{"id":35,"date":"2019-01-23T21:46:57","date_gmt":"2019-01-23T21:46:57","guid":{"rendered":"http:\/\/kravmagahacking.com\/?page_id=14"},"modified":"2020-10-06T16:45:01","modified_gmt":"2020-10-06T19:45:01","slug":"services","status":"publish","type":"page","link":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/services\/","title":{"rendered":"Services"},"content":{"rendered":"\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container\">\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div class=\"wp-block-cover has-background-gradient aligncenter\" style=\"min-height:252px\"><video class=\"wp-block-cover__video-background\" autoplay muted loop playsinline src=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/03\/World-1992.mp4\"><\/video><div class=\"wp-block-cover__inner-container\">\n<h1>Servicios de <span class=\"has-inline-color has-vivid-red-color\">Ciberseguridad<\/span><\/h1>\n\n\n\n<p>Listos para brindar apoyo a su organizaci\u00f3n<\/p>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"has-text-align-center has-vivid-red-color has-text-color\">Productos &amp; Soluciones<\/h3>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container\">\n<p class=\"has-text-align-center\">Seleccionamos estrat\u00e9gicamente cada uno de los productos que ofrecemos. Buscamos excelencia y experiencia en cada materia.<\/p>\n<\/div><\/div>\n\n\n\n<pre class=\"wp-block-preformatted\">\n\t<div class=\"gs_logo_area gs_logo_area_69de5069a4ac4 slider1\" style=\"opacity: 0; visibility: hidden;\">\n\t\t<div class=\"gs_logo_area--inner\">\n\n\t\t\t\n<div class=\"gs_logo_container gs_carousel_swiper gs_logo_fix_height_and_center\" data-carousel-config='{\"direction\":\"horizontal\",\"speed\":500,\"isAutoplay\":true,\"autoplayDelay\":2000,\"loop\":true,\"pauseOnHover\":true,\"ticker\":false,\"navs\":true,\"navs_pos\":\"bottom\",\"dots\":false,\"dynamic_dots\":true,\"slideSpace\":10,\"slidesPerGroup\":1,\"desktopLogos\":5,\"tabletLogos\":3,\"mobileLogos\":2,\"reverseDirection\":false}'>\n\n\t\n\t\t\n\t\t\t<div class=\"gs_logo_single--wrapper\">\n\t\t\t\t<div class=\"gs_logo_single\">\n\n\t\t\t\t\t<!-- Logo Title -->\n\t\t\t\t\t<a href=\"https:\/\/www.appgate.com\/\" target=\"_blank\" rel=\"noopener\"><img width=\"300\" height=\"150\" src=\"https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/appgate-e1591296980446.png?fit=300%2C150&amp;ssl=1\" class=\"gs-logo--img wp-post-image\" alt=\"\" loading=\"lazy\" title=\"AppGate\" \/><\/a>\n\t\t\t\t\t<!-- Logo Title -->\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\n\t\t\t<div class=\"gs_logo_single--wrapper\">\n\t\t\t\t<div class=\"gs_logo_single\">\n\n\t\t\t\t\t<!-- Logo Title -->\n\t\t\t\t\t<a href=\"https:\/\/www.coresecurity.com\/\" target=\"_blank\" rel=\"noopener\"><img width=\"150\" height=\"94\" src=\"https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/CoreLogo-e1591296822696.png?fit=150%2C94&amp;ssl=1\" class=\"gs-logo--img wp-post-image\" alt=\"CORE Securty\" loading=\"lazy\" title=\"Core\" \/><\/a>\n\t\t\t\t\t<!-- Logo Title -->\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\n\t\t\t<div class=\"gs_logo_single--wrapper\">\n\t\t\t\t<div class=\"gs_logo_single\">\n\n\t\t\t\t\t<!-- Logo Title -->\n\t\t\t\t\t<a href=\"https:\/\/www.mobiledit.com\/\" target=\"_blank\" rel=\"noopener\"><img width=\"300\" height=\"200\" src=\"https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/MOBILedit-Compelson-e1591296862497.png?fit=300%2C200&amp;ssl=1\" class=\"gs-logo--img wp-post-image\" alt=\"MOBILedit-Compelson\" loading=\"lazy\" title=\"Compelson\" \/><\/a>\n\t\t\t\t\t<!-- Logo Title -->\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\n\t\t\t<div class=\"gs_logo_single--wrapper\">\n\t\t\t\t<div class=\"gs_logo_single\">\n\n\t\t\t\t\t<!-- Logo Title -->\n\t\t\t\t\t<a href=\"https:\/\/www.securonix.com\/\" target=\"_blank\" rel=\"noopener\"><img width=\"300\" height=\"143\" src=\"https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/Securonix-e1591233159594.png?fit=300%2C143&amp;ssl=1\" class=\"gs-logo--img wp-post-image\" alt=\"Securonix\" loading=\"lazy\" title=\"Securonix\" \/><\/a>\n\t\t\t\t\t<!-- Logo Title -->\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\n\t\t\t<div class=\"gs_logo_single--wrapper\">\n\t\t\t\t<div class=\"gs_logo_single\">\n\n\t\t\t\t\t<!-- Logo Title -->\n\t\t\t\t\t<a href=\"https:\/\/www.tenable.com\/\" target=\"_blank\" rel=\"noopener\"><img width=\"300\" height=\"67\" src=\"https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/Tenable-e1591233110367.png?fit=300%2C67&amp;ssl=1\" class=\"gs-logo--img wp-post-image\" alt=\"Tenable\" loading=\"lazy\" title=\"Tenable\" \/><\/a>\n\t\t\t\t\t<!-- Logo Title -->\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\n\t\t\t<div class=\"gs_logo_single--wrapper\">\n\t\t\t\t<div class=\"gs_logo_single\">\n\n\t\t\t\t\t<!-- Logo Title -->\n\t\t\t\t\t<a href=\"https:\/\/www.checkmarx.com\/\" target=\"_blank\" rel=\"noopener\"><img width=\"300\" height=\"49\" src=\"https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/Checkmarx-e1591233068265.png?fit=300%2C49&amp;ssl=1\" class=\"gs-logo--img wp-post-image\" alt=\"Checkmarx\" loading=\"lazy\" title=\"Checkmarx\" \/><\/a>\n\t\t\t\t\t<!-- Logo Title -->\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t\t\n\t\n<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t<\/pre>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n<\/div><\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-image-fill\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/cafe-1209769_1280-1024x683.jpg);background-position:50% 50%\"><img loading=\"lazy\" width=\"900\" height=\"600\" src=\"https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/cafe-1209769_1280-1024x683.jpg?resize=900%2C600\" alt=\"\" class=\"wp-image-797\" srcset=\"https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/cafe-1209769_1280.jpg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/cafe-1209769_1280.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/cafe-1209769_1280.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/cafe-1209769_1280.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 900px) 100vw, 900px\" data-recalc-dims=\"1\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h4 class=\"has-vivid-red-color has-text-color\"><strong><a href=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/services\">Nuestros Servicios en materia de Ciberseguridad<\/a><\/strong><\/h4>\n\n\n\n<p>Siempre que necesite asesoramiento o fuerza de trabajo, puede contar con nuestros consultores certificados en una amplia gama de temas de seguridad cibern\u00e9tica que van desde cuestiones estrat\u00e9gicas para analizar riesgos junto con la alta direcci\u00f3n de la organizaci\u00f3n hasta servicios especializados y altamente t\u00e9cnicos de pirater\u00eda y an\u00e1lisis \u00e9tico o forense digital. Todo nuestro equipo a su disposici\u00f3n, siempre.<\/p>\n\n\n\n<p class=\"has-vivid-red-color has-text-color\"><a href=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/application-security\">Application Security<\/a> | <a href=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/incident-response\">Incident Response<\/a> | <a href=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/soc-csirt\">SOC &amp; CSIRT<\/a> | <a href=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/cyber-resilience-strategy\">Cyber Resilience Strategy<\/a> | <a href=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/compliance\">Compliance<\/a><\/p>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-image-fill\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/technical-2355871_1280-1024x682.jpg);background-position:50% 50%\"><img loading=\"lazy\" width=\"900\" height=\"599\" src=\"https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/technical-2355871_1280-1024x682.jpg?resize=900%2C599\" alt=\"\" class=\"wp-image-799\" srcset=\"https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/technical-2355871_1280.jpg?resize=1024%2C682&amp;ssl=1 1024w, https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/technical-2355871_1280.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/technical-2355871_1280.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/technical-2355871_1280.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 900px) 100vw, 900px\" data-recalc-dims=\"1\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h5 class=\"has-vivid-red-color has-text-color\"><a href=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/products\"><strong>Products<\/strong><\/a><\/h5>\n\n\n\n<p>A lo largo de los a\u00f1os hemos encontrado excelentes soluciones de mercado. Seleccionado las mejores soluciones internacionales de ciberseguridad para ser socios y ofrecer servicios de implementaci\u00f3n, administraci\u00f3n, asesoramiento y soporte. <br>Implemente Application Security en DevOps CI CD Pipelines con Checkmarx y NeuraLegion, identifique y administre vulnerabilidades con Tenable, mejore las capacidades de an\u00e1lisis forense digital de tel\u00e9fonos m\u00f3viles con Mobiledit para mejorar las capacidades de hacking y detecci\u00f3n de intrusos en la red con soluciones de Core Security, entre varias soluciones de primer nivel.<\/p>\n\n\n\n<p class=\"has-vivid-red-color has-text-color\"><a href=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/checkmarx\">Checkmarx<\/a> | <a href=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/neuralegion\">NeuraLegion<\/a> | <a href=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/checkmarx\">Tenable<\/a> | <a href=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/irius-risk\">Irius Risk<\/a> | <a href=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/ibm\">IBM<\/a> | <a href=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/core-security\">Core Security<\/a> | <a href=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/thycotic\">Thycotic<\/a> | <a href=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/code-scan\">Code Scan<\/a> | <a href=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/ihacklabs\">iHackLabs<\/a> | <a href=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/ridgesecurity\">Ridge Security<\/a> | <a href=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/compelson\">Compelson<\/a> <\/p>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-image-fill\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/hacker-1569744_1280-1024x681.jpg);background-position:50% 50%\"><img loading=\"lazy\" width=\"900\" height=\"599\" src=\"https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/hacker-1569744_1280-1024x681.jpg?resize=900%2C599\" alt=\"\" class=\"wp-image-800\" srcset=\"https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/hacker-1569744_1280.jpg?resize=1024%2C681&amp;ssl=1 1024w, https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/hacker-1569744_1280.jpg?resize=300%2C199&amp;ssl=1 300w, https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/hacker-1569744_1280.jpg?resize=768%2C511&amp;ssl=1 768w, https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/hacker-1569744_1280.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 900px) 100vw, 900px\" data-recalc-dims=\"1\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h5 class=\"has-vivid-red-color has-text-color\"><a href=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\"><strong>Training<\/strong><\/a><\/h5>\n\n\n\n<p>Mejore las capacidades de su personal a trav\u00e9s de capacitaciones t\u00e9cnicas que van desde lo b\u00e1sico de Linux, Networking, y Python hasta   ethical hacking avanzado, OWASP Top Ten, network hacking, an\u00e1lisis forense digital  y Malware Analysis training.  Entrenamientos in situ, remotos y CBT (Computer Based Training).<\/p>\n\n\n\n<p class=\"has-vivid-red-color has-text-color\"><a href=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\/\">Basic Trainings<\/a> | <a href=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\/\">Advanced Trainings<\/a> | <a href=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\/\">Offensive Trainings<\/a> | <a href=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\/\">Defensive Trainings<\/a><\/p>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Productos &amp; Soluciones Seleccionamos estrat\u00e9gicamente cada uno de los productos que ofrecemos. Buscamos excelencia y experiencia en cada materia. Nuestros Servicios en materia de Ciberseguridad Siempre que necesite asesoramiento o fuerza de trabajo, puede contar con nuestros consultores certificados en una amplia gama de temas de seguridad cibern\u00e9tica que van desde cuestiones estrat\u00e9gicas para analizar [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"spay_email":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Services - KINAITECH | Ciberseguridad<\/title>\n<meta name=\"description\" content=\"KINAITECH was created with the objective of delivering the best professional cybersecurity services and we continuously work to ensure that our deliverables are unique and with much added value to our clients. Our vision is to be the strategic partner of companies that supply or integrate products and services in order to provide the best professional services to their clients.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/services\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Services - KINAITECH | Ciberseguridad\" \/>\n<meta property=\"og:description\" content=\"KINAITECH was created with the objective of delivering the best professional cybersecurity services and we continuously work to ensure that our deliverables are unique and with much added value to our clients. Our vision is to be the strategic partner of companies that supply or integrate products and services in order to provide the best professional services to their clients.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/services\/\" \/>\n<meta property=\"og:site_name\" content=\"KINAITECH | Ciberseguridad\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-06T19:45:01+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/cafe-1209769_1280-1024x683.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/#website\",\"url\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/\",\"name\":\"KINAITECH | Ciberseguridad\",\"description\":\"Ethical Hacking, Application Security and Trainings through a partner networks across Latin America and Caribbean\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/services\/#primaryimage\",\"inLanguage\":\"es\",\"url\":\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/cafe-1209769_1280-1024x683.jpg\",\"contentUrl\":\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/cafe-1209769_1280-1024x683.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/services\/#webpage\",\"url\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/services\/\",\"name\":\"Services - KINAITECH | Ciberseguridad\",\"isPartOf\":{\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/services\/#primaryimage\"},\"datePublished\":\"2019-01-23T21:46:57+00:00\",\"dateModified\":\"2020-10-06T19:45:01+00:00\",\"description\":\"KINAITECH was created with the objective of delivering the best professional cybersecurity services and we continuously work to ensure that our deliverables are unique and with much added value to our clients. Our vision is to be the strategic partner of companies that supply or integrate products and services in order to provide the best professional services to their clients.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/services\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/services\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Services - KINAITECH | Ciberseguridad","description":"KINAITECH was created with the objective of delivering the best professional cybersecurity services and we continuously work to ensure that our deliverables are unique and with much added value to our clients. Our vision is to be the strategic partner of companies that supply or integrate products and services in order to provide the best professional services to their clients.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/services\/","og_locale":"es_ES","og_type":"article","og_title":"Services - KINAITECH | Ciberseguridad","og_description":"KINAITECH was created with the objective of delivering the best professional cybersecurity services and we continuously work to ensure that our deliverables are unique and with much added value to our clients. Our vision is to be the strategic partner of companies that supply or integrate products and services in order to provide the best professional services to their clients.","og_url":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/services\/","og_site_name":"KINAITECH | Ciberseguridad","article_modified_time":"2020-10-06T19:45:01+00:00","og_image":[{"url":"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/cafe-1209769_1280-1024x683.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/#website","url":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/","name":"KINAITECH | Ciberseguridad","description":"Ethical Hacking, Application Security and Trainings through a partner networks across Latin America and Caribbean","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"ImageObject","@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/services\/#primaryimage","inLanguage":"es","url":"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/cafe-1209769_1280-1024x683.jpg","contentUrl":"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/cafe-1209769_1280-1024x683.jpg"},{"@type":"WebPage","@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/services\/#webpage","url":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/services\/","name":"Services - KINAITECH | Ciberseguridad","isPartOf":{"@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/services\/#primaryimage"},"datePublished":"2019-01-23T21:46:57+00:00","dateModified":"2020-10-06T19:45:01+00:00","description":"KINAITECH was created with the objective of delivering the best professional cybersecurity services and we continuously work to ensure that our deliverables are unique and with much added value to our clients. Our vision is to be the strategic partner of companies that supply or integrate products and services in order to provide the best professional services to their clients.","breadcrumb":{"@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/services\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.kinaitech.com.ar\/ciberseguridad\/services\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/"},{"@type":"ListItem","position":2,"name":"Services"}]}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Mateo Martinez","author_link":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/author\/admin\/"},"uagb_comment_info":0,"uagb_excerpt":"Productos &amp; Soluciones Seleccionamos estrat\u00e9gicamente cada uno de los productos que ofrecemos. Buscamos excelencia y experiencia en cada materia. Nuestros Servicios en materia de Ciberseguridad Siempre que necesite asesoramiento o fuerza de trabajo, puede contar con nuestros consultores certificados en una amplia gama de temas de seguridad cibern\u00e9tica que van desde cuestiones estrat\u00e9gicas para analizar&hellip;","_links":{"self":[{"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/pages\/35"}],"collection":[{"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/comments?post=35"}],"version-history":[{"count":85,"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/pages\/35\/revisions"}],"predecessor-version":[{"id":993,"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/pages\/35\/revisions\/993"}],"wp:attachment":[{"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/media?parent=35"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}