{"id":156,"date":"2023-10-10T20:17:51","date_gmt":"2023-10-10T20:17:51","guid":{"rendered":"http:\/\/abisphere.com\/?page_id=156"},"modified":"2023-10-19T16:52:08","modified_gmt":"2023-10-19T16:52:08","slug":"soluciones","status":"publish","type":"page","link":"https:\/\/abisphere.com\/?page_id=156","title":{"rendered":"Soluciones"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-text-align-center\"><strong>SGSI<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left\">El Sistema de Gesti\u00f3n de Seguridad de la Informaci\u00f3n; <strong>ISMS<\/strong> son las siglas equivalentes en ingles a Information Security Management System. Es el principal concepto sobre el que se conforma la norma&nbsp;<strong>ISO 27001<\/strong>.<\/p>\n\n\n\n<p class=\"has-text-align-left\">Es un conjunto de principios o procedimientos que se utilizan para identificar riesgos y definir los pasos de mitigaci\u00f3n de riesgos que deben llevarse a cabo. \u00c9ste garantiza que las empresas tomen medidas sistem\u00e1ticamente para mantener seguros los datos y la informaci\u00f3n; puede ser cualquier tipo de informaci\u00f3n, como datos de clientes, procesos internos o detalles de pago.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns:44% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"683\" src=\"http:\/\/abisphere.com\/wp-content\/uploads\/2023\/10\/soc-1024x683.jpg\" alt=\"\" class=\"wp-image-181 size-full\" srcset=\"https:\/\/abisphere.com\/wp-content\/uploads\/2023\/10\/soc-1024x683.jpg 1024w, https:\/\/abisphere.com\/wp-content\/uploads\/2023\/10\/soc-300x200.jpg 300w, https:\/\/abisphere.com\/wp-content\/uploads\/2023\/10\/soc-768x512.jpg 768w, https:\/\/abisphere.com\/wp-content\/uploads\/2023\/10\/soc.jpg 1500w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-text-align-center\"><strong>SOC<\/strong><\/p>\n\n\n\n<p>El Centro de Operaciones de Seguridad, SOC, se refiere al equipo responsable de garantizar la seguridad de la informaci\u00f3n.<\/p>\n\n\n\n<p>Adem\u00e1s que permite la supervisi\u00f3n y administraci\u00f3n de la seguridad del sistema de informaci\u00f3n a trav\u00e9s de herramientas de recogida, correlaci\u00f3n de eventos e intervenci\u00f3n remota. El SIEM (Security Information Event Management) es la principal herramienta del SOC ya que permite gestionar los eventos de un Sistema Inform\u00e1tico.<\/p>\n\n\n\n<p>El objetivo de un SOC es detectar, analizar y corregir incidentes de ciberseguridad utilizando soluciones tecnol\u00f3gicas y enfoques diferentes. Supervisan y analizan la actividad en redes, servidores, terminales, bases de datos, aplicaciones, sitios web y otros sistemas en busca de se\u00f1ales d\u00e9biles o comportamientos anormales que puedan indicar un incidente de seguridad o un compromiso.<\/p>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-text-align-center\"><strong>MARCAS<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-5 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full has-custom-border wp-duotone-unset-1\"><img decoding=\"async\" loading=\"lazy\" width=\"557\" height=\"345\" src=\"http:\/\/abisphere.com\/wp-content\/uploads\/2023\/10\/netskope.png\" alt=\"\" class=\"wp-image-213\" style=\"border-style:none;border-width:0px;border-radius:50px\" srcset=\"https:\/\/abisphere.com\/wp-content\/uploads\/2023\/10\/netskope.png 557w, https:\/\/abisphere.com\/wp-content\/uploads\/2023\/10\/netskope-300x186.png 300w\" sizes=\"(max-width: 557px) 100vw, 557px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large has-custom-border\"><img decoding=\"async\" loading=\"lazy\" width=\"390\" height=\"290\" src=\"http:\/\/abisphere.com\/wp-content\/uploads\/2023\/10\/nutanix.jpg\" alt=\"\" class=\"wp-image-175\" style=\"border-radius:50px\" srcset=\"https:\/\/abisphere.com\/wp-content\/uploads\/2023\/10\/nutanix.jpg 390w, https:\/\/abisphere.com\/wp-content\/uploads\/2023\/10\/nutanix-300x223.jpg 300w\" sizes=\"(max-width: 390px) 100vw, 390px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large has-custom-border\"><img decoding=\"async\" loading=\"lazy\" width=\"390\" height=\"290\" src=\"http:\/\/abisphere.com\/wp-content\/uploads\/2023\/10\/kaspersky.jpg\" alt=\"\" class=\"wp-image-179\" style=\"border-radius:50px\" srcset=\"https:\/\/abisphere.com\/wp-content\/uploads\/2023\/10\/kaspersky.jpg 390w, https:\/\/abisphere.com\/wp-content\/uploads\/2023\/10\/kaspersky-300x223.jpg 300w\" sizes=\"(max-width: 390px) 100vw, 390px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large has-custom-border\"><img decoding=\"async\" loading=\"lazy\" width=\"390\" height=\"290\" src=\"http:\/\/abisphere.com\/wp-content\/uploads\/2023\/10\/malwarebytes.jpg\" alt=\"\" class=\"wp-image-177\" style=\"border-radius:50px\" srcset=\"https:\/\/abisphere.com\/wp-content\/uploads\/2023\/10\/malwarebytes.jpg 390w, https:\/\/abisphere.com\/wp-content\/uploads\/2023\/10\/malwarebytes-300x223.jpg 300w\" sizes=\"(max-width: 390px) 100vw, 390px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large has-custom-border\"><img decoding=\"async\" loading=\"lazy\" width=\"390\" height=\"290\" src=\"http:\/\/abisphere.com\/wp-content\/uploads\/2023\/10\/nvidia.jpg\" alt=\"\" class=\"wp-image-176\" style=\"border-radius:50px\" srcset=\"https:\/\/abisphere.com\/wp-content\/uploads\/2023\/10\/nvidia.jpg 390w, https:\/\/abisphere.com\/wp-content\/uploads\/2023\/10\/nvidia-300x223.jpg 300w\" sizes=\"(max-width: 390px) 100vw, 390px\" \/><\/figure>\n<\/figure>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>SGSI El Sistema de Gesti\u00f3n de Seguridad de la Informaci\u00f3n; ISMS son las siglas equivalentes en ingles a Information Security Management System. Es el principal concepto sobre el que se conforma la norma&nbsp;ISO 27001. Es un conjunto de principios o procedimientos que se utilizan para identificar riesgos y definir los pasos de mitigaci\u00f3n de riesgos [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/abisphere.com\/index.php?rest_route=\/wp\/v2\/pages\/156"}],"collection":[{"href":"https:\/\/abisphere.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/abisphere.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/abisphere.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/abisphere.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=156"}],"version-history":[{"count":5,"href":"https:\/\/abisphere.com\/index.php?rest_route=\/wp\/v2\/pages\/156\/revisions"}],"predecessor-version":[{"id":215,"href":"https:\/\/abisphere.com\/index.php?rest_route=\/wp\/v2\/pages\/156\/revisions\/215"}],"wp:attachment":[{"href":"https:\/\/abisphere.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=156"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}