{"id":5632,"date":"2023-09-15T12:15:07","date_gmt":"2023-09-15T10:15:07","guid":{"rendered":"https:\/\/mascalagrimas.es\/dev-enthec_old\/solutions\/"},"modified":"2024-07-02T10:24:43","modified_gmt":"2024-07-02T08:24:43","slug":"solutions","status":"publish","type":"page","link":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/solutions\/","title":{"rendered":"Solutions"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Soluciones section Title&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/soluciones-bg.jpg&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; background_enable_image=&#8221;off&#8221; background_enable_video_mp4=&#8221;off&#8221; width=&#8221;90%&#8221; max_width=&#8221;2384px&#8221; height=&#8221;90%&#8221; max_height=&#8221;1836px&#8221; custom_padding=&#8221;0%||4%||false|false&#8221; border_radii=&#8221;on|9px|9px|9px|9px&#8221; border_style_all=&#8221;groove&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#f2273b&#8221; header_2_font_size=&#8221;4.06rem&#8221; header_3_text_color=&#8221;#FFFFFF&#8221; header_3_font_size=&#8221;40px&#8221; header_3_line_height=&#8221;45px&#8221; custom_margin=&#8221;||||false|false&#8221; header_2_font_size_tablet=&#8221;3.13rem&#8221; header_2_font_size_phone=&#8221;2rem&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Solutions<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;||||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;2.81rem&#8221; header_3_text_color=&#8221;#FFFFFF&#8221; header_3_font_size=&#8221;45px&#8221; header_3_line_height=&#8221;45px&#8221; text_orientation=&#8221;center&#8221; width=&#8221;39%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; header_2_font_size_tablet=&#8221;2.19rem&#8221; header_2_font_size_phone=&#8221;1.56rem&#8221; header_2_font_size_last_edited=&#8221;on|tablet&#8221; header_3_font_size_tablet=&#8221;45px&#8221; header_3_font_size_phone=&#8221;45px&#8221; header_3_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Extended Threat Intelligence<\/h2>\n<p>[\/et_pb_text][et_pb_code _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"line-white\"><!-- [et_pb_line_break_holder] --><\/div>\n<p>[\/et_pb_code][et_pb_text _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.6em&#8221; header_3_font=&#8221;|300|||||||&#8221; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#FFFFFF&#8221; header_3_font_size=&#8221;2.19rem&#8221; header_3_font_size_tablet=&#8221;1.56rem&#8221; header_3_font_size_phone=&#8221;1.25rem&#8221; header_3_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>An army of XTI Watchbots to protect all sectors.<\/h3>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI1IiwiZW5hYmxlX2h0bWwiOiJvZmYifX0=@&#8221; button_text=&#8221;ARME YOURSELF FOR YOUR SECTOR&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.23.1&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;1.25rem&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#F2273B&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;#F2273B&#8221; button_border_radius=&#8221;15px&#8221; button_letter_spacing=&#8221;0px&#8221; button_font=&#8221;|300||on|||||&#8221; button_use_icon=&#8221;off&#8221; transform_translate_linked=&#8221;off&#8221; custom_margin=&#8221;50px|100px|50px|100px|false|false&#8221; custom_padding=&#8221;10px|10px|10px|10px|false|false&#8221; button_text_size_tablet=&#8221;1rem&#8221; button_text_size_phone=&#8221;0.75rem&#8221; button_text_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; button_text_color__hover_enabled=&#8221;on|hover&#8221; button_text_color__hover=&#8221;#F2273B&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#FFFFFF&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Challenges&#8221; module_id=&#8221;challenges&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;gcid-1b4a3854-7b44-49f6-922e-e1ac36476373&#8243; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{%22gcid-1b4a3854-7b44-49f6-922e-e1ac36476373%22:%91%22background_color%22%93}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; module_class=&#8221;vh-center&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;92%&#8221; max_width=&#8221;100%&#8221; custom_padding=&#8221;100px||100px||false|false&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;gcid-d7d27651-32df-4d20-8c0d-e16a0fc02af9&#8243; text_font_size=&#8221;2.19rem&#8221; text_line_height=&#8221;2em&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_font_size=&#8221;4.06rem&#8221; header_2_line_height=&#8221;1.2em&#8221; custom_margin=&#8221;||0%||false|false&#8221; custom_padding=&#8221;|||3%|false|false&#8221; text_font_size_tablet=&#8221;1.56rem&#8221; text_font_size_phone=&#8221;1.25rem&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_2_text_align_tablet=&#8221;center&#8221; header_2_text_align_phone=&#8221;center&#8221; header_2_text_align_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;3.13rem&#8221; header_2_font_size_phone=&#8221;2rem&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{%22gcid-d7d27651-32df-4d20-8c0d-e16a0fc02af9%22:%91%22text_text_color%22%93}&#8221;]<\/p>\n<h2>Challenges.<\/h2>\n<p><strong>External Threat Intelligence<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;list-soluciones&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|300|||||||&#8221; text_font_size=&#8221;1.25rem&#8221; custom_padding=&#8221;2%||||false|false&#8221; text_font_size_tablet=&#8221;1rem&#8221; text_font_size_phone=&#8221;0.75rem&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li>Red<\/li>\n<li>DNS Health\/Phishing<\/li>\n<li>Patch Management<\/li>\n<li>IP Reputation<\/li>\n<li>Web Security<\/li>\n<li>Document Leaks<\/li>\n<li>Credential leak<\/li>\n<li>Social networks<\/li>\n<li>Email security<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/solcuiones02.png&#8221; title_text=&#8221;solcuiones02&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Rotativo&#8221; module_id=&#8221;rotativo&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row disabled_on=&#8221;on|on|off&#8221; admin_label=&#8221;Row-PC&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;90%&#8221; max_width=&#8221;100%&#8221; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_tabs module_class=&#8221;tabla-soluciones&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_tab title=&#8221;Third Party Risk&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"table-section\">\n<div class=\"table-row left\">\n<h2>Riesgo de Terceros<\/h2>\n<p>Los ataques a empresas a trav\u00e9s de sus proveedores o terceros colaboradores crecen cada a\u00f1o llegando a ser m\u00e1s del 80% de la causa durante el \u00faltimo a\u00f1o. Gracias a los XTI Watchbots de Kartos podr\u00e1s asegurar tu compa\u00f1\u00eda contra este problema, conociendo en tiempo real el estado de seguridad de sus proveedores, adem\u00e1s del suyo propio.<\/p>\n<p>            <a href=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/contacto\/\"><button class=\"boton\" href=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/contacto\/\">Encuentra y protege tus puntos vulnerables<\/button><\/a>\n        <\/div>\n<div class=\"table-row right\">\n            <img decoding=\"async\" src=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/RIESGO-TERCEROS-e1698075832434.png\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 604px, 100vw\" srcset=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/RIESGO-TERCEROS-e1698075832434.png 604w, https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/RIESGO-TERCEROS-e1698075832434.png 480w\">\n        <\/div>\n<\/p><\/div>\n<p>  [\/et_pb_tab][et_pb_tab title=&#8221;Supplier Evaluation&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"table-section\">\n<div class=\"table-row left\">\n            <img decoding=\"async\" src=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/EVALUACION-PROVEEDORES-e1698075654610.png\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 604px, 100vw\" srcset=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/EVALUACION-PROVEEDORES-e1698075654610.png 604w, https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/EVALUACION-PROVEEDORES-e1698075654610.png 480w\">\n        <\/div>\n<div class=\"table-row right\">\n<h2>Evaluaci\u00f3n de Proveedores<\/h2>\n<p>Evaluaci\u00f3n del nivel de ciberseguridad de proveedores antes de comenzar la relaci\u00f3n comercial y durante todo el tiempo que esta dure. Detecci\u00f3n automatizada y en tiempo real de vulnerabilidades asociadas a proveedores.<\/p>\n<p>            <a href=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/contacto\/\"><button class=\"boton\">EVAL\u00daA LA CIBERSEGURIDAD DE TUS PROVEEDORES<\/button><\/a>\n        <\/div>\n<\/p><\/div>\n<p>  [\/et_pb_tab][et_pb_tab title=&#8221;Cybersecurity in social networks&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"table-section\">\n<div class=\"table-row left\">\n<h2>Ciberseguridad en redes sociales<\/h2>\n<p>Enfoque \u00fanico en el mercado que permite la detecci\u00f3n de conversaciones en redes relacionadas con hacktivismo, fraude, phishing o campa\u00f1as de fake news, entre otras, y conversaciones que puedan hacer sospechar de un ataque en preparaci\u00f3n.<\/p>\n<p>            <a href=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/contacto\/\"><button class=\"boton\">DETECTA AMENAZAS EN REDES SOCIALES<\/button><\/a>\n        <\/div>\n<div class=\"table-row right\">\n            <img decoding=\"async\" src=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/solcuiones02.png\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 604px, 100vw\" srcset=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/solcuiones02.png 604w, https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/solcuiones02.png 480w\">\n        <\/div>\n<\/p><\/div>\n<p> [\/et_pb_tab][et_pb_tab title=&#8221;Detection of leaked and exposed information&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;] <\/p>\n<div class=\"table-section\">\n<div class=\"table-row left\">\n            <img decoding=\"async\" src=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/robot-datos-e1698075861946.png\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 604px, 100vw\" srcset=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/robot-datos-e1698075861946.png 604w, https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/robot-datos-e1698075861946.png 480w\">\n        <\/div>\n<div class=\"table-row right\">\n<h2>Detecci\u00f3n de la informaci\u00f3n filtrada y expuesta<\/h2>\n<p>Localizaci\u00f3n de toda informaci\u00f3n filtrada y expuesta en la red sobre la organizaci\u00f3n que est\u00e9 al alcance de cualquiera que sepa buscarla o tenga inter\u00e9s en adquirirla para utilizarla en su propio beneficio o para preparar un ataque.<\/p>\n<p>            <a href=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/contacto\/\"><button class=\"boton\">PROTEGE TUS DATOS Y EVITA FILTRACIONES<\/button><\/a>\n        <\/div>\n<\/p><\/div>\n<p>  [\/et_pb_tab][et_pb_tab title=&#8221;Detection of information leak points&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]  <\/p>\n<div class=\"table-section\">\n<div class=\"table-row left\">\n<h2>Detecci\u00f3n de puntos de fuga de informaci\u00f3n<\/h2>\n<p>Localizaci\u00f3n de las brechas de seguridad que provocan dichas filtraciones de informaci\u00f3n para que la entidad pueda tomar las acciones que le permitan mejorar sus sistemas de defensa y protegerse de posibles ataques.<\/p>\n<p>            <a href=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/contacto\/\"><button class=\"boton\">ENCUENTRA Y PROTEGE TUS PUNTOS VULNERABLES<\/button><\/a>\n        <\/div>\n<div class=\"table-row right\">\n            <img decoding=\"async\" src=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/robot-datos-e1698075861946.png\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 604px, 100vw\" srcset=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/robot-datos-e1698075861946.png 604w, https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/robot-datos-e1698075861946.png 480w\">\n        <\/div>\n<\/p><\/div>\n<p>[\/et_pb_tab][et_pb_tab title=&#8221;FIND AND PROTECT YOUR VULNERABLE POINTS&#8221; content_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"table-section\">\n<div class=\"table-row left\">\n            <img decoding=\"async\" src=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/robot-datos-2-e1698075780739.png\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 604px, 100vw\" srcset=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/robot-datos-2-e1698075780739.png 604w, https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/robot-datos-2-e1698075780739.png 480w\">\n        <\/div>\n<div class=\"table-row right\">\n<h2>Evaluaci\u00f3n del nivel corporativo de ciberseguridad<\/h2>\n<p>Evaluaci\u00f3n independiente de riesgos propios para obtener una visualizaci\u00f3n amplia de la madurez en ciberseguridad de la organizaci\u00f3n utilizando un enfoque externo.<\/p>\n<p>            <a href=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/contacto\/\"><button class=\"boton\">EVAL\u00daA TU NIVEL DE SEGURIDAD<\/button><\/a>\n        <\/div>\n<\/p><\/div>\n<p> [\/et_pb_tab][\/et_pb_tabs][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=&#8221;off|off|on&#8221; admin_label=&#8221;Row-Tablet\/Phone&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;10px||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_toggle title=&#8221;Third-party risk&#8221; admin_label=&#8221;Riesgo de terceros&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;10px||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]    <\/p>\n<div class=\"toggle-soluciones\">\n<h2>Third Party Risk<\/h2>\n<p>Attacks on companies through their suppliers or third-party collaborators grow every year, accounting for more than 80% of the cause during the last year. Thanks to the XTI Watchbots from Kartos you will be able to secure your company against this problem, knowing in real time the security status of your suppliers, in addition to your own.<\/p>\n<p>        <button class=\"boton\">Find and protect your vulnerable points<\/button><br \/>\n        <img decoding=\"async\" src=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/RIESGO-TERCEROS-e1698075832434.png\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 604px, 100vw\" srcset=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/RIESGO-TERCEROS-e1698075832434.png 604w, https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/RIESGO-TERCEROS-e1698075832434.png 480w\">\n    <\/div>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Supplier Evaluation&#8221; admin_label=&#8221;Evaluaci\u00f3n de provedores&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;10px||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;] <\/p>\n<div class=\"toggle-soluciones\">\n<h2>Supplier Evaluation<\/h2>\n<p>Evaluation of the level of cybersecurity of suppliers before beginning the commercial relationship and for as long as it lasts. Automated and real-time detection of vulnerabilities associated with suppliers.<\/p>\n<p>        <button class=\"boton\">EVALUATE THE CYBERSECURITY OF YOUR SUPPLIERS<\/button><br \/>\n        <img decoding=\"async\" src=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/EVALUACION-PROVEEDORES-e1698075654610.png\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 604px, 100vw\" srcset=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/EVALUACION-PROVEEDORES-e1698075654610.png 604w, https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/EVALUACION-PROVEEDORES-e1698075654610.png 480w\">\n   <\/div>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Cybersecurity in social networks&#8221; admin_label=&#8221;Ciberseguridad en redes sociales&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;10px||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"toggle-soluciones\">\n<h2>Cybersecurity in social networks<\/h2>\n<p>Unique approach in the market that allows the detection of conversations on networks related to hacktivism, fraud, phishing or fake news campaigns, among others, and conversations that may raise suspicion of an attack in preparation.<\/p>\n<p>        <button class=\"boton\">DETECT THREATS ON SOCIAL NETWORKS<\/button><br \/>\n        <img decoding=\"async\" src=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/solcuiones02.png\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 604px, 100vw\" srcset=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/solcuiones02.png 604w, https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/solcuiones02.png 480w\">\n   <\/div>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Detection of leaked and exposed information&#8221; admin_label=&#8221;Detecci\u00f3n de la Informaci\u00f3n&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;10px||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"toggle-soluciones\">\n<h2>Detection of leaked and exposed information<\/h2>\n<p>Location of all information leaked and exposed on the network about the organization that is available to anyone who knows how to look for it or has an interest in acquiring it to use it for their own benefit or to prepare an attack.<\/p>\n<p>        <button class=\"boton\">PROTECT YOUR DATA AND AVOID LEAKS<\/button><br \/>\n        <img decoding=\"async\" src=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/robot-datos-e1698075861946.png\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 604px, 100vw\" srcset=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/robot-datos-e1698075861946.png 604w, https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/robot-datos-e1698075861946.png 480w\">\n   <\/div>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Detection of information leak points&#8221; admin_label=&#8221;Detecci\u00f3n de puntos de fuga&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;10px||10px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]  <\/p>\n<div class=\"toggle-soluciones\">\n<h2>Detection of information leak points<\/h2>\n<p>Locating the security gaps that cause these information leaks so that the entity can take actions that allow it to improve its defense systems and protect itself from possible attacks.<\/p>\n<p>        <button class=\"boton\">FIND AND PROTECT YOUR VULNERABLE POINTS<\/button><br \/>\n        <img decoding=\"async\" src=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/robot-datos-e1698075861946.png\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 604px, 100vw\" srcset=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/robot-datos-e1698075861946.png 604w, https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/robot-datos-e1698075861946.png 480w\">\n   <\/div>\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;FIND AND PROTECT YOUR VULNERABLE POINTS&#8221; admin_label=&#8221;Evaluaci\u00f3n del nivel&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"toggle-soluciones\">\n<h2>Supplier Evaluation<\/h2>\n<p>Evaluation of the level of cybersecurity of suppliers before beginning the commercial relationship and for as long as it lasts. Automated and real-time detection of vulnerabilities associated with suppliers.<\/p>\n<p>        <button class=\"boton\">EVALUATE THE CYBERSECURITY OF YOUR SUPPLIERS<\/button><br \/>\n        <img decoding=\"async\" src=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/robot-datos-2-e1698075780739.png\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 604px, 100vw\" srcset=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/robot-datos-2-e1698075780739.png 604w, https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/robot-datos-2-e1698075780739.png 480w\">\n    <\/div>\n<p>[\/et_pb_toggle][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Sectores&#8221; module_id=&#8221;sectors&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/Group-100.jpg&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;100px||100px||false|false&#8221; locked=&#8221;off&#8221; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/Group-81.png&#8221; title_text=&#8221;Group-81&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;4.06rem&#8221; header_2_font_size_tablet=&#8221;3.13rem&#8221; header_2_font_size_phone=&#8221;2rem&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Cybersecurity for the following sectors<\/h2>\n<p>[\/et_pb_text][et_pb_code _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"line-white\"><!-- [et_pb_line_break_holder] --><\/div>\n<p>[\/et_pb_code][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_5,1_5,1_5,1_5,1_5&#8243; make_equal=&#8221;on&#8221; disabled_on=&#8221;on|on|off&#8221; admin_label=&#8221;Row-Sectores-PC&#8221; module_id=&#8221;sector1&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;90%&#8221; max_width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; header_font_size_tablet=&#8221;1.56rem&#8221; header_font_size_phone=&#8221;1.25rem&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; body_font_size_tablet=&#8221;1rem&#8221; body_font_size_phone=&#8221;0.75rem&#8221; body_font_size_last_edited=&#8221;on|desktop&#8221;][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Health&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-heart.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_font_size=&#8221;1.56rem&#8221; body_font=&#8221;|300|||||||&#8221; body_text_align=&#8221;center&#8221; body_font_size=&#8221;0.75rem&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; module_alignment=&#8221;center&#8221; header_font_size_tablet=&#8221;1.56rem&#8221; header_font_size_phone=&#8221;1.25rem&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; body_font_size_tablet=&#8221;1rem&#8221; body_font_size_phone=&#8221;0.75rem&#8221; body_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Recovery of leaked medical records. Detection of compromised passwords. Protection of the query and operations system. Protection of the hospital care system. Detection of security breaches. Evaluation of partners and suppliers. GDPR compliance.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Pharma&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-cross.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_font_size=&#8221;1.56rem&#8221; body_font=&#8221;|300|||||||&#8221; body_text_align=&#8221;center&#8221; body_font_size=&#8221;0.75rem&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; module_alignment=&#8221;center&#8221; header_font_size_tablet=&#8221;1.56rem&#8221; header_font_size_phone=&#8221;1.25rem&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; body_font_size_tablet=&#8221;1rem&#8221; body_font_size_phone=&#8221;0.75rem&#8221; body_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Recovery of leaked documents. Detection of compromised passwords. Protection of intellectual and industrial property. Protection of the operation of laboratories and plants. Detection of security breaches. Evaluation of partners and suppliers. Brand protection.[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Insurance companies&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-shield.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_font_size=&#8221;1.56rem&#8221; body_font=&#8221;|300|||||||&#8221; body_text_align=&#8221;center&#8221; body_font_size=&#8221;0.75rem&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; module_alignment=&#8221;center&#8221; header_font_size_tablet=&#8221;1.56rem&#8221; header_font_size_phone=&#8221;1.25rem&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; body_font_size_tablet=&#8221;1rem&#8221; body_font_size_phone=&#8221;0.75rem&#8221; body_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Client IT risk analysis. Detection of compromised passwords. Recovery of leaked parts and files. Cyber leak surveillance service for policyholders. Evaluation of partners and suppliers. GDPR Compliance.[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Utilities&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-gear-132.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_font_size=&#8221;1.56rem&#8221; body_font=&#8221;|300|||||||&#8221; body_text_align=&#8221;center&#8221; body_font_size=&#8221;0.75rem&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; module_alignment=&#8221;center&#8221; header_font_size_tablet=&#8221;1.56rem&#8221; header_font_size_phone=&#8221;1.25rem&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; body_font_size_tablet=&#8221;1rem&#8221; body_font_size_phone=&#8221;0.75rem&#8221; body_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Protection of service continuity. Detection of compromised passwords. Protection against sabotage. Recovery of leaked sensitive information. Detection of security breaches. Evaluation of partners and suppliers. GDPR Compliance.[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Education&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-hat.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_font_size=&#8221;1.56rem&#8221; body_font=&#8221;|300|||||||&#8221; body_text_align=&#8221;center&#8221; body_font_size=&#8221;0.75rem&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; module_alignment=&#8221;center&#8221; header_font_size_tablet=&#8221;1.56rem&#8221; header_font_size_phone=&#8221;1.25rem&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; body_font_size_tablet=&#8221;1rem&#8221; body_font_size_phone=&#8221;0.75rem&#8221; body_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Recovery of leaked files. Protection of intellectual property. Protection of minors&#8217; information. Detection of compromised passwords of students and employees. Protection of the continuity of academic activity. Brand protection. GDPR Compliance.[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_5,1_5,1_5,1_5,1_5&#8243; make_equal=&#8221;on&#8221; disabled_on=&#8221;on|on|off&#8221; admin_label=&#8221;Row-Sectores2-PC&#8221; module_id=&#8221;sector1&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;90%&#8221; max_width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Finance&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-cash.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_font_size=&#8221;1.56rem&#8221; body_font=&#8221;|300|||||||&#8221; body_text_align=&#8221;center&#8221; body_font_size=&#8221;0.75rem&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; module_alignment=&#8221;center&#8221; header_font_size_tablet=&#8221;1.56rem&#8221; header_font_size_phone=&#8221;1.25rem&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; body_font_size_tablet=&#8221;1rem&#8221; body_font_size_phone=&#8221;0.75rem&#8221; body_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Protection against fraudulent orders and interventions. Recovery of leaked sensitive information. Detection of compromised passwords. Detection of security breaches. Prevention of identity theft. Protection of the continuity of financial activity. GDPR compliance.[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Telecommunications&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-antenna.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_font_size=&#8221;1.56rem&#8221; body_font=&#8221;|300|||||||&#8221; body_text_align=&#8221;center&#8221; body_font_size=&#8221;0.75rem&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; module_alignment=&#8221;center&#8221; header_font_size_tablet=&#8221;1.56rem&#8221; header_font_size_phone=&#8221;1.25rem&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; body_font_size_tablet=&#8221;1rem&#8221; body_font_size_phone=&#8221;0.75rem&#8221; body_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Protection of service continuity. Protection of intellectual property. Detection of compromised passwords. Detection of security breaches. Protection of IT systems. Evaluation of partners and suppliers. GDPR Compliance.[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Industry&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-factory.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_font_size=&#8221;1.56rem&#8221; body_font=&#8221;|300|||||||&#8221; body_text_align=&#8221;center&#8221; body_font_size=&#8221;0.75rem&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; module_alignment=&#8221;center&#8221; header_font_size_tablet=&#8221;1.56rem&#8221; header_font_size_phone=&#8221;1.25rem&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; body_font_size_tablet=&#8221;1rem&#8221; body_font_size_phone=&#8221;0.75rem&#8221; body_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Protection of the production chain. Detection of compromised passwords. Protection of industrial property and patents. Recovery of leaked sensitive information. Detection of security breaches. Protection of production continuity. Evaluation of partners and suppliers.[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Public sector&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-people.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_font_size=&#8221;1.56rem&#8221; body_font=&#8221;|300|||||||&#8221; body_text_align=&#8221;center&#8221; body_font_size=&#8221;0.75rem&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; module_alignment=&#8221;center&#8221; header_font_size_tablet=&#8221;1.56rem&#8221; header_font_size_phone=&#8221;1.25rem&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; body_font_size_tablet=&#8221;1rem&#8221; body_font_size_phone=&#8221;0.75rem&#8221; body_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Protection of citizen data. Protection of the continuity of services. Detection of compromised passwords. Detection of leaked files. Prevention of identity theft. Detection of security breaches. Supplier Evaluation.[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Retail&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-retail.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_font_size=&#8221;1.56rem&#8221; body_font=&#8221;|300|||||||&#8221; body_text_align=&#8221;center&#8221; body_font_size=&#8221;0.75rem&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; module_alignment=&#8221;center&#8221; header_font_size_tablet=&#8221;1.56rem&#8221; header_font_size_phone=&#8221;1.25rem&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; body_font_size_tablet=&#8221;1rem&#8221; body_font_size_phone=&#8221;0.75rem&#8221; body_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Protection of the continuity of customer service. Protection of the continuity of online sales. Detection of compromised passwords. Prevention of identity theft. Detection of security breaches. Brand protection. GDPR compliance. Protection of sensitive data. Risk assessment of third parties, suppliers and partners. Location of sensitive leaked information.[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; disabled_on=&#8221;on|off|on&#8221; admin_label=&#8221;Row-sectores-Tablet&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;90%&#8221; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; border_width_all=&#8221;0px&#8221; border_color_all=&#8221;#E02B20&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Health&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-heart.png&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; min_height=&#8221;550px&#8221; max_height=&#8221;550px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Recovery of leaked medical records. Detection of compromised passwords. Protection of the query and operations system. Protection of the hospital care system. Detection of security breaches. Evaluation of partners and suppliers. GDPR compliance.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Education&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-hat.png&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; min_height=&#8221;550px&#8221; max_height=&#8221;550px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Recovery of leaked files. Protection of intellectual property. Protection of minors&#8217; information. Detection of compromised passwords of students and employees. Protection of the continuity of academic activity. Brand protection. GDPR Compliance.[\/et_pb_blurb][et_pb_blurb title=&#8221;Public sector&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-people.png&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; min_height=&#8221;550px&#8221; max_height=&#8221;550px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Protection of citizen data. Protection of the continuity of services. Detection of compromised passwords. Detection of leaked files. Prevention of identity theft. Detection of security breaches. Supplier Evaluation.[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Pharma&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-cross.png&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; min_height=&#8221;550px&#8221; max_height=&#8221;550px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Recovery of leaked documents. Detection of compromised passwords. Protection of intellectual and industrial property. Protection of the operation of laboratories and plants. Detection of security breaches. Evaluation of partners and suppliers. Brand protection.[\/et_pb_blurb][et_pb_blurb title=&#8221;Finance&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-cash.png&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; min_height=&#8221;550px&#8221; max_height=&#8221;550px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Protection against fraudulent orders and interventions. Recovery of leaked sensitive information. Detection of compromised passwords. Detection of security breaches. Prevention of identity theft. Protection of the continuity of financial activity. GDPR compliance.[\/et_pb_blurb][et_pb_blurb title=&#8221;Retail&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-retail.png&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; min_height=&#8221;550px&#8221; max_height=&#8221;550px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Protection of the continuity of customer service. Protection of the continuity of online sales. Detection of compromised passwords. Prevention of identity theft. Detection of security breaches. Brand protection. GDPR compliance.[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Insurance companies&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-shield.png&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; min_height=&#8221;550px&#8221; max_height=&#8221;550px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Client IT risk analysis. Detection of compromised passwords. Recovery of leaked parts and files. Cyber leak surveillance service for policyholders. Evaluation of partners and suppliers. GDPR Compliance.[\/et_pb_blurb][et_pb_blurb title=&#8221;Telecommunications&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-antenna.png&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; min_height=&#8221;550px&#8221; max_height=&#8221;550px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Protection of service continuity. Protection of intellectual property. Detection of compromised passwords. Detection of security breaches. Protection of IT systems. Evaluation of partners and suppliers. GDPR Compliance.[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Utilities&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-gear-132.png&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; min_height=&#8221;550px&#8221; max_height=&#8221;550px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Protection of service continuity. Detection of compromised passwords. Protection against sabotage. Recovery of leaked sensitive information. Detection of security breaches. Evaluation of partners and suppliers. GDPR Compliance.[\/et_pb_blurb][et_pb_blurb title=&#8221;Industry&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-factory.png&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; min_height=&#8221;550px&#8221; max_height=&#8221;550px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Protection of the production chain. Detection of compromised passwords. Protection of industrial property and patents. Recovery of leaked sensitive information. Detection of security breaches. Protection of production continuity. Evaluation of partners and suppliers.[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=&#8221;off|on|on&#8221; admin_label=&#8221;Row-sectores-Phone&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Health&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-heart.png&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h3&#8243; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;35px&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Recovery of leaked medical records. Detection of compromised passwords. Protection of the query and operations system. Protection of the hospital care system. Detection of security breaches. Evaluation of partners and suppliers. GDPR compliance.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Pharma&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-cross.png&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h3&#8243; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;35px&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Recovery of leaked documents. Detection of compromised passwords. Protection of intellectual and industrial property. Protection of the operation of laboratories and plants. Detection of security breaches. Evaluation of partners and suppliers. Brand protection.[\/et_pb_blurb][et_pb_blurb title=&#8221;Insurance companies&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-shield.png&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h3&#8243; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;35px&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Client IT risk analysis. Detection of compromised passwords. Recovery of leaked parts and files. Cyber leak surveillance service for policyholders. Evaluation of partners and suppliers. GDPR Compliance.[\/et_pb_blurb][et_pb_blurb title=&#8221;Utilities&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-gear-132.png&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h3&#8243; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;35px&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Protection of service continuity. Detection of compromised passwords. Protection against sabotage. Recovery of leaked sensitive information. Detection of security breaches. Evaluation of partners and suppliers. GDPR Compliance.[\/et_pb_blurb][et_pb_blurb title=&#8221;Education&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-hat.png&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h3&#8243; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;35px&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Recovery of leaked files. Protection of intellectual property. Protection of minors&#8217; information. Detection of compromised passwords of students and employees. Protection of the continuity of academic activity. Brand protection. GDPR Compliance.[\/et_pb_blurb][et_pb_blurb title=&#8221;Finance&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-cash.png&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h3&#8243; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;35px&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Protection against fraudulent orders and interventions. Recovery of leaked sensitive information. Detection of compromised passwords. Detection of security breaches. Prevention of identity theft. Protection of the continuity of financial activity. GDPR compliance.[\/et_pb_blurb][et_pb_blurb title=&#8221;Telecommunications&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-antenna.png&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h3&#8243; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;35px&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Protection of service continuity. Protection of intellectual property. Detection of compromised passwords. Detection of security breaches. Protection of IT systems. Evaluation of partners and suppliers. GDPR Compliance.[\/et_pb_blurb][et_pb_blurb title=&#8221;Industry&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-factory.png&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h3&#8243; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;35px&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Protection of the production chain. Detection of compromised passwords. Protection of industrial property and patents. Recovery of leaked sensitive information. Detection of security breaches. Protection of production continuity. Evaluation of partners and suppliers.[\/et_pb_blurb][et_pb_blurb title=&#8221;Public sector&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-people.png&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h3&#8243; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;35px&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Protection of citizen data. Protection of the continuity of services. Detection of compromised passwords. Detection of leaked files. Prevention of identity theft. Detection of security breaches. Supplier Evaluation.[\/et_pb_blurb][et_pb_blurb title=&#8221;Retail&#8221; image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-red-retail.png&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h3&#8243; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;35px&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Protection of the continuity of customer service. Protection of the continuity of online sales. Detection of compromised passwords. Prevention of identity theft. Detection of security breaches. Brand protection. GDPR compliance. Protection of sensitive data. Risk assessment of third parties, suppliers and partners. Location of sensitive leaked information.[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Areas Coorporativas&#8221; module_id=&#8221;areas&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Row-title&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;100px||100px||false|false&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/Mesa-de-trabajo-2-copia-5-1.png&#8221; title_text=&#8221;Mesa-de-trabajo-2-copia-5-1&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;4.06rem&#8221; header_2_font_size_tablet=&#8221;3.13rem&#8221; header_2_font_size_phone=&#8221;2rem&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Corporate areas<\/h2>\n<p>[\/et_pb_text][et_pb_code _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"line-black\"><!-- [et_pb_line_break_holder] --><\/div>\n<p>[\/et_pb_code][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; admin_label=&#8221;Row-Direcci\u00f3n&#8221; module_id=&#8221;aread&#8221; module_class=&#8221;vh-center-reverse&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1290px&#8221; custom_padding=&#8221;5%||||false|false&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-spiral-1.png&#8221; title_text=&#8221;icon-spiral-1&#8243; align_tablet=&#8221;center&#8221; align_phone=&#8221;center&#8221; align_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|0px||25%|false|false&#8221; custom_padding_tablet=&#8221;|||0%|false|false&#8221; custom_padding_phone=&#8221;|||0%|false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|700|||||||&#8221; text_font_size=&#8221;2.19rem&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;1.56rem&#8221; text_font_size_phone=&#8221;1.25rem&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Management<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|300|||||||&#8221; text_font_size=&#8221;1.25rem&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;45px&#8221; text_font_size_tablet=&#8221;1rem&#8221; text_font_size_phone=&#8221;0.75rem&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Kartos protects business continuity, intellectual and industrial property, detects leaked corporate information and security breaches and increases the effectiveness of corporate cyber protection strategies without requiring a high cost of investment, implementation, personnel or maintenance. Provides two levels of reports adapted to the different profiles of the organization.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; admin_label=&#8221;Row-Seguridad&#8221; module_id=&#8221;arease&#8221; module_class=&#8221;vh-center-reverse&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1290px&#8221; custom_padding=&#8221;5%||||false|false&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-spiral-2.png&#8221; title_text=&#8221;icon-spiral-2&#8243; align_tablet=&#8221;center&#8221; align_phone=&#8221;center&#8221; align_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|0px||25%|false|false&#8221; custom_padding_tablet=&#8221;|||0%|false|false&#8221; custom_padding_phone=&#8221;|||0%|false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|700|||||||&#8221; text_font_size=&#8221;2.19rem&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;1.56rem&#8221; text_font_size_phone=&#8221;1.25rem&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Security<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|300|||||||&#8221; text_font_size=&#8221;1.25rem&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;45px&#8221; text_font_size_tablet=&#8221;1rem&#8221; text_font_size_phone=&#8221;0.75rem&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Kartos provides the information necessary to control corporate information leaked and available on the Web, the Deep Web and the Dark Web, detect latent vulnerabilities, discover security gaps in the organization and flaws in the cyber protection strategy. Kartos works 24&#215;7 in a non-intrusive manner and allows the level of corporate cybersecurity to be evaluated from the point of view of its effectiveness and cybersecurity culture.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; admin_label=&#8221;Row-IT&#8221; module_id=&#8221;areai&#8221; module_class=&#8221;vh-center-reverse&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1290px&#8221; custom_padding=&#8221;5%||||false|false&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-spiral-3.png&#8221; title_text=&#8221;icon-spiral-3&#8243; align_tablet=&#8221;center&#8221; align_phone=&#8221;center&#8221; align_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|0px||25%|false|false&#8221; custom_padding_tablet=&#8221;|||0%|false|false&#8221; custom_padding_phone=&#8221;|||0%|false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|700|||||||&#8221; text_font_size=&#8221;2.19rem&#8221; text_font_size_tablet=&#8221;1.56rem&#8221; text_font_size_phone=&#8221;1.25rem&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>IT<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|300|||||||&#8221; text_font_size=&#8221;1.25rem&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;45px&#8221; text_font_size_tablet=&#8221;1rem&#8221; text_font_size_phone=&#8221;0.75rem&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Kartos protects the operation and continuity of the organization&#8217;s systems by detecting latent vulnerabilities beyond the corporate perimeter and nullifying their effectiveness in a cyber attack. Kartos extends the corporate cybersecurity strategy through a solution that works 24&#215;7 in a non-intrusive manner and its implementation, adoption and management are within the reach of any member of the organization.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; admin_label=&#8221;Row-Marketing&#8221; module_id=&#8221;aream&#8221; module_class=&#8221;vh-center-reverse&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1290px&#8221; custom_padding=&#8221;5%||||false|false&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-spiral-4.png&#8221; title_text=&#8221;icon-spiral-4&#8243; align_tablet=&#8221;center&#8221; align_phone=&#8221;center&#8221; align_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|0px||25%|false|false&#8221; custom_padding_tablet=&#8221;|||0%|false|false&#8221; custom_padding_phone=&#8221;|||0%|false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|700|||||||&#8221; text_font_size=&#8221;2.19rem&#8221; text_font_size_tablet=&#8221;1.56rem&#8221; text_font_size_phone=&#8221;1.25rem&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Marketing<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|300|||||||&#8221; text_font_size=&#8221;1.25rem&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;45px&#8221; text_font_size_tablet=&#8221;1rem&#8221; text_font_size_phone=&#8221;0.75rem&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Kartos helps protect the brand by detecting latent vulnerabilities that can be used in a cyber attack to cause a reputation crisis. In addition, it prevents the usurpation of the brand identity for fraudulent purposes and protects customers and their data. Kartos allows the configuration of real-time alarms that are customizable by fields of interest to the marketing team.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; admin_label=&#8221;Row-Legal&#8221; module_id=&#8221;areal&#8221; module_class=&#8221;vh-center-reverse&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1290px&#8221; custom_padding=&#8221;5%||||false|false&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/icon-spiral-1.png&#8221; title_text=&#8221;icon-spiral-1&#8243; align_tablet=&#8221;center&#8221; align_phone=&#8221;center&#8221; align_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|0px||25%|false|false&#8221; custom_padding_tablet=&#8221;|||0%|false|false&#8221; custom_padding_phone=&#8221;|||0%|false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|700|||||||&#8221; text_font_size=&#8221;2.19rem&#8221; text_font_size_tablet=&#8221;1.56rem&#8221; text_font_size_phone=&#8221;1.25rem&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Legal<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|300|||||||&#8221; text_font_size=&#8221;1.25rem&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;45px&#8221; text_font_size_tablet=&#8221;1rem&#8221; text_font_size_phone=&#8221;0.75rem&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Kartos helps with compliance with data protection regulations. Detects in real time the availability on the Web, the Dark Web and the Deep Web of sensitive corporate data protected by law. Through its real-time alarm configuration system that is customizable by field, the organization&#8217;s legal team will have the necessary information to detect data leaks and avoid the legal consequences of failures in its custody.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Detecci\u00f3n Elementos&#8221; module_id=&#8221;elements&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/sol04.jpg&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; module_class=&#8221;vh-center&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;90%&#8221; max_width=&#8221;100%&#8221; custom_padding=&#8221;100px||100px||false|false&#8221; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;gcid-d7d27651-32df-4d20-8c0d-e16a0fc02af9&#8243; text_font_size=&#8221;22px&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;4.06rem&#8221; header_2_text_align_tablet=&#8221;center&#8221; header_2_text_align_phone=&#8221;center&#8221; header_2_text_align_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;3.13rem&#8221; header_2_font_size_phone=&#8221;2rem&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{%22gcid-d7d27651-32df-4d20-8c0d-e16a0fc02af9%22:%91%22text_text_color%22%93}&#8221;]<\/p>\n<h2>Detection of Compromised Elements<\/h2>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;list-soluciones&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|300|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;1.9rem&#8221; text_font_size_tablet=&#8221;1.56rem&#8221; text_font_size_phone=&#8221;1.25rem&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li>Passwords and credentials<\/li>\n<li>Documents<\/li>\n<li>Email<\/li>\n<li>Web<\/li>\n<li>Information &#8211; Ransomware<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI1IiwiZW5hYmxlX2h0bWwiOiJvZmYifX0=@&#8221; button_text=&#8221;TRY IT AND DISCOVER EVERYTHING&#8221; button_alignment=&#8221;left&#8221; button_alignment_tablet=&#8221;center&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.23.1&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;1.25rem&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#f2273b&#8221; button_border_width=&#8221;1px&#8221; button_border_color=&#8221;#f2273b&#8221; button_border_radius=&#8221;10px&#8221; button_letter_spacing=&#8221;0px&#8221; button_font=&#8221;|300|||||||&#8221; button_use_icon=&#8221;off&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0.7rem|1.6rem|0.7rem|1.6rem|false|false&#8221; button_text_size_tablet=&#8221;1rem&#8221; button_text_size_phone=&#8221;0.75rem&#8221; button_text_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; button_text_color__hover_enabled=&#8221;on|hover&#8221; button_text_color__hover=&#8221;#F2273B&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#FFFFFF&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/sol03.png&#8221; title_text=&#8221;sol03&#8243; align_tablet=&#8221;center&#8221; align_phone=&#8221;center&#8221; align_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SolutionsExtended Threat IntelligenceAn army of XTI Watchbots to protect all sectors.Challenges. External Threat Intelligence Red DNS Health\/Phishing Patch Management IP Reputation Web Security Document Leaks Credential leak Social networks Email security Riesgo de Terceros Los ataques a empresas a trav\u00e9s de sus proveedores o terceros colaboradores crecen cada a\u00f1o llegando a ser m\u00e1s del 80% [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-5632","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Solutions - Kartos<\/title>\n<meta name=\"description\" content=\"Solutions. Detection of information leakage points. Corporate cybersecurity level assessment. Third Party Risk. Attacks on companies through their suppliers or third-party collaborators grow every year, accounting for more than 80% of the cause during the last year.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Solutions - Kartos\" \/>\n<meta property=\"og:description\" content=\"Solutions. Detection of information leakage points. Corporate cybersecurity level assessment. Third Party Risk. Attacks on companies through their suppliers or third-party collaborators grow every year, accounting for more than 80% of the cause during the last year.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"Enthec\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-02T08:24:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/RIESGO-TERCEROS-e1698075832434.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"20 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/solutions\/\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/solutions\/\",\"name\":\"Solutions - Kartos\",\"isPartOf\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/solutions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/solutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/RIESGO-TERCEROS-e1698075832434.png\",\"datePublished\":\"2023-09-15T10:15:07+00:00\",\"dateModified\":\"2024-07-02T08:24:43+00:00\",\"description\":\"Solutions. Detection of information leakage points. Corporate cybersecurity level assessment. Third Party Risk. Attacks on companies through their suppliers or third-party collaborators grow every year, accounting for more than 80% of the cause during the last year.\",\"breadcrumb\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/solutions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/solutions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/solutions\/#primaryimage\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/RIESGO-TERCEROS-e1698075832434.png\",\"contentUrl\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/RIESGO-TERCEROS-e1698075832434.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/solutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#website\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/\",\"name\":\"Enthec\",\"description\":\"La plataforma XTI automatizada\",\"publisher\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#organization\"},\"alternateName\":\"Kartos by Enthec\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#organization\",\"name\":\"Enthec\",\"alternateName\":\"Kartos by Enthec\u00e7\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png\",\"contentUrl\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png\",\"width\":512,\"height\":512,\"caption\":\"Enthec\"},\"image\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Solutions - Kartos","description":"Solutions. Detection of information leakage points. Corporate cybersecurity level assessment. Third Party Risk. Attacks on companies through their suppliers or third-party collaborators grow every year, accounting for more than 80% of the cause during the last year.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Solutions - Kartos","og_description":"Solutions. Detection of information leakage points. Corporate cybersecurity level assessment. Third Party Risk. Attacks on companies through their suppliers or third-party collaborators grow every year, accounting for more than 80% of the cause during the last year.","og_url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/solutions\/","og_site_name":"Enthec","article_modified_time":"2024-07-02T08:24:43+00:00","og_image":[{"url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/RIESGO-TERCEROS-e1698075832434.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"20 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/solutions\/","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/solutions\/","name":"Solutions - Kartos","isPartOf":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/solutions\/#primaryimage"},"image":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/RIESGO-TERCEROS-e1698075832434.png","datePublished":"2023-09-15T10:15:07+00:00","dateModified":"2024-07-02T08:24:43+00:00","description":"Solutions. Detection of information leakage points. Corporate cybersecurity level assessment. Third Party Risk. Attacks on companies through their suppliers or third-party collaborators grow every year, accounting for more than 80% of the cause during the last year.","breadcrumb":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/solutions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/solutions\/#primaryimage","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/RIESGO-TERCEROS-e1698075832434.png","contentUrl":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/10\/RIESGO-TERCEROS-e1698075832434.png"},{"@type":"BreadcrumbList","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/"},{"@type":"ListItem","position":2,"name":"Solutions"}]},{"@type":"WebSite","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#website","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/","name":"Enthec","description":"La plataforma XTI automatizada","publisher":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#organization"},"alternateName":"Kartos by Enthec","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#organization","name":"Enthec","alternateName":"Kartos by Enthec\u00e7","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/logo\/image\/","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png","contentUrl":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png","width":512,"height":512,"caption":"Enthec"},"image":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/pages\/5632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/comments?post=5632"}],"version-history":[{"count":26,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/pages\/5632\/revisions"}],"predecessor-version":[{"id":7439,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/pages\/5632\/revisions\/7439"}],"wp:attachment":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/media?parent=5632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}