{"id":33792,"date":"2025-08-14T22:46:47","date_gmt":"2025-08-14T22:46:47","guid":{"rendered":"https:\/\/overtek.mx\/?page_id=33792"},"modified":"2025-09-05T20:36:41","modified_gmt":"2025-09-05T20:36:41","slug":"analisis-de-vulnerabilidades","status":"publish","type":"page","link":"https:\/\/overtek.mx\/en\/analisis-de-vulnerabilidades\/","title":{"rendered":"An\u00e1lisis de vulnerabilidades"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><section data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_section vc_section_visible custom-responsive-109953967 vc_custom_1755212208030 vc_section-has-fill\" data-section-name=\"\"><div class=\"pix_element_overlay  bg-heading-default\" style=\"pointer-events:none;;position:absolute;width:100%;height:100%;top:0;left:0;opacity:0.8;\"><\/div><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid vc_row_visible custom-responsive-147792203 vc_row-o-content-middle vc_row-flex\"><div class=\"wpb_column vc_column_container vc_col-sm-12 text-left\"><div class=\"vc_column-inner  vc_custom_1604715604745\"><div class=\"wpb_wrapper\"><div id=\"el1749249152455-266a72b7-6123\" class=\"mb-3 text-center  vc_custom_1755211000299\"><h1 class=\"mb-32 pix-sliding-headline-2 animate-in font-weight-bold secondary-font\" data-anim-type=\"pix-sliding-text\" pix-anim-delay=\"500\" data-class=\"secondary-font text-white\" style=\"\"><span class=\"slide-in-container\"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 0ms;\">An\u00e1lisis&#32;<\/span><\/span> <span class=\"slide-in-container\"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 150ms;\">de&#32;<\/span><\/span> <span class=\"slide-in-container\"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 300ms;\">vulnerabilidades&#32;<\/span><\/span> <\/h1><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/section><div class=\"vc_row-full-width vc_clearfix\"><\/div><section data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_section vc_section_visible vc_custom_1755211565681 vc_section-has-fill\" data-section-name=\"\"><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid vc_row_visible vc_row-o-content-middle vc_row-flex\"><div class=\"wpb_column vc_column_container vc_col-sm-6 text-left\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1450\" height=\"1441\" src=\"https:\/\/overtek.mx\/wp-content\/uploads\/2025\/08\/analisis-de-vulnerabilidades-software.jpg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"analisis-de-vulnerabilidades-software\" srcset=\"https:\/\/overtek.mx\/wp-content\/uploads\/2025\/08\/analisis-de-vulnerabilidades-software.jpg 1450w, https:\/\/overtek.mx\/wp-content\/uploads\/2025\/08\/analisis-de-vulnerabilidades-software-300x298.jpg 300w, https:\/\/overtek.mx\/wp-content\/uploads\/2025\/08\/analisis-de-vulnerabilidades-software-1024x1018.jpg 1024w\" sizes=\"auto, (max-width: 1450px) 100vw, 1450px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6 text-left\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div id=\"el1755198346275-309ecf20-a25d\" class=\"pix-el-text   w-100\" ><p class=\"\"><h2><b>An\u00e1lisis de <span style=\"color: #6f0c2f;\">vulnerabilidades<\/span><\/b><\/h2>\n<\/p><\/div><div id=\"el1757103873226-82e5f658-c182\" class=\"pix-el-text   w-100\" ><p class=\"\"><p><span style=\"font-weight: 400;\">En <span style=\"color: #041424;\"><strong>Overtek<\/strong> <\/span>identificamos y priorizamos las debilidades de tu infraestructura antes de que los adversarios puedan explotarlas. Nuestro <span style=\"color: #041424;\"><strong>servicio de An\u00e1lisis de Vulnerabilidades<\/strong><\/span> combina t\u00e9cnicas automatizadas y revisi\u00f3n manual para ofrecerte un diagn\u00f3stico completo y accionable.<\/span><\/p>\n<\/p><\/div><div id=\"1755198591486-bd898ed8-3ebd\" class=\"pix-feature-el  media  vc_custom_1755211080958\"><div class=\"mr-3 feature_img animate-in\" data-anim-type=\"fade-in-up\" data-anim-delay=\"400\" style=\"position:relative;text-align:center;\"><i style=\"display:inline-block;font-size:40px;min-width:40px;line-height:40px;\" class=\"text-red align-middle pixicon-user-circle-1\"><\/i><\/div><div class=\"media-body text-left\"><div class=\"font-weight-bold  secondary-font text-heading-default animate-in\" style=\"font-size:18px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"500\">Escaneo externo (caja negra)<\/div><div class=\"text-body-default      animate-in\" style=\"padding-top:5px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"600\">Revisi\u00f3n desde Internet para descubrir puertas de enlace, servicios y aplicaciones expuestas.<\/div><\/div><\/div><div id=\"1755204020322-7e49309e-fcc7\" class=\"pix-feature-el  media  vc_custom_1755211094795\"><div class=\"mr-3 feature_img animate-in\" data-anim-type=\"fade-in-up\" data-anim-delay=\"400\" style=\"position:relative;text-align:center;\"><i style=\"display:inline-block;font-size:40px;min-width:40px;line-height:40px;\" class=\"text-red align-middle pixicon-star-4\"><\/i><\/div><div class=\"media-body text-left\"><div class=\"font-weight-bold  secondary-font text-heading-default animate-in\" style=\"font-size:18px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"500\">Escaneo interno (caja gris\/blanca)<\/div><div class=\"text-body-default      animate-in\" style=\"padding-top:5px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"600\">An\u00e1lisis dentro de tu red para detectar vulnerabilidades en sistemas, segmentaci\u00f3n y pol\u00edticas de acceso.<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_row_visible vc_custom_1755207152954\"><div class=\"wpb_column vc_column_container vc_col-sm-4 text-left\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div id=\"1755198569717-d3a11e04-be7f\" class=\"pix-feature-el  media  vc_custom_1755211108362\"><div class=\"mr-3 feature_img animate-in\" data-anim-type=\"fade-in-up\" data-anim-delay=\"400\" style=\"position:relative;text-align:center;\"><i style=\"display:inline-block;font-size:40px;min-width:40px;line-height:40px;\" class=\"text-red align-middle pixicon-lock-1\"><\/i><\/div><div class=\"media-body text-left\"><div class=\"font-weight-bold  secondary-font text-heading-default animate-in\" style=\"font-size:18px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"500\">Pruebas espec\u00edficas de aplicaciones<\/div><div class=\"text-body-default      animate-in\" style=\"padding-top:5px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"600\">Evaluaci\u00f3n de portales web, APIs y servicios internos para identificar riesgos en el c\u00f3digo y configuraciones.<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4 text-left\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div id=\"1755198465482-4426432d-6ef2\" class=\"pix-feature-el  media  vc_custom_1755211126258\"><div class=\"mr-3 feature_img animate-in\" data-anim-type=\"fade-in-up\" data-anim-delay=\"400\" style=\"position:relative;text-align:center;\"><i style=\"display:inline-block;font-size:40px;min-width:40px;line-height:40px;\" class=\"text-red align-middle pixicon-like\"><\/i><\/div><div class=\"media-body text-left\"><div class=\"font-weight-bold  secondary-font text-heading-default animate-in\" style=\"font-size:18px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"500\">Evaluaci\u00f3n de configuraciones<\/div><div class=\"text-body-default      animate-in\" style=\"padding-top:5px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"600\">Revisi\u00f3n de hardening, parches, versiones y pol\u00edticas de seguridad en servidores y dispositivos de red.<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4 text-left\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div id=\"1755204013399-88c7130c-47bf\" class=\"pix-feature-el  media  vc_custom_1755211139790\"><div class=\"mr-3 feature_img animate-in\" data-anim-type=\"fade-in-up\" data-anim-delay=\"400\" style=\"position:relative;text-align:center;\"><i style=\"display:inline-block;font-size:40px;min-width:40px;line-height:40px;\" class=\"text-red align-middle pixicon-loop-3\"><\/i><\/div><div class=\"media-body text-left\"><div class=\"font-weight-bold  secondary-font text-heading-default animate-in\" style=\"font-size:18px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"500\">Reporte ejecutivo y t\u00e9cnico<\/div><div class=\"text-body-default      animate-in\" style=\"padding-top:5px;\" data-anim-type=\"fade-in-up\" data-anim-delay=\"600\">Documento dual con resumen de alto nivel para direcci\u00f3n y detalle t\u00e9cnico de IoC\/TTPs, evidencias y recomendaciones.<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_row_visible vc_custom_1755211578003\"><div class=\"wpb_column vc_column_container vc_col-sm-12 text-left\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"pix-content-box card      vc_custom_1755211537377    rounded-10 shadow-lg shadow-hover-lg fly-sm animate-in bg- w-100\"  data-anim-type=\"fade-in-up\" data-anim-delay=\"0\"><div class=\"\" style=\"z-index:30;position:relative;\"><div id=\"el1755198945787-01abfb0f-49b7\" class=\"mb-3 text-center  vc_custom_1755211592185\"><h3 class=\"mb-32 pix-sliding-headline-2 animate-in font-weight-bold secondary-font\" data-anim-type=\"pix-sliding-text\" pix-anim-delay=\"500\" data-class=\"secondary-font text-white\" style=\"\"><span class=\"slide-in-container\"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 0ms;\">Nuestra&#32;<\/span><\/span> <span class=\"slide-in-container\"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 150ms;\">metodolog\u00eda&#32;<\/span><\/span> <\/h3><\/div><div class=\"row pix-levels mb-3 mb-sm-0 mx-0\" style=\"border-bottom:0;\"><div class=\"col-xs-12 col-md-4 pix-levels-step d-flex flex-column complete px-0\">\n\t\t\t  <h6 class=\"pix-levels-title text-center font-weight-bold text-white pb-3 d-flex flex-column align-items-center justify-content-center\" style=\"\">Definici\u00f3n de alcance<\/h6>\n\t\t\t  <div class=\"position-relative w-100 text-center mb-3\">\n\t\t\t\t  <div class=\"progress bg-gray-2\" ><div class=\"progress-bar bg-red\" ><\/div><\/div>\n\t\t\t\t  <div class=\"pix-leveles-dot-div\"><span class=\"pix-levels-dot bg-red\" >\n\t\t\t\t\t\t\t\t\t\t  <span class=\"pix-levels-dot-inner bg-dark-opacity-3\"><\/span>\n\t\t\t\t\t\t\t\t\t  <\/span><\/div>\n\t\t\t  <\/div><p class=\"text-center pix-p-10 text-light-opacity-6\" >Acordamos conjuntos de IPs, subredes, aplicaciones y sistemas a evaluar.<\/p><\/div><div class=\"col-xs-12 col-md-4 pix-levels-step d-flex flex-column complete px-0\">\n\t\t\t  <h6 class=\"pix-levels-title text-center font-weight-bold text-white pb-3 d-flex flex-column align-items-center justify-content-center\" style=\"\">Escaneo automatizado<\/h6>\n\t\t\t  <div class=\"position-relative w-100 text-center mb-3\">\n\t\t\t\t  <div class=\"progress bg-gray-2\" ><div class=\"progress-bar bg-red\" ><\/div><\/div>\n\t\t\t\t  <div class=\"pix-leveles-dot-div\"><span class=\"pix-levels-dot bg-red\" >\n\t\t\t\t\t\t\t\t\t\t  <span class=\"pix-levels-dot-inner bg-dark-opacity-3\"><\/span>\n\t\t\t\t\t\t\t\t\t  <\/span><\/div>\n\t\t\t  <\/div><p class=\"text-center pix-p-10 text-light-opacity-6\" >Uso de herramientas l\u00edderes para detecci\u00f3n inicial de vulnerabilidades conocidas.<\/p><\/div><div class=\"col-xs-12 col-md-4 pix-levels-step d-flex flex-column complete px-0\">\n\t\t\t  <h6 class=\"pix-levels-title text-center font-weight-bold text-white pb-3 d-flex flex-column align-items-center justify-content-center\" style=\"\">Validaci\u00f3n manual<\/h6>\n\t\t\t  <div class=\"position-relative w-100 text-center mb-3\">\n\t\t\t\t  <div class=\"progress bg-gray-2\" ><div class=\"progress-bar bg-red\" ><\/div><\/div>\n\t\t\t\t  <div class=\"pix-leveles-dot-div\"><span class=\"pix-levels-dot bg-red\" >\n\t\t\t\t\t\t\t\t\t\t  <span class=\"pix-levels-dot-inner bg-dark-opacity-3\"><\/span>\n\t\t\t\t\t\t\t\t\t  <\/span><\/div>\n\t\t\t  <\/div><p class=\"text-center pix-p-10 text-light-opacity-6\" >Confirmaci\u00f3n y explotaci\u00f3n controlada de hallazgos cr\u00edticos para verificar su impacto real.<\/p><\/div><div class=\"w-100\"><\/div><div class=\"col-xs-12 col-md-4 pix-levels-step d-flex flex-column complete px-0\">\n\t\t\t  <h6 class=\"pix-levels-title text-center font-weight-bold text-white pb-3 d-flex flex-column align-items-center justify-content-center\" style=\"\">Clasificaci\u00f3n y priorizaci\u00f3n<\/h6>\n\t\t\t  <div class=\"position-relative w-100 text-center mb-3\">\n\t\t\t\t  <div class=\"progress bg-gray-2\" ><div class=\"progress-bar bg-red\" ><\/div><\/div>\n\t\t\t\t  <div class=\"pix-leveles-dot-div\"><span class=\"pix-levels-dot bg-red\" >\n\t\t\t\t\t\t\t\t\t\t  <span class=\"pix-levels-dot-inner bg-dark-opacity-3\"><\/span>\n\t\t\t\t\t\t\t\t\t  <\/span><\/div>\n\t\t\t  <\/div><p class=\"text-center pix-p-10 text-light-opacity-6\" >Matriz de riesgo basada en CVSS, impacto al negocio y facilidad de explotaci\u00f3n.<\/p><\/div><div class=\"col-xs-12 col-md-4 pix-levels-step d-flex flex-column active px-0\">\n\t\t\t  <h6 class=\"pix-levels-title text-center font-weight-bold text-white pb-3 d-flex flex-column align-items-center justify-content-center\" style=\"\">Entrega de reporte<\/h6>\n\t\t\t  <div class=\"position-relative w-100 text-center mb-3\">\n\t\t\t\t  <div class=\"progress bg-gray-2\" ><div class=\"progress-bar bg-red\" ><\/div><\/div>\n\t\t\t\t  <div class=\"pix-leveles-dot-div\"><span class=\"pix-levels-dot bg-red\" >\n\t\t\t\t\t\t\t\t\t\t  <span class=\"pix-levels-dot-inner bg-dark-opacity-3\"><\/span>\n\t\t\t\t\t\t\t\t\t  <\/span><\/div>\n\t\t\t  <\/div><p class=\"text-center pix-p-10 text-light-opacity-6\" >Sesi\u00f3n de presentaci\u00f3n con plan de remediaci\u00f3n por gravedad y cronograma sugerido.<\/p><\/div><div class=\"col-xs-12 col-md-4 pix-levels-step d-flex flex-column complete px-0\">\n\t\t\t  <h6 class=\"pix-levels-title text-center font-weight-bold text-white pb-3 d-flex flex-column align-items-center justify-content-center\" style=\"\">Retesting<\/h6>\n\t\t\t  <div class=\"position-relative w-100 text-center mb-3\">\n\t\t\t\t  <div class=\"progress bg-gray-2\" ><div class=\"progress-bar bg-gray-2\" ><\/div><\/div>\n\t\t\t\t  <div class=\"pix-leveles-dot-div\"><span class=\"pix-levels-dot bg-gray-2\" >\n\t\t\t\t\t\t\t\t\t\t  <span class=\"pix-levels-dot-inner bg-dark-opacity-3\"><\/span>\n\t\t\t\t\t\t\t\t\t  <\/span><\/div>\n\t\t\t  <\/div><p class=\"text-center pix-p-10 text-light-opacity-6\" >Verificaci\u00f3n de correcci\u00f3n tras la implementaci\u00f3n de parches y ajustes.<\/p><\/div><div class=\"w-100\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_row_visible\"><div class=\"wpb_column vc_column_container vc_col-sm-4 text-left\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4 text-left\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><a  href=\"https:\/\/overtek.mx\/en\/contacto\/\" class=\"btn mb-2    vc_custom_1755203595128  shadow-lg shadow-hover-lg text-white btn-red d-inline-block pix-hover-item     secondary-font btn-rounded animate-in btn-md\"   data-anim-type=\"fade-in-up\" data-anim-delay=\"600\" ><i class=\"font-weight-bold pixicon-user-circle-1  pix-hover-left  mr-1\"><\/i> <span class=\"font-weight-bold\" >Habla con un experto hoy<\/span><\/a><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4 text-left\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><\/section><div class=\"vc_row-full-width vc_clearfix\"><\/div><section data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_section vc_section_visible custom-responsive-33026244 vc_custom_1757104130275 vc_section-has-fill\" data-section-name=\"\"><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid vc_row_visible vc_column-gap-10 vc_row-o-equal-height vc_row-flex\"><div class=\"wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill text-center\"><div class=\"vc_column-inner  vc_custom_1757103789029\"><div class=\"wpb_wrapper\"><div class=\"pix-content-box card   sticky-top pix-sticky-top-adjust   vc_custom_1757103906172    rounded-10 bg- text-left  w-100\"   ><div class=\"scene scene-over\"><\/div><div class=\"\" style=\"z-index:30;position:relative;\"><div id=\"el1757103432923-bdf402ac-f10c\" class=\"pix-el-text   w-100   vc_custom_1757103919232\" ><p class=\"\"><h2 style=\"text-align: left;\"><b>Beneficios para tu <span style=\"color: #6f0c2f;\">organizaci\u00f3n<\/span><\/b><\/h2>\n<\/p><\/div><div id=\"el1755198410938-0978ab9b-5903\" class=\"pix-el-text   w-100\" ><p class=\"\"><p style=\"text-align: left;\"><span style=\"color: #041424;\"><b>Descubre y corrige tus puntos d\u00e9biles antes que los atacantes. <\/b><\/span><span style=\"font-weight: 400;\">Solicita tu An\u00e1lisis de Vulnerabilidades y fortalece hoy la seguridad de tu organizaci\u00f3n.<\/span><\/p>\n<\/p><\/div><div class=\"d-block w-100 text-left\"><a  href=\"https:\/\/overtek.mx\/en\/contacto\/\" class=\"btn mb-2     shadow-sm btn-red d-inline-block pix-hover-item      btn-rounded pix-btn-div btn-lg\"     ><i class=\"font-weight-bold pixicon-messages-2  pix-hover-left  mr-1\"><\/i> <span class=\"font-weight-bold\" >\u00a1Cont\u00e1ctanos hoy mismo!<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6 text-center\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"pix-content-box card pix-scale-in-sm     vc_custom_1757103833875    rounded-10 fly-sm bg- w-100\"   ><div class=\"\" style=\"z-index:30;position:relative;\"><div id=\"1634697380462-b2e6e275-13fb\" class=\"pix-feature-el  media  vc_custom_1757104277399\"><div class=\"rounded-circle mr-3 d-inline-block2 d-inline-flex align-items-center justify-content-center line-height-0 mw-100 bg-primary-light\"   style=\" width:72px;aspect-ratio:1\/1 !important;position:relative;text-align:center;\"><div class=\"text-red\" style=\"display:inline-block;width:40px;height:40px;font-size:40px;\"><svg width=\"100%\" height=\"100%\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\"> <defs><\/defs> <g stroke=\"none\" stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"> <path d=\"M9.26193932,16.6476484 C8.90425297,17.0684559 8.27315905,17.1196257 7.85235158,16.7619393 C7.43154411,16.404253 7.38037434,15.773159 7.73806068,15.3523516 L16.2380607,5.35235158 C16.6013618,4.92493855 17.2451015,4.87991302 17.6643638,5.25259068 L22.1643638,9.25259068 C22.5771466,9.6195087 22.6143273,10.2515811 22.2474093,10.6643638 C21.8804913,11.0771466 21.2484189,11.1143273 20.8356362,10.7474093 L17.0997854,7.42665306 L9.26193932,16.6476484 Z\" id=\"Path-94-Copy\" fill=\"#000000\" fill-rule=\"nonzero\" opacity=\"0.3\" transform=\"translate(14.999995, 11.000002) rotate(-180.000000) translate(-14.999995, -11.000002) \"><\/path> <path d=\"M4.26193932,17.6476484 C3.90425297,18.0684559 3.27315905,18.1196257 2.85235158,17.7619393 C2.43154411,17.404253 2.38037434,16.773159 2.73806068,16.3523516 L11.2380607,6.35235158 C11.6013618,5.92493855 12.2451015,5.87991302 12.6643638,6.25259068 L17.1643638,10.2525907 C17.5771466,10.6195087 17.6143273,11.2515811 17.2474093,11.6643638 C16.8804913,12.0771466 16.2484189,12.1143273 15.8356362,11.7474093 L12.0997854,8.42665306 L4.26193932,17.6476484 Z\" fill=\"#000000\" fill-rule=\"nonzero\" transform=\"translate(9.999995, 12.000002) rotate(-180.000000) translate(-9.999995, -12.000002) \"><\/path> <\/g> <\/svg><\/div><\/div><div class=\"media-body text-left\"><h6 class=\"font-weight-bold   text-heading-default\" style=\"padding-top:3px;\"  >Apoyo estrat\u00e9gico<\/h6><div class=\"text-body-default text-18\" style=\"padding-top:10px;\"  >Recomendaciones alineadas con tus objetivos de negocio.<\/div><\/div><\/div><\/div><\/div><div class=\"pix-content-box card pix-scale-in-sm     vc_custom_1757104441742    rounded-10 fly-sm bg- w-100\"   ><div class=\"\" style=\"z-index:30;position:relative;\"><div id=\"1757104191591-685d7a80-9427\" class=\"pix-feature-el  media  vc_custom_1757104486426\"><div class=\"rounded-circle mr-3 d-inline-block2 d-inline-flex align-items-center justify-content-center line-height-0 mw-100 bg-primary-light\"   style=\" width:72px;aspect-ratio:1\/1 !important;position:relative;text-align:center;\"><div class=\"text-red\" style=\"display:inline-block;width:40px;height:40px;font-size:40px;\"><svg width=\"100%\" height=\"100%\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\"> <defs><\/defs> <g stroke=\"none\" stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"> <circle fill=\"#000000\" opacity=\"0.3\" cx=\"12\" cy=\"12\" r=\"10\"><\/circle> <rect id=\"Rectangle-9\" fill=\"#000000\" x=\"11\" y=\"7\" width=\"2\" height=\"8\" rx=\"1\"><\/rect> <rect id=\"Rectangle-9-Copy\" fill=\"#000000\" x=\"11\" y=\"16\" width=\"2\" height=\"2\" rx=\"1\"><\/rect> <\/g> <\/svg><\/div><\/div><div class=\"media-body text-left\"><h6 class=\"font-weight-bold   text-heading-default\" style=\"padding-top:3px;\"  >Visi\u00f3n clara de riesgos<\/h6><div class=\"text-body-default text-18\" style=\"padding-top:10px;\"  >Evita sorpresas con hallazgos que ya conoces.<\/div><\/div><\/div><\/div><\/div><div class=\"pix-content-box card pix-scale-in-sm     vc_custom_1757104378935    rounded-10 fly-sm bg- w-100\"   ><div class=\"\" style=\"z-index:30;position:relative;\"><div id=\"1757104220018-69256fb1-a2f8\" class=\"pix-feature-el  media  vc_custom_1757104547674\"><div class=\"rounded-circle mr-3 d-inline-block2 d-inline-flex align-items-center justify-content-center line-height-0 mw-100 bg-primary-light\"   style=\" width:72px;aspect-ratio:1\/1 !important;position:relative;text-align:center;\"><div class=\"text-red\" style=\"display:inline-block;width:40px;height:40px;font-size:40px;\"><svg width=\"100%\" height=\"100%\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\"> <defs><\/defs> <g stroke=\"none\" stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"> <path d=\"M16.3740377,19.9389434 L22.2226499,11.1660251 C22.4524142,10.8213786 22.3592838,10.3557266 22.0146373,10.1259623 C21.8914367,10.0438285 21.7466809,10 21.5986122,10 L17,10 L17,4.47708173 C17,4.06286817 16.6642136,3.72708173 16.25,3.72708173 C15.9992351,3.72708173 15.7650616,3.85240758 15.6259623,4.06105658 L9.7773501,12.8339749 C9.54758575,13.1786214 9.64071616,13.6442734 9.98536267,13.8740377 C10.1085633,13.9561715 10.2533191,14 10.4013878,14 L15,14 L15,19.5229183 C15,19.9371318 15.3357864,20.2729183 15.75,20.2729183 C16.0007649,20.2729183 16.2349384,20.1475924 16.3740377,19.9389434 Z\" fill=\"#000000\"><\/path> <path d=\"M4.5,5 L9.5,5 C10.3284271,5 11,5.67157288 11,6.5 C11,7.32842712 10.3284271,8 9.5,8 L4.5,8 C3.67157288,8 3,7.32842712 3,6.5 C3,5.67157288 3.67157288,5 4.5,5 Z M4.5,17 L9.5,17 C10.3284271,17 11,17.6715729 11,18.5 C11,19.3284271 10.3284271,20 9.5,20 L4.5,20 C3.67157288,20 3,19.3284271 3,18.5 C3,17.6715729 3.67157288,17 4.5,17 Z M2.5,11 L6.5,11 C7.32842712,11 8,11.6715729 8,12.5 C8,13.3284271 7.32842712,14 6.5,14 L2.5,14 C1.67157288,14 1,13.3284271 1,12.5 C1,11.6715729 1.67157288,11 2.5,11 Z\" fill=\"#000000\" opacity=\"0.3\"><\/path> <\/g> <\/svg><\/div><\/div><div class=\"media-body text-left\"><h6 class=\"font-weight-bold   text-heading-default\" style=\"padding-top:3px;\"  >Priorizaci\u00f3n efectiva<\/h6><div class=\"text-body-default text-18\" style=\"padding-top:10px;\"  >Enfoca recursos en las vulnerabilidades m\u00e1s cr\u00edticas.<\/div><\/div><\/div><\/div><\/div><div class=\"pix-content-box card pix-scale-in-sm     vc_custom_1757104393303    rounded-10 fly-sm bg- w-100\"   ><div class=\"\" style=\"z-index:30;position:relative;\"><div id=\"1757104239764-14dfbfd9-e957\" class=\"pix-feature-el  media  vc_custom_1757104537320\"><div class=\"rounded-circle mr-3 d-inline-block2 d-inline-flex align-items-center justify-content-center line-height-0 mw-100 bg-primary-light\"   style=\" width:72px;aspect-ratio:1\/1 !important;position:relative;text-align:center;\"><div class=\"text-red\" style=\"display:inline-block;width:40px;height:40px;font-size:40px;\"><svg width=\"100%\" height=\"100%\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\"> <defs><\/defs> <g stroke=\"none\" stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"> <path d=\"M4,4 L11.6314229,2.5691082 C11.8750185,2.52343403 12.1249815,2.52343403 12.3685771,2.5691082 L20,4 L20,13.2830094 C20,16.2173861 18.4883464,18.9447835 16,20.5 L12.5299989,22.6687507 C12.2057287,22.8714196 11.7942713,22.8714196 11.4700011,22.6687507 L8,20.5 C5.51165358,18.9447835 4,16.2173861 4,13.2830094 L4,4 Z\" fill=\"#000000\" opacity=\"0.3\"><\/path> <path d=\"M11.1750002,14.75 C10.9354169,14.75 10.6958335,14.6541667 10.5041669,14.4625 L8.58750019,12.5458333 C8.20416686,12.1625 8.20416686,11.5875 8.58750019,11.2041667 C8.97083352,10.8208333 9.59375019,10.8208333 9.92916686,11.2041667 L11.1750002,12.45 L14.3375002,9.2875 C14.7208335,8.90416667 15.2958335,8.90416667 15.6791669,9.2875 C16.0625002,9.67083333 16.0625002,10.2458333 15.6791669,10.6291667 L11.8458335,14.4625 C11.6541669,14.6541667 11.4145835,14.75 11.1750002,14.75 Z\" fill=\"#000000\"><\/path> <\/g> <\/svg><\/div><\/div><div class=\"media-body text-left\"><h6 class=\"font-weight-bold   text-heading-default\" style=\"padding-top:3px;\"  >Cumplimiento<\/h6><div class=\"text-body-default text-18\" style=\"padding-top:10px;\"  >Soporte para est\u00e1ndares y auditor\u00edas (PCI-DSS, ISO 27001, etc.).<\/div><\/div><\/div><\/div><\/div><div class=\"pix-content-box card pix-scale-in-sm     vc_custom_1757104408969    rounded-10 fly-sm bg- w-100\"   ><div class=\"\" style=\"z-index:30;position:relative;\"><div id=\"1757104259118-4db41744-c01d\" class=\"pix-feature-el  media  vc_custom_1757104576606\"><div class=\"rounded-circle mr-3 d-inline-block2 d-inline-flex align-items-center justify-content-center line-height-0 mw-100 bg-primary-light\"   style=\" width:72px;aspect-ratio:1\/1 !important;position:relative;text-align:center;\"><div class=\"text-red\" style=\"display:inline-block;width:40px;height:40px;font-size:40px;\"><svg width=\"100%\" height=\"100%\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\"> <defs><\/defs> <g stroke=\"none\" stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"> <path d=\"M5,19 L20,19 C20.5522847,19 21,19.4477153 21,20 C21,20.5522847 20.5522847,21 20,21 L4,21 C3.44771525,21 3,20.5522847 3,20 L3,4 C3,3.44771525 3.44771525,3 4,3 C4.55228475,3 5,3.44771525 5,4 L5,19 Z\" id=\"Path-95\" fill=\"#000000\" fill-rule=\"nonzero\"><\/path> <path d=\"M8.7295372,14.6839411 C8.35180695,15.0868534 7.71897114,15.1072675 7.31605887,14.7295372 C6.9131466,14.3518069 6.89273254,13.7189711 7.2704628,13.3160589 L11.0204628,9.31605887 C11.3857725,8.92639521 11.9928179,8.89260288 12.3991193,9.23931335 L15.358855,11.7649545 L19.2151172,6.88035571 C19.5573373,6.44687693 20.1861655,6.37289714 20.6196443,6.71511723 C21.0531231,7.05733733 21.1271029,7.68616551 20.7848828,8.11964429 L16.2848828,13.8196443 C15.9333973,14.2648593 15.2823707,14.3288915 14.8508807,13.9606866 L11.8268294,11.3801628 L8.7295372,14.6839411 Z\" id=\"Path-97\" fill=\"#000000\" fill-rule=\"nonzero\" opacity=\"0.3\"><\/path> <\/g> <\/svg><\/div><\/div><div class=\"media-body text-left\"><h6 class=\"font-weight-bold   text-heading-default\" style=\"padding-top:3px;\"  >Mejora continua<\/h6><div class=\"text-body-default text-18\" style=\"padding-top:10px;\"  >Replanteamiento de controles tras cada ciclo de evaluaci\u00f3n.<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/section><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/section>","protected":false},"excerpt":{"rendered":"An\u00e1lisis&#32; de&#32; vulnerabilidades&#32; An\u00e1lisis de vulnerabilidades En Overtek identificamos y priorizamos las debilidades de tu infraestructura antes de que los adversarios puedan explotarlas. Nuestro servicio de An\u00e1lisis de Vulnerabilidades combina t\u00e9cnicas automatizadas y revisi\u00f3n manual para ofrecerte un diagn\u00f3stico completo...","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-33792","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/overtek.mx\/en\/wp-json\/wp\/v2\/pages\/33792","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/overtek.mx\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/overtek.mx\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/overtek.mx\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/overtek.mx\/en\/wp-json\/wp\/v2\/comments?post=33792"}],"version-history":[{"count":22,"href":"https:\/\/overtek.mx\/en\/wp-json\/wp\/v2\/pages\/33792\/revisions"}],"predecessor-version":[{"id":33889,"href":"https:\/\/overtek.mx\/en\/wp-json\/wp\/v2\/pages\/33792\/revisions\/33889"}],"wp:attachment":[{"href":"https:\/\/overtek.mx\/en\/wp-json\/wp\/v2\/media?parent=33792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}