{"id":1885,"date":"2022-06-23T08:34:35","date_gmt":"2022-06-23T08:34:35","guid":{"rendered":"https:\/\/web.ibercra.com\/?page_id=1885"},"modified":"2022-06-27T08:07:13","modified_gmt":"2022-06-27T08:07:13","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/web.ibercra.com\/en\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_section full_width=&#8221;stretch_row&#8221; pix_bg_grdient=&#8221;bg-gradient-dark&#8221; fade_in_opacity=&#8221;pix-opacity-9&#8243; pix_over_visibility=&#8221;&#8221; bottom_divider_select=&#8221;15&#8243; fade_in_intro=&#8221;1589&#8243; el_class=&#8221;seccabecera&#8221;][vc_row pix_particles_check=&#8221;&#8221;][vc_column]<div id=\"sliding-text-56367964541f60461ba7a36b8d7539b7\" class=\"mb-3 text-right \"><div class=\"d-inline-block\" style=\"max-width:800px;\"><h2 class=\"mb-32 pix-sliding-headline-2 animate-in secondary-font \" data-anim-type=\"pix-sliding-text\" data-class=\"secondary-font text-white\" style=\"\"><span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 0ms;\">CYBERSECURITY&#32;<\/span><\/span> <\/h2><\/div><\/div>[\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; pix_over_visibility=&#8221;&#8221; bottom_divider_select=&#8221;15&#8243; el_class=&#8221;secprincipal&#8221;][vc_row pix_particles_check=&#8221;&#8221; css=&#8221;.vc_custom_1626177425877{padding-bottom: 5% !important;}&#8221;][vc_column]<div id=\"sliding-text-9b881ad429db73c6ae2f3ed392379093\" class=\"mb-3 text-center  vc_custom_1655972864679\"><h1 class=\"mb-32 pix-sliding-headline-2 animate-in font-weight-bold secondary-font \" data-anim-type=\"pix-sliding-text\" data-class=\"secondary-font text-primary\" style=\"\"><span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-primary\" style=\"transition-delay: 0ms;\">We&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-primary\" style=\"transition-delay: 150ms;\">provide&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-primary\" style=\"transition-delay: 300ms;\">the&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-primary\" style=\"transition-delay: 450ms;\">best&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-primary\" style=\"transition-delay: 600ms;\">cybersecurity&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-primary\" style=\"transition-delay: 750ms;\">services&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-primary\" style=\"transition-delay: 900ms;\">for&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-primary\" style=\"transition-delay: 1050ms;\">complete&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-primary\" style=\"transition-delay: 1200ms;\">protection.&#32;<\/span><\/span> <\/h1><\/div>[vc_column_text]<\/p>\r\n<p style=\"text-align: center;\">Discover all our cybersecurity resources for better protection against any vulnerability. A wide range of services from IT security, virtualization&#8230; to a complete Disaster Recovery Plan.<\/p>\r\n<p>[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row_content&#8221; pix_over_visibility=&#8221;&#8221;][vc_row full_width=&#8221;stretch_row&#8221; pix_particles_check=&#8221;&#8221; css=&#8221;.vc_custom_1635491958662{padding-top: 5% !important;padding-right: 5% !important;padding-bottom: 5% !important;padding-left: 5% !important;background-image: url(https:\/\/web.ibercra.com\/wp-content\/uploads\/2021\/10\/seccion_seguridadinformatica-1.jpg?id=1529) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; content_align=&#8221;text-center&#8221;]<div id=\"el1626177325404-bedab120-788d\" class=\"w-100 d-block \"><\/div><div  class=\"pix-heading-el text-center  vc_custom_1655973089727\"><h3 class=\"text-white font-weight-bold h3 heading-text el-title_custom_color mb-12\" style=\"\" data-anim-type=\"\" data-anim-delay=\"0\">Computer Security<\/h3><\/div><div class=\"pix-el-text w-100  \" ><p class=\"text-18  text-white  \" >We develop security protocols and policies to provide a secure and reliable environment.<\/p><\/div><a  href=\"\/en\/cibersecurity\/security-computing\/\" class=\"btn mb-2    vc_custom_1656317230730   text-white btn-primary d-inline-flex align-items-center      btn-md\"     ><span class=\"font-weight-bold \" >ACCESS<\/span><\/a>[\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_particles_check=&#8221;&#8221; css=&#8221;.vc_custom_1635770254588{padding-top: 5% !important;padding-right: 5% !important;padding-bottom: 5% !important;padding-left: 5% !important;background-image: url(https:\/\/web.ibercra.com\/wp-content\/uploads\/2021\/11\/secc_prot_peri.jpg?id=1592) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243; content_align=&#8221;text-right&#8221;]<div  class=\"pix-heading-el text-center  vc_custom_1655973162431\"><h3 class=\"text-white font-weight-bold h3 heading-text el-title_custom_color mb-12\" style=\"\" data-anim-type=\"\" data-anim-delay=\"0\">Perimeter protection<\/h3><\/div><div class=\"pix-el-text w-100 text-center \" ><p class=\"text-18  text-white text-center \" >We protect ourselves at all levels, both internally and externally, against a possible cyber-attack, filtering and isolating possible threats.<\/p><\/div><div class=\"d-block w-100 text-center\"><a  href=\"\/en\/cibersecurity\/perimeter-protection\" class=\"btn mb-2    vc_custom_1655973675910   text-white btn-secondary d-inline-flex align-items-center      pix-btn-div btn-md\"     ><span class=\"font-weight-bold \" >APPLY FOR<\/span><\/a><\/div><div id=\"el1626177338093-457d8624-ae7d\" class=\"w-100 d-block \"><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_particles_check=&#8221;&#8221; css=&#8221;.vc_custom_1635492063178{padding-top: 5% !important;padding-right: 5% !important;padding-bottom: 5% !important;padding-left: 5% !important;background-image: url(https:\/\/web.ibercra.com\/wp-content\/uploads\/2021\/10\/secciones_entornoseguro-1.jpg?id=1531) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; content_align=&#8221;text-center&#8221;]<div id=\"el1626177351492-dd26492f-3a3e\" class=\"w-100 d-block \"><\/div><div  class=\"pix-heading-el text-center  vc_custom_1655973189264\"><h3 class=\"text-white font-weight-bold h3 heading-text el-title_custom_color mb-12\" style=\"\" data-anim-type=\"\" data-anim-delay=\"0\">Secure environment<\/h3><\/div><div class=\"pix-el-text w-100  \" ><p class=\"text-18  text-white  \" >We host all our clients&#8217; information centrally to offer maximum protection and security.<\/p><\/div><a  href=\"\/en\/cibersecurity\/secure-environment\" class=\"btn mb-2    vc_custom_1655973685620   text-white btn-primary d-inline-flex align-items-center      btn-md\"     ><span class=\"font-weight-bold \" >MORE INFO<\/span><\/a>[\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_particles_check=&#8221;&#8221; css=&#8221;.vc_custom_1635492002982{padding-top: 5% !important;padding-right: 5% !important;padding-bottom: 5% !important;padding-left: 5% !important;background-image: url(https:\/\/web.ibercra.com\/wp-content\/uploads\/2021\/10\/secciones_virtualizacion-1.jpg?id=1532) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243; content_align=&#8221;text-center&#8221;]<div  class=\"pix-heading-el text-center  vc_custom_1655973233842\"><h3 class=\"text-white font-weight-bold h3 heading-text el-title_custom_color mb-12\" style=\"\" data-anim-type=\"\" data-anim-delay=\"0\">Virtualization<\/h3><\/div><div class=\"pix-el-text w-100 text-center \" ><p class=\"text-18  text-white text-center \" >We create an efficient system for recovering resources in a matter of minutes in the event of a system failure.<\/p><\/div><div class=\"d-block w-100 text-center\"><a  href=\"\/en\/cibersecurity\/virtualization\" class=\"btn mb-2    vc_custom_1655973696761   text-white btn-secondary d-inline-flex align-items-center      pix-btn-div btn-md\"     ><span class=\"font-weight-bold \" >DISCOVER<\/span><\/a><\/div><div id=\"el1626177357322-df9ad0c2-0b46\" class=\"w-100 d-block \"><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_particles_check=&#8221;&#8221; css=&#8221;.vc_custom_1635492046667{padding-top: 5% !important;padding-right: 5% !important;padding-bottom: 5% !important;padding-left: 5% !important;background-image: url(https:\/\/web.ibercra.com\/wp-content\/uploads\/2021\/10\/secciones_DRP-2.jpg?id=1530) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; content_align=&#8221;text-center&#8221;]<div id=\"el1626177366599-bec4f209-5bc6\" class=\"w-100 d-block \"><\/div><div  class=\"pix-heading-el text-center  vc_custom_1626169150459\"><h3 class=\"text-white font-weight-bold h3 heading-text el-title_custom_color mb-12\" style=\"\" data-anim-type=\"\" data-anim-delay=\"0\">DRP<\/h3><\/div><div class=\"pix-el-text w-100  \" ><p class=\"text-18  text-white  \" >Ibercra has a dedicated Disaster Recovery Plan for any failure that may occur in IT systems.<\/p><\/div><a  href=\"\/en\/cibersecurity\/drp\" class=\"btn mb-2    vc_custom_1655974505232   text-white btn-primary d-inline-flex align-items-center      btn-md\"     ><span class=\"font-weight-bold \" >KNOW MORE<\/span><\/a>[\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][\/vc_row][\/vc_section]<\/p>\r\n<\/div>","protected":false},"excerpt":{"rendered":"[vc_section full_width=&#8221;stretch_row&#8221; pix_bg_grdient=&#8221;bg-gradient-dark&#8221; fade_in_opacity=&#8221;pix-opacity-9&#8243; pix_over_visibility=&#8221;&#8221; bottom_divider_select=&#8221;15&#8243; fade_in_intro=&#8221;1589&#8243; el_class=&#8221;seccabecera&#8221;][vc_row pix_particles_check=&#8221;&#8221;][vc_column][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; pix_over_visibility=&#8221;&#8221; bottom_divider_select=&#8221;15&#8243; el_class=&#8221;secprincipal&#8221;][vc_row pix_particles_check=&#8221;&#8221; css=&#8221;.vc_custom_1626177425877{padding-bottom: 5% !important;}&#8221;][vc_column][vc_column_text] Discover all our cybersecurity resources for better protection against any vulnerability. A wide range of services from IT security, virtualization&#8230; to a complete&#8230;","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1885","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity - Ibercra<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/web.ibercra.com\/en\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity - Ibercra\" \/>\n<meta property=\"og:description\" content=\"[vc_section full_width=&#8221;stretch_row&#8221; pix_bg_grdient=&#8221;bg-gradient-dark&#8221; fade_in_opacity=&#8221;pix-opacity-9&#8243; pix_over_visibility=&#8221;&#8221; bottom_divider_select=&#8221;15&#8243; fade_in_intro=&#8221;1589&#8243; el_class=&#8221;seccabecera&#8221;][vc_row pix_particles_check=&#8221;&#8221;][vc_column][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; pix_over_visibility=&#8221;&#8221; bottom_divider_select=&#8221;15&#8243; el_class=&#8221;secprincipal&#8221;][vc_row pix_particles_check=&#8221;&#8221; css=&#8221;.vc_custom_1626177425877{padding-bottom: 5% !important;}&#8221;][vc_column][vc_column_text] Discover all our cybersecurity resources for better protection against any vulnerability. A wide range of services from IT security, virtualization&#8230; to a complete...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/web.ibercra.com\/en\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Ibercra\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-27T08:07:13+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/web.ibercra.com\\\/en\\\/cybersecurity\\\/\",\"url\":\"https:\\\/\\\/web.ibercra.com\\\/en\\\/cybersecurity\\\/\",\"name\":\"Cybersecurity - Ibercra\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/web.ibercra.com\\\/#website\"},\"datePublished\":\"2022-06-23T08:34:35+00:00\",\"dateModified\":\"2022-06-27T08:07:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/web.ibercra.com\\\/en\\\/cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/web.ibercra.com\\\/en\\\/cybersecurity\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/web.ibercra.com\\\/en\\\/cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/web.ibercra.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/web.ibercra.com\\\/#website\",\"url\":\"https:\\\/\\\/web.ibercra.com\\\/\",\"name\":\"Ibercra\",\"description\":\"Central receptora de alarmas\",\"publisher\":{\"@id\":\"https:\\\/\\\/web.ibercra.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/web.ibercra.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/web.ibercra.com\\\/#organization\",\"name\":\"Ibercra\",\"url\":\"https:\\\/\\\/web.ibercra.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/web.ibercra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/web.ibercra.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/ibercra_retina_logo.png\",\"contentUrl\":\"https:\\\/\\\/web.ibercra.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/ibercra_retina_logo.png\",\"width\":620,\"height\":170,\"caption\":\"Ibercra\"},\"image\":{\"@id\":\"https:\\\/\\\/web.ibercra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity - Ibercra","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/web.ibercra.com\/en\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity - Ibercra","og_description":"[vc_section full_width=&#8221;stretch_row&#8221; pix_bg_grdient=&#8221;bg-gradient-dark&#8221; fade_in_opacity=&#8221;pix-opacity-9&#8243; pix_over_visibility=&#8221;&#8221; bottom_divider_select=&#8221;15&#8243; fade_in_intro=&#8221;1589&#8243; el_class=&#8221;seccabecera&#8221;][vc_row pix_particles_check=&#8221;&#8221;][vc_column][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; pix_over_visibility=&#8221;&#8221; bottom_divider_select=&#8221;15&#8243; el_class=&#8221;secprincipal&#8221;][vc_row pix_particles_check=&#8221;&#8221; css=&#8221;.vc_custom_1626177425877{padding-bottom: 5% !important;}&#8221;][vc_column][vc_column_text] Discover all our cybersecurity resources for better protection against any vulnerability. A wide range of services from IT security, virtualization&#8230; to a complete...","og_url":"https:\/\/web.ibercra.com\/en\/cybersecurity\/","og_site_name":"Ibercra","article_modified_time":"2022-06-27T08:07:13+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/web.ibercra.com\/en\/cybersecurity\/","url":"https:\/\/web.ibercra.com\/en\/cybersecurity\/","name":"Cybersecurity - Ibercra","isPartOf":{"@id":"https:\/\/web.ibercra.com\/#website"},"datePublished":"2022-06-23T08:34:35+00:00","dateModified":"2022-06-27T08:07:13+00:00","breadcrumb":{"@id":"https:\/\/web.ibercra.com\/en\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/web.ibercra.com\/en\/cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/web.ibercra.com\/en\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/web.ibercra.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/web.ibercra.com\/#website","url":"https:\/\/web.ibercra.com\/","name":"Ibercra","description":"Central receptora de alarmas","publisher":{"@id":"https:\/\/web.ibercra.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/web.ibercra.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/web.ibercra.com\/#organization","name":"Ibercra","url":"https:\/\/web.ibercra.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/web.ibercra.com\/#\/schema\/logo\/image\/","url":"https:\/\/web.ibercra.com\/wp-content\/uploads\/2021\/02\/ibercra_retina_logo.png","contentUrl":"https:\/\/web.ibercra.com\/wp-content\/uploads\/2021\/02\/ibercra_retina_logo.png","width":620,"height":170,"caption":"Ibercra"},"image":{"@id":"https:\/\/web.ibercra.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/web.ibercra.com\/en\/wp-json\/wp\/v2\/pages\/1885","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.ibercra.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/web.ibercra.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/web.ibercra.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/web.ibercra.com\/en\/wp-json\/wp\/v2\/comments?post=1885"}],"version-history":[{"count":9,"href":"https:\/\/web.ibercra.com\/en\/wp-json\/wp\/v2\/pages\/1885\/revisions"}],"predecessor-version":[{"id":2121,"href":"https:\/\/web.ibercra.com\/en\/wp-json\/wp\/v2\/pages\/1885\/revisions\/2121"}],"wp:attachment":[{"href":"https:\/\/web.ibercra.com\/en\/wp-json\/wp\/v2\/media?parent=1885"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}