{"id":5502,"date":"2024-08-06T17:26:39","date_gmt":"2024-08-06T20:26:39","guid":{"rendered":"https:\/\/pegasussecurity.com.br\/soluciones\/x-vrm\/"},"modified":"2025-02-17T16:30:33","modified_gmt":"2025-02-17T19:30:33","slug":"x-vrm","status":"publish","type":"page","link":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-vrm\/","title":{"rendered":"X-VRM"},"content":{"rendered":"<div class=\"gb-container gb-container-7afdb014 alignfull\">\n<div class=\"gb-container gb-container-3bbb8919\">\n<div class=\"gb-container gb-container-825dd645\">\n\n<h2 class=\"gb-headline gb-headline-15d91eaf gb-headline-text\">X-VRM: Gesti\u00f3n de vulnerabilidades<\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-914b850d gb-headline-text\"><mark class=\"gb-highlight\">TestX-VRM: Application Security Testing<br>est\u00e1 automatizado para identificar activos y aplicaciones de TI y evaluar sus vulnerabilidades. Nuestro Portal le ayudar\u00e1 a priorizar su correcci\u00f3n <\/mark><\/h3>\n\n\n\n<figure class=\"gb-block-image gb-block-image-3427522f\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"327\" class=\"gb-image gb-image-3427522f\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test.webp\" alt=\"\" title=\"x-vrm-test\" srcset=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test.webp 800w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test-300x123.webp 300w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test-768x314.webp 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n<\/div>\n\n<div class=\"gb-container gb-container-f6d24632\">\n\n<h2 class=\"gb-headline gb-headline-f311d94c gb-headline-text\">Nuestros Diferenciales<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-b816845b gb-headline-text\"><mark class=\"gb-highlight\">CICLO DE VIDA DE LA GESTI\u00d3N DE VULNERABILIDADES<br><\/mark>Integrado con nuestro ciclo de vida de gesti\u00f3n de vulnerabilidades. Rastrea tus vulnerabilidades desde un \u00fanico punto <\/p>\n\n\n\n<p class=\"gb-headline gb-headline-3c53721f gb-headline-text\"><mark class=\"gb-highlight\">CENTRO DE EXCELENCIA<br><\/mark>Equipo de operaciones altamente calificado en nuestro Centro de Excelencia Global<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-c531105f gb-headline-text\"><mark class=\"gb-highlight\">VA SCANNER SOLUTIONS<\/mark><br>Integraci\u00f3n de soluciones de esc\u00e1ner VA de alta tecnolog\u00eda.<\/p>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-e2506f05 alignfull\">\n<div class=\"gb-container gb-container-4df911ec\">\n<div class=\"gb-container gb-container-0ca18755\">\n\n<h2 class=\"gb-headline gb-headline-15d91eaf gb-headline-text\">X-VRM: Pruebas de penetraci\u00f3n y evaluaci\u00f3n de la Red Team<\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-dab47ac5 gb-headline-text\"><mark class=\"gb-highlight\">Obtenga el conocimiento, la experiencia y la eficiencia para realizar pruebas de seguridad adversarias integrales con resultados pr\u00e1cticos.<br><\/mark><\/h3>\n\n\n<div class=\"gb-container gb-container-f43274c5\">\n<div class=\"gb-container gb-container-36d4acc5\">\n\n<h3 class=\"gb-headline gb-headline-9e82af04 gb-headline-text\">Pruebas de Penetraci\u00f3n<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-438eb80c gb-headline-text\">Revela vulnerabilidades que un intruso puede explotar para obtener acceso a tu entorno y sistemas.<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-a1130dd0 gb-headline-text\">Prep\u00e1rese con recomendaciones personalizadas y pr\u00e1cticas y orientaci\u00f3n para la correcci\u00f3n.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-76f42566\">\n\n<h3 class=\"gb-headline gb-headline-bdbc58d0 gb-headline-text\">Evaluaci\u00f3n Red Team<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-4ef2dc18 gb-headline-text\">Pon a prueba tus capacidades defensivas y de respuesta contra un oponente simulado de la vida real.<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-6c339033 gb-headline-text\">Comprende su capacidad para resistir ataques sociales, f\u00edsicos, de red y de aplicaciones.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-1c79ce0f\">\n\n<h2 class=\"gb-headline gb-headline-c9fee983 gb-headline-text\">Nuestros Diferenciadores<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-fb987472 gb-headline-text\"><mark class=\"gb-highlight\">CICLO DE VIDA DE LA GESTI\u00d3N DE VULNERABILIDADES<br><\/mark>Integrado con nuestro ciclo de vida de gesti\u00f3n de vulnerabilidades. Realice un seguimiento de sus vulnerabilidades desde un \u00fanico punto de vista. <\/p>\n\n\n\n<p class=\"gb-headline gb-headline-9394fac8 gb-headline-text\"><mark class=\"gb-highlight\">RESULTADOS Y RESUMEN EJECUTIVO<br><\/mark>Los informes finales contienen hallazgos detallados y un resumen ejecutivo.<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-8bbe138b gb-headline-text\"><mark class=\"gb-highlight\">ESPECIALISTAS EN SEGURIDAD<br><\/mark>Ejecutado por un equipo altamente calificado de especialistas en seguridad.<\/p>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-643a03f1 alignfull\">\n<div class=\"gb-container gb-container-c0c4e0e3\">\n<div class=\"gb-container gb-container-4ea21334\">\n\n<h2 class=\"gb-headline gb-headline-06d1c4ff gb-headline-text\">Nuestros Diferenciales<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-507002bb gb-headline-text\"><mark class=\"gb-highlight\">AST<br><\/mark>Orientaci\u00f3n y recomendaciones de nuestros especialistas en AST para mejorar su postura de seguridad<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-715958a5 gb-headline-text\"><mark class=\"gb-highlight\">WEB SERVICES AND API FRAMEWORKS<br><\/mark>Muchos servicios web admiten estructuras API<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-1f057784 gb-headline-text\"><mark class=\"gb-highlight\">SECURITY EXPERTS<br><\/mark>End-to-end garant\u00eda como pr\u00e1ctica recomendada en AST utilizando m\u00faltiples tecnolog\u00edas en diferentes puntos del SDLC<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-20441259\">\n\n<h2 class=\"gb-headline gb-headline-2a02057d gb-headline-text\">X-VRM: Application Security Testing<br><\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-de78326a gb-headline-text\"><mark class=\"gb-highlight\">Proteja sus aplicaciones web, aplicaciones m\u00f3viles y APIs, mejorando su postura de seguridad, identificando vulnerabilidades durante el ciclo de desarrollo de los sistemas.<\/mark><\/h3>\n\n\n<div class=\"gb-container gb-container-d6d4a643\">\n\n<figure class=\"gb-block-image gb-block-image-c7857b28\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"804\" class=\"gb-image gb-image-c7857b28\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test-02.webp\" alt=\"\" title=\"x-vrm-test-02\" srcset=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test-02.webp 800w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test-02-150x150.webp 150w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test-02-768x772.webp 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-c3bd4674 alignfull\">\n<div class=\"gb-container gb-container-85c9d4c4\">\n<div class=\"gb-container gb-container-1f1ec4fd\">\n<div class=\"gb-container gb-container-7c0a7d83\">\n<div class=\"gb-container gb-container-262ab261\">\n\n<h4 class=\"gb-headline gb-headline-39cbf78d gb-headline-text\">Desarrollo<\/h4>\n\n<\/div>\n\n<div class=\"gb-container gb-container-ba981b5b\">\n<div class=\"gb-container gb-container-52ddce72\">\n\n<p class=\"gb-headline gb-headline-064d639d gb-headline-text\"><mark class=\"gb-highlight\">An\u00e1lisis de c\u00f3digo est\u00e1tico<br>SAST, SCA<\/mark><\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-9461ed8a\">\n\n<p class=\"gb-headline gb-headline-851836b7 gb-headline-text\">Feedback de seguridad en tiempo real a medida que se implementa la aplicaci\u00f3n..<br><\/p>\n\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-060dd47f\">\n<div class=\"gb-container gb-container-98b44d6e\">\n\n<h4 class=\"gb-headline gb-headline-15cf7ee1 gb-headline-text\">Preproducci\u00f3n<\/h4>\n\n<\/div>\n\n<div class=\"gb-container gb-container-064afd8c\">\n<div class=\"gb-container gb-container-82fa4df8\">\n\n<p class=\"gb-headline gb-headline-8c2c598b gb-headline-text\"><mark class=\"gb-highlight\">An\u00e1lisis de c\u00f3digo din\u00e1mico e interactivo<br>DAST, M\u00c1STIL, IAST<\/mark><br><\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-19962cc6\">\n\n<p class=\"gb-headline gb-headline-d3cd25fd gb-headline-text\">Probar los requisitos funcionales de sus aplicaciones, encontrar y corregir vulnerabilidades en las primeras etapas de desarrollo antes de que se conviertan en riesgos de seguridad.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-edca9b99\">\n<div class=\"gb-container gb-container-46714a63\">\n\n<h4 class=\"gb-headline gb-headline-3f0436cd gb-headline-text\">Producci\u00f3n<\/h4>\n\n<\/div>\n\n<div class=\"gb-container gb-container-930916da\">\n<div class=\"gb-container gb-container-5321ead6\">\n\n<p class=\"gb-headline gb-headline-33a3fad3 gb-headline-text\"><mark class=\"gb-highlight\">Aplicaci\u00f3n en tiempo de ejecuci\u00f3n<br>Autoprotecci\u00f3n<br>SAST, SCA<\/mark><\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-9b0a38dc\">\n\n<p class=\"gb-headline gb-headline-01753df6 gb-headline-text\">Detecta y bloquea ataques en tus aplicaciones en tiempo real sin intervenci\u00f3n humana<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-ee6fa952 alignfull\">\n<div class=\"gb-container gb-container-410459d9\">\n<div class=\"gb-container gb-container-3d323105\">\n\n<h2 class=\"gb-headline gb-headline-a47fc783 gb-headline-text\">Nuestros Diferenciales<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-cffdc53a gb-headline-text\">El servicio aprovecha <mark class=\"gb-highlight\">nuestra CTI<\/mark> para explorar un nuevo compromiso<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-ccc0a4bb gb-headline-text\">Centro de excelencia para aprovechar la amplia <mark class=\"gb-highlight\">visibilidad de las amenazas<\/mark><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-d880d57a gb-headline-text\"><mark class=\"gb-highlight\">An\u00e1lisis semanal<\/mark> de los \u00faltimos IoAs, TTPs y IoCs no confirmados<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-f985ad23 gb-headline-text\"><mark class=\"gb-highlight\">Integrado<\/mark> con la cartera X-Secure para conectarse con DFIR y el monitoreo de amenazas<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-62271ebd\">\n\n<h2 class=\"gb-headline gb-headline-9fadeabb gb-headline-text\">X-VRM: Managed Threat Hunting<\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-3bff1f09 gb-headline-text\"><mark class=\"gb-highlight\">Ampl\u00ede su capacidad de detecci\u00f3n con la b\u00fasqueda proactiva de amenazas para explorar se\u00f1ales continuas de compromiso en su red.<\/mark><\/h3>\n\n\n<div class=\"gb-container gb-container-3a4f6e40\">\n<div class=\"gb-container gb-container-908ae425\">\n\n<p class=\"gb-headline gb-headline-e882299a gb-headline-text\">Aproveche nuestros expertos en pirater\u00eda y malware CTI para detectar infracciones continuas que no son detectadas por sus controles de seguridad.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-default\" style=\"background-color:#b7b7b7;color:#b7b7b7\"\/>\n\n\n\n<p class=\"gb-headline gb-headline-ed608ce1 gb-headline-text\">Explore las \u00faltimas TTP, que ayudan a reducir el tiempo de permanencia de la infracci\u00f3n, minimizar el impacto y brindar retroalimentaci\u00f3n a su ingenier\u00eda de detecci\u00f3n.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-e26415cd\">\n\n<figure class=\"gb-block-image gb-block-image-f60946db\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"477\" class=\"gb-image gb-image-f60946db\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test-03.webp\" alt=\"\" title=\"x-vrm-test-03\" srcset=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test-03.webp 800w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test-03-300x179.webp 300w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test-03-768x458.webp 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-9ebcdbb8 alignfull\">\n<div class=\"gb-container gb-container-3d628bc1\">\n<div class=\"gb-container gb-container-723179f1\">\n\n<figure class=\"gb-block-image gb-block-image-760d8a85\"><a href=\"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-vrm\/\"><img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"125\" class=\"gb-image gb-image-760d8a85 hide-on-mobile\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/2024\/05\/icone02.webp\" alt=\"\" title=\"icono02\"><\/a><\/figure>\n\n\n\n<h3 class=\"gb-headline gb-headline-f20ced6e\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M352 0c-12.9 0-24.6 7.8-29.6 19.8s-2.2 25.7 6.9 34.9L370.7 96 201.4 265.4c-12.5 12.5-12.5 32.8 0 45.3s32.8 12.5 45.3 0L416 141.3l41.4 41.4c9.2 9.2 22.9 11.9 34.9 6.9s19.8-16.6 19.8-29.6l0-128c0-17.7-14.3-32-32-32L352 0zM80 32C35.8 32 0 67.8 0 112L0 432c0 44.2 35.8 80 80 80l320 0c44.2 0 80-35.8 80-80l0-112c0-17.7-14.3-32-32-32s-32 14.3-32 32l0 112c0 8.8-7.2 16-16 16L80 448c-8.8 0-16-7.2-16-16l0-320c0-8.8 7.2-16 16-16l112 0c17.7 0 32-14.3 32-32s-14.3-32-32-32L80 32z\"><\/path><\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/pegasussecurity.com.br\/soluciones\/x-vrm\/\">X-VRM<\/a><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list produto\">\n<li style=\"font-size:15px\">Identificar y gestionar las vulnerabilidades para prevenir los ciberataques.<\/li>\n\n\n\n<li style=\"font-size:15px\">Penetration Tests &amp; Offensive Security<\/li>\n\n\n\n<li style=\"font-size:15px\">Managed Threat Hunting<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-9414705c\">\n\n<h2 class=\"gb-headline gb-headline-c3ea7d7b gb-headline-text\">Oferta Pegasus Security<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-432b8a92 gb-headline-text\"><mark class=\"gb-highlight\">Modelos de entrega<\/mark> para adaptar nuestra capacidad SECOPS a sus necesidades.<\/p>\n\n\n<div class=\"gb-container gb-container-9def3147\">\n<div class=\"gb-container gb-container-7e50bb9d\">\n\n<p class=\"gb-headline gb-headline-efc49d6c gb-headline-text\">Pruebas de Penetraci\u00f3n<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-f65b0a2a\">\n\n<p class=\"gb-headline gb-headline-6299817c gb-headline-text\">Gesti\u00f3n de vulnerabilidades<br><\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-99290237\">\n\n<p class=\"gb-headline gb-headline-da1abad4 gb-headline-text\">Seguridad de la aplicaci\u00f3n<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-f0ec9fd1\">\n\n<p class=\"gb-headline gb-headline-6b4566ee gb-headline-text\">Threat Hunting<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-72b5ddbc\">\n\n<a class=\"gb-button gb-button-cfa11b91\" href=\"https:\/\/pegasussecurity.com.br\/contacto\/\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" role=\"img\" height=\"1em\" width=\"1em\" viewbox=\"0 0 496 512\"><path fill=\"currentColor\" d=\"M248 8C111 8 0 119 0 256s111 248 248 248 248-111 248-248S385 8 248 8zm0 96c48.6 0 88 39.4 88 88s-39.4 88-88 88-88-39.4-88-88 39.4-88 88-88zm0 344c-58.7 0-111.3-26.6-146.5-68.2 18.8-35.4 55.6-59.8 98.5-59.8 2.4 0 4.8.4 7.1 1.1 13 4.2 26.6 6.9 40.9 6.9 14.3 0 28-2.7 40.9-6.9 2.3-.7 4.7-1.1 7.1-1.1 42.9 0 79.7 24.4 98.5 59.8C359.3 421.4 306.7 448 248 448z\"><\/path><\/svg><\/span><span class=\"gb-button-text\">Hable con un consultor y programe una demostraci\u00f3n.<\/span><\/a>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>X-VRM: Gesti\u00f3n de vulnerabilidades TestX-VRM: Application Security Testingest\u00e1 automatizado para identificar activos y aplicaciones de TI y evaluar sus vulnerabilidades. Nuestro Portal le ayudar\u00e1 a priorizar su correcci\u00f3n Nuestros Diferenciales CICLO DE VIDA DE LA GESTI\u00d3N DE VULNERABILIDADESIntegrado con nuestro ciclo de vida de gesti\u00f3n de vulnerabilidades. Rastrea tus vulnerabilidades desde un \u00fanico punto CENTRO &#8230; <a title=\"X-VRM\" class=\"read-more\" href=\"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-vrm\/\" aria-label=\"Leer m\u00e1s sobre X-VRM\">Leer m\u00e1s<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":5371,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-5502","page","type-page","status-publish"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>X-VRM - Pegasus Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-vrm\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"X-VRM - Pegasus Security\" \/>\n<meta property=\"og:description\" content=\"X-VRM: Gesti\u00f3n de vulnerabilidades TestX-VRM: Application Security Testingest\u00e1 automatizado para identificar activos y aplicaciones de TI y evaluar sus vulnerabilidades. Nuestro Portal le ayudar\u00e1 a priorizar su correcci\u00f3n Nuestros Diferenciales CICLO DE VIDA DE LA GESTI\u00d3N DE VULNERABILIDADESIntegrado con nuestro ciclo de vida de gesti\u00f3n de vulnerabilidades. Rastrea tus vulnerabilidades desde un \u00fanico punto CENTRO ... Leer m\u00e1s\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-vrm\/\" \/>\n<meta property=\"og:site_name\" content=\"Pegasus Security\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-17T19:30:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test.webp\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/x-vrm\\\/\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/x-vrm\\\/\",\"name\":\"X-VRM - Pegasus Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/x-vrm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/x-vrm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/x-vrm-test.webp\",\"datePublished\":\"2024-08-06T20:26:39+00:00\",\"dateModified\":\"2025-02-17T19:30:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/x-vrm\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/x-vrm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/x-vrm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/x-vrm-test.webp\",\"contentUrl\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/x-vrm-test.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/x-vrm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Soluciones\",\"item\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/soluciones\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"X-VRM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/\",\"name\":\"Pegasus Security\",\"description\":\"Cybersecurity for All\",\"publisher\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/#organization\"},\"alternateName\":\"Pegasus\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/#organization\",\"name\":\"Pegasus Security\",\"alternateName\":\"Pegasus Security\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/cropped-pegasus-white-logo.webp\",\"contentUrl\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/cropped-pegasus-white-logo.webp\",\"width\":392,\"height\":328,\"caption\":\"Pegasus Security\"},\"image\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"X-VRM - Pegasus Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-vrm\/","og_locale":"es_ES","og_type":"article","og_title":"X-VRM - Pegasus Security","og_description":"X-VRM: Gesti\u00f3n de vulnerabilidades TestX-VRM: Application Security Testingest\u00e1 automatizado para identificar activos y aplicaciones de TI y evaluar sus vulnerabilidades. Nuestro Portal le ayudar\u00e1 a priorizar su correcci\u00f3n Nuestros Diferenciales CICLO DE VIDA DE LA GESTI\u00d3N DE VULNERABILIDADESIntegrado con nuestro ciclo de vida de gesti\u00f3n de vulnerabilidades. Rastrea tus vulnerabilidades desde un \u00fanico punto CENTRO ... Leer m\u00e1s","og_url":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-vrm\/","og_site_name":"Pegasus Security","article_modified_time":"2025-02-17T19:30:33+00:00","og_image":[{"url":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test.webp","type":"","width":"","height":""}],"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-vrm\/","url":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-vrm\/","name":"X-VRM - Pegasus Security","isPartOf":{"@id":"https:\/\/pegasussecurity.com.br\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-vrm\/#primaryimage"},"image":{"@id":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-vrm\/#primaryimage"},"thumbnailUrl":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test.webp","datePublished":"2024-08-06T20:26:39+00:00","dateModified":"2025-02-17T19:30:33+00:00","breadcrumb":{"@id":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-vrm\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-vrm\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-vrm\/#primaryimage","url":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test.webp","contentUrl":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/x-vrm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/pegasussecurity.com.br\/es\/"},{"@type":"ListItem","position":2,"name":"Soluciones","item":"https:\/\/pegasussecurity.com.br\/es\/soluciones\/"},{"@type":"ListItem","position":3,"name":"X-VRM"}]},{"@type":"WebSite","@id":"https:\/\/pegasussecurity.com.br\/es\/#website","url":"https:\/\/pegasussecurity.com.br\/es\/","name":"Pegasus Security","description":"Cybersecurity for All","publisher":{"@id":"https:\/\/pegasussecurity.com.br\/es\/#organization"},"alternateName":"Pegasus","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pegasussecurity.com.br\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/pegasussecurity.com.br\/es\/#organization","name":"Pegasus Security","alternateName":"Pegasus Security","url":"https:\/\/pegasussecurity.com.br\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/pegasussecurity.com.br\/es\/#\/schema\/logo\/image\/","url":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/cropped-pegasus-white-logo.webp","contentUrl":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/cropped-pegasus-white-logo.webp","width":392,"height":328,"caption":"Pegasus Security"},"image":{"@id":"https:\/\/pegasussecurity.com.br\/es\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/pages\/5502","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/comments?post=5502"}],"version-history":[{"count":1,"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/pages\/5502\/revisions"}],"predecessor-version":[{"id":5503,"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/pages\/5502\/revisions\/5503"}],"up":[{"embeddable":true,"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/pages\/5371"}],"wp:attachment":[{"href":"https:\/\/pegasussecurity.com.br\/es\/wp-json\/wp\/v2\/media?parent=5502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}