{"id":11,"date":"2019-02-19T23:32:03","date_gmt":"2019-02-19T23:32:03","guid":{"rendered":"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/?page_id=11"},"modified":"2020-10-06T12:32:44","modified_gmt":"2020-10-06T15:32:44","slug":"products","status":"publish","type":"page","link":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/products\/","title":{"rendered":"Products"},"content":{"rendered":"\n<h4>A lo largo de los a\u00f1os hemos encontrado excelentes soluciones de mercado. Seleccionado las mejores soluciones internacionales de ciberseguridad para ser socios y ofrecer servicios de implementaci\u00f3n, administraci\u00f3n, asesoramiento y soporte.<\/h4>\n\n\n\n<p><br>Implemente Application Security en DevOps CI CD Pipelines con Checkmarx y NeuraLegion, identifique y administre vulnerabilidades con Tenable, mejore las capacidades de an\u00e1lisis forense digital de tel\u00e9fonos m\u00f3viles con Mobiledit para mejorar las capacidades de hacking y detecci\u00f3n de intrusos en la red con soluciones de Core Security, entre varias soluciones de primer nivel.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" src=\"https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/03\/Products-1.png?resize=900%2C316\" alt=\"\" class=\"wp-image-463\" width=\"900\" height=\"316\" srcset=\"https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/03\/Products-1.png?w=1362&amp;ssl=1 1362w, https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/03\/Products-1.png?resize=300%2C106&amp;ssl=1 300w, https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/03\/Products-1.png?resize=1024%2C360&amp;ssl=1 1024w, https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/03\/Products-1.png?resize=768%2C270&amp;ssl=1 768w\" sizes=\"(max-width: 900px) 100vw, 900px\" data-recalc-dims=\"1\" \/><\/figure><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container\"><\/div><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A lo largo de los a\u00f1os hemos encontrado excelentes soluciones de mercado. Seleccionado las mejores soluciones internacionales de ciberseguridad para ser socios y ofrecer servicios de implementaci\u00f3n, administraci\u00f3n, asesoramiento y soporte. Implemente Application Security en DevOps CI CD Pipelines con Checkmarx y NeuraLegion, identifique y administre vulnerabilidades con Tenable, mejore las capacidades de an\u00e1lisis forense [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"spay_email":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Products - KINAITECH | Ciberseguridad<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/products\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Products - KINAITECH | Ciberseguridad\" \/>\n<meta property=\"og:description\" content=\"A lo largo de los a\u00f1os hemos encontrado excelentes soluciones de mercado. Seleccionado las mejores soluciones internacionales de ciberseguridad para ser socios y ofrecer servicios de implementaci\u00f3n, administraci\u00f3n, asesoramiento y soporte. Implemente Application Security en DevOps CI CD Pipelines con Checkmarx y NeuraLegion, identifique y administre vulnerabilidades con Tenable, mejore las capacidades de an\u00e1lisis forense [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/products\/\" \/>\n<meta property=\"og:site_name\" content=\"KINAITECH | Ciberseguridad\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-06T15:32:44+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/03\/Products-1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/#website\",\"url\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/\",\"name\":\"KINAITECH | Ciberseguridad\",\"description\":\"Ethical Hacking, Application Security and Trainings through a partner networks across Latin America and Caribbean\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/products\/#primaryimage\",\"inLanguage\":\"es\",\"url\":\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/03\/Products-1.png\",\"contentUrl\":\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/03\/Products-1.png\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/products\/#webpage\",\"url\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/products\/\",\"name\":\"Products - KINAITECH | Ciberseguridad\",\"isPartOf\":{\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/products\/#primaryimage\"},\"datePublished\":\"2019-02-19T23:32:03+00:00\",\"dateModified\":\"2020-10-06T15:32:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/products\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/products\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/products\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Products\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Products - KINAITECH | Ciberseguridad","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/products\/","og_locale":"es_ES","og_type":"article","og_title":"Products - KINAITECH | Ciberseguridad","og_description":"A lo largo de los a\u00f1os hemos encontrado excelentes soluciones de mercado. Seleccionado las mejores soluciones internacionales de ciberseguridad para ser socios y ofrecer servicios de implementaci\u00f3n, administraci\u00f3n, asesoramiento y soporte. Implemente Application Security en DevOps CI CD Pipelines con Checkmarx y NeuraLegion, identifique y administre vulnerabilidades con Tenable, mejore las capacidades de an\u00e1lisis forense [&hellip;]","og_url":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/products\/","og_site_name":"KINAITECH | Ciberseguridad","article_modified_time":"2020-10-06T15:32:44+00:00","og_image":[{"url":"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/03\/Products-1.png"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/#website","url":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/","name":"KINAITECH | Ciberseguridad","description":"Ethical Hacking, Application Security and Trainings through a partner networks across Latin America and Caribbean","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"ImageObject","@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/products\/#primaryimage","inLanguage":"es","url":"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/03\/Products-1.png","contentUrl":"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/03\/Products-1.png"},{"@type":"WebPage","@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/products\/#webpage","url":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/products\/","name":"Products - KINAITECH | Ciberseguridad","isPartOf":{"@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/products\/#primaryimage"},"datePublished":"2019-02-19T23:32:03+00:00","dateModified":"2020-10-06T15:32:44+00:00","breadcrumb":{"@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/products\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.kinaitech.com.ar\/ciberseguridad\/products\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/products\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/"},{"@type":"ListItem","position":2,"name":"Products"}]}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Mateo Martinez","author_link":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/author\/admin\/"},"uagb_comment_info":0,"uagb_excerpt":"A lo largo de los a\u00f1os hemos encontrado excelentes soluciones de mercado. Seleccionado las mejores soluciones internacionales de ciberseguridad para ser socios y ofrecer servicios de implementaci\u00f3n, administraci\u00f3n, asesoramiento y soporte. Implemente Application Security en DevOps CI CD Pipelines con Checkmarx y NeuraLegion, identifique y administre vulnerabilidades con Tenable, mejore las capacidades de an\u00e1lisis forense&hellip;","_links":{"self":[{"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/pages\/11"}],"collection":[{"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/comments?post=11"}],"version-history":[{"count":33,"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/pages\/11\/revisions"}],"predecessor-version":[{"id":987,"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/pages\/11\/revisions\/987"}],"wp:attachment":[{"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/media?parent=11"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}