{"id":128,"date":"2022-02-22T10:16:21","date_gmt":"2022-02-22T10:16:21","guid":{"rendered":"https:\/\/blg1.j2sec.com\/?page_id=128"},"modified":"2023-04-26T18:59:52","modified_gmt":"2023-04-26T18:59:52","slug":"sobre-nosotros","status":"publish","type":"page","link":"https:\/\/blg1.j2sec.com\/index.php\/sobre-nosotros\/","title":{"rendered":"Sobre Nosotros"},"content":{"rendered":"\n<p>J2sec apuesta por el desarrollo de nuevas tecnolog\u00edas de seguridad encaminadas a la prevenci\u00f3n de riesgos y a la gesti\u00f3n de infraestructuras cr\u00edticas. La experiencia acumulada en el sector de las TIC durante mas de 15 a\u00f1os, nos lleva a desarrollar una labor de consultor\u00eda enfocada a la consecuci\u00f3n de objetivos de todos nuestros clientes. En J2sec pensamos que la base del \u00e9xito de cualquier proyecto se sustenta en una dedicada labor y un desarrollo tecnol\u00f3gico adecuado a las caracter\u00edsticas de cada cliente.<\/p>\n\n\n\n<p>Por ello, nuestra compa\u00f1\u00eda se enfoca en la implementaci\u00f3n de soluciones de seguridad vanguardistas, tales como la detecci\u00f3n temprana de amenazas, el monitoreo de infraestructuras y la gesti\u00f3n de crisis. Adem\u00e1s, ofrecemos servicios de consultor\u00eda en ciberseguridad, evaluaciones de riesgos y capacitaci\u00f3n para empleados en materia de seguridad inform\u00e1tica.<\/p>\n\n\n\n<p>Nos esforzamos por mantenernos actualizados en cuanto a las \u00faltimas tendencias y avances en tecnolog\u00eda de seguridad, a trav\u00e9s de la investigaci\u00f3n y el desarrollo de nuevas soluciones que nos permitan seguir brindando a nuestros clientes la mejor protecci\u00f3n posible.<\/p>\n\n\n\n<p>En resumen, en J2sec nos dedicamos a ayudar a nuestros clientes a alcanzar sus objetivos a trav\u00e9s de soluciones de seguridad innovadoras y personalizadas, basadas en nuestra experiencia y conocimiento en el sector de las TIC.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-jetpack-tiled-gallery aligncenter is-style-rectangular\"><div class=\"tiled-gallery__gallery\"><div class=\"tiled-gallery__row\"><div class=\"tiled-gallery__col\" style=\"flex-basis:52.92558%\"><figure class=\"tiled-gallery__item\"><img decoding=\"async\" srcset=\"https:\/\/i0.wp.com\/blg1.j2sec.com\/wp-content\/uploads\/2023\/04\/microsoft-logo.jpg?strip=info&#038;w=600&#038;ssl=1 600w,https:\/\/i0.wp.com\/blg1.j2sec.com\/wp-content\/uploads\/2023\/04\/microsoft-logo.jpg?strip=info&#038;w=640&#038;ssl=1 640w\" alt=\"\" data-height=\"356\" data-id=\"143\" data-link=\"https:\/\/blg1.j2sec.com\/index.php\/sobre-nosotros\/microsoft-logo-2\/\" data-url=\"https:\/\/blg1.j2sec.com\/wp-content\/uploads\/2023\/04\/microsoft-logo.jpg\" data-width=\"640\" src=\"https:\/\/i0.wp.com\/blg1.j2sec.com\/wp-content\/uploads\/2023\/04\/microsoft-logo.jpg?ssl=1\" data-amp-layout=\"responsive\"\/><\/figure><\/div><div class=\"tiled-gallery__col\" style=\"flex-basis:47.07442%\"><figure class=\"tiled-gallery__item\"><img decoding=\"async\" srcset=\"https:\/\/i1.wp.com\/blg1.j2sec.com\/wp-content\/uploads\/2023\/04\/vmware-logo.png?strip=info&#038;w=600&#038;ssl=1 600w,https:\/\/i1.wp.com\/blg1.j2sec.com\/wp-content\/uploads\/2023\/04\/vmware-logo.png?strip=info&#038;w=620&#038;ssl=1 620w\" alt=\"\" data-height=\"388\" data-id=\"144\" data-link=\"https:\/\/blg1.j2sec.com\/index.php\/sobre-nosotros\/vmware-logo-2\/\" data-url=\"https:\/\/blg1.j2sec.com\/wp-content\/uploads\/2023\/04\/vmware-logo.png\" data-width=\"620\" src=\"https:\/\/i1.wp.com\/blg1.j2sec.com\/wp-content\/uploads\/2023\/04\/vmware-logo.png?ssl=1\" data-amp-layout=\"responsive\"\/><\/figure><\/div><\/div><div class=\"tiled-gallery__row\"><div class=\"tiled-gallery__col\" style=\"flex-basis:30.96369%\"><figure class=\"tiled-gallery__item\"><img decoding=\"async\" srcset=\"https:\/\/i1.wp.com\/blg1.j2sec.com\/wp-content\/uploads\/2023\/04\/Bit-Defender1.png?strip=info&#038;w=300&#038;ssl=1 300w\" alt=\"\" data-height=\"168\" data-id=\"145\" data-link=\"https:\/\/blg1.j2sec.com\/index.php\/sobre-nosotros\/bit-defender1\/\" data-url=\"https:\/\/blg1.j2sec.com\/wp-content\/uploads\/2023\/04\/Bit-Defender1.png\" data-width=\"300\" src=\"https:\/\/i1.wp.com\/blg1.j2sec.com\/wp-content\/uploads\/2023\/04\/Bit-Defender1.png?ssl=1\" data-amp-layout=\"responsive\"\/><\/figure><\/div><div class=\"tiled-gallery__col\" style=\"flex-basis:30.96369%\"><figure class=\"tiled-gallery__item\"><img decoding=\"async\" srcset=\"https:\/\/i2.wp.com\/blg1.j2sec.com\/wp-content\/uploads\/2023\/04\/dlink2.png?strip=info&#038;w=300&#038;ssl=1 300w\" alt=\"\" data-height=\"168\" data-id=\"146\" data-link=\"https:\/\/blg1.j2sec.com\/index.php\/sobre-nosotros\/dlink2\/\" data-url=\"https:\/\/blg1.j2sec.com\/wp-content\/uploads\/2023\/04\/dlink2.png\" data-width=\"300\" src=\"https:\/\/i2.wp.com\/blg1.j2sec.com\/wp-content\/uploads\/2023\/04\/dlink2.png?ssl=1\" data-amp-layout=\"responsive\"\/><\/figure><\/div><div class=\"tiled-gallery__col\" style=\"flex-basis:38.07263%\"><figure class=\"tiled-gallery__item\"><img decoding=\"async\" srcset=\"https:\/\/i1.wp.com\/blg1.j2sec.com\/wp-content\/uploads\/2023\/04\/logo-checkpoint.jpg?strip=info&#038;w=600&#038;ssl=1 600w,https:\/\/i1.wp.com\/blg1.j2sec.com\/wp-content\/uploads\/2023\/04\/logo-checkpoint.jpg?strip=info&#038;w=770&#038;ssl=1 770w\" alt=\"\" data-height=\"350\" data-id=\"147\" data-link=\"https:\/\/blg1.j2sec.com\/index.php\/sobre-nosotros\/logo-checkpoint-2\/\" data-url=\"https:\/\/blg1.j2sec.com\/wp-content\/uploads\/2023\/04\/logo-checkpoint.jpg\" data-width=\"770\" src=\"https:\/\/i1.wp.com\/blg1.j2sec.com\/wp-content\/uploads\/2023\/04\/logo-checkpoint.jpg?ssl=1\" data-amp-layout=\"responsive\"\/><\/figure><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>J2sec apuesta por el desarrollo de nuevas tecnolog\u00edas de seguridad encaminadas a la prevenci\u00f3n de riesgos y a la gesti\u00f3n de infraestructuras cr\u00edticas. La experiencia acumulada en el sector de las TIC durante mas de 15 a\u00f1os, nos lleva a &hellip; <a href=\"https:\/\/blg1.j2sec.com\/index.php\/sobre-nosotros\/\">Sigue leyendo <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-128","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blg1.j2sec.com\/index.php\/wp-json\/wp\/v2\/pages\/128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blg1.j2sec.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blg1.j2sec.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blg1.j2sec.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blg1.j2sec.com\/index.php\/wp-json\/wp\/v2\/comments?post=128"}],"version-history":[{"count":3,"href":"https:\/\/blg1.j2sec.com\/index.php\/wp-json\/wp\/v2\/pages\/128\/revisions"}],"predecessor-version":[{"id":162,"href":"https:\/\/blg1.j2sec.com\/index.php\/wp-json\/wp\/v2\/pages\/128\/revisions\/162"}],"wp:attachment":[{"href":"https:\/\/blg1.j2sec.com\/index.php\/wp-json\/wp\/v2\/media?parent=128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}