{"id":170,"date":"2023-08-20T21:40:14","date_gmt":"2023-08-20T21:40:14","guid":{"rendered":"https:\/\/markficompany.com\/home\/?page_id=170"},"modified":"2023-08-20T22:36:54","modified_gmt":"2023-08-20T22:36:54","slug":"cybersoc","status":"publish","type":"page","link":"https:\/\/markficompany.com\/home\/services\/cybersoc\/","title":{"rendered":"CyberSOC"},"content":{"rendered":"\n\n\n<h1 dir=\"ltr\" style=\"line-height: 1.295; margin-top: 0pt; margin-bottom: 8pt;\"><span id=\"docs-internal-guid-8cf8e702-7fff-00d1-4268-3f4bb41e961b\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">CyberSOC<\/span><\/span><\/h1>\n\n<p dir=\"ltr\" style=\"line-height:1.295;margin-top:0pt;margin-bottom:8pt;\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">Centro de Operaciones de Ciberseguridad flexible para proteger, detectar y dar respuesta a los incidentes con agilidad y preci.si\u00f3n<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.295; margin-top: 0pt; margin-bottom: 8pt;\"><span id=\"docs-internal-guid-5cc7e4e1-7fff-09fb-4b00-ad484f832d97\"><\/span><\/p><p dir=\"ltr\" style=\"line-height:1.295;margin-top:0pt;margin-bottom:8pt;\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">Nuestro&nbsp;<\/span><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">CyberSOC-as-a-Service<\/span><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">&nbsp;es el servicio flexible y adaptable que necesitan las organizaciones para gestionar completamente las operaciones de ciberseguridad, detectando y respondiendo a las alertas e incidentes con agilidad y precisi\u00f3n, sin inversiones ni personal dedicado.<\/span><\/p>\n\r\n<h2>Como lo hacemos<\/h2>\r\n\n\n<p dir=\"ltr\" style=\"line-height: 1.295; margin-top: 0pt; margin-bottom: 8pt;\">&nbsp;<\/p>\n<p dir=\"ltr\" style=\"line-height: 1.295; margin-top: 0pt; margin-bottom: 8pt;\"><b><u>Detecci\u00f3n de amenazas<\/u><\/b><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.295; margin-top: 0pt; margin-bottom: 8pt;\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">El equipo SOC est\u00e1 constantemente monitoreando y alertando sobre posibles amenazas y vulnerabilidades que pueden afectar los sistemas de la organizaci\u00f3n. Esto se logra mediante el uso de herramientas de detecci\u00f3n de intrusiones, an\u00e1lisis de registros de eventos y otros sistemas de monitoreo.<\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt; margin-bottom: 8pt; line-height: 1.295;\"><b><u>An\u00e1lisis de Alertas<\/u><\/b><\/p><p dir=\"ltr\" style=\"margin-top: 0pt; margin-bottom: 8pt; line-height: 1.295;\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">Cuando se recibe una alerta de posible amenaza, el equipo SOC lo analiza. Esto implica investigar el incidente, descubrir que ocurri\u00f3, determinar el alcance y el impacto potencial y evaluar la prioridad de respuesta.<\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt; margin-bottom: 8pt; line-height: 1.295;\"><b><u>Respuesta a incidentes<\/u><\/b><\/p><p dir=\"ltr\" style=\"margin-top: 0pt; margin-bottom: 8pt; line-height: 1.295;\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;\">Una vez que se confirma un incidente, el equipo SOC responde r\u00e1pidamente para contener y mitigar el impacto. Esto puede incluir bloqueo de direcciones IP maliciosas, desactivaci\u00f3n de cuentas comprometidas o eliminaci\u00f3n de malware.<\/span><\/p>\n\n<p\u00a0dir=\"ltr\" style=\"line-height: 1.295; margin-top: 0pt; margin-bottom: 8pt;\"><p dir=\"ltr\" style=\"line-height: 1.295; margin-top: 0pt; margin-bottom: 8pt;\">&nbsp;<\/p>\n<\/p\u00a0dir=\"ltr\">\n\n\n\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":31,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-170","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/markficompany.com\/home\/wp-json\/wp\/v2\/pages\/170","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/markficompany.com\/home\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/markficompany.com\/home\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/markficompany.com\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/markficompany.com\/home\/wp-json\/wp\/v2\/comments?post=170"}],"version-history":[{"count":3,"href":"https:\/\/markficompany.com\/home\/wp-json\/wp\/v2\/pages\/170\/revisions"}],"predecessor-version":[{"id":183,"href":"https:\/\/markficompany.com\/home\/wp-json\/wp\/v2\/pages\/170\/revisions\/183"}],"up":[{"embeddable":true,"href":"https:\/\/markficompany.com\/home\/wp-json\/wp\/v2\/pages\/31"}],"wp:attachment":[{"href":"https:\/\/markficompany.com\/home\/wp-json\/wp\/v2\/media?parent=170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}