{"id":277,"date":"2020-06-22T20:01:55","date_gmt":"2020-06-22T20:01:55","guid":{"rendered":"http:\/\/genesinetworks.com\/co\/?page_id=277"},"modified":"2021-02-25T17:58:22","modified_gmt":"2021-02-25T17:58:22","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/genesinetworks.com\/co\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.7.4&#8243; background_color=\u00bb#00bcdb\u00bb background_image=\u00bbhttp:\/\/genesinetworks.com\/co\/wp-content\/uploads\/2020\/08\/Cybersecurity2-02.jpg\u00bb background_position=\u00bbtop_center\u00bb max_width=\u00bb1080px\u00bb module_alignment=\u00bbcenter\u00bb custom_padding=\u00bb250px||250px||true|false\u00bb custom_padding_tablet=\u00bb150px||150px||true|false\u00bb custom_padding_phone=\u00bb100px||100px||true|false\u00bb][et_pb_row column_structure=\u00bb2_3,1_3&#8243; _builder_version=\u00bb4.4.8&#8243; custom_padding=\u00bb||||true|false\u00bb][et_pb_column type=\u00bb2_3&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_text _builder_version=\u00bb4.4.8&#8243; text_font=\u00bbMiso-regular||||||||\u00bb text_font_size=\u00bb26px\u00bb text_line_height=\u00bb1.2em\u00bb header_font=\u00bbFiraSan-Medium||||||||\u00bb header_font_size=\u00bb45px\u00bb header_2_font=\u00bbMiso-regular||||||||\u00bb header_2_text_color=\u00bb#99d9e1&#8243; header_2_font_size=\u00bb65px\u00bb background_layout=\u00bbdark\u00bb header_font_size_tablet=\u00bb35px\u00bb header_font_size_phone=\u00bb\u00bb header_font_size_last_edited=\u00bbon|tablet\u00bb header_2_font_size_tablet=\u00bb45px\u00bb header_2_font_size_phone=\u00bb40px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb]<\/p>\n<h1>Genesi Cybersecurity_<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.5.3&#8243; text_font=\u00bbFiraSan-Regular||||||||\u00bb text_font_size=\u00bb26px\u00bb text_line_height=\u00bb1.2em\u00bb background_layout=\u00bbdark\u00bb]<\/p>\n<p class=\"p1\"><span class=\"s1\">La identificaci\u00f3n y control de acceso de usuarios, dispositivos y aplicaciones en un esquema de protecci\u00f3n total a la infraestructura cr\u00edtica.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.4.8&#8243;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.7.4&#8243; max_width=\u00bb1080px\u00bb module_alignment=\u00bbcenter\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb][et_pb_row column_structure=\u00bb1_6,1_6,1_6,1_6,1_6,1_6&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb1&#8243; _builder_version=\u00bb4.7.4&#8243; width=\u00bb100%\u00bb max_width=\u00bb100%\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb locked=\u00bboff\u00bb][et_pb_column type=\u00bb1_6&#8243; _builder_version=\u00bb4.5.1&#8243; background_color=\u00bb#5a1278&#8243;][et_pb_text _builder_version=\u00bb4.7.4&#8243; header_2_font=\u00bbFiraSan-Medium||||||||\u00bb header_2_text_color=\u00bb#ffffff\u00bb header_2_font_size=\u00bb22px\u00bb custom_padding=\u00bb100px|20px|50px|20px|false|true\u00bb custom_padding_tablet=\u00bb|50px||50px|false|true\u00bb custom_padding_phone=\u00bb\u00bb custom_padding_last_edited=\u00bbon|tablet\u00bb link_option_url=\u00bbhttp:\/\/genesinetworks.com\/co\/genesi-business\/\u00bb]<\/p>\n<h2>Genesi\u00a0<\/h2>\n<h2>Business<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_6&#8243; _builder_version=\u00bb4.4.8&#8243; background_color=\u00bb#00bcdb\u00bb][et_pb_text _builder_version=\u00bb4.7.4&#8243; header_2_font=\u00bbFiraSan-Medium||||||||\u00bb header_2_text_color=\u00bb#ffffff\u00bb header_2_font_size=\u00bb22px\u00bb custom_padding=\u00bb100px|20px|50px|20px|false|true\u00bb link_option_url=\u00bbhttp:\/\/genesinetworks.com\/co\/cybersecurity\/\u00bb]<\/p>\n<h2>Genesi<\/h2>\n<h2>Cybersecurity<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_6&#8243; _builder_version=\u00bb4.4.8&#8243; background_color=\u00bb#fd7102&#8243;][et_pb_text _builder_version=\u00bb4.7.4&#8243; header_font_size=\u00bb28px\u00bb header_2_font=\u00bbFiraSan-Medium||||||||\u00bb header_2_text_color=\u00bb#ffffff\u00bb header_2_font_size=\u00bb22px\u00bb custom_padding=\u00bb100px|20px|50px|20px|false|true\u00bb link_option_url=\u00bbhttp:\/\/genesinetworks.com\/co\/infraestructure\/\u00bb]<\/p>\n<h2>Genesi<\/h2>\n<h2>Infrastructure<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_6&#8243; _builder_version=\u00bb4.7.4&#8243; background_color=\u00bb#99d9e1&#8243;][et_pb_text _builder_version=\u00bb4.7.4&#8243; header_2_font=\u00bbFiraSan-Medium||||||||\u00bb header_2_text_color=\u00bb#ffffff\u00bb header_2_font_size=\u00bb22px\u00bb custom_padding=\u00bb100px|20px|50px|20px|false|true\u00bb custom_padding_tablet=\u00bb|50px||50px|false|true\u00bb custom_padding_phone=\u00bb\u00bb custom_padding_last_edited=\u00bbon|tablet\u00bb link_option_url=\u00bbhttp:\/\/genesinetworks.com\/co\/services\/\u00bb]<\/p>\n<h2>Genesi<\/h2>\n<h2>Services<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_6&#8243; _builder_version=\u00bb4.7.4&#8243; background_color=\u00bb#ed156f\u00bb][et_pb_text _builder_version=\u00bb4.7.4&#8243; header_2_font=\u00bbFiraSan-Medium||||||||\u00bb header_2_text_color=\u00bb#ffffff\u00bb header_2_font_size=\u00bb22px\u00bb custom_padding=\u00bb100px|20px|38px|20px|false|true\u00bb custom_padding_tablet=\u00bb|50px||50px|false|true\u00bb custom_padding_phone=\u00bb\u00bb custom_padding_last_edited=\u00bbon|tablet\u00bb link_option_url=\u00bbhttp:\/\/genesinetworks.com\/co\/video-profesional\/\u00bb]<\/p>\n<h2>Genesi Professional Audio \/ Video<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_6&#8243; _builder_version=\u00bb4.7.4&#8243; background_color=\u00bb#00aaab\u00bb][et_pb_text _builder_version=\u00bb4.7.4&#8243; header_2_font=\u00bbFiraSan-Medium||||||||\u00bb header_2_text_color=\u00bb#ffffff\u00bb header_2_font_size=\u00bb22px\u00bb custom_padding=\u00bb100px|20px|50px|20px|false|true\u00bb custom_padding_tablet=\u00bb|50px||50px|false|true\u00bb custom_padding_phone=\u00bb\u00bb custom_padding_last_edited=\u00bbon|tablet\u00bb link_option_url=\u00bbhttp:\/\/genesinetworks.com\/co\/genesi-consulting\/\u00bb]<\/p>\n<h2>Genesi<\/h2>\n<h2>Consulting<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.7.4&#8243; max_width=\u00bb1080px\u00bb module_alignment=\u00bbcenter\u00bb custom_padding=\u00bb||0px||false|false\u00bb][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; _builder_version=\u00bb4.4.8&#8243; module_alignment_tablet=\u00bbcenter\u00bb module_alignment_phone=\u00bbcenter\u00bb module_alignment_last_edited=\u00bbon|desktop\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_text _builder_version=\u00bb4.5.1&#8243; text_font=\u00bbFiraSan-Regular||||||||\u00bb text_font_size=\u00bb18px\u00bb header_4_font=\u00bbMiso-regular||||||||\u00bb header_4_text_color=\u00bb#00bcdb\u00bb header_4_font_size=\u00bb22px\u00bb header_4_letter_spacing=\u00bb3px\u00bb]En esta era de hiperconectividad, las amenazas a la seguridad cada vez son m\u00e1s frecuentes. La r\u00e1pida evoluci\u00f3n de los modelos de consumo en la nube y dispositivos m\u00f3viles, generan enormes oportunidades y significativas amenazas de seguridad y privacidad. Desde amenazas internas y el surgimiento del \u201chacktivismo\u201d, hasta la proliferaci\u00f3n de ataques patrocinados por el Estado.[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_text _builder_version=\u00bb4.5.1&#8243; text_font=\u00bbFiraSan-Regular||||||||\u00bb text_font_size=\u00bb18px\u00bb header_4_font=\u00bbMiso-regular||||||||\u00bb header_4_text_color=\u00bb#00bcdb\u00bb header_4_font_size=\u00bb22px\u00bb header_4_letter_spacing=\u00bb3px\u00bb]La seguridad se ha elevado a la cima de la planificaci\u00f3n estrat\u00e9gica de la Tecnolog\u00eda de la Informaci\u00f3n (TI). Nuestro enfoque integral de seguridad cibern\u00e9tica contempla el desarrollo de arquitecturas integrales, visibilidad empresarial, conocimiento situacional, gobierno, automatizaci\u00f3n y un equipo capacitado para enfrentar los problemas de seguridad modernos.[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_image src=\u00bbhttp:\/\/genesinetworks.com\/co\/wp-content\/uploads\/2020\/08\/Cybersecurity2-03.jpg\u00bb title_text=\u00bbCybersecurity2-03&#8243; _builder_version=\u00bb4.7.4&#8243; custom_margin=\u00bb||||false|false\u00bb border_color_bottom=\u00bb#00bcdb\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb2_3,1_3&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_column type=\u00bb2_3&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_image src=\u00bbhttp:\/\/genesinetworks.com\/co\/wp-content\/uploads\/2020\/06\/icono_genesi-02.png\u00bb title_text=\u00bbicono_genesi-02&#8243; align=\u00bbcenter\u00bb _builder_version=\u00bb4.7.4&#8243; width=\u00bb20%\u00bb width_tablet=\u00bb50%\u00bb width_phone=\u00bb100%\u00bb width_last_edited=\u00bbon|phone\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||||false|false\u00bb custom_margin_tablet=\u00bb0px||||false|false\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|tablet\u00bb][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.4.8&#8243;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb3_5,2_5&#8243; disabled_on=\u00bbon|on|off\u00bb _builder_version=\u00bb4.5.0&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb100%\u00bb max_width=\u00bb100%\u00bb custom_padding=\u00bb||0px||false|false\u00bb][et_pb_column type=\u00bb3_5&#8243; _builder_version=\u00bb4.5.0&#8243; _module_preset=\u00bbdefault\u00bb][\/et_pb_column][et_pb_column type=\u00bb2_5&#8243; _builder_version=\u00bb4.5.0&#8243; _module_preset=\u00bbdefault\u00bb][et_pb_divider color=\u00bb#00bcdb\u00bb divider_weight=\u00bb40px\u00bb _builder_version=\u00bb4.7.4&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb92%\u00bb module_alignment=\u00bbright\u00bb custom_margin=\u00bb-250px||||false|false\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.7.4&#8243; max_width=\u00bb1080px\u00bb module_alignment=\u00bbcenter\u00bb custom_padding=\u00bb0px||||false|false\u00bb][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; _builder_version=\u00bb4.5.0&#8243; custom_padding=\u00bb0px||||false|false\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.4.8&#8243;][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_text _builder_version=\u00bb4.4.8&#8243; header_2_font=\u00bbFiraSan-Medium||||||||\u00bb header_2_text_align=\u00bbcenter\u00bb header_2_text_color=\u00bb#00bcdb\u00bb header_2_font_size=\u00bb32px\u00bb header_2_font_size_tablet=\u00bb28px\u00bb header_2_font_size_phone=\u00bb23px\u00bb header_2_font_size_last_edited=\u00bbon|desktop\u00bb border_width_bottom=\u00bb8px\u00bb border_color_bottom=\u00bb#5a1278&#8243;]<\/p>\n<h2>Nuestras soluciones<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.4.8&#8243;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb3_5,2_5&#8243; _builder_version=\u00bb4.4.9&#8243;][et_pb_column type=\u00bb3_5&#8243; _builder_version=\u00bb4.4.9&#8243;][et_pb_text _builder_version=\u00bb4.5.0&#8243; header_font=\u00bbFiraSan-Medium||||||||\u00bb header_text_align=\u00bbcenter\u00bb header_text_color=\u00bb#ffffff\u00bb background_color=\u00bb#00bcdb\u00bb custom_padding=\u00bb5px|20px|5px|20px|true|true\u00bb]<\/p>\n<h1>Valoraci\u00f3n de la<br \/> situaci\u00f3n actual<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb2_5&#8243; _builder_version=\u00bb4.4.9&#8243;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_image src=\u00bbhttp:\/\/genesinetworks.com\/co\/wp-content\/uploads\/2020\/08\/Cybersecurity2-04.jpg\u00bb title_text=\u00bbCybersecurity2-04&#8243; align=\u00bbcenter\u00bb _builder_version=\u00bb4.5.6&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_text _builder_version=\u00bb4.7.7&#8243; text_font=\u00bbFiraSan-Regular||||||||\u00bb text_font_size=\u00bb18px\u00bb custom_margin=\u00bb20px||||false|false\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb]<\/p>\n<p class=\"p1\"><span class=\"s1\">Este servicio consiste en un taller de valoraci\u00f3n que nos permite identificar la situaci\u00f3n actual del cliente con respecto a los diferentes controles de seguridad de su informaci\u00f3n y buenas pr\u00e1cticas de la industria. La soluci\u00f3n brinda amplia visibilidad en las cinco fases principales de prevenci\u00f3n de incidentes de seguridad: identificar, proteger, detectar, responder y recuperar.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\"><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Al final el cliente contar\u00e1 con elementos para determinar oportunidades de mejora y priorizar inversiones en TI.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.4.8&#8243;][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_text _builder_version=\u00bb4.7.7&#8243; header_font=\u00bbFiraSan-Medium||||||||\u00bb header_text_align=\u00bbcenter\u00bb header_text_color=\u00bb#ffffff\u00bb background_color=\u00bb#00bcdb\u00bb custom_padding=\u00bb10px|20px|5px|20px|false|true\u00bb]<\/p>\n<h1>An\u00e1lisis de vulnerabilidades y pruebas de intrusi\u00f3n<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; _builder_version=\u00bb4.7.4&#8243; width=\u00bb85%\u00bb max_width=\u00bb100%\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.4.8&#8243;][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_image src=\u00bbhttp:\/\/genesinetworks.com\/co\/wp-content\/uploads\/2020\/06\/Cybersecurity-04.jpg\u00bb title_text=\u00bbCybersecurity-04&#8243; align=\u00bbcenter\u00bb _builder_version=\u00bb4.7.4&#8243; width=\u00bb270px\u00bb custom_margin=\u00bb20px||||false|false\u00bb][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_text _builder_version=\u00bb4.7.7&#8243; text_font=\u00bbFiraSan-Regular||||||||\u00bb text_font_size=\u00bb18px\u00bb custom_margin=\u00bb||||false|false\u00bb custom_margin_tablet=\u00bb10px||||false|false\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb20px||20px||true|true\u00bb text_orientation_tablet=\u00bbleft\u00bb text_orientation_phone=\u00bb\u00bb text_orientation_last_edited=\u00bbon|phone\u00bb]El servicio consta de los an\u00e1lisis de vulnerabilidades y\/o pruebas de intrusi\u00f3n sobre los servicios, aplicaciones, c\u00f3digo fuente, bases de datos o infraestructura de red del cliente, en donde se provee la generaci\u00f3n de reportes sobre las condiciones de seguridad actuales en la infraestructura analizada.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_2,1_2&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb1&#8243; _builder_version=\u00bb4.4.8&#8243; module_alignment=\u00bbleft\u00bb module_alignment_tablet=\u00bbcenter\u00bb module_alignment_phone=\u00bbcenter\u00bb module_alignment_last_edited=\u00bbon|phone\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_image src=\u00bbhttp:\/\/genesinetworks.com\/co\/wp-content\/uploads\/2020\/08\/Cybersecurity2-05.jpg\u00bb title_text=\u00bbCybersecurity2-05&#8243; _builder_version=\u00bb4.5.6&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_text _builder_version=\u00bb4.5.0&#8243; header_font=\u00bbFiraSan-Medium||||||||\u00bb header_text_align=\u00bbright\u00bb header_text_color=\u00bb#ffffff\u00bb background_color=\u00bb#00bcdb\u00bb custom_margin=\u00bb150px||||false|false\u00bb custom_margin_tablet=\u00bb0px||||false|false\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|tablet\u00bb custom_padding=\u00bb10px|80px|10px|80px|true|true\u00bb custom_padding_tablet=\u00bb|40px||40px|true|true\u00bb custom_padding_phone=\u00bb|20px||20px|true|true\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb]<\/p>\n<h1>Infraestructura cr\u00edtica y<br \/> an\u00e1lisis de riesgo<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.4.8&#8243;][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_text _builder_version=\u00bb4.7.4&#8243; text_font=\u00bbFiraSan-Regular||||||||\u00bb text_font_size=\u00bb18px\u00bb text_orientation=\u00bbcenter\u00bb text_orientation_tablet=\u00bbleft\u00bb text_orientation_phone=\u00bb\u00bb text_orientation_last_edited=\u00bbon|phone\u00bb]Consultor\u00eda enfocada a identificar la infraestructura cr\u00edtica o de riesgo (l\u00f3gica, f\u00edsica y humana) aplicando las mejores pr\u00e1cticas de la industria. Esto permite mapear los elementos m\u00e1s cr\u00edticos a proteger para aplicar medidas de seguridad en atenci\u00f3n a los riesgos que pueden estar expuestos.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.7.4&#8243; background_image=\u00bbhttp:\/\/genesinetworks.com\/co\/wp-content\/uploads\/2020\/08\/Cybersecurity2-06.jpg\u00bb max_width=\u00bb1080px\u00bb module_alignment=\u00bbcenter\u00bb custom_padding=\u00bb150px||150px||true|false\u00bb][et_pb_row column_structure=\u00bb2_5,3_5&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb1&#8243; _builder_version=\u00bb4.4.9&#8243;][et_pb_column type=\u00bb2_5&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_text _builder_version=\u00bb4.4.9&#8243; header_font=\u00bbFiraSan-Medium||||||||\u00bb header_text_align=\u00bbleft\u00bb header_text_color=\u00bb#ffffff\u00bb header_font_size=\u00bb35px\u00bb background_color=\u00bb#5a1278&#8243; module_alignment=\u00bbright\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb header_font_size_tablet=\u00bb45px\u00bb header_font_size_phone=\u00bb35px\u00bb header_font_size_last_edited=\u00bbon|desktop\u00bb module_alignment_tablet=\u00bbcenter\u00bb module_alignment_phone=\u00bbcenter\u00bb module_alignment_last_edited=\u00bbon|phone\u00bb]<\/p>\n<h1>Hardening<br \/> (Reforzamiento)<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb3_5&#8243; _builder_version=\u00bb4.4.8&#8243;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.4.8&#8243; max_width=\u00bb1380px\u00bb module_alignment=\u00bbcenter\u00bb][et_pb_row column_structure=\u00bb2_5,3_5&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb1&#8243; _builder_version=\u00bb4.4.9&#8243;][et_pb_column type=\u00bb2_5&#8243; _builder_version=\u00bb4.4.8&#8243;][\/et_pb_column][et_pb_column type=\u00bb3_5&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_text _builder_version=\u00bb4.7.4&#8243; text_font=\u00bbFiraSan-Regular||||||||\u00bb text_text_color=\u00bb#ffffff\u00bb text_font_size=\u00bb18px\u00bb background_color=\u00bb#00bcdb\u00bb custom_margin=\u00bb-238px||||false|false\u00bb custom_margin_tablet=\u00bb0px||||false|false\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb100px|50px|100px|50px|true|true\u00bb text_font_size_tablet=\u00bb22px\u00bb text_font_size_phone=\u00bb18px\u00bb text_font_size_last_edited=\u00bbon|phone\u00bb]El servicio trata de una consultor\u00eda t\u00e9cnica que ayuda a los clientes a mejorar la configuraci\u00f3n de sus equipos desde el punto de vista de seguridad, donde por medio de un endurecimiento o hardening (mejora en la configuraci\u00f3n) se asegura que los dispositivos se encuentren configurados de la mejor manera para proteger la red, informaci\u00f3n o servicios. [\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.7.4&#8243; background_color=\u00bb#f3f3f3&#8243; max_width=\u00bb1080px\u00bb module_alignment=\u00bbcenter\u00bb custom_padding=\u00bb||||false|false\u00bb][et_pb_row _builder_version=\u00bb4.4.9&#8243; custom_padding=\u00bb||||true|false\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_text _builder_version=\u00bb4.5.0&#8243; header_font=\u00bbFiraSan-Medium||||||||\u00bb header_text_align=\u00bbcenter\u00bb header_text_color=\u00bb#ffffff\u00bb background_color=\u00bb#00bcdb\u00bb custom_margin=\u00bb-80px||||false|false\u00bb custom_margin_tablet=\u00bb0px||||false|false\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|tablet\u00bb custom_padding=\u00bb20px||10px||false|false\u00bb]<\/p>\n<h1>Consultor\u00eda y planes de concientizaci\u00f3n<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_text _builder_version=\u00bb4.7.4&#8243; text_font=\u00bbFiraSan-Regular||||||||\u00bb text_font_size=\u00bb18px\u00bb custom_margin=\u00bb30px||||false|false\u00bb custom_margin_tablet=\u00bb10px||||false|false\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|tablet\u00bb custom_padding=\u00bb20px|40px|20px|40px|true|true\u00bb custom_padding_tablet=\u00bb||||true|true\u00bb custom_padding_phone=\u00bb|20px||20px|true|true\u00bb custom_padding_last_edited=\u00bbon|tablet\u00bb]Servicios de consultor\u00eda para la implementaci\u00f3n de sistemas de gesti\u00f3n de seguridad de la informaci\u00f3n (ISO 27001 &#038; NIST), creaci\u00f3n de equipos de respuesta a incidentes de seguridad de la informaci\u00f3n, planes de continuidad ante incidentes de seguridad inform\u00e1tica, levantamiento, clasificaci\u00f3n de informaci\u00f3n, capacitaciones t\u00e9cnicas en ethical hacking, respuesta a incidentes, an\u00e1lisis forenses, entre otros.[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_image src=\u00bbhttp:\/\/genesinetworks.com\/co\/wp-content\/uploads\/2020\/06\/Cybersecurity-08.png\u00bb title_text=\u00bbCybersecurity-08&#8243; align=\u00bbcenter\u00bb _builder_version=\u00bb4.4.8&#8243; width=\u00bb50%\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||||false|false\u00bb custom_margin_tablet=\u00bb0px||||false|false\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|tablet\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.7.4&#8243; max_width=\u00bb1080px\u00bb module_alignment=\u00bbcenter\u00bb][et_pb_row column_structure=\u00bb1_2,1_2&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb1&#8243; _builder_version=\u00bb4.4.9&#8243; module_alignment=\u00bbleft\u00bb module_alignment_tablet=\u00bbcenter\u00bb module_alignment_phone=\u00bbcenter\u00bb module_alignment_last_edited=\u00bbon|phone\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_text _builder_version=\u00bb4.7.4&#8243; text_font=\u00bbFiraSan-Regular||||||||\u00bb text_font_size=\u00bb18px\u00bb header_font=\u00bbFiraSan-Medium||||||||\u00bb header_text_align=\u00bbright\u00bb header_text_color=\u00bb#ffffff\u00bb header_font_size=\u00bb36px\u00bb background_color=\u00bb#00bcdb\u00bb custom_margin=\u00bb200px||||false|false\u00bb custom_margin_tablet=\u00bb10px||||false|false\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb20px|40px|10px|40px|false|true\u00bb custom_padding_tablet=\u00bb||||true|true\u00bb custom_padding_phone=\u00bb|20px||20px|true|true\u00bb custom_padding_last_edited=\u00bbon|tablet\u00bb]<\/p>\n<h1>Soluciones<\/h1>\n<h1>Tecnol\u00f3gicas.<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_image src=\u00bbhttp:\/\/genesinetworks.com\/co\/wp-content\/uploads\/2020\/08\/Cybersecurity2-07.jpg\u00bb title_text=\u00bbCybersecurity2-07&#8243; align=\u00bbcenter\u00bb align_tablet=\u00bb\u00bb align_phone=\u00bbcenter\u00bb align_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.5.6&#8243; width=\u00bb50%\u00bb width_tablet=\u00bb70%\u00bb width_phone=\u00bb100%\u00bb width_last_edited=\u00bbon|tablet\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||||false|false\u00bb custom_margin_tablet=\u00bb0px||||false|false\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|tablet\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_5,3_5,1_5&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb1&#8243; _builder_version=\u00bb4.4.9&#8243; width=\u00bb100%\u00bb max_width=\u00bb100%\u00bb][et_pb_column type=\u00bb1_5&#8243; _builder_version=\u00bb4.4.8&#8243;][\/et_pb_column][et_pb_column type=\u00bb3_5&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_text _builder_version=\u00bb4.4.9&#8243; text_font=\u00bbFiraSan-Regular||||||||\u00bb text_font_size=\u00bb18px\u00bb header_font=\u00bbFiraSan-Regular||||||||\u00bb header_text_align=\u00bbcenter\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb text_orientation_tablet=\u00bbleft\u00bb text_orientation_phone=\u00bb\u00bb text_orientation_last_edited=\u00bbon|desktop\u00bb]Nuestras soluciones tecnol\u00f3gicas nos permiten cubrir las 5 funciones del marco de Ciber Seguridad de la NIST (National Institute of Standards and Technology), que van desde la identificaci\u00f3n de activos y riesgos, pasando por los controles de identidad, protecci\u00f3n y monitoreo de los datos, y llegando hasta soluciones que nos permitan contener las amenazas, responder a ellas y recuperarse en el menor tiempo posible.[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_5&#8243; _builder_version=\u00bb4.4.8&#8243;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb4.7.4&#8243; locked=\u00bboff\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_text _builder_version=\u00bb4.7.4&#8243; header_3_font=\u00bbMiso-regular|700|||||||\u00bb header_3_text_align=\u00bbcenter\u00bb header_3_text_color=\u00bb#ffffff\u00bb header_3_font_size=\u00bb26px\u00bb background_color=\u00bb#00bcdb\u00bb width=\u00bb100%\u00bb custom_margin=\u00bb|150px|||false|false\u00bb custom_margin_tablet=\u00bb|0px|||false|false\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb10px|20px|5px|20px|false|true\u00bb]<\/p>\n<h3>Planificaci\u00f3n e implementaci\u00f3n\u00a0de un DRP (Disaster Recovery Plan)<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.7.4&#8243; header_3_font=\u00bbMiso-regular|700|||||||\u00bb header_3_text_align=\u00bbcenter\u00bb header_3_text_color=\u00bb#ffffff\u00bb header_3_font_size=\u00bb26px\u00bb background_color=\u00bb#00bcdb\u00bb width=\u00bb100%\u00bb custom_margin=\u00bb|150px|||false|false\u00bb custom_margin_tablet=\u00bb|0px|||false|false\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb10px|20px|5px|20px|false|true\u00bb]<\/p>\n<h3>Next Generation Firewall NGFW, NGIPS &#038; VPN<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.7.4&#8243; header_3_font=\u00bbMiso-regular|700|||||||\u00bb header_3_text_align=\u00bbcenter\u00bb header_3_text_color=\u00bb#ffffff\u00bb header_3_font_size=\u00bb26px\u00bb background_color=\u00bb#00bcdb\u00bb width=\u00bb100%\u00bb custom_margin=\u00bb|150px|||false|false\u00bb custom_margin_tablet=\u00bb|0px|||false|false\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb10px|20px|5px|20px|false|true\u00bb]<\/p>\n<h3>Endpoint Protection<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.7.4&#8243; header_3_font=\u00bbMiso-regular|700|||||||\u00bb header_3_text_align=\u00bbcenter\u00bb header_3_text_color=\u00bb#ffffff\u00bb header_3_font_size=\u00bb26px\u00bb background_color=\u00bb#00bcdb\u00bb width=\u00bb100%\u00bb custom_margin=\u00bb|150px|||false|false\u00bb custom_margin_tablet=\u00bb|0px|||false|false\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb10px|20px|5px|20px|false|true\u00bb]<\/p>\n<h3>Email Protection &#038; Web Security<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.7.4&#8243; header_3_font=\u00bbMiso-regular|700|||||||\u00bb header_3_text_align=\u00bbcenter\u00bb header_3_text_color=\u00bb#ffffff\u00bb header_3_font_size=\u00bb26px\u00bb background_color=\u00bb#00bcdb\u00bb width=\u00bb100%\u00bb custom_margin=\u00bb|150px|||false|false\u00bb custom_margin_tablet=\u00bb|0px|||false|false\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb10px|20px|5px|20px|false|true\u00bb]<\/p>\n<h3>Multi-Factor Authentication (MFA)<br \/>\n<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_text _builder_version=\u00bb4.7.4&#8243; header_3_font=\u00bbMiso-regular|700|||||||\u00bb header_3_text_align=\u00bbcenter\u00bb header_3_text_color=\u00bb#ffffff\u00bb header_3_font_size=\u00bb26px\u00bb background_color=\u00bb#00bcdb\u00bb width=\u00bb100%\u00bb custom_margin=\u00bb|150px|||false|false\u00bb custom_margin_tablet=\u00bb|0px|||false|false\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb10px|20px|5px|20px|false|true\u00bb]<\/p>\n<h3>Web Application Firewall (WAF) &#038; DDoS Protection<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.7.4&#8243; header_3_font=\u00bbMiso-regular|700|||||||\u00bb header_3_text_align=\u00bbcenter\u00bb header_3_text_color=\u00bb#ffffff\u00bb header_3_font_size=\u00bb26px\u00bb background_color=\u00bb#00bcdb\u00bb width=\u00bb100%\u00bb custom_margin=\u00bb|150px|||false|false\u00bb custom_margin_tablet=\u00bb|0px|||false|false\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb10px|20px|5px|20px|false|true\u00bb]<\/p>\n<h3>Security Information and Event Management (SIEM)<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.7.4&#8243; header_3_font=\u00bbMiso-regular|700|||||||\u00bb header_3_text_align=\u00bbcenter\u00bb header_3_text_color=\u00bb#ffffff\u00bb header_3_font_size=\u00bb26px\u00bb background_color=\u00bb#00bcdb\u00bb width=\u00bb100%\u00bb custom_margin=\u00bb|150px|||false|false\u00bb custom_margin_tablet=\u00bb|0px|||false|false\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb10px|20px|5px|20px|false|true\u00bb]<\/p>\n<h3>Security Network Infrastructure Monitoring &#038; APM<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.7.4&#8243; header_3_font=\u00bbMiso-regular|700|||||||\u00bb header_3_text_align=\u00bbcenter\u00bb header_3_text_color=\u00bb#ffffff\u00bb header_3_font_size=\u00bb26px\u00bb background_color=\u00bb#00bcdb\u00bb width=\u00bb100%\u00bb custom_margin=\u00bb|150px|||false|false\u00bb custom_margin_tablet=\u00bb|0px|||false|false\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb10px|20px|5px|20px|false|true\u00bb]<\/p>\n<h3>DNS-Layer &#038; Cloud Security<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.7.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1080px\u00bb module_alignment=\u00bbcenter\u00bb][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb4.5.1&#8243; _module_preset=\u00bbdefault\u00bb module_alignment=\u00bbleft\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.5.1&#8243; _module_preset=\u00bbdefault\u00bb][et_pb_text _builder_version=\u00bb4.5.1&#8243; text_font=\u00bbFiraSan-Regular||||||||\u00bb text_font_size=\u00bb18px\u00bb header_font=\u00bbFiraSan-Medium||||||||\u00bb header_text_align=\u00bbleft\u00bb header_text_color=\u00bb#ffffff\u00bb header_font_size=\u00bb36px\u00bb background_color=\u00bb#00bcdb\u00bb custom_margin=\u00bb||||false|false\u00bb custom_margin_tablet=\u00bb10px||||false|false\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb20px|20px|10px|100px|false|false\u00bb custom_padding_tablet=\u00bb||||true|true\u00bb custom_padding_phone=\u00bb|20px||20px|true|true\u00bb custom_padding_last_edited=\u00bbon|tablet\u00bb]<\/p>\n<h1>Alianzas<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.5.1&#8243; _module_preset=\u00bbdefault\u00bb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_4,1_4,1_4,1_4&#8243; _builder_version=\u00bb4.5.6&#8243; _module_preset=\u00bbdefault\u00bb][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.5.1&#8243; _module_preset=\u00bbdefault\u00bb][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.5.1&#8243; _module_preset=\u00bbdefault\u00bb][et_pb_image src=\u00bbhttp:\/\/genesinetworks.com\/co\/wp-content\/uploads\/2020\/07\/clientes-25.jpg\u00bb title_text=\u00bbclientes-25&#8243; _builder_version=\u00bb4.5.1&#8243; _module_preset=\u00bbdefault\u00bb][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.5.1&#8243; _module_preset=\u00bbdefault\u00bb][et_pb_image src=\u00bbhttp:\/\/genesinetworks.com\/co\/wp-content\/uploads\/2020\/08\/cisco-11.png\u00bb title_text=\u00bbcisco-11&#8243; _builder_version=\u00bb4.5.6&#8243; _module_preset=\u00bbdefault\u00bb][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.5.1&#8243; _module_preset=\u00bbdefault\u00bb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.7.7&#8243; background_color=\u00bb#000000&#8243; max_width=\u00bb1080px\u00bb module_alignment=\u00bbcenter\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb locked=\u00bboff\u00bb global_module=\u00bb1838&#8243;][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; _builder_version=\u00bb4.7.7&#8243;][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_image src=\u00bbhttp:\/\/genesinetworks.com\/co\/wp-content\/uploads\/2020\/06\/Genesi_business-02.png\u00bb title_text=\u00bbGenesi_business-02&#8243; _builder_version=\u00bb4.4.8&#8243; width=\u00bb50%\u00bb][\/et_pb_image][et_pb_button button_url=\u00bbhttp:\/\/genesinetworks.com\/co\/aviso-de-privacidad\/\u00bb button_text=\u00bbAviso de privacidad\u00bb _builder_version=\u00bb4.7.4&#8243; _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb18px\u00bb button_text_color=\u00bb#ffffff\u00bb button_border_width=\u00bb0px\u00bb button_font=\u00bbFiraSan-Medium||||||||\u00bb button_icon=\u00bb%%3%%\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.4.8&#8243;][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.4.8&#8243;][et_pb_social_media_follow _builder_version=\u00bb4.4.8&#8243;][et_pb_social_media_follow_network social_network=\u00bbfacebook\u00bb url=\u00bbhttps:\/\/www.facebook.com\/GenesiNetworksMx\/\u00bb _builder_version=\u00bb4.4.8&#8243; background_color=\u00bb#3b5998&#8243; follow_button=\u00bboff\u00bb url_new_window=\u00bbon\u00bb]facebook[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=\u00bblinkedin\u00bb url=\u00bbhttps:\/\/www.linkedin.com\/company\/65387244\/admin\/\u00bb _builder_version=\u00bb4.4.8&#8243; background_color=\u00bb#007bb6&#8243; follow_button=\u00bboff\u00bb url_new_window=\u00bbon\u00bb]linkedin[\/et_pb_social_media_follow_network][\/et_pb_social_media_follow][et_pb_blurb image=\u00bbhttp:\/\/genesinetworks.com\/co\/wp-content\/uploads\/2020\/06\/genesi_img-29.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.7.7&#8243; body_font=\u00bbFiraSan-Regular||||||||\u00bb body_text_color=\u00bb#ffffff\u00bb body_font_size=\u00bb16px\u00bb]<\/p>\n<p> +57 (1) 6594532 <\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/genesinetworks.com\/co\/wp-content\/uploads\/2020\/06\/genesi_img-30.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.6.1&#8243; body_font=\u00bbFiraSan-Regular||||||||\u00bb body_text_color=\u00bb#ffffff\u00bb body_font_size=\u00bb16px\u00bb]<span style=\"color: #ffffff;\"><a href=\"mailto:ventas@genesi.com.co\" style=\"color: #ffffff;\">ventas@genesi.com.co<\/a><\/span>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Genesi Cybersecurity_La identificaci\u00f3n y control de acceso de usuarios, dispositivos y aplicaciones en un esquema de protecci\u00f3n total a la infraestructura cr\u00edtica.Genesi\u00a0 BusinessGenesi CybersecurityGenesi InfrastructureGenesi ServicesGenesi Professional Audio \/ VideoGenesi ConsultingEn esta era de hiperconectividad, las amenazas a la seguridad cada vez son m\u00e1s frecuentes. La r\u00e1pida evoluci\u00f3n de los modelos de consumo en la [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-277","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/genesinetworks.com\/co\/wp-json\/wp\/v2\/pages\/277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/genesinetworks.com\/co\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/genesinetworks.com\/co\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/genesinetworks.com\/co\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/genesinetworks.com\/co\/wp-json\/wp\/v2\/comments?post=277"}],"version-history":[{"count":58,"href":"https:\/\/genesinetworks.com\/co\/wp-json\/wp\/v2\/pages\/277\/revisions"}],"predecessor-version":[{"id":1847,"href":"https:\/\/genesinetworks.com\/co\/wp-json\/wp\/v2\/pages\/277\/revisions\/1847"}],"wp:attachment":[{"href":"https:\/\/genesinetworks.com\/co\/wp-json\/wp\/v2\/media?parent=277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}