3cfd01 e-con-full ct-iconbox e-flex e-con e-child\" data-id=\"f3cfd01\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-917f1d7 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"917f1d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chess\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tDise\u00f1o de estrateg\u00edas de seguridad\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tEvaluaci\u00f3n de los activos digitales de un proyecto y sus caracter\u00edsticas que nos permita desarrollar una estrategia o protocolo para mejorar la ciberseguridad en base a su tipo de actividad y riesgos. \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ccd5b71 elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"ccd5b71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#estrategias\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 18 18\"><path d=\"M15 3.6c0-.4-.4-.6-.7-.6H4C2.7 3 2.7 5 4 5h7.6l-8.3 8.3c-.9 1 .6 2.4 1.5 1.3l8.3-8.2v7.5c0 1.4 1.9 1.4 1.9 0z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">M\u00e1s informaci\u00f3n<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53a00ca e-con-full ct-iconbox e-flex e-con e-child\" data-id=\"53a00ca\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c96fa3c elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"c96fa3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-shield-virus\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tGesti\u00f3n de riesgos\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tPropuestas de implementaci\u00f3n de medidas para mitigar o resolver las brechas de seguridad encontradas. Reevaluaci\u00f3n del sistema para comprobar la efectividad de las medidas aplicadas.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d761838 elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"d761838\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#gestion-riesgos\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 18 18\"><path d=\"M15 3.6c0-.4-.4-.6-.7-.6H4C2.7 3 2.7 5 4 5h7.6l-8.3 8.3c-.9 1 .6 2.4 1.5 1.3l8.3-8.2v7.5c0 1.4 1.9 1.4 1.9 0z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">M\u00e1s informaci\u00f3n<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-477ddf5 e-con-full ct-iconbox e-flex e-con e-child\" data-id=\"477ddf5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61a4dfe elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"61a4dfe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-user-shield\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAsesor\u00eda\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tServicio de consultor\u00eda y resoluci\u00f3n de problemas sobre asuntos de seguridad dig\u00edtal y la seguridad de la informaci\u00f3n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47944e4 elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"47944e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#asesoria\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 18 18\"><path d=\"M15 3.6c0-.4-.4-.6-.7-.6H4C2.7 3 2.7 5 4 5h7.6l-8.3 8.3c-.9 1 .6 2.4 1.5 1.3l8.3-8.2v7.5c0 1.4 1.9 1.4 1.9 0z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">M\u00e1s informaci\u00f3n<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b8f25cd e-flex e-con-boxed e-con e-parent\" data-id=\"6b8f25cd\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1c43c81c e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"1c43c81c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;lightSpeedIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-50309ebd e-con-full e-flex e-con e-child\" data-id=\"50309ebd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-323e7764 elementor-widget elementor-widget-heading\" data-id=\"323e7764\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Necesitas ayuda?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-793f280 elementor-widget elementor-widget-text-editor\" data-id=\"793f280\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Contactacta con nosotros y cuentanos tu problema para que podamos hacerte un presupuesto ajustado a tu situaci\u00f3n<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-640a2cf9 e-con-full e-flex e-con e-child\" data-id=\"640a2cf9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-528a2786 elementor-widget elementor-widget-button\" data-id=\"528a2786\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"http:\/\/192.168.0.129\/beroot\/index.php\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contactanos<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-77f9febe e-flex e-con-boxed e-con e-parent\" data-id=\"77f9febe\" data-element_type=\"container\" data-e-type=\"container\" id=\"pentesting\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33d63bbc elementor-widget__width-initial elementor-widget-tablet__width-inherit animated-slow elementor-invisible elementor-widget elementor-widget-image\" data-id=\"33d63bbc\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-15.13.57-A-highly-detailed-modern-digital-illustration-for-a-web-page-showcasing-the-concept-of-pentesting-and-security-auditing.-In-the-foreground-a-profes.png\" class=\"attachment-large size-large wp-image-2051\" alt=\"\" srcset=\"https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-15.13.57-A-highly-detailed-modern-digital-illustration-for-a-web-page-showcasing-the-concept-of-pentesting-and-security-auditing.-In-the-foreground-a-profes.png 1024w, https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-15.13.57-A-highly-detailed-modern-digital-illustration-for-a-web-page-showcasing-the-concept-of-pentesting-and-security-auditing.-In-the-foreground-a-profes-300x300.png 300w, https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-15.13.57-A-highly-detailed-modern-digital-illustration-for-a-web-page-showcasing-the-concept-of-pentesting-and-security-auditing.-In-the-foreground-a-profes-150x150.png 150w, https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-15.13.57-A-highly-detailed-modern-digital-illustration-for-a-web-page-showcasing-the-concept-of-pentesting-and-security-auditing.-In-the-foreground-a-profes-768x768.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7b80905b e-con-full e-flex e-con e-child\" data-id=\"7b80905b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48ab9891 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"48ab9891\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Que es el pentesting<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f9dfa2e elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"3f9dfa2e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>El pentesting, tambi\u00e9n conocido como pruebas de penetraci\u00f3n, es un proceso crucial en la seguridad digital que simula ataques cibern\u00e9ticos en sistemas inform\u00e1ticos, redes o aplicaciones web para descubrir vulnerabilidades.<\/p><p>Pi\u00e9nsalo como un ejercicio en el que expertos en seguridad act\u00faan como ciberdelincuentes, pero de manera \u00e9tica y controlada, con el objetivo de encontrar y arreglar los puntos d\u00e9biles antes de que los ciberdelincuentes reales puedan explotarlos.<\/p><p>Este servicio es esencial para usuarios y empresas, ya que ayuda a proteger sus datos y sistemas contra posibles ataques cibern\u00e9ticos, garantizando as\u00ed una mayor seguridad y tranquilidad en el mundo digital.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-62edf071 e-flex e-con-boxed e-con e-parent\" data-id=\"62edf071\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4dd9eb0e e-con-full e-flex e-con e-child\" data-id=\"4dd9eb0e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7cf29655 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"7cf29655\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-small\">Servici\u00f3s de Auditor\u00eda<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-704d72d1 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"704d72d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Hoy en d\u00eda internet se ha convertido en un espacio fundamental para nuestra sociedad. Es el lugar del que dependen negocios y relaciones personales alrededor de todo el mundo. Una parte de nuestra identidad se construye en el espacio digital. Si bien esto es una revoluci\u00f3n tecnologica con una ingente cantidad de posibilidades, el ciberespacio no est\u00e1 exento de riesgos, que en muchos casos desconocemos, lo cual los hace a\u00fan m\u00e1s peligrosos.<\/p><p>Ofrecemos un servicio integral de Auditor\u00eda y PenTesting, clave para asegurar la fortaleza de tus sistemas inform\u00e1ticos, aplicaciones, sitios web y dispositivos m\u00f3viles. Imagina este servicio como un entrenamiento avanzado para tu infraestructura tecnol\u00f3gica, donde fortalecemos tus defensas antes de que los atacantes puedan encontrar y explotar cualquier debilidad.<\/p><p>En un mundo donde los ciberataques y las estafas por internet son cada vez m\u00e1s comunes, pretendemos acercar los servicios de auditor\u00eda y pentesting a diferentes proyectos y negocios para que puedan prevenir los riesgos a los que estamos expuestos en una sociedad digital.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f834667 elementor-tablet-align-center elementor-invisible elementor-widget elementor-widget-button\" data-id=\"2f834667\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;lightSpeedIn&quot;,&quot;_animation_delay&quot;:900}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/beroot.es\/index.php\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contactanos<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-530e2475 e-con-full e-flex e-con e-child\" data-id=\"530e2475\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-62b801f8 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"62b801f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nuestro objetivo es asegurarnos de que tus sistemas y aplicaciones est\u00e9n no solo cumpliendo con los est\u00e1ndares de seguridad actuales, sino que tambi\u00e9n est\u00e9n preparados para enfrentar las amenazas futuras.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5463b elementor-position-inline-start elementor-tablet-position-block-start elementor-view-default elementor-mobile-position-block-start elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"d5463b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tSitios y Aplicaciones Web:\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tConsidera tu sitio web y aplicaciones como tu presencia digital en el mundo. Nuestra auditor\u00eda es como un an\u00e1lisis exhaustivo para asegurarnos de que est\u00e1s presentando la mejor versi\u00f3n de ti mismo, libre de vulnerabilidades que puedan ser aprovechadas por personas malintencionadas.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c5f97bc elementor-position-inline-start elementor-tablet-position-block-start elementor-view-default elementor-mobile-position-block-start elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"3c5f97bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tSistemas, servidores y estaciones de trabajo:\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tEs como realizar una revisi\u00f3n detallada de los cimientos y estructuras de un edificio. Nos aseguramos de que tus sistemas operativos, servidores y estaciones de trabajo sean seguros y est\u00e9n protegidos contra cualquier intento de intrusi\u00f3n.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16c65ae elementor-position-inline-start elementor-tablet-position-block-start elementor-view-default elementor-mobile-position-block-start elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"16c65ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tRedes:\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tEsta auditor\u00eda es como examinar las carreteras y caminos que conectan tu mundo digital. Nos enfocamos en asegurar que tus redes sean robustas y seguras, evitando que invasores no deseados puedan acceder y comprometer tus datos.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2296ce89 elementor-position-inline-start elementor-tablet-position-block-start elementor-view-default elementor-mobile-position-block-start elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"2296ce89\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:800}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tDispositivos y Aplicaciones mobile\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tTus dispositivos m\u00f3viles son como tus mensajeros personales en el mundo digital. Realizamos una auditor\u00eda meticulosa para garantizar que estos mensajeros est\u00e9n bien protegidos y no sean vulnerables a ataques externos.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-120ff7c7 e-flex e-con-boxed e-con e-parent\" data-id=\"120ff7c7\" data-element_type=\"container\" data-e-type=\"container\" id=\"analisis-vuln\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-234518cf e-con-full e-flex e-con e-child\" data-id=\"234518cf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e9549f9 elementor-widget elementor-widget-heading\" data-id=\"7e9549f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Analisis de vulnerabilidades<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74fb6242 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"74fb6242\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>El servicio de an\u00e1lisis de vulnerabilidades es como un chequeo de salud para la seguridad de tu informaci\u00f3n digital.<\/p><p>Imagina que tu sistema inform\u00e1tico es una fortaleza; este servicio act\u00faa como un experto que examina cada rinc\u00f3n, desde las puertas hasta las paredes, buscando posibles debilidades o huecos por donde un intruso podr\u00eda entrar. Utiliza herramientas avanzadas para detectar puntos vulnerables en tus redes, aplicaciones o sistemas, identificando \u00e1reas que necesitan refuerzo.<\/p><p>Esto es vital para usuarios y empresas peque\u00f1as y medianas, ya que les proporciona un informe detallado de los riesgos y les orienta sobre c\u00f3mo mejorar su seguridad, protegiendo as\u00ed sus datos y operaciones en el competitivo y a menudo peligroso entorno digital.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e31080a elementor-widget__width-initial elementor-widget-tablet__width-inherit elementor-widget elementor-widget-image\" data-id=\"6e31080a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-17.02.50-A-conceptual-and-illustrative-digital-image-for-a-cybersecurity-service-website-visualizing-the-text-about-vulnerability-analysis-service.-The-image-.png\" class=\"attachment-large size-large wp-image-2081\" alt=\"\" srcset=\"https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-17.02.50-A-conceptual-and-illustrative-digital-image-for-a-cybersecurity-service-website-visualizing-the-text-about-vulnerability-analysis-service.-The-image-.png 1024w, https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-17.02.50-A-conceptual-and-illustrative-digital-image-for-a-cybersecurity-service-website-visualizing-the-text-about-vulnerability-analysis-service.-The-image--300x300.png 300w, https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-17.02.50-A-conceptual-and-illustrative-digital-image-for-a-cybersecurity-service-website-visualizing-the-text-about-vulnerability-analysis-service.-The-image--150x150.png 150w, https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-17.02.50-A-conceptual-and-illustrative-digital-image-for-a-cybersecurity-service-website-visualizing-the-text-about-vulnerability-analysis-service.-The-image--768x768.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3075d42d e-flex e-con-boxed e-con e-parent\" data-id=\"3075d42d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-11943e98 e-con-full e-flex e-con e-child\" data-id=\"11943e98\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6472a6ae elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"6472a6ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-small\">Tu Escudo Contra Amenazas Digitales<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4cf43b41 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"4cf43b41\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ofrecemos un servicio esencial de An\u00e1lisis de Vulnerabilidades, fundamental para garantizar la seguridad de tus sistemas inform\u00e1ticos, sitios web y dispositivos.<\/p><p>Piensa en este servicio como un chequeo m\u00e9dico para tu tecnolog\u00eda: identificamos posibles problemas de salud antes de que se conviertan en enfermedades serias.<\/p><p>Entendemos que la seguridad digital es m\u00e1s crucial que nunca. Nos dedicamos a proteger tu infraestructura tecnol\u00f3gica como si fuera nuestra, proporcion\u00e1ndote tranquilidad y confianza en un mundo digital cada vez m\u00e1s complejo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59020a93 elementor-tablet-align-center elementor-invisible elementor-widget elementor-widget-button\" data-id=\"59020a93\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;lightSpeedIn&quot;,&quot;_animation_delay&quot;:900}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/beroot.es\/index.php\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contactanos<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-44f524f1 e-con-full e-flex e-con e-child\" data-id=\"44f524f1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-285a3651 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"285a3651\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Queremos poner nuestras habilidades y conocimientos inform\u00e1ticos al servicio de las personas para que puedan recuperar parte se su soberan\u00eda y ser realmente due\u00f1os de sus dispositivos y software<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-402610f0 elementor-position-inline-start elementor-tablet-position-block-start elementor-view-default elementor-mobile-position-block-start elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"402610f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tEvaluaci\u00f3n Completa: \t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tAnalizamos meticulosamente para detectar cualquier vulnerabilidad que pueda ser explotada por agentes maliciosos.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b141173 elementor-position-inline-start elementor-tablet-position-block-start elementor-view-default elementor-mobile-position-block-start elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"b141173\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tIdentificaci\u00f3n de Vulnerabilidades:\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tIdentificamos las debilidades en tus sistemas y dispositivos antes de que puedan ser utilizadas en tu contra. Al conocer estas vulnerabilidades, podemos actuar proactivamente para protegerte.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e2a998b elementor-position-inline-start elementor-tablet-position-block-start elementor-view-default elementor-mobile-position-block-start elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"4e2a998b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tPropuestas de Mitigaci\u00f3n:\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tOfrecemos soluciones concretas y pr\u00e1cticas para fortalecer tus sistemas, minimizando los riesgos y mejorando la seguridad general.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3d84cf0b e-flex e-con-boxed e-con e-parent\" data-id=\"3d84cf0b\" data-element_type=\"container\" data-e-type=\"container\" id=\"estrategias\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4cc84ecc elementor-widget__width-initial elementor-widget-tablet__width-inherit animated-slow elementor-invisible elementor-widget elementor-widget-image\" data-id=\"4cc84ecc\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-16.40.25-A-creative-and-metaphorical-digital-illustration-to-visually-interpret-the-text-about-designing-security-strategies-likened-to-creating-a-personalize.png\" class=\"attachment-large size-large wp-image-2078\" alt=\"\" srcset=\"https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-16.40.25-A-creative-and-metaphorical-digital-illustration-to-visually-interpret-the-text-about-designing-security-strategies-likened-to-creating-a-personalize.png 1024w, https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-16.40.25-A-creative-and-metaphorical-digital-illustration-to-visually-interpret-the-text-about-designing-security-strategies-likened-to-creating-a-personalize-300x300.png 300w, https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-16.40.25-A-creative-and-metaphorical-digital-illustration-to-visually-interpret-the-text-about-designing-security-strategies-likened-to-creating-a-personalize-150x150.png 150w, https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-16.40.25-A-creative-and-metaphorical-digital-illustration-to-visually-interpret-the-text-about-designing-security-strategies-likened-to-creating-a-personalize-768x768.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-70cbab0c e-con-full e-flex e-con e-child\" data-id=\"70cbab0c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5aedc40c elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"5aedc40c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Dise\u00f1o de estrat\u00e9gias de seguridad<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca2f53f elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"ca2f53f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>El dise\u00f1o de estrategias de seguridad es como crear un plan de defensa personalizado para proteger tu casa digital.<\/p><p>Este servicio consiste en analizar tu situaci\u00f3n espec\u00edfica &#8211; ya sea como usuario individual o como una peque\u00f1a o mediana empresa &#8211; y luego desarrollar un plan a medida para proteger tus sistemas, datos y operaciones en l\u00ednea. Enfocado en entender tus necesidades \u00fanicas y los riesgos a los que te enfrentas, y luego dise\u00f1an medidas como contrase\u00f1as fuertes, firewalls, encriptaci\u00f3n y protocolos de respuesta ante incidentes.<\/p><p>Esto asegura que tengas las herramientas y conocimientos necesarios para defenderte contra amenazas cibern\u00e9ticas y mantener tu informaci\u00f3n segura en el mundo digital.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6dd99abc e-flex e-con-boxed e-con e-parent\" data-id=\"6dd99abc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-741355ab e-con-full e-flex e-con e-child\" data-id=\"741355ab\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2e3a9a6c elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"2e3a9a6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-small\">Plan Personalizado<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18ae6a57 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"18ae6a57\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Comprendemos que la seguridad digital no es de talla \u00fanica. Cada proyecto y empresa tiene sus activos digitales \u00fanicos y enfrenta desaf\u00edos distintos.<\/p><p>Por eso, ofrecemos un servicio especializado en el Dise\u00f1o de Estrategias de Seguridad, donde evaluamos meticulosamente tus necesidades espec\u00edficas para desarrollar un protocolo de seguridad a medida.<\/p><p>Estamos comprometidos a asegurar que tu proyecto est\u00e9 equipado con una estrategia de seguridad robusta y eficaz, adaptada a tus necesidades espec\u00edficas. Conf\u00eda en nosotros para proteger lo que m\u00e1s importa en tu empresa.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-157578e5 elementor-tablet-align-center elementor-invisible elementor-widget elementor-widget-button\" data-id=\"157578e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;lightSpeedIn&quot;,&quot;_animation_delay&quot;:900}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/beroot.es\/index.php\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contactanos<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3d01a0d9 e-con-full e-flex e-con e-child\" data-id=\"3d01a0d9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6fb35697 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"6fb35697\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Queremos poner nuestras habilidades y conocimientos inform\u00e1ticos al servicio de las personas para que puedan recuperar parte se su soberan\u00eda y ser realmente due\u00f1os de sus dispositivos y software<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12b3b220 elementor-position-inline-start elementor-tablet-position-block-start elementor-view-default elementor-mobile-position-block-start elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"12b3b220\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tEvaluaci\u00f3n Personalizada de Activos Digitales:\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tAnalizamos tus recursos digitales para entender su valor y vulnerabilidades \u00fanicas. Nos centramos en identificar los elementos m\u00e1s cr\u00edticos de tu infraestructura digital, y comprender c\u00f3mo interact\u00faan estos activos dentro de tu operaci\u00f3n diaria.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30c02023 elementor-position-inline-start elementor-tablet-position-block-start elementor-view-default elementor-mobile-position-block-start elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"30c02023\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tDesarrollo de Protocolos de Seguridad a Medida\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tDesarrollamos una estrategia de seguridad que se adapta perfectamente a tu proyecto. Creando un conjunto de pr\u00e1cticas y herramientas dise\u00f1adas espec\u00edficamente para proteger tus activos digitales, considerando el tipo de actividad y los riesgos asociados a tu operaci\u00f3n.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42156de elementor-position-inline-start elementor-tablet-position-block-start elementor-view-default elementor-mobile-position-block-start elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"42156de\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tEnfoque Proactivo para Proteger tu Empresa:\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tNuestro objetivo no solo es reaccionar a los incidentes de seguridad, sino anticiparnos y prevenirlos. Con nuestro Dise\u00f1o de Estrategias de Seguridad, te proporcionamos las herramientas y conocimientos necesarios para mantener tu empresa segura en el cambiante panorama digital.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7d34456 e-flex e-con-boxed e-con e-parent\" data-id=\"7d34456\" data-element_type=\"container\" data-e-type=\"container\" id=\"gestion-riesgos\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-310a3872 e-con-full e-flex e-con e-child\" data-id=\"310a3872\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a3a7841 elementor-widget elementor-widget-heading\" data-id=\"a3a7841\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Gestion de riesgos<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a8af55f elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"a8af55f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>El servicio de gesti\u00f3n de riesgos en el \u00e1mbito de la seguridad inform\u00e1tica y digital es como tener un asesor personal que te ayuda a navegar y mitigar los posibles peligros en el mundo digital.<\/p><p>Este servicio se enfoca en identificar, evaluar y priorizar los riesgos que pueden afectar tus sistemas de informaci\u00f3n y operaciones en l\u00ednea.<\/p><p>Trabajamos contigo para entender las amenazas espec\u00edficas a las que te enfrentas, ya seas un usuario individual o una peque\u00f1a o mediana empresa. Luego, te gu\u00edamos en el desarrollo de estrategias y acciones para reducir esos riesgos, como implementar medidas de seguridad robustas y planes de respuesta ante incidentes. Realizamos contigo un proceso de seguimiento y mitigaci\u00f3n para comprobar la efectividad de las medidas implementadas.<\/p><p>Esto te ayuda a estar preparado y protegido contra posibles ataques cibern\u00e9ticos, asegurando la continuidad y la seguridad de tus actividades en el espacio digital.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30acfacd elementor-widget__width-initial elementor-widget-tablet__width-inherit elementor-widget elementor-widget-image\" data-id=\"30acfacd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-16.49.31-A-visually-engaging-and-metaphorical-digital-illustration-for-a-website-capturing-the-essence-of-risk-management-in-cybersecurity.-The-image-showcase.png\" class=\"attachment-large size-large wp-image-2079\" alt=\"\" srcset=\"https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-16.49.31-A-visually-engaging-and-metaphorical-digital-illustration-for-a-website-capturing-the-essence-of-risk-management-in-cybersecurity.-The-image-showcase.png 1024w, https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-16.49.31-A-visually-engaging-and-metaphorical-digital-illustration-for-a-website-capturing-the-essence-of-risk-management-in-cybersecurity.-The-image-showcase-300x300.png 300w, https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-16.49.31-A-visually-engaging-and-metaphorical-digital-illustration-for-a-website-capturing-the-essence-of-risk-management-in-cybersecurity.-The-image-showcase-150x150.png 150w, https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-16.49.31-A-visually-engaging-and-metaphorical-digital-illustration-for-a-website-capturing-the-essence-of-risk-management-in-cybersecurity.-The-image-showcase-768x768.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-67f43a5a e-flex e-con-boxed e-con e-parent\" data-id=\"67f43a5a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4bb7c9ef e-con-full e-flex e-con e-child\" data-id=\"4bb7c9ef\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-72c88563 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"72c88563\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-small\">Navegando con Seguridad en Aguas Digitales<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55228a9f elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"55228a9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ofrecemos un servicio vital de Gesti\u00f3n de Riesgos, dise\u00f1ado para fortalecer y salvaguardar tus sistemas digitales.<\/p><p>Imagina navegar en un mar lleno de potenciales tormentas y peligros ocultos; nuestra gesti\u00f3n de riesgos es como el faro y el tim\u00f3n que te ayudan a navegar con seguridad, evitando los riesgos y protegiendo tu valioso cargamento digital.<\/p><p>Entendemos que la gesti\u00f3n de riesgos no es un evento \u00fanico, sino un proceso continuo. Estamos dedicados a proporcionarte la tranquilidad de saber que tus sistemas est\u00e1n protegidos y adaptados para enfrentar los desaf\u00edos del mundo digital.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4281dca6 elementor-tablet-align-center elementor-invisible elementor-widget elementor-widget-button\" data-id=\"4281dca6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;lightSpeedIn&quot;,&quot;_animation_delay&quot;:900}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/beroot.es\/index.php\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contactanos<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-21d09efc e-con-full e-flex e-con e-child\" data-id=\"21d09efc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2d09db1a elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"2d09db1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0Conf\u00eda en nosotros para mantener tu infraestructura tecnol\u00f3gica segura y eficiente.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40538e69 elementor-position-inline-start elementor-tablet-position-block-start elementor-view-default elementor-mobile-position-block-start elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"40538e69\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tImplementaci\u00f3n de Medidas Preventivas:\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tUna vez identificadas las brechas de seguridad en tus sistemas, desarrollamos e implementamos medidas estrat\u00e9gicas para mitigar estos riesgos, asegurando que tus sistemas sean robustos y resistentes a amenazas potenciales.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1424bb6f elementor-position-inline-start elementor-tablet-position-block-start elementor-view-default elementor-mobile-position-block-start elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"1424bb6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tResoluci\u00f3n Proactiva de Brechas de Seguridad:\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tNos enfocamos no solo en prevenir riesgos, sino tambi\u00e9n en resolver activamente cualquier brecha de seguridad que se encuentre, fortaleciendo tus defensas contra futuros ataques.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18e30c28 elementor-position-inline-start elementor-tablet-position-block-start elementor-view-default elementor-mobile-position-block-start elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"18e30c28\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tReevaluaci\u00f3n y Ajuste Continuo:\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tUna vez aplicadas las medidas de seguridad, realizamos una reevaluaci\u00f3n de tus sistemas. Esto nos permite verificar la efectividad de nuestras soluciones y hacer ajustes seg\u00fan sea necesario, asegurando una protecci\u00f3n continua y adaptada a las nuevas amenazas.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4827f78c e-flex e-con-boxed e-con e-parent\" data-id=\"4827f78c\" data-element_type=\"container\" data-e-type=\"container\" id=\"asesoria\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2738dddc elementor-widget__width-initial elementor-widget-tablet__width-inherit animated-slow elementor-invisible elementor-widget elementor-widget-image\" data-id=\"2738dddc\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-16.55.19-A-dynamic-and-illustrative-digital-image-for-a-website-portraying-cybersecurity-and-digital-security-advisory-services.-The-scene-depicts-a-knowledge.png\" class=\"attachment-large size-large wp-image-2080\" alt=\"\" srcset=\"https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-16.55.19-A-dynamic-and-illustrative-digital-image-for-a-website-portraying-cybersecurity-and-digital-security-advisory-services.-The-scene-depicts-a-knowledge.png 1024w, https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-16.55.19-A-dynamic-and-illustrative-digital-image-for-a-website-portraying-cybersecurity-and-digital-security-advisory-services.-The-scene-depicts-a-knowledge-300x300.png 300w, https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-16.55.19-A-dynamic-and-illustrative-digital-image-for-a-website-portraying-cybersecurity-and-digital-security-advisory-services.-The-scene-depicts-a-knowledge-150x150.png 150w, https:\/\/beroot.es\/wp-content\/uploads\/2023\/12\/DALL\u00b7E-2023-12-04-16.55.19-A-dynamic-and-illustrative-digital-image-for-a-website-portraying-cybersecurity-and-digital-security-advisory-services.-The-scene-depicts-a-knowledge-768x768.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-466d2900 e-con-full e-flex e-con e-child\" data-id=\"466d2900\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79d36e14 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"79d36e14\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Servici\u00f3 de Asesor\u00eda<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ee93ffd elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"1ee93ffd\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>El servicio de asesor\u00eda en seguridad inform\u00e1tica y digital es como contar con un gu\u00eda experto en tu viaje a trav\u00e9s del complejo mundo de la tecnolog\u00eda y la protecci\u00f3n de datos. Este servicio proporciona orientaci\u00f3n y consejos personalizados para ayudar a usuarios y peque\u00f1as y medianas empresas a comprender y mejorar su seguridad digital.<\/p><p>Piensa en ello como tener un entrenador personal que eval\u00faa tus necesidades espec\u00edficas, te ense\u00f1a las mejores pr\u00e1cticas en seguridad, y te ayuda a implementar soluciones efectivas para proteger tus sistemas, redes y datos importantes.<\/p><p>Ya sea que necesites ayuda para configurar medidas de seguridad, entender nuevas amenazas cibern\u00e9ticas, o planificar una estrategia de seguridad a largo plazo, los asesores est\u00e1n ah\u00ed para proporcionarte el conocimiento y las herramientas necesarias para navegar con seguridad en el mundo digital.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-10d5a328 e-flex e-con-boxed e-con e-parent\" data-id=\"10d5a328\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-23111ff e-con-full e-flex e-con e-child\" data-id=\"23111ff\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34123143 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"34123143\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-small\">Tu Gu\u00eda en el Laberinto de la Seguridad de la Informaci\u00f3n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55873cf elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"55873cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ofrecemos un servicio de asesor\u00eda especializado en seguridad digital y protecci\u00f3n de la informaci\u00f3n.<\/p><p>Imagina que la seguridad digital es un laberinto complejo, lleno de pasillos confusos y trampas ocultas.<\/p><p>Nuestro servicio de asesor\u00eda es como tener un mapa detallado y un gu\u00eda experto para navegar por este laberinto, asegurando que siempre encuentres el camino seguro.<\/p><p>Ya sea que est\u00e9s enfrentando desaf\u00edos actuales o buscando prevenir futuros problemas, nuestra asesor\u00eda est\u00e1 aqu\u00ed para ofrecerte claridad, soluciones y tranquilidad.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50523772 elementor-tablet-align-center elementor-invisible elementor-widget elementor-widget-button\" data-id=\"50523772\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;lightSpeedIn&quot;,&quot;_animation_delay&quot;:900}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/beroot.es\/index.php\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contactanos<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7a0ecd51 e-con-full e-flex e-con e-child\" data-id=\"7a0ecd51\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16c35549 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"16c35549\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Queremos poner nuestras habilidades y conocimientos inform\u00e1ticos al servicio de las personas para que puedan recuperar parte se su soberan\u00eda y ser realmente due\u00f1os de sus dispositivos y software<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f564ea8 elementor-position-inline-start elementor-tablet-position-block-start elementor-view-default elementor-mobile-position-block-start elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"f564ea8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tConsultor\u00eda Experta:\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tEn el mundo digital, las amenazas y desaf\u00edos de seguridad son como enigmas complejos. Nosotros somos tus solucionadores de rompecabezas personales, ofreci\u00e9ndote consejos y soluciones basadas en nuestra experiencia y conocimiento especializado.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79afbc7b elementor-position-inline-start elementor-tablet-position-block-start elementor-view-default elementor-mobile-position-block-start elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"79afbc7b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tResoluci\u00f3n de Problemas:\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tCada problema de seguridad es \u00fanico. Nos especializamos en encontrar la combinaci\u00f3n correcta para tus problemas de seguridad, proporcion\u00e1ndote soluciones personalizadas y eficaces para proteger tus datos y sistemas.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46bffbcf elementor-position-inline-start elementor-tablet-position-block-start elementor-view-default elementor-mobile-position-block-start elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"46bffbcf\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tSoporte Continuo y Personalizado:\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tNuestro servicio no termina con una simple consulta. Te brindamos soporte continuo, ayud\u00e1ndote a adaptarte y responder a las cambiantes amenazas y desaf\u00edos en seguridad de la informaci\u00f3n.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-241cc4fd elementor-position-inline-start elementor-tablet-position-block-start elementor-view-default elementor-mobile-position-block-start elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"241cc4fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:800}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAuditor\u00eda de dispositivos y Aplicaciones mobile\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Servicios de Ciberseguridad Hoy en d\u00eda internet se ha convertido en un espacio fundamental para nuestra sociedad. Es el lugar del que dependen negocios y relaciones personales alrededor de todo el mundo. Una parte de nuestra identidad se construye en el espacio digital. Si bien esto es una revoluci\u00f3n tecnologica con una ingente cantidad de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":793,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1565","page","type-page","status-publish","hentry"],"blocksy_meta":{"page_title_panel":"","has_hero_section":"disabled","e38715bb122191d12b00a4ff2f5acc0d":"","hero_section":"type-1","hero_elements":[{"id":"custom_title","enabled":true,"heading_tag":"h1","title":"Home"},{"id":"custom_description","enabled":true,"description_visibility":{"desktop":true,"tablet":true,"mobile":false}},{"id":"custom_meta","enabled":false,"meta_elements":[{"id":"author","enabled":true,"label":"By","has_author_avatar":"yes","avatar_size":25},{"id":"post_date","enabled":true,"label":"On","date_format_source":"default","date_format":"M j, Y"},{"id":"updated_date","enabled":false,"label":"On","date_format_source":"default","date_format":"M j, Y"},{"id":"categories","enabled":false,"label":"In","style":"simple"},{"id":"comments","enabled":true}],"page_meta_elements":{"joined":true,"articles_count":true,"comments":true}},{"id":"breadcrumbs","enabled":false}],"cdfdc69e127db85256160ecef73f61cf":"","hero_alignment1":"CT_CSS_SKIP_RULE","hero_margin":40,"hero_alignment2":"center","hero_vertical_alignment":"center","6fea0e66a2b5d6a4880c87191c0e3589":"","hero_structure":"narrow","caec56dac1f3124aba4f24b90c3f166d":"","page_title_bg_type":"featured_image","custom_hero_background":{"attachment_id":null},"page_title_image_size":"full","parallax":{"desktop":false,"tablet":false,"mobile":false},"07106ee7ed2e4852a96bbd1e7c3ca084":"","hero_height":"250px","pageTitleFont":{"family":"Default","variation":"Default","size":"30px","line-height":"CT_CSS_SKIP_RULE","letter-spacing":"CT_CSS_SKIP_RULE","text-transform":"CT_CSS_SKIP_RULE","text-decoration":"CT_CSS_SKIP_RULE"},"pageTitleFontColor":{"default":{"color":"CT_CSS_SKIP_RULEDEFAULT"}},"pageMetaFont":{"family":"Default","variation":"n6","size":"12px","line-height":"1.3","letter-spacing":"CT_CSS_SKIP_RULE","text-transform":"uppercase","text-decoration":"CT_CSS_SKIP_RULE"},"pageMetaFontColor":{"default":{"color":"CT_CSS_SKIP_RULEDEFAULT"},"hover":{"color":"CT_CSS_SKIP_RULEDEFAULT"}},"page_meta_button_type_font_colors":{"default":{"color":"CT_CSS_SKIP_RULEDEFAULT"},"hover":{"color":"CT_CSS_SKIP_RULEDEFAULT"}},"page_meta_button_type_background_colors":{"default":{"color":"CT_CSS_SKIP_RULEDEFAULT"},"hover":{"color":"CT_CSS_SKIP_RULEDEFAULT"}},"pageExcerptFont":{"family":"Default","variation":"Default","size":"CT_CSS_SKIP_RULE","line-height":"CT_CSS_SKIP_RULE","letter-spacing":"CT_CSS_SKIP_RULE","text-transform":"CT_CSS_SKIP_RULE","text-decoration":"CT_CSS_SKIP_RULE"},"pageExcerptColor":{"default":{"color":"CT_CSS_SKIP_RULEDEFAULT"}},"breadcrumbsFont":{"family":"Default","variation":"Default","size":"CT_CSS_SKIP_RULE","line-height":"CT_CSS_SKIP_RULE","letter-spacing":"CT_CSS_SKIP_RULE","text-transform":"CT_CSS_SKIP_RULE","text-decoration":"CT_CSS_SKIP_RULE"},"breadcrumbsFontColor":{"default":{"color":"CT_CSS_SKIP_RULEDEFAULT"},"initial":{"color":"CT_CSS_SKIP_RULEDEFAULT"},"hover":{"color":"CT_CSS_SKIP_RULEDEFAULT"}},"pageTitleOverlay":{"background_type":"color","background_pattern":"type-1","background_image":{"attachment_id":null,"x":0,"y":0},"gradient":"linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%)","background_repeat":"repeat","background_size":"auto","background_attachment":"scroll","patternColor":{"default":{"color":"#e5e7ea"}},"overlayColor":{"default":{"color":"CT_CSS_SKIP_RULE"}},"backgroundColor":{"default":{"color":"CT_CSS_SKIP_RULE"}}},"pageTitleBackground":{"background_type":"color","background_pattern":"type-1","background_image":{"attachment_id":null,"x":0,"y":0},"gradient":"linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%)","background_repeat":"repeat","background_size":"auto","background_attachment":"scroll","patternColor":{"default":{"color":"#e5e7ea"}},"overlayColor":{"default":{"color":"CT_CSS_SKIP_RULE"}},"backgroundColor":{"default":{"color":"var(--theme-palette-color-6)"}}},"pageTitlePadding":{"top":"50px","bottom":"50px","left":"auto","right":"auto","linked":true},"8731634cc32e95e0be09e75dbf703b3f":"","page_structure_type":"default","6ef7870ac163491031ebf652adea8358":"","content_style_source":"inherit","content_style":"wide","vertical_spacing_source":"custom","content_area_spacing":"none","background":{"background_type":"color","background_pattern":"type-1","background_image":{"attachment_id":null,"x":0,"y":0},"gradient":"linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%)","background_repeat":"repeat","background_size":"auto","background_attachment":"scroll","patternColor":{"default":{"color":"#e5e7ea"}},"overlayColor":{"default":{"color":"CT_CSS_SKIP_RULE"}},"backgroundColor":{"default":{"color":"CT_CSS_SKIP_RULE"}}},"content_background":{"background_type":"color","background_pattern":"type-1","background_image":{"attachment_id":null,"x":0,"y":0},"gradient":"linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%)","background_repeat":"repeat","background_size":"auto","background_attachment":"scroll","patternColor":{"default":{"color":"#e5e7ea"}},"overlayColor":{"default":{"color":"CT_CSS_SKIP_RULE"}},"backgroundColor":{"default":{"color":"var(--theme-palette-color-8)"}}},"content_boxed_shadow":{"inherit":false,"blur":18,"spread":-6,"v_offset":12,"h_offset":0,"inset":false,"enable":true,"color":{"color":"rgba(34, 56, 101, 0.04)"}},"content_boxed_border":{"width":1,"style":"none","color":{"color":"rgba(44,62,80,0.2)"}},"content_boxed_radius":{"top":"3px","bottom":"3px","left":"3px","right":"3px","linked":true},"boxed_content_spacing":{"desktop":{"top":"40px","bottom":"40px","left":"40px","right":"40px","linked":true},"tablet":{"top":"35px","bottom":"35px","left":"35px","right":"35px","linked":true},"mobile":{"top":"20px","bottom":"20px","left":"20px","right":"20px","linked":true}},"36b606f0b937718d397a640df4fa4b31":"","disable_featured_image":"no","disable_share_box":"no","disable_header":"no","disable_footer":"no","styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/beroot.es\/index.php\/wp-json\/wp\/v2\/pages\/1565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beroot.es\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/beroot.es\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/beroot.es\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/beroot.es\/index.php\/wp-json\/wp\/v2\/comments?post=1565"}],"version-history":[{"count":55,"href":"https:\/\/beroot.es\/index.php\/wp-json\/wp\/v2\/pages\/1565\/revisions"}],"predecessor-version":[{"id":2159,"href":"https:\/\/beroot.es\/index.php\/wp-json\/wp\/v2\/pages\/1565\/revisions\/2159"}],"up":[{"embeddable":true,"href":"https:\/\/beroot.es\/index.php\/wp-json\/wp\/v2\/pages\/793"}],"wp:attachment":[{"href":"https:\/\/beroot.es\/index.php\/wp-json\/wp\/v2\/media?parent=1565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}