{"id":5500,"date":"2024-08-06T17:26:38","date_gmt":"2024-08-06T20:26:38","guid":{"rendered":"https:\/\/pegasussecurity.com.br\/soluciones\/x-secure\/"},"modified":"2025-02-19T11:47:35","modified_gmt":"2025-02-19T14:47:35","slug":"x-secure","status":"publish","type":"page","link":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-secure\/","title":{"rendered":"X-Secure"},"content":{"rendered":"<div class=\"gb-container gb-container-31d0c4d1 alignfull\">\n<div class=\"gb-container gb-container-ae5c886b\">\n\n<h2 class=\"gb-headline gb-headline-3ef3c545 gb-headline-text\">Detectar, Responder y Recuperar<\/h2>\n\n\n\n<p>La misi\u00f3n de Pegasus como Intelligent Security Service Provider (iSSP) es ofrecer a nuestros clientes soluciones completas asociadas a los mejores y m\u00e1s especializados profesionales, procesos y tecnolog\u00edas.<\/p>\n\n\n\n<p><strong>Nuestra soluci\u00f3n se basa en 3 pilares:<\/strong><br\/><\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-77748045\">\n<div class=\"gb-container gb-container-a0084182\">\n\n<h3 class=\"gb-headline gb-headline-e190ba31 gb-headline-text\">X-VRM<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-dfeb057e gb-headline-text\">Gesti\u00f3n de Vulnerabilidades y Amenazas<\/p>\n\n\n<div class=\"gb-container gb-container-5d296dad\">\n<div class=\"gb-container gb-container-9cfaf22c\">\n<div class=\"gb-container gb-container-437ebc58\">\n\n<figure class=\"gb-block-image gb-block-image-1374f93c\"><img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"96\" class=\"gb-image gb-image-1374f93c\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0030.jpg\" alt=\"\" title=\"icon-0030\"><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-2628f4be gb-headline-text\">An\u00e1lisis de vulnerabilidades<br>Benchmarking &amp; riesgos de terceros<br>Prueba de penetraci\u00f3n<br>Red Team<br>Gesti\u00f3n de Threat Hunting<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-47cb1948\">\n\n<h3 class=\"gb-headline gb-headline-73848a9b gb-headline-text\">X-THREATS<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-eb8a87c0 gb-headline-text\">Inteligencia de Amenazas<\/p>\n\n\n<div class=\"gb-container gb-container-f3895535\">\n<div class=\"gb-container gb-container-3f9fc072\">\n<div class=\"gb-container gb-container-7c672bd4\">\n\n<figure class=\"gb-block-image gb-block-image-f5d3a9a2\"><img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"96\" class=\"gb-image gb-image-f5d3a9a2\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0026-1.jpg\" alt=\"\" title=\"icon-0026\"><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-3305e204 gb-headline-text\">Riesgo de Protecci\u00f3n de Datos<br>Fuentes de Informaci\u00f3n sobre amenazas<br>Proyectos de Inteligencia personalizados<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-2588e31e\">\n\n<h3 class=\"gb-headline gb-headline-dacc0392 gb-headline-text\">X-SECURE<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-610cd96a gb-headline-text\">Detecci\u00f3n &amp; Respuesta<\/p>\n\n\n<div class=\"gb-container gb-container-089661aa\">\n<div class=\"gb-container gb-container-9186c172\">\n<div class=\"gb-container gb-container-fd9bd31b\">\n\n<figure class=\"gb-block-image gb-block-image-1a4961e2\"><img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"96\" class=\"gb-image gb-image-1a4961e2\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0031.jpg\" alt=\"\" title=\"icon-0031\"><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-8a8f30c7 gb-headline-text\">Protecci\u00f3n de Activos<br>Gesti\u00f3n de Detecci\u00f3n y Respuesta<br>Respuesta a Incidentes &amp; An\u00e1lisis Forense Digital<\/p>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-0ea7c5a1 alignfull\">\n<div class=\"gb-container gb-container-38653c35\">\n\n<h2 class=\"gb-headline gb-headline-846de857 gb-headline-text\">Seguridad administrada<\/h2>\n\n<\/div>\n\n<div class=\"gb-container gb-container-a114872d\">\n<div class=\"gb-container gb-container-4a04af96\">\n\n<p class=\"gb-headline gb-headline-a1b27784 gb-headline-text\">Ahora que los l\u00edmites de la informaci\u00f3n y los datos dentro de las empresas han desaparecido debido a la <mark class=\"gb-highlight\">transformaci\u00f3n digital<\/mark>, es fundamental adaptarse a un nuevo enfoque de la seguridad.<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-74a44f68 gb-headline-text\">Pegasus Security, como<mark class=\"gb-highlight\"> proveedor de servicios de seguridad<\/mark>, tiene una visi\u00f3n hol\u00edstica: debemos ayudar a nuestros clientes a maximizar la protecci\u00f3n de su negocio contra amenazas de ciberseguridad y minimizar el riesgo de acuerdo a sus necesidades y capacidades.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-dbd2fc3c\">\n\n<p class=\"gb-headline gb-headline-35cb0c7d gb-headline-text\">Pegasus Security <strong>administra todos los elementos de seguridad<\/strong> que se utilizan para limitar o evitar que las amenazas y los ataques tengan \u00e9xito.&nbsp;<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-6aab69e5 gb-headline-text\">Es importante cubrir los diferentes vectores de ataque posibles y asegurar que todos los mecanismos b\u00e1sicos de protecci\u00f3n est\u00e1n en su lugar, ayudando a minimizar el riesgo asociado especialmente a los m\u00e1s vulnerables, como los empleados, el correo electr\u00f3nico o los terminales m\u00f3viles.<\/p>\n\n\n\n<figure class=\"gb-block-image gb-block-image-24ab7e12\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"199\" class=\"gb-image gb-image-24ab7e12\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/seguranca-gerenciada.webp\" alt=\"\" title=\"seguridad administrada\" srcset=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/seguranca-gerenciada.webp 600w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/seguranca-gerenciada-300x100.webp 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-9106c964 alignfull\">\n<div class=\"gb-container gb-container-39f9c666\">\n\n<h2 class=\"gb-headline gb-headline-c3f5dd43 gb-headline-text\">Seguridad del Dispositivo<\/h2>\n\n<\/div>\n\n<div class=\"gb-container gb-container-1d4629a4\">\n<div class=\"gb-container gb-container-37f6091c\">\n\n<p class=\"gb-headline gb-headline-8c159377 gb-headline-text\">El dispositivo es la puerta de enlace principal que utilizan los atacantes para comprometer una organizaci\u00f3n.<br>Las soluciones de seguridad tradicionales protegen la red (firewalls, IDS, DLP, etc.), pero no protegen frente a los riesgos derivados del nuevo ecosistema digital, como: empleados que trabajan fuera de la red corporativa, tr\u00e1fico oscurecido o Shadow IT\/IoT.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-563cdf31\">\n\n<p class=\"gb-headline gb-headline-e017d172 gb-headline-text\">Como los <mark class=\"gb-highlight\">antivirus tradicionales basados \u200b\u200ben firmas son insuficientes para los ataques actuales<\/mark>, necesitamos nuevas estrategias para combatir eficazmente los ataques sofisticados que emplean malware avanzado, exploits o APT.<\/p>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-80f52c4e alignfull\">\n<div class=\"gb-container gb-container-0da7f42c\">\n\n<h2 class=\"gb-headline gb-headline-f9f968ac gb-headline-text\">Seguridad de la Red<\/h2>\n\n<\/div>\n\n<div class=\"gb-container gb-container-04faa831\">\n<div class=\"gb-container gb-container-ad5f5137\">\n\n<p class=\"gb-headline gb-headline-5f53b89c gb-headline-text\">El concepto de seguridad de la red ya no funciona solo debido a los dr\u00e1sticos desaf\u00edos de la transformaci\u00f3n digital:<br>Pegasus Security es el socio perfecto para ofrecer una \u00fanica soluci\u00f3n de red y seguridad a sus clientes.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Movilidad del usuario<\/li>\n\n\n\n<li>Migraci\u00f3n a la Nube<\/li>\n\n\n\n<li>La evoluci\u00f3n de las amenazas<\/li>\n\n\n\n<li>Adopci\u00f3n SD-WAN<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-1f939124\">\n\n<p class=\"gb-headline gb-headline-3a55db74 gb-headline-text\"><mark class=\"gb-highlight\">En Pegasus Security,<br><\/mark>Somos conscientes de estos problemas y hemos adaptado nuestras soluciones a este complejo escenario de ecosistemas fronterizos difusos.<\/p>\n\n\n<div class=\"gb-container gb-container-727b80bf\">\n<div class=\"gb-container gb-container-495ae53c\">\n<div class=\"gb-container gb-container-f178e500\">\n<div class=\"gb-container gb-container-03b6466e\">\n<div class=\"gb-container gb-container-8d958375\">\n<div class=\"gb-container gb-container-21c8af30\">\n\n<figure class=\"gb-block-image gb-block-image-ff8ccb2c\"><img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"96\" class=\"gb-image gb-image-ff8ccb2c\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0042.jpg\" alt=\"\" title=\"icon-0042\"><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-80817a78\">\n\n<p class=\"gb-headline gb-headline-d5cb094c gb-headline-text\">Acceso seguro y uso de los servicios de aplicaciones corporativas.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-7d187801\">\n<div class=\"gb-container gb-container-52ea368a\">\n<div class=\"gb-container gb-container-414a2a3c\">\n<div class=\"gb-container gb-container-67ec0bab\">\n<div class=\"gb-container gb-container-1b9dc381\">\n<div class=\"gb-container gb-container-6e522b20\">\n\n<figure class=\"gb-block-image gb-block-image-7e607d00\"><img loading=\"lazy\" decoding=\"async\" width=\"2048\" height=\"2048\" class=\"gb-image gb-image-7e607d00\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0041.jpg\" alt=\"\" title=\"icon-0041\" srcset=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0041.jpg 2048w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0041-300x300.jpg 300w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0041-1024x1024.jpg 1024w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0041-150x150.jpg 150w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0041-768x768.jpg 768w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0041-1536x1536.jpg 1536w\" sizes=\"auto, (max-width: 2048px) 100vw, 2048px\" \/><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-5e61cb04\">\n\n<p class=\"gb-headline gb-headline-1031db1c gb-headline-text\">Servicios de navegaci\u00f3n segura en Internet<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-05129b15\">\n<div class=\"gb-container gb-container-894f9934\">\n<div class=\"gb-container gb-container-d3adb96f\">\n<div class=\"gb-container gb-container-1decb0c5\">\n<div class=\"gb-container gb-container-89bbdf21\">\n<div class=\"gb-container gb-container-47395b85\">\n\n<figure class=\"gb-block-image gb-block-image-7562a432\"><img loading=\"lazy\" decoding=\"async\" width=\"2048\" height=\"2048\" class=\"gb-image gb-image-7562a432\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0040.jpg\" alt=\"\" title=\"icon-0040\" srcset=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0040.jpg 2048w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0040-300x300.jpg 300w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0040-1024x1024.jpg 1024w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0040-150x150.jpg 150w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0040-768x768.jpg 768w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0040-1536x1536.jpg 1536w\" sizes=\"auto, (max-width: 2048px) 100vw, 2048px\" \/><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-a0766048\">\n\n<p class=\"gb-headline gb-headline-eaddfb82 gb-headline-text\">Acceso y uso seguro de los servicios de aplicaciones corporativas.Acceso seguro y uso de los servicios de aplicaciones corporativas.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-f0f5e880 alignfull\">\n<div class=\"gb-container gb-container-2332065c\">\n\n<h2 class=\"gb-headline gb-headline-d71718de gb-headline-text\">Protecci\u00f3n de Datos<\/h2>\n\n<\/div>\n\n<div class=\"gb-container gb-container-684741ed\">\n<div class=\"gb-container gb-container-e1ad07c1\">\n\n<p class=\"gb-headline gb-headline-d58604c3 gb-headline-text\">La informaci\u00f3n es uno de los activos m\u00e1s valiosos de cualquier empresa y representa un desaf\u00edo a la hora de protegerla:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u00bfDonde esta?<\/li>\n\n\n\n<li>\u00bfQui\u00e9n accede a qu\u00e9?<\/li>\n\n\n\n<li>\u00bfSe envi\u00f3?<\/li>\n\n\n\n<li>\u00bfA quien?<\/li>\n<\/ul>\n\n\n\n<p>\u00bfQu\u00e9 proteger?<br\/>\u00bfUsuario? \u00bfDispositivo? <\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-52fa0569\">\n\n<p class=\"gb-headline gb-headline-8ba2b750 gb-headline-text\">Servicios de seguridad gestionados:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SOCs con profesionales especializados en las principales tecnolog\u00edas<\/li>\n\n\n\n<li>Con capacidades de respuesta a incidentes importantes (CSIRT)<\/li>\n\n\n\n<li>Analistas Especializados<\/li>\n<\/ul>\n\n\n\n<p class=\"gb-headline gb-headline-bf3be180 gb-headline-text\">Controles de seguridad:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Herramientas de seguridad<\/li>\n\n\n\n<li>Acuerdos y conocimientos de tecnolog\u00eda de vanguardia<\/li>\n<\/ul>\n\n\n\n<p class=\"gb-headline gb-headline-f89e71bb gb-headline-text\">Servicios profesionales:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Auditor\u00eda y Consultor\u00eda<\/li>\n\n\n\n<li>Capacitaci\u00f3n<\/li>\n\n\n\n<li>Integraci\u00f3n<\/li>\n<\/ul>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-dd85960d alignfull\">\n<div class=\"gb-container gb-container-12ed10c1\">\n\n<h2 class=\"gb-headline gb-headline-e16744a2 gb-headline-text\">Seguridad en la Nube<\/h2>\n\n<\/div>\n\n<div class=\"gb-container gb-container-895a1bec\">\n<div class=\"gb-container gb-container-66ab62ee\">\n\n<p class=\"gb-headline gb-headline-474443aa gb-headline-text\">La Nube P\u00fablica es un facilitador para la transformaci\u00f3n digital, pero su adopci\u00f3n trae diferentes desaf\u00edos para el negocio, donde la Seguridad es uno de los m\u00e1s importantes.<br><br>Dado que en los entornos de nube p\u00fablica <mark class=\"gb-highlight\">la responsabilidad de la seguridad se comparte<\/mark> entre el proveedor de la nube y el cliente, las empresas necesitan un socio confiable como Pegasus Security en este complejo viaje.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-448a0915\">\n\n<p class=\"gb-headline gb-headline-a5755af7 gb-headline-text\">Una propuesta basada en capacidades para todo el recorrido hacia la nube<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>CWPP<\/strong> | Cloud Workload Protection Platform<\/li>\n\n\n\n<li><strong>CSPM<\/strong> | Cloud Security Posture Management<\/li>\n\n\n\n<li><strong>CASB<\/strong> | Cloud Access Service Broker<\/li>\n<\/ul>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-8b865444 alignfull\">\n<div class=\"gb-container gb-container-22a0d195\">\n\n<h2 class=\"gb-headline gb-headline-d1c5b797 gb-headline-text\">Protecci\u00f3n de Identidad y Acceso<\/h2>\n\n<\/div>\n\n<div class=\"gb-container gb-container-476ae234\">\n<div class=\"gb-container gb-container-46dc9ba3\">\n\n<p class=\"gb-headline gb-headline-3beb852c gb-headline-text\">La protecci\u00f3n de la identidad y el acceso es una <mark class=\"gb-highlight\">necesidad transversal en la cadena de ciberseguridad<\/mark>.<br><br>No se trata s\u00f3lo de qui\u00e9n tiene o no acceso, sino tambi\u00e9n de <mark class=\"gb-highlight\">c\u00f3mo<\/mark> y <mark class=\"gb-highlight\">cu\u00e1ndo<\/mark> se permite ese acceso.<br><mark class=\"gb-highlight\">La identificaci\u00f3n y el acceso autorizado<\/mark> deben concederse en funci\u00f3n de una evaluaci\u00f3n de riesgos actualizada y continua asignada a dicho acceso, ciclo de vida de contrase\u00f1as\/certificaciones, firmas digitales\u2026 lo que a veces resulta abrumador para las organizaciones.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-c682d204\">\n\n<p class=\"gb-headline gb-headline-6abc2828 gb-headline-text\">Nuestro equipo de consultores expertos<br>Con nuestro portafolio de soluciones, apoyamos a las empresas en la construcci\u00f3n e implementaci\u00f3n de un Plan de Identidad Estrat\u00e9gica personalizado.<\/p>\n\n\n<div class=\"gb-container gb-container-65419199\">\n<div class=\"gb-container gb-container-1373506c\">\n\n<p class=\"gb-headline gb-headline-f436d547 gb-headline-text\">An\u00e1lisis y Design<\/p>\n\n\n<div class=\"gb-container gb-container-471b49cd\">\n\n<h2 class=\"gb-headline gb-headline-3394bdad\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M334.5 414c8.8 3.8 19 2 26-4.6l144-136c4.8-4.5 7.5-10.8 7.5-17.4s-2.7-12.9-7.5-17.4l-144-136c-7-6.6-17.2-8.4-26-4.6s-14.5 12.5-14.5 22l0 72L32 192c-17.7 0-32 14.3-32 32l0 64c0 17.7 14.3 32 32 32l288 0 0 72c0 9.6 5.7 18.2 14.5 22z\"><\/path><\/svg><\/span><\/h2>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-90f27a8c\">\n\n<p class=\"gb-headline gb-headline-f5b5674e gb-headline-text\">Implementaci\u00f3n<\/p>\n\n\n<div class=\"gb-container gb-container-82b63683\">\n\n<h2 class=\"gb-headline gb-headline-d5a73f73\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M334.5 414c8.8 3.8 19 2 26-4.6l144-136c4.8-4.5 7.5-10.8 7.5-17.4s-2.7-12.9-7.5-17.4l-144-136c-7-6.6-17.2-8.4-26-4.6s-14.5 12.5-14.5 22l0 72L32 192c-17.7 0-32 14.3-32 32l0 64c0 17.7 14.3 32 32 32l288 0 0 72c0 9.6 5.7 18.2 14.5 22z\"><\/path><\/svg><\/span><\/h2>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-7ceb701f\">\n\n<p class=\"gb-headline gb-headline-f13a4da4 gb-headline-text\">Vigilancia<\/p>\n\n\n<div class=\"gb-container gb-container-3fc9e3d7\">\n\n<h2 class=\"gb-headline gb-headline-e425a534\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M334.5 414c8.8 3.8 19 2 26-4.6l144-136c4.8-4.5 7.5-10.8 7.5-17.4s-2.7-12.9-7.5-17.4l-144-136c-7-6.6-17.2-8.4-26-4.6s-14.5 12.5-14.5 22l0 72L32 192c-17.7 0-32 14.3-32 32l0 64c0 17.7 14.3 32 32 32l288 0 0 72c0 9.6 5.7 18.2 14.5 22z\"><\/path><\/svg><\/span><\/h2>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-bf7a48ff alignfull\">\n<div class=\"gb-container gb-container-840f7edf\">\n\n<h2 class=\"gb-headline gb-headline-78066009 gb-headline-text\">Capacidad de Detecci\u00f3n y Respuesta Mejorada<\/h2>\n\n<\/div>\n\n<div class=\"gb-container gb-container-db8b0c37\">\n<div class=\"gb-container gb-container-993bd6da\">\n\n<h3 class=\"gb-headline gb-headline-de58cc30 gb-headline-text\">Cambiando la seguridad tradicional:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Centrarse en el comportamiento y la situaci\u00f3n posterior a la infracci\u00f3n mediante IA\/ML<\/li>\n\n\n\n<li>Extensi\u00f3n EPP \ud83e\udc6a EDR y superficie de ataque<\/li>\n\n\n\n<li>Extensi\u00f3n IDPS\/FW \ud83e\udc6a Capacidad NTA\/NDR<\/li>\n<\/ul>\n\n\n\n<h3 class=\"gb-headline gb-headline-680886b4 gb-headline-text\">Nuevas \u201cfronteras\u201d a proteger:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Protecci\u00f3n de carga de trabajo en la nube, CASB, CSPM<\/li>\n\n\n\n<li>Redes IoT \/ ICS. Movilidad. SD-Wan  <\/li>\n\n\n\n<li>Protecci\u00f3n de riesgos digitales (marca, reputaci\u00f3n)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"gb-headline gb-headline-e9760e9e gb-headline-text\">Extended Mission:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Facilitar la investigaci\u00f3n de infracciones, la contenci\u00f3n remota y la investigaci\u00f3n forense.<\/li>\n\n\n\n<li>Capa de an\u00e1lisis con telemetr\u00eda para permitir la detecci\u00f3n y b\u00fasqueda de AI &amp; Hunting<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-80608737\">\n\n<p class=\"gb-headline gb-headline-f575fcac gb-headline-text\">Integrar piezas y ampliar capacidades<\/p>\n\n\n<div class=\"gb-container gb-container-1a108530\">\n\n<figure class=\"gb-block-image gb-block-image-b7f85eb4\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"450\" class=\"gb-image gb-image-b7f85eb4\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/deteccao-resposta.webp\" alt=\"\" title=\"detecci\u00f3n-respuesta\" srcset=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/deteccao-resposta.webp 800w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/deteccao-resposta-300x169.webp 300w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/deteccao-resposta-768x432.webp 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-41b42fb7 alignfull\">\n<div class=\"gb-container gb-container-8a3b6f14\">\n<div class=\"gb-container gb-container-1755c5bf\">\n\n<h2 class=\"gb-headline gb-headline-0ff1dbde gb-headline-text\">X-Secure: Detecci\u00f3n y Respuesta Gestionadas<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-ef801e79 gb-headline-text\">Benef\u00edciese de una monitorizaci\u00f3n continua de amenazas las 24 horas, los 7 d\u00edas de la semana, investigaci\u00f3n de infracciones y respuesta remota r\u00e1pida<\/p>\n\n\n<div class=\"gb-container gb-container-b1d112fb\">\n<div class=\"gb-container gb-container-fe1e2c4b\">\n<div class=\"gb-container gb-container-c1e299fd\">\n<div class=\"gb-container gb-container-cbe3c9a8\">\n<div class=\"gb-container gb-container-efe5221b\">\n\n<figure class=\"gb-block-image gb-block-image-4abbc73b\"><img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"96\" class=\"gb-image gb-image-4abbc73b\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0019.jpg\" alt=\"\" title=\"icon-0019\"><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-e901fa52 gb-headline-text\">Subcontratar la monitorizaci\u00f3n de amenazas 24 horas al d\u00eda, 7 d\u00edas a la semana,<br>y esfuerzos de detecci\u00f3n e investigaci\u00f3n de infracciones para nuestros equipos de expertos.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-3a8035df\">\n<div class=\"gb-container gb-container-e7e2ab7e\">\n<div class=\"gb-container gb-container-ce25614d\">\n<div class=\"gb-container gb-container-f265b84a\">\n\n<figure class=\"gb-block-image gb-block-image-6cd6ab83\"><img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"96\" class=\"gb-image gb-image-6cd6ab83\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0014.jpg\" alt=\"\" title=\"icon-0014\"><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-7a0150f7 gb-headline-text\">Detecci\u00f3n mejorada con X-Secure, incluida protecci\u00f3n de endpoint, implementada y mantenida por nuestro equipo<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-d6581b25\">\n<div class=\"gb-container gb-container-40162ba3\">\n<div class=\"gb-container gb-container-0b6b40f6\">\n<div class=\"gb-container gb-container-79d21f66\">\n\n<figure class=\"gb-block-image gb-block-image-67404f22\"><img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"96\" class=\"gb-image gb-image-67404f22\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0013.jpg\" alt=\"\" title=\"icon-0013\"><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-0419257f gb-headline-text\">Nuestros expertos brindan orientaci\u00f3n pr\u00e1ctica sobre la erradicaci\u00f3n y recuperaci\u00f3n de incidentes, as\u00ed como acciones r\u00e1pidas de contenci\u00f3n de infracciones.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-d7e848af\">\n\n<h3 class=\"gb-headline gb-headline-0f2c8785 gb-headline-text\">Nuestros Diferenciadores<\/h3>\n\n\n\n<h4 class=\"gb-headline gb-headline-fbfb5cb3 gb-headline-text\">LA MEJOR TECNOLOG\u00cdA DE PROTECCI\u00d3N DE ENDPOINT<\/h4>\n\n\n\n<p>Aumente su inversi\u00f3n en seguridad con una soluci\u00f3n EPP avanzada, que incluye EDR y recursos de superficie de ataque, resultado de nuestros contratos premium con los mejores proveedores de la categor\u00eda.<\/p>\n\n\n\n<h4 class=\"gb-headline gb-headline-e81526f1 gb-headline-text\">CENTRO DE EXCELENCIA 24&#215;7<\/h4>\n\n\n\n<p>El Servicio es prestado por nuestros Centros de Excelencia Global las 24 horas del d\u00eda, los 7 d\u00edas de la semana, aprovechando la visibilidad global de las amenazas y la automatizaci\u00f3n estandarizada. respuesta, apoyada por nuestra capacidad local <\/p>\n\n\n\n<h4 class=\"gb-headline gb-headline-3428760c gb-headline-text\">DETECCI\u00d3N AVANZADA Y CAPACIDAD CTI<\/h4>\n\n\n\n<p>Nuestra plataforma MDR extiende la capa de protecci\u00f3n EPP, a trav\u00e9s de an\u00e1lisis de detecci\u00f3n avanzados, recursos de orquestaci\u00f3n y la aplicaci\u00f3n de nuestra inteligencia patentada.<\/p>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-56983304 alignfull\">\n<div class=\"gb-container gb-container-be44af2e\">\n<div class=\"gb-container gb-container-620f0ad8\">\n\n<h2 class=\"gb-headline gb-headline-ea389114 gb-headline-text\">X-Secure: Detecci\u00f3n y Respuesta Gestionadas<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-1926cf13 gb-headline-text\">Aproveche los entornos sint\u00e9ticos que atraen y desv\u00edan a los invasores mientras obtiene informaci\u00f3n<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Distrae al adversario de los activos reales del Cliente y consume sus recursos para los dados.<\/li>\n\n\n\n<li>Identifica activos vulnerables y protege la infraestructura de ataques dirigidos.<\/li>\n\n\n\n<li>Descubra amenazas internas o externas<\/li>\n\n\n\n<li>Implementa recursos y presupuestos de seguridad de manera m\u00e1s eficiente<\/li>\n<\/ul>\n\n\n\n<figure class=\"gb-block-image gb-block-image-fd0eba1c\"><img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"318\" class=\"gb-image gb-image-fd0eba1c\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/ambientes-sinteticos.webp\" alt=\"\" title=\"entornos sint\u00e9ticos\" srcset=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/ambientes-sinteticos.webp 650w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/ambientes-sinteticos-300x147.webp 300w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/figure>\n\n<\/div>\n\n<div class=\"gb-container gb-container-3f037af8\">\n\n<h3 class=\"gb-headline gb-headline-73f871d8 gb-headline-text\">Nuestros Diferenciales<\/h3>\n\n\n\n<h4 class=\"gb-headline gb-headline-7e2069df gb-headline-text\">APROVECHAMIENTO DE LA TECNOLOG\u00cdA DE CONTRAINTELIGENCIA<\/h4>\n\n\n\n<p>Aportamos tecnolog\u00eda para dise\u00f1ar e implementar sistemas de enga\u00f1o.<\/p>\n\n\n\n<h4 class=\"gb-headline gb-headline-5b9a0297 gb-headline-text\">ENTORNOS DECOY PERSONALIZABLES<\/h4>\n\n\n\n<p>Nuestros servicios de enga\u00f1o proporcionan una amplia variedad de entornos de enga\u00f1o, capaces de replicar diferentes redes internas y externas de cara al p\u00fablico y a la DMZ.<\/p>\n\n\n\n<h4 class=\"gb-headline gb-headline-be1ca855 gb-headline-text\">RECOPILACI\u00d3N DE CTI E INTEGRACI\u00d3N DE TERCEROS<\/h4>\n\n\n\n<p>La tecnolog\u00eda de contrainteligencia mejora el mapeo con la estructura ATT&amp;CK y permite el consumo y la recuperaci\u00f3n de t\u00e9cnicas\/patrones de invasores para posibilitar los esfuerzos de caza. Adem\u00e1s, las alertas se pueden exportar f\u00e1cilmente a su SIEM. <\/p>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-c59c8e0c alignfull\">\n<div class=\"gb-container gb-container-e9a96164\">\n<div class=\"gb-container gb-container-6c334cc2\">\n\n<h2 class=\"gb-headline gb-headline-3b873745 gb-headline-text\">X-Secure: DFIR<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-26357c0e gb-headline-text\">Ampl\u00ede la capacidad de su CSIRT con asistencia las 24 horas del d\u00eda, los 7 d\u00edas de la semana en infracciones y crisis complejas<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ack Inquiry Assign Incid. Handler <\/li>\n\n\n\n<li>Recopilaci\u00f3n de pruebas 1\u00ba Contiene<\/li>\n\n\n\n<li>An\u00e1lisis &amp; Informe inicial<\/li>\n\n\n\n<li>Gu\u00eda de remediaci\u00f3n de Evaluaci\u00f3n de Compromiso<\/li>\n\n\n\n<li>Lecciones aprendidas y endurecimiento<\/li>\n<\/ul>\n\n\n<div class=\"gb-container gb-container-576dfd4e\">\n<div class=\"gb-container gb-container-b8d02d95\">\n\n<p class=\"gb-headline gb-headline-e74d53af gb-headline-text\"><mark class=\"gb-highlight\">Disponibilidad y asistencia las 24 horas del d\u00eda<\/mark>, los 7 d\u00edas de la semana y asistencia de nuestros especialistas en reversi\u00f3n de malware, an\u00e1lisis forense digital, inteligencia de amenazas y gesti\u00f3n de crisis.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-c714359b\">\n<div class=\"gb-container gb-container-34edb431\">\n\n<p class=\"gb-headline gb-headline-14bc4837 gb-headline-text\"><mark class=\"gb-highlight\">Gestor de incidentes<\/mark> dedicado, no local\/remoto, respuesta coordinada<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-52135cf4\">\n\n<p class=\"gb-headline gb-headline-ff20848f gb-headline-text\"><mark class=\"gb-highlight\">Orientaci\u00f3n completa<\/mark> sobre reparaci\u00f3n, lecciones aprendidas y apoyo legal<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-f6cdf63d\">\n\n<h3 class=\"gb-headline gb-headline-0c1a8b3c gb-headline-text\">Nuestros Diferenciales<\/h3>\n\n\n\n<h4 class=\"gb-headline gb-headline-24d8a73f gb-headline-text\">CAPACIDAD DE RESPUESTA LOCAL<\/h4>\n\n\n\n<p>Presencia local para la coordinaci\u00f3n de crisis en el sitio y la gesti\u00f3n de evidencia, respaldada por nuestra capacidad global de an\u00e1lisis r\u00e1pido<\/p>\n\n\n\n<h4 class=\"gb-headline gb-headline-7f7b3dea gb-headline-text\">ASISTENCIA EN CASO DE INCIDENTES DE END-TO-END<\/h4>\n\n\n\n<p>Apoya a su equipo durante todo el ciclo de vida del incidente, incluida una gu\u00eda integral sobre la aplicaci\u00f3n de acciones de remediaci\u00f3n, recuperaci\u00f3n del sistema, respaldo y protecci\u00f3n.<\/p>\n\n\n\n<h4 class=\"gb-headline gb-headline-ec1b64b6 gb-headline-text\">INTELIGENCIA DE AMENAZAS<br>FORENSICS &amp; ANALYSIS TOOLING<\/h4>\n\n\n\n<p>Para respaldar la contextualizaci\u00f3n de amenazas y los CoAs para la erradicaci\u00f3n de amenazas, incluidas nuestras herramientas forenses para una implementaci\u00f3n r\u00e1pida, recopilaci\u00f3n de evidencia y un barrido integral de IoC<\/p>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-9ebcdbb8 alignfull\">\n<div class=\"gb-container gb-container-3d628bc1\">\n<div class=\"gb-container gb-container-3474c1d6\">\n\n<figure class=\"gb-block-image gb-block-image-738c7866\"><a href=\"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-secure\/\"><img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"125\" class=\"gb-image gb-image-738c7866 hide-on-mobile\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/2024\/05\/icone01.webp\" alt=\"\" title=\"icono01\"><\/a><\/figure>\n\n\n\n<h3 class=\"gb-headline gb-headline-a2ed4837\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M352 0c-12.9 0-24.6 7.8-29.6 19.8s-2.2 25.7 6.9 34.9L370.7 96 201.4 265.4c-12.5 12.5-12.5 32.8 0 45.3s32.8 12.5 45.3 0L416 141.3l41.4 41.4c9.2 9.2 22.9 11.9 34.9 6.9s19.8-16.6 19.8-29.6l0-128c0-17.7-14.3-32-32-32L352 0zM80 32C35.8 32 0 67.8 0 112L0 432c0 44.2 35.8 80 80 80l320 0c44.2 0 80-35.8 80-80l0-112c0-17.7-14.3-32-32-32s-32 14.3-32 32l0 112c0 8.8-7.2 16-16 16L80 448c-8.8 0-16-7.2-16-16l0-320c0-8.8 7.2-16 16-16l112 0c17.7 0 32-14.3 32-32s-14.3-32-32-32L80 32z\"><\/path><\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-secure\/\">X-SECURE<\/a><\/span><\/h3>\n\n\n\n<ul style=\"font-size:15px\" class=\"wp-block-list produto\">\n<li style=\"font-size:15px\">Detecci\u00f3n y Respuesta Gestionadas (MDR)<\/li>\n\n\n\n<li>Acciones de remediaci\u00f3n y contenci\u00f3n del impacto<\/li>\n\n\n\n<li style=\"font-size:15px\">Inform\u00e1tica Forense Digital<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-9414705c\">\n\n<h2 class=\"gb-headline gb-headline-c3ea7d7b gb-headline-text\">Oferta Pegasus Security<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-432b8a92 gb-headline-text\"><mark class=\"gb-highlight\">Modelos de entrega<\/mark> para adaptar nuestra capacidad SECOPS a sus necesidades.<br><\/p>\n\n\n<div class=\"gb-container gb-container-9def3147\">\n<div class=\"gb-container gb-container-7e50bb9d\">\n\n<p class=\"gb-headline gb-headline-efc49d6c gb-headline-text\"><mark class=\"gb-highlight\">Subcontrataci\u00f3n de monitoreo de amenazas las 24 horas del d\u00eda<\/mark>, los 7 d\u00edas de la semana,<br>y esfuerzos de detecci\u00f3n e investigaci\u00f3n de infracciones para nuestros equipos de especialistas.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-f65b0a2a\">\n\n<p class=\"gb-headline gb-headline-6299817c gb-headline-text\"><mark class=\"gb-highlight\">Detecci\u00f3n mejorada con X-Secure<\/mark>, que incluye <mark class=\"gb-highlight\">protecci\u00f3n de endpoint y de red<\/mark>, implementada y mantenida por nuestro equipo<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-72b5ddbc\">\n\n<a class=\"gb-button gb-button-cfa11b91\" href=\"https:\/\/pegasussecurity.com.br\/contacto\/\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" role=\"img\" height=\"1em\" width=\"1em\" viewbox=\"0 0 496 512\"><path fill=\"currentColor\" d=\"M248 8C111 8 0 119 0 256s111 248 248 248 248-111 248-248S385 8 248 8zm0 96c48.6 0 88 39.4 88 88s-39.4 88-88 88-88-39.4-88-88 39.4-88 88-88zm0 344c-58.7 0-111.3-26.6-146.5-68.2 18.8-35.4 55.6-59.8 98.5-59.8 2.4 0 4.8.4 7.1 1.1 13 4.2 26.6 6.9 40.9 6.9 14.3 0 28-2.7 40.9-6.9 2.3-.7 4.7-1.1 7.1-1.1 42.9 0 79.7 24.4 98.5 59.8C359.3 421.4 306.7 448 248 448z\"><\/path><\/svg><\/span><span class=\"gb-button-text\">Hable con un consultor y programe una demostraci\u00f3n.<\/span><\/a>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Detectar, Responder y Recuperar La misi\u00f3n de Pegasus como Intelligent Security Service Provider (iSSP) es ofrecer a nuestros clientes soluciones completas asociadas a los mejores y m\u00e1s especializados profesionales, procesos y tecnolog\u00edas. Nuestra soluci\u00f3n se basa en 3 pilares: X-VRM Gesti\u00f3n de Vulnerabilidades y Amenazas An\u00e1lisis de vulnerabilidadesBenchmarking &amp; riesgos de tercerosPrueba de penetraci\u00f3nRed TeamGesti\u00f3n &#8230; <a title=\"X-Secure\" class=\"read-more\" href=\"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-secure\/\" aria-label=\"Leer m\u00e1s sobre X-Secure\">Leer m\u00e1s<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":5371,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-5500","page","type-page","status-publish"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>X-Secure - Pegasus Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-secure\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"X-Secure - Pegasus Security\" \/>\n<meta property=\"og:description\" content=\"Detectar, Responder y Recuperar La misi\u00f3n de Pegasus como Intelligent Security Service Provider (iSSP) es ofrecer a nuestros clientes soluciones completas asociadas a los mejores y m\u00e1s especializados profesionales, procesos y tecnolog\u00edas. Nuestra soluci\u00f3n se basa en 3 pilares: X-VRM Gesti\u00f3n de Vulnerabilidades y Amenazas An\u00e1lisis de vulnerabilidadesBenchmarking &amp; riesgos de tercerosPrueba de penetraci\u00f3nRed TeamGesti\u00f3n ... Leer m\u00e1s\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-secure\/\" \/>\n<meta property=\"og:site_name\" content=\"Pegasus Security\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-19T14:47:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0030.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/x-secure\\\/\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/x-secure\\\/\",\"name\":\"X-Secure - Pegasus Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/x-secure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/x-secure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/icon-0030.jpg\",\"datePublished\":\"2024-08-06T20:26:38+00:00\",\"dateModified\":\"2025-02-19T14:47:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/x-secure\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/x-secure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/x-secure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/icon-0030.jpg\",\"contentUrl\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/icon-0030.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/x-secure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Soluciones\",\"item\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"X-Secure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/\",\"name\":\"Pegasus Security\",\"description\":\"Cybersecurity for All\",\"publisher\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/#organization\"},\"alternateName\":\"Pegasus\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/#organization\",\"name\":\"Pegasus Security\",\"alternateName\":\"Pegasus Security\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/cropped-pegasus-white-logo.webp\",\"contentUrl\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/cropped-pegasus-white-logo.webp\",\"width\":392,\"height\":328,\"caption\":\"Pegasus Security\"},\"image\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"X-Secure - Pegasus Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-secure\/","og_locale":"es_ES","og_type":"article","og_title":"X-Secure - Pegasus Security","og_description":"Detectar, Responder y Recuperar La misi\u00f3n de Pegasus como Intelligent Security Service Provider (iSSP) es ofrecer a nuestros clientes soluciones completas asociadas a los mejores y m\u00e1s especializados profesionales, procesos y tecnolog\u00edas. Nuestra soluci\u00f3n se basa en 3 pilares: X-VRM Gesti\u00f3n de Vulnerabilidades y Amenazas An\u00e1lisis de vulnerabilidadesBenchmarking &amp; riesgos de tercerosPrueba de penetraci\u00f3nRed TeamGesti\u00f3n ... Leer m\u00e1s","og_url":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-secure\/","og_site_name":"Pegasus Security","article_modified_time":"2025-02-19T14:47:35+00:00","og_image":[{"url":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0030.jpg","type":"","width":"","height":""}],"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-secure\/","url":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-secure\/","name":"X-Secure - Pegasus Security","isPartOf":{"@id":"https:\/\/pegasussecurity.com.br\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-secure\/#primaryimage"},"image":{"@id":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0030.jpg","datePublished":"2024-08-06T20:26:38+00:00","dateModified":"2025-02-19T14:47:35+00:00","breadcrumb":{"@id":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-secure\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-secure\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-secure\/#primaryimage","url":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0030.jpg","contentUrl":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0030.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-secure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/pegasussecurity.com.br\/es\/"},{"@type":"ListItem","position":2,"name":"Soluciones","item":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/"},{"@type":"ListItem","position":3,"name":"X-Secure"}]},{"@type":"WebSite","@id":"https:\/\/pegasussecurity.com.br\/es\/#website","url":"https:\/\/pegasussecurity.com.br\/es\/","name":"Pegasus Security","description":"Cybersecurity for All","publisher":{"@id":"https:\/\/pegasussecurity.com.br\/es\/#organization"},"alternateName":"Pegasus","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pegasussecurity.com.br\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/pegasussecurity.com.br\/es\/#organization","name":"Pegasus Security","alternateName":"Pegasus Security","url":"https:\/\/pegasussecurity.com.br\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/pegasussecurity.com.br\/es\/#\/schema\/logo\/image\/","url":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/cropped-pegasus-white-logo.webp","contentUrl":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/cropped-pegasus-white-logo.webp","width":392,"height":328,"caption":"Pegasus Security"},"image":{"@id":"https:\/\/pegasussecurity.com.br\/es\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/pages\/5500","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/comments?post=5500"}],"version-history":[{"count":3,"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/pages\/5500\/revisions"}],"predecessor-version":[{"id":5514,"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/pages\/5500\/revisions\/5514"}],"up":[{"embeddable":true,"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/pages\/5371"}],"wp:attachment":[{"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/media?parent=5500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}