{"id":5496,"date":"2024-09-03T15:14:37","date_gmt":"2024-09-03T18:14:37","guid":{"rendered":"https:\/\/pegasussecurity.com.br\/soluciones\/framework\/"},"modified":"2025-02-23T20:04:41","modified_gmt":"2025-02-23T23:04:41","slug":"framework","status":"publish","type":"page","link":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/framework\/","title":{"rendered":"Framework"},"content":{"rendered":"<div class=\"gb-container gb-container-858c92dd alignfull\">\n<div class=\"gb-container gb-container-60695833\">\n\n<h3 class=\"gb-headline gb-headline-984b62a1 gb-headline-text\">Framework \u201c<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-accent-3-color\">End to End<\/mark>\u201d de Seguridad<\/h3>\n\n\n\n<p>Nuestro Framework es un marco metodol\u00f3gico que nos permite gestionar las amenazas asociadas a la Ciberseguridad, con base en los objetivos de negocio del Cliente y transformando la Seguridad en un habilitador de nuevas oportunidades y transformaci\u00f3n digital.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-ecfc5a47\">\n<div class=\"gb-container gb-container-c110be55\">\n\n<h4 class=\"gb-headline gb-headline-2ea45815 gb-headline-text\">Gobernanza, Compliance<br>y riesgo<\/h4>\n\n\n\n<p>En el alcance de GRC, analizamos las necesidades, brechas y riesgos asociados al negocio del Cliente, a trav\u00e9s de sus procesos y tecnolog\u00edas. Definimos una estrategia de seguridad E2E que garantiza un nivel aceptable de riesgo y resiliencia. Implementamos los controles necesarios para asegurar el cumplimiento de las obligaciones regulatorias y del negocio.   <\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-c14e8ef6\">\n\n<h4 class=\"gb-headline gb-headline-001b0950 gb-headline-text\">Transformaci\u00f3n digital<\/h4>\n\n\n\n<p>La Ingenier\u00eda de Seguridad traduce la estrategia y controles de Seguridad en infraestructura, apoyando agn\u00f3sticamente la selecci\u00f3n de Tecnolog\u00edas y la implementaci\u00f3n y desarrollo de las capacidades necesarias para establecer una Infraestructura de defensa. Todo este trabajo proporciona la Visibilidad necesaria para una adecuada Gesti\u00f3n de la Seguridad. <\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-2155fa42\">\n\n<h4 class=\"gb-headline gb-headline-bd6d6879 gb-headline-text\">Gesti\u00f3n y detecci\u00f3n<\/h4>\n\n\n\n<p>De forma modular, realizamos la Gesti\u00f3n E2E de infraestructuras de Seguridad, Detectando e Identificando de forma anticipada vulnerabilidades, amenazas y ataques y Automatizando procesos para su correcta ejecuci\u00f3n. Adem\u00e1s, aplicamos la Inteligencia adquirida en nuestro entorno global a los procesos diarios de todos los clientes. <\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-209eaa85\">\n\n<h4 class=\"gb-headline gb-headline-fc756631 gb-headline-text\">Respuesta y Recuperaci\u00f3n<\/h4>\n\n\n\n<p>En caso de un ataque o fuga de informaci\u00f3n, es fundamental poder contar con un equipo de Respuesta y as\u00ed controlar el entorno y\/o el Incidente, realizar Correcci\u00f3n de vulnerabilidades y finalmente Recuperar la normalidad operacional. Posteriormente, la investigaci\u00f3n de incidencias permite realizar la evoluci\u00f3n necesaria en los procesos y entornos. <\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-94254107\">\n<div class=\"gb-container gb-container-5df32c37\">\n\n<h4 class=\"gb-headline gb-headline-93c5efed gb-headline-text\">Estrategia<\/h4>\n\n<\/div>\n\n<div class=\"gb-container gb-container-bf5fc11a\">\n\n<h4 class=\"gb-headline gb-headline-5753f466 gb-headline-text\">Desarrollo<\/h4>\n\n<\/div>\n\n<div class=\"gb-container gb-container-0ba5ff35\">\n\n<h4 class=\"gb-headline gb-headline-fa168645 gb-headline-text\">Operaci\u00f3n<\/h4>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-c4872dfa alignfull\">\n<div class=\"gb-container gb-container-c2ebfa31\">\n\n<h3 class=\"gb-headline gb-headline-cae8afba gb-headline-text\">Gobernanza, riesgo y Compliance<\/h3>\n\n\n\n<p>Las empresas necesitan operar con una visi\u00f3n de GRC que tenga la capacidad de lograr objetivos de manera confiable, al mismo tiempo que aborda la incertidumbre y act\u00faa con integridad y agilidad. Actuar estrat\u00e9gicamente para gestionar la gobernanza general de una organizaci\u00f3n, la gesti\u00f3n de riesgos comerciales y el cumplimiento normativo brinda a nuestros clientes una ventaja competitiva considerable. <\/p>\n\n\n\n<p>\u00c1reas como auditor\u00eda interna, cumplimiento, riesgos, legal, financiero, TI, RRHH, as\u00ed como l\u00edneas de negocio, equipo ejecutivo y junta directiva necesitan trabajar en conjunto para asegurar que el proceso sea lo m\u00e1s asertivo posible, mitigando y tomando decisiones estrat\u00e9gicas \u00e1giles, que permitan alcanzar los objetivos del negocio y no sufrir impactos negativos durante su operaci\u00f3n.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-c6ca765a\">\n<div class=\"gb-container gb-container-df7580ab\">\n\n<h4 class=\"gb-headline gb-headline-b075b2a6 gb-headline-text\">Analizar<\/h4>\n\n\n<div class=\"gb-container gb-container-c073aa60\">\n\n<p class=\"gb-headline gb-headline-baf6b889 gb-headline-text\">Evaluaci\u00f3n y nivel de madurez del SGSI<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-91fba446\">\n\n<p class=\"gb-headline gb-headline-020161ba gb-headline-text\">Evaluaci\u00f3n de riesgos<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-00ffb2a3\">\n\n<p class=\"gb-headline gb-headline-0676ff78 gb-headline-text\">Evaluaci\u00f3n de entornos tecnol\u00f3gicos<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-3e5a53db\">\n\n<p class=\"gb-headline gb-headline-d481bd3d gb-headline-text\">Evaluaci\u00f3n de privacidad<br>\/ LGPD \/ RGPD<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-2aac58ef\">\n\n<p class=\"gb-headline gb-headline-933c4187 gb-headline-text\">Assessment ISO27001 \/<br>PCI-DSS \/ NIST \/ CIS \/ Otros<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-25fbd89d\">\n\n<h4 class=\"gb-headline gb-headline-f4f1cc1d gb-headline-text\">Definir<\/h4>\n\n\n<div class=\"gb-container gb-container-3772b416\">\n\n<p class=\"gb-headline gb-headline-9d028ab4 gb-headline-text\">Estrategia de seguridad \/ PDSI<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-b5ca0a24\">\n\n<p class=\"gb-headline gb-headline-7f1125c2 gb-headline-text\">Estrategia y modelo<br>Gesti\u00f3n de riesgos<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-387cf85a\">\n\n<p class=\"gb-headline gb-headline-63bf1262 gb-headline-text\">Estrategia de continuidad de<br>Negocios<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-a35413f5\">\n\n<p class=\"gb-headline gb-headline-3f667b19 gb-headline-text\">Estrategia de privacidad y&nbsp;Compliance<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-4c3a8c15\">\n\n<p class=\"gb-headline gb-headline-60853bd1 gb-headline-text\">Modelo de&nbsp;resiliencia<br>Cibern\u00e9tica<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-4d511ab9\">\n\n<h4 class=\"gb-headline gb-headline-7d161ad6 gb-headline-text\">Implementar<\/h4>\n\n\n<div class=\"gb-container gb-container-9fe9119a\">\n\n<p class=\"gb-headline gb-headline-31e5306c gb-headline-text\">Sistema de Gesti\u00f3n de Seguridad de la Informaci\u00f3n<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-37b8143c\">\n\n<p class=\"gb-headline gb-headline-b5def497 gb-headline-text\">Modelo de Gesti\u00f3n de Riesgos<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-50c97794\">\n\n<p class=\"gb-headline gb-headline-8d4acdae gb-headline-text\">Pol\u00edtica y Procesos de Continuidad de Negocios<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-28db6e53\">\n\n<p class=\"gb-headline gb-headline-b1ab3684 gb-headline-text\">Sistemas de Compliance y&nbsp;Gobernancia&nbsp;para la&nbsp;Protecci\u00f3n&nbsp;de Datos<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-e31921ca\">\n\n<h4 class=\"gb-headline gb-headline-368491ba gb-headline-text\">Cumplir<\/h4>\n\n\n<div class=\"gb-container gb-container-521b219e\">\n\n<p class=\"gb-headline gb-headline-3cfe7995 gb-headline-text\">Pol\u00edtica y procedimientos de seguridad<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-e0230d31\">\n\n<p class=\"gb-headline gb-headline-68ed2793 gb-headline-text\">Pol\u00edtica de Gesti\u00f3n de Riesgos<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-128b5a44\">\n\n<p class=\"gb-headline gb-headline-da5b77b8 gb-headline-text\">Plan de Continuidad de Negocios<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-d346528c\">\n\n<p class=\"gb-headline gb-headline-13b0c0b0 gb-headline-text\">Normativa Sectorial y Empresarial<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-ffb755ec\">\n<div class=\"gb-container gb-container-36289166\">\n\n<h4 class=\"gb-headline gb-headline-30e3d6d1 gb-headline-text\">Estrategia<\/h4>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-5eb25c71\">\n<div class=\"gb-container gb-container-a65cb60e\">\n\n<h3 class=\"gb-headline gb-headline-7bd4ec00 gb-headline-text\">Transformaci\u00f3n Digital<\/h3>\n\n\n\n<p>El ritmo acelerado de su transformaci\u00f3n digital basada en la adopci\u00f3n de tecnolog\u00edas de vanguardia como cloud\/edge computing, Big Data e Internet de las cosas (IoT) requiere una visi\u00f3n estrat\u00e9gica alineada con los objetivos de negocio.<\/p>\n\n\n\n<p>La automatizaci\u00f3n de las soluciones de ciberseguridad en conjunto con la estrategia de gesti\u00f3n es fundamental para hacer frente al creciente n\u00famero de amenazas de ciberseguridad, y puede complementarse con sistemas de machine learning, capaces de detectar patrones de ataque y permitir acciones r\u00e1pidas para contener incidentes y\/o riesgos identificados.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-7b401caa\">\n<div class=\"gb-container gb-container-640723db\">\n\n<h4 class=\"gb-headline gb-headline-a0ea3a49 gb-headline-text\">Ingenier\u00eda<\/h4>\n\n\n<div class=\"gb-container gb-container-d09c5d87\">\n\n<p class=\"gb-headline gb-headline-8692c8be gb-headline-text\">Definici\u00f3n de Arquitectura de Seguridad<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-ec1791ed\">\n\n<p class=\"gb-headline gb-headline-a4c95104 gb-headline-text\">Desarrollo de Modelos de Operaci\u00f3n \/ Seguridad Gestionada<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-a04182e4\">\n\n<p class=\"gb-headline gb-headline-505d988f gb-headline-text\">Desarrollo de Framework SecDevOps<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-d6a145f3\">\n\n<p class=\"gb-headline gb-headline-fa5f1254 gb-headline-text\">Estrategia en Cloud Security<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-5ec453a5\">\n\n<p class=\"gb-headline gb-headline-5ef98236 gb-headline-text\">Estrategia en IoT \/ OT<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-2e658524\">\n\n<p class=\"gb-headline gb-headline-ad993913 gb-headline-text\">SASE<br>Secure Access Service Edge<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-352b50c5\">\n\n<h4 class=\"gb-headline gb-headline-5ac20156 gb-headline-text\">Tecnolog\u00edas<\/h4>\n\n\n<div class=\"gb-container gb-container-4389cb32\">\n\n<p class=\"gb-headline gb-headline-d468908e gb-headline-text\">Endpoint Security<br>EDR \/ XDR \/ MDM \/ MDR<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-b1e0586e\">\n\n<p class=\"gb-headline gb-headline-7f792b17 gb-headline-text\">Aplication Security<br>WAF \/ AntiSpam \/ \u2026<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-21003a7c\">\n\n<p class=\"gb-headline gb-headline-9776c511 gb-headline-text\">Networking Securit<br>ADDoS \/ Proxy \/ DNS \/ Etc.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-81f0a40b\">\n\n<p class=\"gb-headline gb-headline-2aae6a90 gb-headline-text\">Seguridad perimetral<br>NGFirewal \/ IPS \/ IDS \/\u2026<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-7e1de4c5\">\n\n<p class=\"gb-headline gb-headline-4b1e8157 gb-headline-text\">SIEM \u2013 SIEMaaS<br>UEBA \/ UBA<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-6391676f\">\n\n<p class=\"gb-headline gb-headline-d591c44a gb-headline-text\">IAM &#8211; Identity &amp;<br>Access Mgmt<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-77282853\">\n\n<h4 class=\"gb-headline gb-headline-4c69cd5e gb-headline-text\">Desarrollar<\/h4>\n\n\n<div class=\"gb-container gb-container-c4d06b5a\">\n\n<p class=\"gb-headline gb-headline-5ed16949 gb-headline-text\">Implementaci\u00f3n y Migraci\u00f3n de tecnolog\u00edas<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-eafeab06\">\n\n<p class=\"gb-headline gb-headline-884ee53a gb-headline-text\">Integraci\u00f3n de tecnolog\u00edas<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-545ec886\">\n\n<p class=\"gb-headline gb-headline-8b7cc003 gb-headline-text\">Fine Tunning y optimizaci\u00f3n<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-7c141ef0\">\n\n<p class=\"gb-headline gb-headline-5744ba8e gb-headline-text\">Automatizaci\u00f3n<br>SOAR<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-06913430\">\n\n<p class=\"gb-headline gb-headline-49311362 gb-headline-text\">Playbooks &amp; Runbooks<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-0c291b26\">\n\n<h4 class=\"gb-headline gb-headline-74f8f5b8 gb-headline-text\">Visibilidad<\/h4>\n\n\n<div class=\"gb-container gb-container-66173ed0\">\n\n<p class=\"gb-headline gb-headline-d749e32c gb-headline-text\">KPIs \/ SLAs \/ SLOs<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-e3b492e8\">\n\n<p class=\"gb-headline gb-headline-7409708a gb-headline-text\">Dashboards<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-3e3b18ab\">\n\n<p class=\"gb-headline gb-headline-07b2e397 gb-headline-text\">Feed de Seguridad<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-0cba9c39\">\n<div class=\"gb-container gb-container-201b707c\">\n\n<h4 class=\"gb-headline gb-headline-47e9d18d gb-headline-text\">Desarrollo<\/h4>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-86c74fdf alignfull\">\n<div class=\"gb-container gb-container-9e181546\">\n\n<h3 class=\"gb-headline gb-headline-76fc12b6 gb-headline-text\">Operaci\u00f3n &amp; Monitoreo<\/h3>\n\n\n\n<p>El departamento de operaciones de seguridad (SOC) es responsable del monitoreo y an\u00e1lisis continuo de los eventos y acciones de seguridad de una organizaci\u00f3n. El objetivo es detectar, analizar y responder a incidentes de ciberseguridad utilizando una combinaci\u00f3n de soluciones tecnol\u00f3gicas y un s\u00f3lido conjunto de procesos manuales y automatizados, trabajando en conjunto con los procesos de respuesta a incidentes de la organizaci\u00f3n para garantizar que los problemas de seguridad se aborden r\u00e1pidamente en caso de crisis e incidentes. <\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-609a1b9d\">\n<div class=\"gb-container gb-container-975f8a14\">\n\n<h4 class=\"gb-headline gb-headline-d14a5668 gb-headline-text\">Gesti\u00f3n<\/h4>\n\n\n<div class=\"gb-container gb-container-8e2ea1f7\">\n\n<p class=\"gb-headline gb-headline-71aed820 gb-headline-text\">Seguridad administrada<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-ad7b919b\">\n\n<p class=\"gb-headline gb-headline-f96c8d55 gb-headline-text\">Creaci\u00f3n y gesti\u00f3n de pol\u00edticas<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-24610728\">\n\n<p class=\"gb-headline gb-headline-cac3d364 gb-headline-text\">Creaci\u00f3n y revisi\u00f3n de Reglas<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-80f5ce01\">\n\n<p class=\"gb-headline gb-headline-8911f557 gb-headline-text\">Monitoreo de disponibilidad<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-dc1da9c6\">\n\n<p class=\"gb-headline gb-headline-c86464f4 gb-headline-text\">Correlaci\u00f3n de eventos y alertas<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-77b3e526\">\n\n<h4 class=\"gb-headline gb-headline-c68f1bfe gb-headline-text\">Automatizaci\u00f3n<\/h4>\n\n\n<div class=\"gb-container gb-container-8e9e2014\">\n\n<p class=\"gb-headline gb-headline-8e5ae64a gb-headline-text\">Procesos y procedimientos<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-71c0b5e3\">\n\n<p class=\"gb-headline gb-headline-c8a91d0b gb-headline-text\">Alertas y notificaciones<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-f5f410af\">\n\n<p class=\"gb-headline gb-headline-3f5ec72e gb-headline-text\">Playbooks &amp; Runbooks<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-5a7c8bb0\">\n\n<p class=\"gb-headline gb-headline-e4d9e0c2 gb-headline-text\">Respuesta<br>Primer Nivel<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-f605cb43\">\n\n<p class=\"gb-headline gb-headline-4db75b69 gb-headline-text\">Desarrollo de pruebas de escenarios de incidentes<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-ec08e65a\">\n\n<h4 class=\"gb-headline gb-headline-f7f32644 gb-headline-text\">Detecci\u00f3n<\/h4>\n\n\n<div class=\"gb-container gb-container-3b192186\">\n\n<p class=\"gb-headline gb-headline-a2caad8a gb-headline-text\">Zero Day Attack<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-24f1cbc1\">\n\n<p class=\"gb-headline gb-headline-c3c09fe9 gb-headline-text\">Ataques Avanzados y Persistentes<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-8601a911\">\n\n<p class=\"gb-headline gb-headline-5cebcf44 gb-headline-text\">Ataques ADDoS<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-299f1311\">\n\n<p class=\"gb-headline gb-headline-4eb3106f gb-headline-text\">Uso no autorizado de la marca<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-e56f6ef6\">\n\n<p class=\"gb-headline gb-headline-5e8b3ac2 gb-headline-text\">Fuga de datos &amp;<br>Robo de credenciales<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-6113ea43\">\n\n<p class=\"gb-headline gb-headline-e024558a gb-headline-text\">Sitios Web y Aplicaciones Falsos \/ Phishing<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-e0fd4406\">\n\n<p class=\"gb-headline gb-headline-be7ccf3e gb-headline-text\">Scan de Vulnerabilidades<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-f8f3b4fb\">\n\n<h4 class=\"gb-headline gb-headline-73709a75 gb-headline-text\">Inteligencia<\/h4>\n\n\n<div class=\"gb-container gb-container-f5dda85f\">\n\n<p class=\"gb-headline gb-headline-99f724a1 gb-headline-text\">Threat Hunting<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-74b0a591\">\n\n<p class=\"gb-headline gb-headline-8dd24c17 gb-headline-text\">UBA \/ UEBA<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-0a01dfbe\">\n\n<p class=\"gb-headline gb-headline-03d44913 gb-headline-text\">Ataques Sectorizados<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-84b5c4eb\">\n\n<p class=\"gb-headline gb-headline-8e71ae44 gb-headline-text\">IoC \/ Feeds<br>Threat Intelligencie<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-52c445bc\">\n<div class=\"gb-container gb-container-09c30832\">\n\n<h4 class=\"gb-headline gb-headline-c8188a67 gb-headline-text\">Operaci\u00f3n<\/h4>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-1c49a98d\">\n<div class=\"gb-container gb-container-3f6f8135\">\n\n<h3 class=\"gb-headline gb-headline-2c1606f3 gb-headline-text\">Respuesta &amp; Recuperaci\u00f3n<\/h3>\n\n\n\n<p>Un s\u00f3lido proceso de gesti\u00f3n de vulnerabilidades y riesgos combinado con procesos de respuesta y recuperaci\u00f3n proporciona un marco definido para que nuestros clientes se preparen ante posibles incidentes de seguridad. Estos procesos son apoyados por el \u00e1rea de gesti\u00f3n y operaciones, permitiendo una visi\u00f3n eficiente de los procesos y procedimientos que deben realizarse de forma r\u00e1pida en tiempos de crisis. <\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-3fda3b2f\">\n<div class=\"gb-container gb-container-0eecf48d\">\n\n<h4 class=\"gb-headline gb-headline-2764f8a0 gb-headline-text\">Responder<\/h4>\n\n\n<div class=\"gb-container gb-container-b2a64ed6\">\n\n<p class=\"gb-headline gb-headline-7b581b94 gb-headline-text\">Planes de Respuesta a Incidentes<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-abf8fc8c\">\n\n<p class=\"gb-headline gb-headline-5d36b0fa gb-headline-text\">Pol\u00edticas y Normas y Legislaci\u00f3n<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-8adc701c\">\n\n<p class=\"gb-headline gb-headline-735216a9 gb-headline-text\">Plan de Formaci\u00f3n y Cualificaci\u00f3n<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-dcc7efe4\">\n\n<p class=\"gb-headline gb-headline-0299325f gb-headline-text\">Herramientas de monitoreo<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-a3461eb7\">\n\n<p class=\"gb-headline gb-headline-c4590118 gb-headline-text\">Equipo 24&#215;7<br>Respuesta a Incidentes<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-bfa85d0d\">\n\n<p class=\"gb-headline gb-headline-96cc7ccf gb-headline-text\">Plan de Comunicaci\u00f3n (Clientes, Empleados y Proveedores)<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-0691023a\">\n\n<h4 class=\"gb-headline gb-headline-0435af1a gb-headline-text\">Corregir<\/h4>\n\n\n<div class=\"gb-container gb-container-9d42a88f\">\n\n<p class=\"gb-headline gb-headline-f0b02d4f gb-headline-text\">Mapeo de Activos y Aplicaciones<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-197f01f6\">\n\n<p class=\"gb-headline gb-headline-5905bb2c gb-headline-text\">Gesti\u00f3n de Amenazas y Vulnerabilidades<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-173a45cd\">\n\n<p class=\"gb-headline gb-headline-792eadfa gb-headline-text\">Planes de revisi\u00f3n de entornos M\u00f3viles, de Infraestructura y WEB<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-d1fffe81\">\n\n<p class=\"gb-headline gb-headline-23e0ce1e gb-headline-text\">Plan y revisi\u00f3n de control de acceso<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-28a4e41f\">\n\n<p class=\"gb-headline gb-headline-85785f50 gb-headline-text\">Patch Management<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-bf24301c\">\n\n<h4 class=\"gb-headline gb-headline-86b41039 gb-headline-text\">Recuperar<\/h4>\n\n\n<div class=\"gb-container gb-container-dc6f4add\">\n\n<p class=\"gb-headline gb-headline-ca558972 gb-headline-text\">Planes de Recuperaci\u00f3n de Entornos M\u00f3viles, de Infraestructura y WEB<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-7db23c47\">\n\n<p class=\"gb-headline gb-headline-21fc3fa1 gb-headline-text\">Comunicaci\u00f3n (Clientes, Empleados y Proveedores)<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-de90f7b5\">\n\n<p class=\"gb-headline gb-headline-c63a7065 gb-headline-text\">Pruebas peri\u00f3dicas<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-bc6169f3\">\n\n<h4 class=\"gb-headline gb-headline-f1244ba9 gb-headline-text\">Investigar<\/h4>\n\n\n<div class=\"gb-container gb-container-eb01df8b\">\n\n<p class=\"gb-headline gb-headline-5c7908fc gb-headline-text\">Pericia Forense<br>DFIR<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-a4ee350c\">\n\n<p class=\"gb-headline gb-headline-f3f4d34e gb-headline-text\">Correlaci\u00f3n de Eventos de Seguridad<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-e7ef64c7\">\n\n<p class=\"gb-headline gb-headline-bd67dc4a gb-headline-text\">Identificar Eventos Sospechosos \/ Cr\u00edticos<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-21b38702\">\n\n<p class=\"gb-headline gb-headline-2899480c gb-headline-text\">Sistema de Monitoreo Continuo<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-3116d2f7\">\n\n<p class=\"gb-headline gb-headline-d6c89fce gb-headline-text\">Planes y procedimientos para la detecci\u00f3n de incidentes<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-77068ee8\">\n<div class=\"gb-container gb-container-5da5bc31\">\n\n<h4 class=\"gb-headline gb-headline-f878a2d1 gb-headline-text\">Operaci\u00f3n<\/h4>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-3bc287d4 alignfull\">\n<div class=\"gb-container gb-container-42b517f8\">\n<div class=\"gb-container gb-container-a6c54fcb\">\n\n<h2 class=\"gb-headline gb-headline-af8f3ed1 gb-headline-text\">Conoce a Framework Pegasus Security<\/h2>\n\n\n<div class=\"gb-container gb-container-efc1e4cc\">\n\n<a class=\"gb-button gb-button-59c63e2b\" href=\"https:\/\/pegasussecurity.com.br\/contacto\/\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" role=\"img\" height=\"1em\" width=\"1em\" viewbox=\"0 0 496 512\"><path fill=\"currentColor\" d=\"M248 8C111 8 0 119 0 256s111 248 248 248 248-111 248-248S385 8 248 8zm0 96c48.6 0 88 39.4 88 88s-39.4 88-88 88-88-39.4-88-88 39.4-88 88-88zm0 344c-58.7 0-111.3-26.6-146.5-68.2 18.8-35.4 55.6-59.8 98.5-59.8 2.4 0 4.8.4 7.1 1.1 13 4.2 26.6 6.9 40.9 6.9 14.3 0 28-2.7 40.9-6.9 2.3-.7 4.7-1.1 7.1-1.1 42.9 0 79.7 24.4 98.5 59.8C359.3 421.4 306.7 448 248 448z\"><\/path><\/svg><\/span><span class=\"gb-button-text\">Hable con un consultor y programe una demostraci\u00f3n.<\/span><\/a>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Framework \u201cEnd to End\u201d de Seguridad Nuestro Framework es un marco metodol\u00f3gico que nos permite gestionar las amenazas asociadas a la Ciberseguridad, con base en los objetivos de negocio del Cliente y transformando la Seguridad en un habilitador de nuevas oportunidades y transformaci\u00f3n digital. Gobernanza, Compliancey riesgo En el alcance de GRC, analizamos las necesidades, &#8230; <a title=\"Framework\" class=\"read-more\" href=\"https:\/\/pegasussecurity.com.br\/es\/soluciones\/framework\/\" aria-label=\"Leer m\u00e1s sobre Framework\">Leer m\u00e1s<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":5371,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-5496","page","type-page","status-publish"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Framework - Pegasus Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pegasussecurity.com.br\/es\/soluciones\/framework\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Framework - Pegasus Security\" \/>\n<meta property=\"og:description\" content=\"Framework \u201cEnd to End\u201d de Seguridad Nuestro Framework es un marco metodol\u00f3gico que nos permite gestionar las amenazas asociadas a la Ciberseguridad, con base en los objetivos de negocio del Cliente y transformando la Seguridad en un habilitador de nuevas oportunidades y transformaci\u00f3n digital. Gobernanza, Compliancey riesgo En el alcance de GRC, analizamos las necesidades, ... Leer m\u00e1s\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pegasussecurity.com.br\/es\/soluciones\/framework\/\" \/>\n<meta property=\"og:site_name\" content=\"Pegasus Security\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-23T23:04:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/pegasus.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1098\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/framework\\\/\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/framework\\\/\",\"name\":\"Framework - Pegasus Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/#website\"},\"datePublished\":\"2024-09-03T18:14:37+00:00\",\"dateModified\":\"2025-02-23T23:04:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/framework\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/framework\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/framework\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Soluciones\",\"item\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Framework\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/\",\"name\":\"Pegasus Security\",\"description\":\"Cybersecurity for All\",\"publisher\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/#organization\"},\"alternateName\":\"Pegasus\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/#organization\",\"name\":\"Pegasus Security\",\"alternateName\":\"Pegasus Security\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/cropped-pegasus-white-logo.webp\",\"contentUrl\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/cropped-pegasus-white-logo.webp\",\"width\":392,\"height\":328,\"caption\":\"Pegasus Security\"},\"image\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Framework - Pegasus Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/framework\/","og_locale":"es_ES","og_type":"article","og_title":"Framework - Pegasus Security","og_description":"Framework \u201cEnd to End\u201d de Seguridad Nuestro Framework es un marco metodol\u00f3gico que nos permite gestionar las amenazas asociadas a la Ciberseguridad, con base en los objetivos de negocio del Cliente y transformando la Seguridad en un habilitador de nuevas oportunidades y transformaci\u00f3n digital. Gobernanza, Compliancey riesgo En el alcance de GRC, analizamos las necesidades, ... Leer m\u00e1s","og_url":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/framework\/","og_site_name":"Pegasus Security","article_modified_time":"2025-02-23T23:04:41+00:00","og_image":[{"width":1098,"height":500,"url":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/pegasus.jpg","type":"image\/jpeg"}],"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/framework\/","url":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/framework\/","name":"Framework - Pegasus Security","isPartOf":{"@id":"https:\/\/pegasussecurity.com.br\/es\/#website"},"datePublished":"2024-09-03T18:14:37+00:00","dateModified":"2025-02-23T23:04:41+00:00","breadcrumb":{"@id":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/framework\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pegasussecurity.com.br\/es\/soluciones\/framework\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/framework\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/pegasussecurity.com.br\/es\/"},{"@type":"ListItem","position":2,"name":"Soluciones","item":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/"},{"@type":"ListItem","position":3,"name":"Framework"}]},{"@type":"WebSite","@id":"https:\/\/pegasussecurity.com.br\/es\/#website","url":"https:\/\/pegasussecurity.com.br\/es\/","name":"Pegasus Security","description":"Cybersecurity for All","publisher":{"@id":"https:\/\/pegasussecurity.com.br\/es\/#organization"},"alternateName":"Pegasus","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pegasussecurity.com.br\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/pegasussecurity.com.br\/es\/#organization","name":"Pegasus Security","alternateName":"Pegasus Security","url":"https:\/\/pegasussecurity.com.br\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/pegasussecurity.com.br\/es\/#\/schema\/logo\/image\/","url":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/cropped-pegasus-white-logo.webp","contentUrl":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/cropped-pegasus-white-logo.webp","width":392,"height":328,"caption":"Pegasus Security"},"image":{"@id":"https:\/\/pegasussecurity.com.br\/es\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/pages\/5496","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/comments?post=5496"}],"version-history":[{"count":3,"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/pages\/5496\/revisions"}],"predecessor-version":[{"id":5548,"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/pages\/5496\/revisions\/5548"}],"up":[{"embeddable":true,"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/pages\/5371"}],"wp:attachment":[{"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/media?parent=5496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}