{"id":12298,"date":"2022-01-03T15:31:08","date_gmt":"2022-01-03T15:31:08","guid":{"rendered":"https:\/\/powersolution.es\/ciberseguridad\/"},"modified":"2022-03-21T14:52:18","modified_gmt":"2022-03-21T14:52:18","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/www.powersolution.es\/en\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<p>[vc_row content_width=&#8221;grid&#8221; css=&#8221;.vc_custom_1647244037831{padding-top: 50px !important;background-color: #ffffff !important;}&#8221;][vc_column css_animation=&#8221;fadeIn&#8221;]<div class=\"mkd-elements-holder mkd-responsive-mode-768\" ><div class=\"mkd-elements-holder-item mkd-width-1-1 mkd-horizontal-alignment-left\" data-item-class=\"mkd-elements-holder-custom-267734\" >\n\t<div class=\"mkd-elements-holder-item-inner\">\n\t\t<div class=\"mkd-elements-holder-item-content mkd-elements-holder-custom-267734\" >\n            \t\t\t    [vc_single_image image=&#8221;13585&#8243; img_size=&#8221;460&#215;347&#8243; alignment=&#8221;center&#8221;]            \t\t<\/div>\n\t<\/div>\n<\/div><div class=\"mkd-elements-holder-item mkd-width-1-1 mkd-horizontal-alignment-left\" data-item-class=\"mkd-elements-holder-custom-214596\" >\n\t<div class=\"mkd-elements-holder-item-inner\">\n\t\t<div class=\"mkd-elements-holder-item-content mkd-elements-holder-custom-214596\" >\n            \t\t\t    [vc_column_text]<span style=\"font-size: 18px; line-height: 1.8333em;\">At <strong>POWER SOLUTION<\/strong> we provide a transversal service of cybersecurity to our clients in OT environments and production, in order to secure all processes and systems while maintaining accessibility and availability they need by their nature.<\/span>[\/vc_column_text]            \t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][\/vc_row][vc_row content_width=&#8221;grid&#8221; css=&#8221;.vc_custom_1647242424710{padding-top: 50px !important;padding-bottom: 0px !important;background-color: #ffffff !important;}&#8221;][vc_column css_animation=&#8221;fadeIn&#8221; el_id=&#8221;analisis-container&#8221;]<div class=\"mkd-elements-holder mkd-responsive-mode-768\" ><div class=\"mkd-elements-holder-item mkd-width-1-1 mkd-vertical-alignment-top mkd-horizontal-alignment-left\" data-item-class=\"mkd-elements-holder-custom-679552\" >\n\t<div class=\"mkd-elements-holder-item-inner\">\n\t\t<div class=\"mkd-elements-holder-item-content mkd-elements-holder-custom-679552\" >\n            \t\t\t    [vc_column_text]<span style=\"font-size: 18px; line-height: 1.8333em;\">We accompany the final client from the initial study of its facilities through <strong>GAP analysis,<\/strong> which discover the existing architecture and infrastructure and services affected to then give a solution adapted to your production needs, availability and budget always within a cybersecure environment.<\/span><\/p>\n<p><span style=\"font-size: 18px; line-height: 1.8333em;\">We apply cybersecurity practices and tools in customer production environments with high availability needs (power and infrastructures) and included in the security law of critical infrastructures.<\/span>[\/vc_column_text]            \t\t<\/div>\n\t<\/div>\n<\/div><div class=\"mkd-elements-holder-item mkd-width-1-1 mkd-vertical-alignment-top mkd-horizontal-alignment-left\" data-item-class=\"mkd-elements-holder-custom-432192\" >\n\t<div class=\"mkd-elements-holder-item-inner\">\n\t\t<div class=\"mkd-elements-holder-item-content mkd-elements-holder-custom-432192\" >\n            \t\t\t    [vc_single_image image=&#8221;12933&#8243; img_size=&#8221;large&#8221; alignment=&#8221;right&#8221;]            \t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][\/vc_row][vc_row content_width=&#8221;grid&#8221; css=&#8221;.vc_custom_1647244013999{padding-top: 50px !important;padding-bottom: 100px !important;background-color: #ffffff !important;}&#8221;][vc_column css_animation=&#8221;fadeIn&#8221;]<div class=\"mkd-elements-holder mkd-responsive-mode-768\" ><div class=\"mkd-elements-holder-item mkd-width-1-1 mkd-vertical-alignment-top mkd-horizontal-alignment-left\" data-item-class=\"mkd-elements-holder-custom-102844\" >\n\t<div class=\"mkd-elements-holder-item-inner\">\n\t\t<div class=\"mkd-elements-holder-item-content mkd-elements-holder-custom-102844\" >\n            \t\t\t    [vc_single_image image=&#8221;12938&#8243; img_size=&#8221;large&#8221; alignment=&#8221;right&#8221;]            \t\t<\/div>\n\t<\/div>\n<\/div><div class=\"mkd-elements-holder-item mkd-width-1-1 mkd-vertical-alignment-top mkd-horizontal-alignment-left\" data-item-class=\"mkd-elements-holder-custom-180066\" >\n\t<div class=\"mkd-elements-holder-item-inner\">\n\t\t<div class=\"mkd-elements-holder-item-content mkd-elements-holder-custom-180066\" >\n            \t\t\t    [vc_column_text]<span style=\"font-size: 18px; line-height: 1.8333em;\"><strong>POWER SOLUTION<\/strong> has technicians with extensive experience in technology disciplines operational and operational intelligence, dominating the synergy between IT and OT environments and understanding the nature of each environment to provide the security necessary respecting the availability of the processes.&lt;\/span<\/span>[\/vc_column_text]            \t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row content_width=&#8221;grid&#8221; css=&#8221;.vc_custom_1647244037831{padding-top: 50px !important;background-color: #ffffff !important;}&#8221;][vc_column css_animation=&#8221;fadeIn&#8221;][\/vc_column][\/vc_row][vc_row content_width=&#8221;grid&#8221; css=&#8221;.vc_custom_1647242424710{padding-top: 50px !important;padding-bottom: 0px !important;background-color: #ffffff !important;}&#8221;][vc_column css_animation=&#8221;fadeIn&#8221; el_id=&#8221;analisis-container&#8221;][\/vc_column][\/vc_row][vc_row content_width=&#8221;grid&#8221; css=&#8221;.vc_custom_1647244013999{padding-top: 50px !important;padding-bottom: 100px !important;background-color: #ffffff !important;}&#8221;][vc_column css_animation=&#8221;fadeIn&#8221;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width.php","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-12298","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity - Power Solution<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/powersolution.es\/en\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity - Power Solution\" \/>\n<meta property=\"og:description\" content=\"[vc_row content_width=&#8221;grid&#8221; css=&#8221;.vc_custom_1647244037831{padding-top: 50px !important;background-color: #ffffff !important;}&#8221;][vc_column css_animation=&#8221;fadeIn&#8221;][\/vc_column][\/vc_row][vc_row content_width=&#8221;grid&#8221; css=&#8221;.vc_custom_1647242424710{padding-top: 50px !important;padding-bottom: 0px !important;background-color: #ffffff !important;}&#8221;][vc_column css_animation=&#8221;fadeIn&#8221; el_id=&#8221;analisis-container&#8221;][\/vc_column][\/vc_row][vc_row content_width=&#8221;grid&#8221; css=&#8221;.vc_custom_1647244013999{padding-top: 50px !important;padding-bottom: 100px !important;background-color: #ffffff !important;}&#8221;][vc_column css_animation=&#8221;fadeIn&#8221;][\/vc_column][\/vc_row]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/powersolution.es\/en\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Power Solution\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-21T14:52:18+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/powersolution.es\\\/en\\\/cybersecurity\\\/\",\"url\":\"https:\\\/\\\/powersolution.es\\\/en\\\/cybersecurity\\\/\",\"name\":\"Cybersecurity - Power Solution\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.powersolution.es\\\/#website\"},\"datePublished\":\"2022-01-03T15:31:08+00:00\",\"dateModified\":\"2022-03-21T14:52:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/powersolution.es\\\/en\\\/cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/powersolution.es\\\/en\\\/cybersecurity\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/powersolution.es\\\/en\\\/cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.powersolution.com.ar\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.powersolution.es\\\/#website\",\"url\":\"https:\\\/\\\/www.powersolution.es\\\/\",\"name\":\"Power Solution\",\"description\":\"Digitalizaci\u00f3n de empresas industriales\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.powersolution.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.powersolution.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.powersolution.es\\\/#organization\",\"name\":\"Power Solution\",\"url\":\"https:\\\/\\\/www.powersolution.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.powersolution.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/powersolution.es\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Post-POWER-SOLUTION.jpg\",\"contentUrl\":\"https:\\\/\\\/powersolution.es\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Post-POWER-SOLUTION.jpg\",\"width\":1300,\"height\":840,\"caption\":\"Power Solution\"},\"image\":{\"@id\":\"https:\\\/\\\/www.powersolution.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/power-solution-global\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity - Power Solution","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/powersolution.es\/en\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity - Power Solution","og_description":"[vc_row content_width=&#8221;grid&#8221; css=&#8221;.vc_custom_1647244037831{padding-top: 50px !important;background-color: #ffffff !important;}&#8221;][vc_column css_animation=&#8221;fadeIn&#8221;][\/vc_column][\/vc_row][vc_row content_width=&#8221;grid&#8221; css=&#8221;.vc_custom_1647242424710{padding-top: 50px !important;padding-bottom: 0px !important;background-color: #ffffff !important;}&#8221;][vc_column css_animation=&#8221;fadeIn&#8221; el_id=&#8221;analisis-container&#8221;][\/vc_column][\/vc_row][vc_row content_width=&#8221;grid&#8221; css=&#8221;.vc_custom_1647244013999{padding-top: 50px !important;padding-bottom: 100px !important;background-color: #ffffff !important;}&#8221;][vc_column css_animation=&#8221;fadeIn&#8221;][\/vc_column][\/vc_row]","og_url":"https:\/\/powersolution.es\/en\/cybersecurity\/","og_site_name":"Power Solution","article_modified_time":"2022-03-21T14:52:18+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/powersolution.es\/en\/cybersecurity\/","url":"https:\/\/powersolution.es\/en\/cybersecurity\/","name":"Cybersecurity - Power Solution","isPartOf":{"@id":"https:\/\/www.powersolution.es\/#website"},"datePublished":"2022-01-03T15:31:08+00:00","dateModified":"2022-03-21T14:52:18+00:00","breadcrumb":{"@id":"https:\/\/powersolution.es\/en\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/powersolution.es\/en\/cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/powersolution.es\/en\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.powersolution.com.ar\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.powersolution.es\/#website","url":"https:\/\/www.powersolution.es\/","name":"Power Solution","description":"Digitalizaci\u00f3n de empresas industriales","publisher":{"@id":"https:\/\/www.powersolution.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.powersolution.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.powersolution.es\/#organization","name":"Power Solution","url":"https:\/\/www.powersolution.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.powersolution.es\/#\/schema\/logo\/image\/","url":"https:\/\/powersolution.es\/wp-content\/uploads\/2022\/04\/Post-POWER-SOLUTION.jpg","contentUrl":"https:\/\/powersolution.es\/wp-content\/uploads\/2022\/04\/Post-POWER-SOLUTION.jpg","width":1300,"height":840,"caption":"Power Solution"},"image":{"@id":"https:\/\/www.powersolution.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/power-solution-global"]}]}},"_links":{"self":[{"href":"https:\/\/www.powersolution.es\/en\/wp-json\/wp\/v2\/pages\/12298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.powersolution.es\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.powersolution.es\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.powersolution.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.powersolution.es\/en\/wp-json\/wp\/v2\/comments?post=12298"}],"version-history":[{"count":27,"href":"https:\/\/www.powersolution.es\/en\/wp-json\/wp\/v2\/pages\/12298\/revisions"}],"predecessor-version":[{"id":13664,"href":"https:\/\/www.powersolution.es\/en\/wp-json\/wp\/v2\/pages\/12298\/revisions\/13664"}],"wp:attachment":[{"href":"https:\/\/www.powersolution.es\/en\/wp-json\/wp\/v2\/media?parent=12298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}