{"id":1766,"date":"2023-02-22T17:46:57","date_gmt":"2023-02-22T17:46:57","guid":{"rendered":"http:\/\/livedemo.templatation.com\/guardwp1\/?p=1766"},"modified":"2023-02-22T17:51:26","modified_gmt":"2023-02-22T17:51:26","slug":"division-comsec","status":"publish","type":"post","link":"https:\/\/bpintelligence.com\/es\/division-comsec\/","title":{"rendered":"Divisi\u00f3n ComSec"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1072\" height=\"588\" class=\"alignnone size-medium wp-image-1559\" src=\"https:\/\/livedemo.templatation.com\/guardwp1\/wp-content\/uploads\/sites\/41\/2016\/03\/1-7.jpg\" alt=\"1 (7)\" srcset=\"https:\/\/bpintelligence.com\/wp-content\/uploads\/2016\/03\/1-7.jpg 1072w, https:\/\/bpintelligence.com\/wp-content\/uploads\/2016\/03\/1-7-300x165.jpg 300w, https:\/\/bpintelligence.com\/wp-content\/uploads\/2016\/03\/1-7-1024x562.jpg 1024w, https:\/\/bpintelligence.com\/wp-content\/uploads\/2016\/03\/1-7-768x421.jpg 768w\" sizes=\"(max-width: 1072px) 100vw, 1072px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Nuestra Divisi\u00f3n Intel se dedica a dise\u00f1ar y habilitar las medidas y controles necesarios para evitar fugas de informaci\u00f3n, as\u00ed como negar a personas no autorizadas el acceso a\u00a0 informaci\u00f3n derivada de las propias telecomunicaciones, con la finalidad de garantizar la privacidad y autenticidad de la comunicaci\u00f3n.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">DPR &#8211; Control de Confianza<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Dispositivos de Comunicaci\u00f3n de Alta Seguridad<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">CSMA &#8211; Arquitectura mesh de ciberseguridad<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Integraci\u00f3n de soluciones avanzadas de telecomunicaciones<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Nuestra Divisi\u00f3n Intel se dedica a dise\u00f1ar y habilitar las medidas y controles necesarios para evitar fugas de informaci\u00f3n, as\u00ed como negar a personas no autorizadas el acceso a\u00a0 informaci\u00f3n derivada de las propias telecomunicaciones, con la finalidad de garantizar la privacidad y autenticidad de la comunicaci\u00f3n. DPR &#8211; Control de Confianza Dispositivos de Comunicaci\u00f3n [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1502,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[34,1],"tags":[],"_links":{"self":[{"href":"https:\/\/bpintelligence.com\/es\/wp-json\/wp\/v2\/posts\/1766"}],"collection":[{"href":"https:\/\/bpintelligence.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bpintelligence.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bpintelligence.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bpintelligence.com\/es\/wp-json\/wp\/v2\/comments?post=1766"}],"version-history":[{"count":1,"href":"https:\/\/bpintelligence.com\/es\/wp-json\/wp\/v2\/posts\/1766\/revisions"}],"predecessor-version":[{"id":1986,"href":"https:\/\/bpintelligence.com\/es\/wp-json\/wp\/v2\/posts\/1766\/revisions\/1986"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bpintelligence.com\/es\/wp-json\/wp\/v2\/media\/1502"}],"wp:attachment":[{"href":"https:\/\/bpintelligence.com\/es\/wp-json\/wp\/v2\/media?parent=1766"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bpintelligence.com\/es\/wp-json\/wp\/v2\/categories?post=1766"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bpintelligence.com\/es\/wp-json\/wp\/v2\/tags?post=1766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}