{"id":277,"date":"2020-06-22T20:01:55","date_gmt":"2020-06-22T20:01:55","guid":{"rendered":"http:\/\/genesinetworks.com\/en\/?page_id=277"},"modified":"2021-03-02T04:16:49","modified_gmt":"2021-03-02T04:16:49","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/genesinetworks.com\/en\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.7.4&#8243; background_color=&#8221;#00bcdb&#8221; background_image=&#8221;http:\/\/genesinetworks.com\/en\/wp-content\/uploads\/2020\/08\/Cybersecurity2-02.jpg&#8221; background_position=&#8221;top_center&#8221; max_width=&#8221;1080px&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;250px||250px||true|false&#8221; custom_padding_tablet=&#8221;150px||150px||true|false&#8221; custom_padding_phone=&#8221;100px||100px||true|false&#8221;][et_pb_row column_structure=&#8221;2_3,1_3&#8243; _builder_version=&#8221;4.4.8&#8243; custom_padding=&#8221;||||true|false&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_text _builder_version=&#8221;4.4.8&#8243; text_font=&#8221;Miso-regular||||||||&#8221; text_font_size=&#8221;26px&#8221; text_line_height=&#8221;1.2em&#8221; header_font=&#8221;FiraSan-Medium||||||||&#8221; header_font_size=&#8221;45px&#8221; header_2_font=&#8221;Miso-regular||||||||&#8221; header_2_text_color=&#8221;#99d9e1&#8243; header_2_font_size=&#8221;65px&#8221; background_layout=&#8221;dark&#8221; header_font_size_tablet=&#8221;35px&#8221; header_font_size_phone=&#8221;&#8221; header_font_size_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;45px&#8221; header_2_font_size_phone=&#8221;40px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221;]<\/p>\n<h1>Genesi Cybersecurity_<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.7.7&#8243; text_font=&#8221;FiraSan-Regular||||||||&#8221; text_font_size=&#8221;26px&#8221; text_line_height=&#8221;1.2em&#8221; background_layout=&#8221;dark&#8221;]<\/p>\n<p class=\"p1\"><span class=\"s1\">Identifying and controlling user, device and application access within a setup that offers complete protection to critical infrastructure.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.4.8&#8243;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.7.4&#8243; max_width=&#8221;1080px&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;0px||0px||true|false&#8221;][et_pb_row column_structure=&#8221;1_6,1_6,1_6,1_6,1_6,1_6&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; _builder_version=&#8221;4.7.4&#8243; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; locked=&#8221;off&#8221;][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.5.1&#8243; background_color=&#8221;#5a1278&#8243;][et_pb_text _builder_version=&#8221;4.7.4&#8243; header_2_font=&#8221;FiraSan-Medium||||||||&#8221; header_2_text_color=&#8221;#ffffff&#8221; header_2_font_size=&#8221;22px&#8221; custom_padding=&#8221;100px|20px|50px|20px|false|true&#8221; custom_padding_tablet=&#8221;|50px||50px|false|true&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; link_option_url=&#8221;http:\/\/genesinetworks.com\/en\/genesi-business\/&#8221;]<\/p>\n<h2>Genesi\u00a0<\/h2>\n<h2>Business<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.4.8&#8243; background_color=&#8221;#00bcdb&#8221;][et_pb_text _builder_version=&#8221;4.7.4&#8243; header_2_font=&#8221;FiraSan-Medium||||||||&#8221; header_2_text_color=&#8221;#ffffff&#8221; header_2_font_size=&#8221;22px&#8221; custom_padding=&#8221;100px|20px|50px|20px|false|true&#8221; link_option_url=&#8221;http:\/\/genesinetworks.com\/en\/cybersecurity\/&#8221;]<\/p>\n<h2>Genesi<\/h2>\n<h2>Cybersecurity<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.4.8&#8243; background_color=&#8221;#fd7102&#8243;][et_pb_text _builder_version=&#8221;4.7.4&#8243; header_font_size=&#8221;28px&#8221; header_2_font=&#8221;FiraSan-Medium||||||||&#8221; header_2_text_color=&#8221;#ffffff&#8221; header_2_font_size=&#8221;22px&#8221; custom_padding=&#8221;100px|20px|50px|20px|false|true&#8221; link_option_url=&#8221;http:\/\/genesinetworks.com\/en\/infraestructure\/&#8221;]<\/p>\n<h2>Genesi<\/h2>\n<h2>Infrastructure<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.7.4&#8243; background_color=&#8221;#99d9e1&#8243;][et_pb_text _builder_version=&#8221;4.7.4&#8243; header_2_font=&#8221;FiraSan-Medium||||||||&#8221; header_2_text_color=&#8221;#ffffff&#8221; header_2_font_size=&#8221;22px&#8221; custom_padding=&#8221;100px|20px|50px|20px|false|true&#8221; custom_padding_tablet=&#8221;|50px||50px|false|true&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; link_option_url=&#8221;http:\/\/genesinetworks.com\/en\/services\/&#8221;]<\/p>\n<h2>Genesi<\/h2>\n<h2>Services<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.7.4&#8243; background_color=&#8221;#ed156f&#8221;][et_pb_text _builder_version=&#8221;4.7.4&#8243; header_2_font=&#8221;FiraSan-Medium||||||||&#8221; header_2_text_color=&#8221;#ffffff&#8221; header_2_font_size=&#8221;22px&#8221; custom_padding=&#8221;100px|20px|38px|20px|false|true&#8221; custom_padding_tablet=&#8221;|50px||50px|false|true&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; link_option_url=&#8221;http:\/\/genesinetworks.com\/en\/video-profesional\/&#8221;]<\/p>\n<h2>Genesi Professional Audio \/ Video<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.7.4&#8243; background_color=&#8221;#00aaab&#8221;][et_pb_text _builder_version=&#8221;4.7.4&#8243; header_2_font=&#8221;FiraSan-Medium||||||||&#8221; header_2_text_color=&#8221;#ffffff&#8221; header_2_font_size=&#8221;22px&#8221; custom_padding=&#8221;100px|20px|50px|20px|false|true&#8221; custom_padding_tablet=&#8221;|50px||50px|false|true&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; link_option_url=&#8221;http:\/\/genesinetworks.com\/en\/genesi-consulting\/&#8221;]<\/p>\n<h2>Genesi<\/h2>\n<h2>Consulting<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.7.4&#8243; max_width=&#8221;1080px&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;||0px||false|false&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.4.8&#8243; module_alignment_tablet=&#8221;center&#8221; module_alignment_phone=&#8221;center&#8221; module_alignment_last_edited=&#8221;on|desktop&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_text _builder_version=&#8221;4.7.7&#8243; text_font=&#8221;FiraSan-Regular||||||||&#8221; text_font_size=&#8221;18px&#8221; header_4_font=&#8221;Miso-regular||||||||&#8221; header_4_text_color=&#8221;#00bcdb&#8221; header_4_font_size=&#8221;22px&#8221; header_4_letter_spacing=&#8221;3px&#8221;]<\/p>\n<p style=\"text-align: left;\">In this era of hyperconnectivity, threats to security are increasingly frequent. The rapid evolution of cloud and mobile device usage patterns creates enormous opportunities and significant threats to security and privacy. These range from internal threats and the emergence of \u201chacktivism\u201d to the proliferation of state-sponsored attacks.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_text _builder_version=&#8221;4.7.7&#8243; text_font=&#8221;FiraSan-Regular||||||||&#8221; text_font_size=&#8221;18px&#8221; header_4_font=&#8221;Miso-regular||||||||&#8221; header_4_text_color=&#8221;#00bcdb&#8221; header_4_font_size=&#8221;22px&#8221; header_4_letter_spacing=&#8221;3px&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Security has risen to the top of IT strategic planning. Our comprehensive cybersecurity approach includes the development of comprehensive architectures, business visibility, situational knowledge, governance, automation and a team trained to tackle modern security problems.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_image src=&#8221;http:\/\/genesinetworks.com\/en\/wp-content\/uploads\/2020\/08\/Cybersecurity2-03.jpg&#8221; title_text=&#8221;Cybersecurity2-03&#8243; _builder_version=&#8221;4.7.4&#8243; custom_margin=&#8221;||||false|false&#8221; border_color_bottom=&#8221;#00bcdb&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_3,1_3&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_image src=&#8221;http:\/\/genesinetworks.com\/en\/wp-content\/uploads\/2020\/06\/icono_genesi-02.png&#8221; title_text=&#8221;icono_genesi-02&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.7.4&#8243; width=&#8221;20%&#8221; width_tablet=&#8221;50%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.4.8&#8243;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.5.0&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_padding=&#8221;||0px||false|false&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.5.0&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.5.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_divider color=&#8221;#00bcdb&#8221; divider_weight=&#8221;40px&#8221; _builder_version=&#8221;4.7.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;92%&#8221; module_alignment=&#8221;right&#8221; custom_margin=&#8221;-250px||||false|false&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.7.4&#8243; max_width=&#8221;1080px&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;0px||||false|false&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.5.0&#8243; custom_padding=&#8221;0px||||false|false&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.4.8&#8243;][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_text _builder_version=&#8221;4.7.7&#8243; header_2_font=&#8221;FiraSan-Medium||||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#00bcdb&#8221; header_2_font_size=&#8221;32px&#8221; header_2_font_size_tablet=&#8221;28px&#8221; header_2_font_size_phone=&#8221;23px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; border_width_bottom=&#8221;8px&#8221; border_color_bottom=&#8221;#5a1278&#8243;]<\/p>\n<h2>Our solutions<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.4.8&#8243;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.4.9&#8243;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.4.9&#8243;][et_pb_text _builder_version=&#8221;4.7.7&#8243; header_font=&#8221;FiraSan-Medium||||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#ffffff&#8221; background_color=&#8221;#00bcdb&#8221; custom_padding=&#8221;5px|20px|5px|20px|true|true&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h1>Assessment of <br \/> current status<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.4.9&#8243;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_image src=&#8221;http:\/\/genesinetworks.com\/en\/wp-content\/uploads\/2020\/08\/Cybersecurity2-04.jpg&#8221; title_text=&#8221;Cybersecurity2-04&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.5.6&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_text _builder_version=&#8221;4.7.7&#8243; text_font=&#8221;FiraSan-Regular||||||||&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;20px||||false|false&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><span>This service consists of an assessment workshop to determine a client\u2019s current situation to go over what security controls it has in place for its information and what the best practices are for the industry. The solution provides broad visibility in the five main phases of security incident prevention: identify, protect, detect, respond and recover.<\/span><\/p>\n<p><span>Once complete, the client will be able to determine opportunities for improvement and prioritize investments in IT.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.4.8&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_text _builder_version=&#8221;4.7.7&#8243; header_font=&#8221;FiraSan-Medium||||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#ffffff&#8221; background_color=&#8221;#00bcdb&#8221; custom_padding=&#8221;10px|20px|5px|20px|false|true&#8221;]<\/p>\n<h1>Analysis of vulnerabilities and penetration tests<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; _builder_version=&#8221;4.7.4&#8243; width=&#8221;85%&#8221; max_width=&#8221;100%&#8221; custom_padding=&#8221;0px||0px||true|false&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.4.8&#8243;][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_image src=&#8221;http:\/\/genesinetworks.com\/en\/wp-content\/uploads\/2020\/06\/Cybersecurity-04.jpg&#8221; title_text=&#8221;Cybersecurity-04&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.7.4&#8243; width=&#8221;270px&#8221; custom_margin=&#8221;20px||||false|false&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_text _builder_version=&#8221;4.7.7&#8243; text_font=&#8221;FiraSan-Regular||||||||&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;10px||||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;20px||20px||true|true&#8221; hover_enabled=&#8221;0&#8243; text_orientation_tablet=&#8221;left&#8221; text_orientation_phone=&#8221;&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>This service analyzes vulnerabilities in a client\u2019s services, applications, source code, databases or network infrastructure, and\/or penetration tests. Reports on the current security conditions of the analyzed infrastructure are then provided.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; _builder_version=&#8221;4.4.8&#8243; module_alignment=&#8221;left&#8221; module_alignment_tablet=&#8221;center&#8221; module_alignment_phone=&#8221;center&#8221; module_alignment_last_edited=&#8221;on|phone&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_image src=&#8221;http:\/\/genesinetworks.com\/en\/wp-content\/uploads\/2020\/08\/Cybersecurity2-05.jpg&#8221; title_text=&#8221;Cybersecurity2-05&#8243; _builder_version=&#8221;4.5.6&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_text _builder_version=&#8221;4.7.7&#8243; header_font=&#8221;FiraSan-Medium||||||||&#8221; header_text_align=&#8221;right&#8221; header_text_color=&#8221;#ffffff&#8221; background_color=&#8221;#00bcdb&#8221; custom_margin=&#8221;150px||||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;10px|80px|10px|80px|true|true&#8221; custom_padding_tablet=&#8221;|40px||40px|true|true&#8221; custom_padding_phone=&#8221;|20px||20px|true|true&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221;]<\/p>\n<h1>Critical infrastructure and<br \/> risk analysis<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.4.8&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_text _builder_version=&#8221;4.7.7&#8243; text_font=&#8221;FiraSan-Regular||||||||&#8221; text_font_size=&#8221;18px&#8221; text_orientation=&#8221;center&#8221; text_orientation_tablet=&#8221;left&#8221; text_orientation_phone=&#8221;&#8221; text_orientation_last_edited=&#8221;on|phone&#8221;]This consulting service focuses on identifying critical or at risk infrastructure (logical, physical and human) following best practices for the industry. This allows the most critical elements requiring protection to be mapped out so security measures targeting the risks to which they may be exposed can be put in place.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.7.4&#8243; background_image=&#8221;http:\/\/genesinetworks.com\/en\/wp-content\/uploads\/2020\/08\/Cybersecurity2-06.jpg&#8221; max_width=&#8221;1080px&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;150px||150px||true|false&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; _builder_version=&#8221;4.4.9&#8243;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_text _builder_version=&#8221;4.7.7&#8243; header_font=&#8221;FiraSan-Medium||||||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#ffffff&#8221; header_font_size=&#8221;35px&#8221; background_color=&#8221;#5a1278&#8243; module_alignment=&#8221;right&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; header_font_size_tablet=&#8221;45px&#8221; header_font_size_phone=&#8221;35px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; module_alignment_tablet=&#8221;center&#8221; module_alignment_phone=&#8221;center&#8221; module_alignment_last_edited=&#8221;on|phone&#8221;]<\/p>\n<h1>Hardening<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.4.8&#8243;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.4.8&#8243; max_width=&#8221;1380px&#8221; module_alignment=&#8221;center&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; _builder_version=&#8221;4.4.9&#8243;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.4.8&#8243;][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_text _builder_version=&#8221;4.7.7&#8243; text_font=&#8221;FiraSan-Regular||||||||&#8221; text_text_color=&#8221;#ffffff&#8221; text_font_size=&#8221;18px&#8221; background_color=&#8221;#00bcdb&#8221; custom_margin=&#8221;-238px||||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;100px|50px|100px|50px|true|true&#8221; text_font_size_tablet=&#8221;22px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221;]This technical consulting service helps clients improve the configuration of their equipment from a security standpoint. Hardening (an improvement in configuration) ensures devices are configured in the best way possible to protect the network, data and services. [\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.7.4&#8243; background_color=&#8221;#f3f3f3&#8243; max_width=&#8221;1080px&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;||||false|false&#8221;][et_pb_row _builder_version=&#8221;4.4.9&#8243; custom_padding=&#8221;||||true|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_text _builder_version=&#8221;4.7.7&#8243; header_font=&#8221;FiraSan-Medium||||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#ffffff&#8221; background_color=&#8221;#00bcdb&#8221; custom_margin=&#8221;-80px||||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;20px||10px||false|false&#8221;]<\/p>\n<h1>Consulting and awareness-raising plans<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_text _builder_version=&#8221;4.7.7&#8243; text_font=&#8221;FiraSan-Regular||||||||&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;30px||||false|false&#8221; custom_margin_tablet=&#8221;10px||||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;20px|40px|20px|40px|true|true&#8221; custom_padding_tablet=&#8221;||||true|true&#8221; custom_padding_phone=&#8221;|20px||20px|true|true&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221;]These consulting services focus on implementing data security management systems (ISO 27001 &#038; NIST) and creating response teams for data security incidents and continuity plans in the event of IT security incidents, and include surveys, data classification, technical trainings on ethical hacking, incident responses and forensic analyses, inter alia.[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_image src=&#8221;http:\/\/genesinetworks.com\/en\/wp-content\/uploads\/2020\/06\/Cybersecurity-08.png&#8221; title_text=&#8221;Cybersecurity-08&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.4.8&#8243; width=&#8221;50%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.7.4&#8243; max_width=&#8221;1080px&#8221; module_alignment=&#8221;center&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; _builder_version=&#8221;4.4.9&#8243; module_alignment=&#8221;left&#8221; module_alignment_tablet=&#8221;center&#8221; module_alignment_phone=&#8221;center&#8221; module_alignment_last_edited=&#8221;on|phone&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_text _builder_version=&#8221;4.7.7&#8243; text_font=&#8221;FiraSan-Regular||||||||&#8221; text_font_size=&#8221;18px&#8221; header_font=&#8221;FiraSan-Medium||||||||&#8221; header_text_align=&#8221;right&#8221; header_text_color=&#8221;#ffffff&#8221; header_font_size=&#8221;36px&#8221; background_color=&#8221;#00bcdb&#8221; custom_margin=&#8221;200px||||false|false&#8221; custom_margin_tablet=&#8221;10px||||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;20px|40px|10px|40px|false|true&#8221; custom_padding_tablet=&#8221;||||true|true&#8221; custom_padding_phone=&#8221;|20px||20px|true|true&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221;]<\/p>\n<h1>Technological<\/h1>\n<h1>solutions.<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_image src=&#8221;http:\/\/genesinetworks.com\/en\/wp-content\/uploads\/2020\/08\/Cybersecurity2-07.jpg&#8221; title_text=&#8221;Cybersecurity2-07&#8243; align=&#8221;center&#8221; align_tablet=&#8221;&#8221; align_phone=&#8221;center&#8221; align_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.5.6&#8243; width=&#8221;50%&#8221; width_tablet=&#8221;70%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|tablet&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_5,3_5,1_5&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; _builder_version=&#8221;4.4.9&#8243; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221;][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.4.8&#8243;][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_text _builder_version=&#8221;4.7.7&#8243; text_font=&#8221;FiraSan-Regular||||||||&#8221; text_font_size=&#8221;18px&#8221; header_font=&#8221;FiraSan-Regular||||||||&#8221; header_text_align=&#8221;center&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; text_orientation_tablet=&#8221;left&#8221; text_orientation_phone=&#8221;&#8221; text_orientation_last_edited=&#8221;on|desktop&#8221;]Our technological solutions cover the five functions of the National Institute of Standards and Technology (NIST) cybersecurity framework, which range from identifying assets and risks to identity controls, protecting and monitoring data and designing solutions that will contain threats, respond to them and ensure recovery in the shortest time possible.[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.4.8&#8243;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.7.4&#8243; locked=&#8221;off&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_text _builder_version=&#8221;4.7.7&#8243; header_3_font=&#8221;Miso-regular|700|||||||&#8221; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#ffffff&#8221; header_3_font_size=&#8221;26px&#8221; background_color=&#8221;#00bcdb&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;|150px|||false|false&#8221; custom_margin_tablet=&#8221;|0px|||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;10px|20px|5px|20px|false|true&#8221;]<\/p>\n<h3>Planning and Implementation of a Disaster Recovery Plan (DRP)<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.7.7&#8243; header_3_font=&#8221;Miso-regular|700|||||||&#8221; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#ffffff&#8221; header_3_font_size=&#8221;26px&#8221; background_color=&#8221;#00bcdb&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;|150px|||false|false&#8221; custom_margin_tablet=&#8221;|0px|||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;10px|20px|5px|20px|false|true&#8221;]<\/p>\n<h3>Next Generation Firewall (NGFW, NGIPS &#038; VPN)<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.7.4&#8243; header_3_font=&#8221;Miso-regular|700|||||||&#8221; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#ffffff&#8221; header_3_font_size=&#8221;26px&#8221; background_color=&#8221;#00bcdb&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;|150px|||false|false&#8221; custom_margin_tablet=&#8221;|0px|||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;10px|20px|5px|20px|false|true&#8221;]<\/p>\n<h3>Endpoint Protection<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.7.4&#8243; header_3_font=&#8221;Miso-regular|700|||||||&#8221; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#ffffff&#8221; header_3_font_size=&#8221;26px&#8221; background_color=&#8221;#00bcdb&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;|150px|||false|false&#8221; custom_margin_tablet=&#8221;|0px|||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;10px|20px|5px|20px|false|true&#8221;]<\/p>\n<h3>Email Protection &#038; Web Security<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.7.4&#8243; header_3_font=&#8221;Miso-regular|700|||||||&#8221; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#ffffff&#8221; header_3_font_size=&#8221;26px&#8221; background_color=&#8221;#00bcdb&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;|150px|||false|false&#8221; custom_margin_tablet=&#8221;|0px|||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;10px|20px|5px|20px|false|true&#8221;]<\/p>\n<h3>Multi-Factor Authentication (MFA)<br \/>\n<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_text _builder_version=&#8221;4.7.4&#8243; header_3_font=&#8221;Miso-regular|700|||||||&#8221; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#ffffff&#8221; header_3_font_size=&#8221;26px&#8221; background_color=&#8221;#00bcdb&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;|150px|||false|false&#8221; custom_margin_tablet=&#8221;|0px|||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;10px|20px|5px|20px|false|true&#8221;]<\/p>\n<h3>Web Application Firewall (WAF) &#038; DDoS Protection<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.7.4&#8243; header_3_font=&#8221;Miso-regular|700|||||||&#8221; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#ffffff&#8221; header_3_font_size=&#8221;26px&#8221; background_color=&#8221;#00bcdb&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;|150px|||false|false&#8221; custom_margin_tablet=&#8221;|0px|||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;10px|20px|5px|20px|false|true&#8221;]<\/p>\n<h3>Security Information and Event Management (SIEM)<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.7.4&#8243; header_3_font=&#8221;Miso-regular|700|||||||&#8221; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#ffffff&#8221; header_3_font_size=&#8221;26px&#8221; background_color=&#8221;#00bcdb&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;|150px|||false|false&#8221; custom_margin_tablet=&#8221;|0px|||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;10px|20px|5px|20px|false|true&#8221;]<\/p>\n<h3>Security Network Infrastructure Monitoring &#038; APM<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.7.4&#8243; header_3_font=&#8221;Miso-regular|700|||||||&#8221; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#ffffff&#8221; header_3_font_size=&#8221;26px&#8221; background_color=&#8221;#00bcdb&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;|150px|||false|false&#8221; custom_margin_tablet=&#8221;|0px|||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;10px|20px|5px|20px|false|true&#8221;]<\/p>\n<h3>DNS-Layer &#038; Cloud Security<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.7.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1080px&#8221; module_alignment=&#8221;center&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;left&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.7.7&#8243; text_font=&#8221;FiraSan-Regular||||||||&#8221; text_font_size=&#8221;18px&#8221; header_font=&#8221;FiraSan-Medium||||||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#ffffff&#8221; header_font_size=&#8221;36px&#8221; background_color=&#8221;#00bcdb&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;10px||||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;20px|20px|10px|100px|false|false&#8221; custom_padding_tablet=&#8221;||||true|true&#8221; custom_padding_phone=&#8221;|20px||20px|true|true&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221;]<\/p>\n<h1>Alliances<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;http:\/\/genesinetworks.com\/en\/wp-content\/uploads\/2020\/07\/clientes-25.jpg&#8221; title_text=&#8221;clientes-25&#8243; _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;http:\/\/genesinetworks.com\/en\/wp-content\/uploads\/2020\/08\/cisco-11.png&#8221; title_text=&#8221;cisco-11&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.5.1&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.7.7&#8243; background_color=&#8221;#000000&#8243; max_width=&#8221;1080px&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_module=&#8221;1849&#8243; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.7.7&#8243; width=&#8221;84%&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_image src=&#8221;http:\/\/genesinetworks.com\/en\/wp-content\/uploads\/2020\/06\/Genesi_business-02.png&#8221; title_text=&#8221;Genesi_business-02&#8243; _builder_version=&#8221;4.4.8&#8243; width=&#8221;50%&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.4.8&#8243;][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_social_media_follow _builder_version=&#8221;4.4.8&#8243;][et_pb_social_media_follow_network social_network=&#8221;facebook&#8221; url=&#8221;https:\/\/www.facebook.com\/GenesiNetworksMx\/&#8221; _builder_version=&#8221;4.4.8&#8243; background_color=&#8221;#3b5998&#8243; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221;]facebook[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8221;linkedin&#8221; url=&#8221;https:\/\/www.linkedin.com\/company\/65387244\/admin\/&#8221; _builder_version=&#8221;4.4.8&#8243; background_color=&#8221;#007bb6&#8243; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221;]linkedin[\/et_pb_social_media_follow_network][\/et_pb_social_media_follow][et_pb_blurb image=&#8221;http:\/\/genesinetworks.com\/en\/wp-content\/uploads\/2020\/06\/genesi_img-29.png&#8221; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.7.7&#8243; body_font=&#8221;FiraSan-Regular||||||||&#8221; body_text_color=&#8221;#ffffff&#8221; body_font_size=&#8221;16px&#8221;]<\/p>\n<p>954 \u2013 803 3532<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8221;http:\/\/genesinetworks.com\/en\/wp-content\/uploads\/2020\/06\/genesi_img-30.png&#8221; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.7.7&#8243; body_font=&#8221;FiraSan-Regular||||||||&#8221; body_text_color=&#8221;#ffffff&#8221; body_font_size=&#8221;16px&#8221;]<span style=\"color: #ffffff;\"><a href=\"mailto:pcorona@genesinetworks.com\" style=\"color: #ffffff;\">pcorona@genesinetworks.com<\/a><\/span>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Genesi Cybersecurity_Identifying and controlling user, device and application access within a setup that offers complete protection to critical infrastructure.Genesi\u00a0 BusinessGenesi CybersecurityGenesi InfrastructureGenesi ServicesGenesi Professional Audio \/ VideoGenesi ConsultingIn this era of hyperconnectivity, threats to security are increasingly frequent. The rapid evolution of cloud and mobile device usage patterns creates enormous opportunities and significant threats to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","_joinchat":[],"footnotes":""},"class_list":["post-277","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/genesinetworks.com\/en\/wp-json\/wp\/v2\/pages\/277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/genesinetworks.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/genesinetworks.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/genesinetworks.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/genesinetworks.com\/en\/wp-json\/wp\/v2\/comments?post=277"}],"version-history":[{"count":72,"href":"https:\/\/genesinetworks.com\/en\/wp-json\/wp\/v2\/pages\/277\/revisions"}],"predecessor-version":[{"id":2204,"href":"https:\/\/genesinetworks.com\/en\/wp-json\/wp\/v2\/pages\/277\/revisions\/2204"}],"wp:attachment":[{"href":"https:\/\/genesinetworks.com\/en\/wp-json\/wp\/v2\/media?parent=277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}