{"id":33757,"date":"2025-08-14T19:03:39","date_gmt":"2025-08-14T19:03:39","guid":{"rendered":"https:\/\/overtek.mx\/?page_id=33757"},"modified":"2025-08-14T20:35:30","modified_gmt":"2025-08-14T20:35:30","slug":"servicios-de-ciberinteligencia","status":"publish","type":"page","link":"https:\/\/overtek.mx\/en\/servicios-de-ciberinteligencia\/","title":{"rendered":"Servicios de ciberinteligencia"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><section data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_section vc_section_visible custom-responsive-106491066 vc_custom_1755203396438 vc_section-has-fill\" data-section-name=\"\"><div class=\"pix_element_overlay  bg-heading-default\" style=\"pointer-events:none;;position:absolute;width:100%;height:100%;top:0;left:0;opacity:0.8;\"><\/div><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid vc_row_visible custom-responsive-50682251 vc_row-o-content-middle vc_row-flex\"><div class=\"wpb_column vc_column_container vc_col-sm-12 text-left\"><div class=\"vc_column-inner  vc_custom_1604715604745\"><div class=\"wpb_wrapper\"><div id=\"el1749249152455-266a72b7-6123\" class=\"mb-3 text-center  vc_custom_1755198249384\"><h1 class=\"mb-32 pix-sliding-headline-2 animate-in font-weight-bold secondary-font\" data-anim-type=\"pix-sliding-text\" pix-anim-delay=\"500\" data-class=\"secondary-font text-white\" style=\"\"><span class=\"slide-in-container\"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 0ms;\">Servicios&#32;<\/span><\/span> <span class=\"slide-in-container\"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 150ms;\">de&#32;<\/span><\/span> <span class=\"slide-in-container\"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 300ms;\">ciberinteligencia&#32;<\/span><\/span> <\/h1><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/section><div class=\"vc_row-full-width vc_clearfix\"><\/div><section data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_section vc_section_visible vc_custom_1755203724067 vc_section-has-fill\" data-section-name=\"\"><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid vc_row_visible vc_row-o-content-middle vc_row-flex\"><div class=\"wpb_column vc_column_container vc_col-sm-6 text-left\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1450\" height=\"1960\" src=\"https:\/\/overtek.mx\/wp-content\/uploads\/2025\/08\/servicio-de-ciberinteligencia-overtek.jpg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"servicio-de-ciberinteligencia-overtek\" srcset=\"https:\/\/overtek.mx\/wp-content\/uploads\/2025\/08\/servicio-de-ciberinteligencia-overtek.jpg 1450w, https:\/\/overtek.mx\/wp-content\/uploads\/2025\/08\/servicio-de-ciberinteligencia-overtek-222x300.jpg 222w, https:\/\/overtek.mx\/wp-content\/uploads\/2025\/08\/servicio-de-ciberinteligencia-overtek-758x1024.jpg 758w\" sizes=\"auto, (max-width: 1450px) 100vw, 1450px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6 text-left\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div id=\"el1755198346275-309ecf20-a25d\" class=\"pix-el-text   w-100\" ><p class=\"\"><h2><b>Servicios de <span style=\"color: #6f0c2f;\">ciberinteligencia<\/span><\/b><\/h2>\n<\/p><\/div><div id=\"el1755198410938-0978ab9b-5903\" class=\"pix-el-text   w-100\" ><p class=\"\"><p><span style=\"font-weight: 400;\">En <span style=\"color: #031424;\"><strong>Overtek<\/strong><\/span> adoptamos un enfoque proactivo para anticipar y neutralizar amenazas antes de que impacten tu negocio. Nuestro <span style=\"color: #031424;\"><strong>servicio de Ciberinteligencia<\/strong><\/span> combina tecnolog\u00edas avanzadas con la experiencia de analistas certificados para ofrecerte:<\/span><\/p>\n<\/p><\/div><div id=\"1755198465482-4426432d-6ef2\" class=\"pix-feature-el  media  vc_custom_1755201655078\"><div class=\"mr-3 feature_img animate-in\" data-anim-type=\"fade-in-up\" data-anim-delay=\"400\" style=\"position:relative;text-align:center;\"><i style=\"display:inline-block;font-size:40px;min-width:40px;line-height:40px;\" class=\"text-red align-middle pixicon-reload-time\"><\/i><\/div><div class=\"media-body text-left\"><div class=\"font-weight-bold  secondary-font text-heading-default animate-in\" style=\"font-size:18px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"500\">Monitoreo OSINT 24\u00d77<\/div><div class=\"text-body-default      animate-in\" style=\"padding-top:5px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"600\">Recopilaci\u00f3n continua de datos en fuentes abiertas (web, redes sociales, foros especializados) para detectar indicios de ataques dirigidos o filtraciones.<\/div><\/div><\/div><div id=\"1755198569717-d3a11e04-be7f\" class=\"pix-feature-el  media  vc_custom_1755201710457\"><div class=\"mr-3 feature_img animate-in\" data-anim-type=\"fade-in-up\" data-anim-delay=\"400\" style=\"position:relative;text-align:center;\"><i style=\"display:inline-block;font-size:40px;min-width:40px;line-height:40px;\" class=\"text-red align-middle pixicon-browser-search\"><\/i><\/div><div class=\"media-body text-left\"><div class=\"font-weight-bold  secondary-font text-heading-default animate-in\" style=\"font-size:18px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"500\">Escaneo de entornos no indexados<\/div><div class=\"text-body-default      animate-in\" style=\"padding-top:5px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"600\">B\u00fasqueda de credenciales expuestas, menciones de tu marca o fugas de informaci\u00f3n sensible en Deep Web y Dark Web.<\/div><\/div><\/div><div id=\"1755198591486-bd898ed8-3ebd\" class=\"pix-feature-el  media  vc_custom_1755201732332\"><div class=\"mr-3 feature_img animate-in\" data-anim-type=\"fade-in-up\" data-anim-delay=\"400\" style=\"position:relative;text-align:center;\"><i style=\"display:inline-block;font-size:40px;min-width:40px;line-height:40px;\" class=\"text-red align-middle pixicon-detective\"><\/i><\/div><div class=\"media-body text-left\"><div class=\"font-weight-bold  secondary-font text-heading-default animate-in\" style=\"font-size:18px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"500\">Vigilancia de marca y reputaci\u00f3n digital<\/div><div class=\"text-body-default      animate-in\" style=\"padding-top:5px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"600\">Alerta temprana sobre suplantaciones de identidad, fraudes y campa\u00f1as de desinformaci\u00f3n que pongan en riesgo tu imagen corporativa.<\/div><\/div><\/div><a  href=\"https:\/\/overtek.mx\/en\/contacto\/\" class=\"btn mb-2    vc_custom_1755203595128  shadow-lg shadow-hover-lg text-white btn-red d-inline-block pix-hover-item     secondary-font btn-rounded animate-in btn-md\"   data-anim-type=\"fade-in-up\" data-anim-delay=\"600\" ><i class=\"font-weight-bold pixicon-user-circle-1  pix-hover-left  mr-1\"><\/i> <span class=\"font-weight-bold\" >Habla con un experto hoy<\/span><\/a><\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/section><div class=\"vc_row-full-width vc_clearfix\"><\/div><section data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_section vc_section_visible vc_custom_1755199965908\" data-section-name=\"\"><div class=\"pix_element_overlay  bg-heading-default\" style=\"pointer-events:none;;position:absolute;width:100%;height:100%;top:0;left:0;opacity:1;\"><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_row_visible vc_custom_1755199998652\"><div class=\"wpb_column vc_column_container vc_col-sm-12 text-left\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div id=\"el1755198945787-01abfb0f-49b7\" class=\"mb-3 text-center  vc_custom_1755199067385\"><h2 class=\"mb-32 pix-sliding-headline-2 animate-in font-weight-bold secondary-font\" data-anim-type=\"pix-sliding-text\" pix-anim-delay=\"500\" data-class=\"secondary-font text-white\" style=\"\"><span class=\"slide-in-container\"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 0ms;\">Nuestra&#32;<\/span><\/span> <span class=\"slide-in-container\"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 150ms;\">plataforma&#32;<\/span><\/span> <span class=\"slide-in-container\"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 300ms;\">y&#32;<\/span><\/span> <span class=\"slide-in-container\"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 450ms;\">tecnolog\u00eda&#32;<\/span><\/span> <\/h2><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_row_visible\"><div class=\"wpb_column vc_column_container vc_col-sm-4 text-left\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div id=\"1755199215983-c23575d1-0f35\" class=\"pix-feature-el text-left  vc_custom_1755201444261\"><div class=\"d-inline-block animate-in\" data-anim-type=\"fade-in-up\" data-anim-delay=\"\" style=\"position:relative;text-align:center;\"><i style=\"display:inline-block;font-size:52px;line-height:52px;\" class=\"text-red align-middle pixicon-list-th\"><\/i><\/div><h4 class=\"font-weight-bold  secondary-font text-white animate-in\" style=\"padding-top:30px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"100\">Dashboard centralizado<\/h4><div class=\"text-light-opacity-6 text-18     animate-in\" style=\"padding-top:15px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"200\">Visualiza en un solo lugar todos los indicadores clave y niveles de riesgo.<\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4 text-left\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div id=\"1755198945808-ef230ae0-4c4b\" class=\"pix-feature-el text-left  vc_custom_1755201437456\"><div class=\"d-inline-block animate-in\" data-anim-type=\"fade-in-up\" data-anim-delay=\"\" style=\"position:relative;text-align:center;\"><i style=\"display:inline-block;font-size:52px;line-height:52px;\" class=\"text-red align-middle pixicon-messages-1\"><\/i><\/div><h4 class=\"font-weight-bold  secondary-font text-white animate-in\" style=\"padding-top:30px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"100\">Automatizaci\u00f3n de alertas<\/h4><div class=\"text-light-opacity-6 text-18     animate-in\" style=\"padding-top:15px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"200\">Reglas flexibles que disparan notificaciones inmediatas (correo, SMS o Webhook) ante cualquier actividad sospechosa de alto impacto.<\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4 text-left\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div id=\"1755199238484-c7de807b-395c\" class=\"pix-feature-el text-left  vc_custom_1755201450310\"><div class=\"d-inline-block animate-in\" data-anim-type=\"fade-in-up\" data-anim-delay=\"\" style=\"position:relative;text-align:center;\"><i style=\"display:inline-block;font-size:52px;line-height:52px;\" class=\"text-red align-middle pixicon-loop-1\"><\/i><\/div><h4 class=\"font-weight-bold  secondary-font text-white animate-in\" style=\"padding-top:30px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"100\">Correlaci\u00f3n inteligente de datos<\/h4><div class=\"text-light-opacity-6 text-18     animate-in\" style=\"padding-top:15px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"200\">Motor de an\u00e1lisis que relaciona eventos y patrones para identificar amenazas complejas y tendencias emergentes.<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_row_visible vc_custom_1755203631269\"><div class=\"wpb_column vc_column_container vc_col-sm-4 text-left\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4 text-left\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><a  href=\"https:\/\/overtek.mx\/en\/contacto\/\" class=\"btn mb-2    vc_custom_1755203590936  shadow-lg shadow-hover-lg text-white btn-red d-inline-block pix-hover-item     secondary-font btn-rounded animate-in btn-md\"   data-anim-type=\"fade-in-up\" data-anim-delay=\"600\" ><i class=\"font-weight-bold pixicon-user-circle-1  pix-hover-left  mr-1\"><\/i> <span class=\"font-weight-bold\" >Habla con un experto hoy<\/span><\/a><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4 text-left\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><\/section><div class=\"vc_row-full-width vc_clearfix\"><\/div><section data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_section vc_section_visible vc_custom_1755200243257 vc_section-has-fill\" data-section-name=\"\"><div class=\"vc_row wpb_row vc_row-fluid vc_row_visible vc_custom_1589907937654 vc_row-o-content-middle vc_row-flex\"><div class=\"wpb_column vc_column_container vc_col-sm-6 text-left\"><div class=\"vc_column-inner  vc_custom_1592348346180\"><div class=\"wpb_wrapper\"><div id=\"el1755199408976-8bf6350a-9b91\" class=\"pix-el-text   w-100\" ><p class=\"\"><h2><b>\u00bfQu\u00e9 obtienes<br \/>\ncon <span style=\"color: #6f0c2f;\">Overtek<\/span>?<\/b><\/h2>\n<\/p><\/div><div id=\"el1755199628937-4440439a-c50c\" class=\"pix-el-text   w-100\" ><p class=\"\"><p><span style=\"color: #031424;\"><b>Anticipa, detecta y neutraliza amenazas antes de que te afecten. <\/b><\/span><span style=\"font-weight: 400;\">Habla con un<span style=\"color: #031424;\"><strong> analista de Ciberinteligencia<\/strong><\/span> y fortalece hoy la protecci\u00f3n de tu organizaci\u00f3n.<\/span><\/p>\n<\/p><\/div><a  href=\"https:\/\/overtek.mx\/en\/contacto\/\" class=\"btn mb-2    vc_custom_1755203599978  shadow-lg shadow-hover-lg text-white btn-red d-inline-block pix-hover-item     secondary-font btn-rounded animate-in btn-md\"   data-anim-type=\"fade-in-up\" data-anim-delay=\"600\" ><i class=\"font-weight-bold pixicon-user-circle-1  pix-hover-left  mr-1\"><\/i> <span class=\"font-weight-bold\" >Habla con un experto hoy<\/span><\/a><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6 text-left\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"pix-content-box card      vc_custom_1755201799969    rounded-10 animate-in bg- w-100\"  data-anim-type=\"fade-in-up\" data-anim-delay=\"200\"><div class=\"\" style=\"z-index:30;position:relative;\"><div id=\"1755200094612-84ed5df7-93a2\" class=\"pix-feature-el  media\"><div class=\"mr-3 mw-100 text-red animate-in\" data-anim-type=\"fade-in-up\" data-anim-delay=\"400\" style=\"width:64.8px;aspect-ratio:1\/1 !important;position:relative;line-height:64.8px;text-align:center;\"><svg width=\"100%\" height=\"100%\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\"> <defs><\/defs> <g stroke=\"none\" stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"> <path d=\"M8,3 L8,3.5 C8,4.32842712 8.67157288,5 9.5,5 L14.5,5 C15.3284271,5 16,4.32842712 16,3.5 L16,3 L18,3 C19.1045695,3 20,3.8954305 20,5 L20,21 C20,22.1045695 19.1045695,23 18,23 L6,23 C4.8954305,23 4,22.1045695 4,21 L4,5 C4,3.8954305 4.8954305,3 6,3 L8,3 Z\" fill=\"#000000\" opacity=\"0.3\"><\/path> <path d=\"M10.875,15.75 C10.6354167,15.75 10.3958333,15.6541667 10.2041667,15.4625 L8.2875,13.5458333 C7.90416667,13.1625 7.90416667,12.5875 8.2875,12.2041667 C8.67083333,11.8208333 9.29375,11.8208333 9.62916667,12.2041667 L10.875,13.45 L14.0375,10.2875 C14.4208333,9.90416667 14.9958333,9.90416667 15.3791667,10.2875 C15.7625,10.6708333 15.7625,11.2458333 15.3791667,11.6291667 L11.5458333,15.4625 C11.3541667,15.6541667 11.1145833,15.75 10.875,15.75 Z\" fill=\"#000000\"><\/path> <path d=\"M11,2 C11,1.44771525 11.4477153,1 12,1 C12.5522847,1 13,1.44771525 13,2 L14.5,2 C14.7761424,2 15,2.22385763 15,2.5 L15,3.5 C15,3.77614237 14.7761424,4 14.5,4 L9.5,4 C9.22385763,4 9,3.77614237 9,3.5 L9,2.5 C9,2.22385763 9.22385763,2 9.5,2 L11,2 Z\" fill=\"#000000\"><\/path> <\/g> <\/svg><\/div><div class=\"media-body text-left\"><h6 class=\"font-weight-bold  secondary-font text-heading-default animate-in\" style=\"\" data-anim-type=\"fade-in-up\" data-anim-delay=\"500\">Informes ejecutivos y t\u00e9cnicos<\/h6><div class=\"text-body-default      animate-in\" style=\"padding-top:10px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"600\">Res\u00famenes accionables para la alta direcci\u00f3n y detalle de IoC\/TTPs para tu equipo de seguridad.<\/div><\/div><\/div><\/div><\/div><div class=\"pix-content-box card      vc_custom_1755201809898    rounded-10 animate-in bg- w-100\"  data-anim-type=\"fade-in-up\" data-anim-delay=\"200\"><div class=\"\" style=\"z-index:30;position:relative;\"><div id=\"1755200270303-a2cd94d4-cf04\" class=\"pix-feature-el  media\"><div class=\"mr-3 mw-100 text-red animate-in\" data-anim-type=\"fade-in-up\" data-anim-delay=\"400\" style=\"width:64.8px;aspect-ratio:1\/1 !important;position:relative;line-height:64.8px;text-align:center;\"><svg width=\"100%\" height=\"100%\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\"> <defs><\/defs> <g stroke=\"none\" stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"> <path d=\"M15.4508979,17.4029496 L14.1784978,15.8599014 C15.324501,14.9149052 16,13.5137472 16,12 C16,10.4912085 15.3289582,9.09418404 14.1893841,8.14910121 L15.466112,6.60963188 C17.0590936,7.93073905 18,9.88958759 18,12 C18,14.1173586 17.0528606,16.0819686 15.4508979,17.4029496 Z M18.0211112,20.4681628 L16.7438102,18.929169 C18.7927036,17.2286725 20,14.7140097 20,12 C20,9.28974232 18.7960666,6.77820732 16.7520315,5.07766256 L18.031149,3.54017812 C20.5271817,5.61676443 22,8.68922234 22,12 C22,15.3153667 20.523074,18.3916375 18.0211112,20.4681628 Z M8.54910207,17.4029496 C6.94713944,16.0819686 6,14.1173586 6,12 C6,9.88958759 6.94090645,7.93073905 8.53388797,6.60963188 L9.81061588,8.14910121 C8.67104182,9.09418404 8,10.4912085 8,12 C8,13.5137472 8.67549895,14.9149052 9.82150222,15.8599014 L8.54910207,17.4029496 Z M5.9788888,20.4681628 C3.47692603,18.3916375 2,15.3153667 2,12 C2,8.68922234 3.47281829,5.61676443 5.96885102,3.54017812 L7.24796852,5.07766256 C5.20393339,6.77820732 4,9.28974232 4,12 C4,14.7140097 5.20729644,17.2286725 7.25618985,18.929169 L5.9788888,20.4681628 Z\" fill=\"#000000\" fill-rule=\"nonzero\" opacity=\"0.3\"><\/path> <circle fill=\"#000000\" cx=\"12\" cy=\"12\" r=\"2\"><\/circle> <\/g> <\/svg><\/div><div class=\"media-body text-left\"><h6 class=\"font-weight-bold  secondary-font text-heading-default animate-in\" style=\"\" data-anim-type=\"fade-in-up\" data-anim-delay=\"500\">Alertas en tiempo real<\/h6><div class=\"text-body-default      animate-in\" style=\"padding-top:10px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"600\">Notificaciones configurables seg\u00fan criticidad y canal de comunicaci\u00f3n.<\/div><\/div><\/div><\/div><\/div><div class=\"pix-content-box card      vc_custom_1755200745761    rounded-10 animate-in bg- w-100\"  data-anim-type=\"fade-in-up\" data-anim-delay=\"200\"><div class=\"\" style=\"z-index:30;position:relative;\"><div id=\"1755200270026-b2e8ac97-5aeb\" class=\"pix-feature-el  media\"><div class=\"mr-3 mw-100 text-red animate-in\" data-anim-type=\"fade-in-up\" data-anim-delay=\"400\" style=\"width:64.8px;aspect-ratio:1\/1 !important;position:relative;line-height:64.8px;text-align:center;\"><svg width=\"100%\" height=\"100%\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\"> <defs><\/defs> <g stroke=\"none\" stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"> <path d=\"M4,4 L11.6314229,2.5691082 C11.8750185,2.52343403 12.1249815,2.52343403 12.3685771,2.5691082 L20,4 L20,13.2830094 C20,16.2173861 18.4883464,18.9447835 16,20.5 L12.5299989,22.6687507 C12.2057287,22.8714196 11.7942713,22.8714196 11.4700011,22.6687507 L8,20.5 C5.51165358,18.9447835 4,16.2173861 4,13.2830094 L4,4 Z\" fill=\"#000000\" opacity=\"0.3\"><\/path> <path d=\"M11.1750002,14.75 C10.9354169,14.75 10.6958335,14.6541667 10.5041669,14.4625 L8.58750019,12.5458333 C8.20416686,12.1625 8.20416686,11.5875 8.58750019,11.2041667 C8.97083352,10.8208333 9.59375019,10.8208333 9.92916686,11.2041667 L11.1750002,12.45 L14.3375002,9.2875 C14.7208335,8.90416667 15.2958335,8.90416667 15.6791669,9.2875 C16.0625002,9.67083333 16.0625002,10.2458333 15.6791669,10.6291667 L11.8458335,14.4625 C11.6541669,14.6541667 11.4145835,14.75 11.1750002,14.75 Z\" fill=\"#000000\"><\/path> <\/g> <\/svg><\/div><div class=\"media-body text-left\"><h6 class=\"font-weight-bold  secondary-font text-heading-default animate-in\" style=\"\" data-anim-type=\"fade-in-up\" data-anim-delay=\"500\">Recomendaciones de mitigaci\u00f3n<\/h6><div class=\"text-body-default      animate-in\" style=\"padding-top:10px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"600\">Gu\u00edas pr\u00e1cticas y prioritarias para neutralizar amenazas, reforzar tus controles y prevenir recurrencias.<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/section>","protected":false},"excerpt":{"rendered":"Servicios&#32; de&#32; ciberinteligencia&#32; Servicios de ciberinteligencia En Overtek adoptamos un enfoque proactivo para anticipar y neutralizar amenazas antes de que impacten tu negocio. Nuestro servicio de Ciberinteligencia combina tecnolog\u00edas avanzadas con la experiencia de analistas certificados para ofrecerte: Monitoreo OSINT...","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-33757","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/overtek.mx\/en\/wp-json\/wp\/v2\/pages\/33757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/overtek.mx\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/overtek.mx\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/overtek.mx\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/overtek.mx\/en\/wp-json\/wp\/v2\/comments?post=33757"}],"version-history":[{"count":9,"href":"https:\/\/overtek.mx\/en\/wp-json\/wp\/v2\/pages\/33757\/revisions"}],"predecessor-version":[{"id":33768,"href":"https:\/\/overtek.mx\/en\/wp-json\/wp\/v2\/pages\/33757\/revisions\/33768"}],"wp:attachment":[{"href":"https:\/\/overtek.mx\/en\/wp-json\/wp\/v2\/media?parent=33757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}