{"id":20,"date":"2021-04-26T11:11:33","date_gmt":"2021-04-26T11:11:33","guid":{"rendered":"https:\/\/blg1.j2sec.com\/?page_id=20"},"modified":"2023-04-26T19:03:09","modified_gmt":"2023-04-26T19:03:09","slug":"j2sec","status":"publish","type":"page","link":"https:\/\/blg1.j2sec.com\/","title":{"rendered":"J2sec Secure Systems"},"content":{"rendered":"\n<p><strong>SOLUCIONES<\/strong>,                                            <strong>CONSULTORIA<\/strong>,                                      <strong> I+D, ENERGIAS RENOVABLES<\/strong><\/p>\n\n\n\n<div class=\"wp-block-jetpack-tiled-gallery aligncenter is-style-square\"><div class=\"tiled-gallery__gallery\"><div class=\"tiled-gallery__row columns-3\"><div class=\"tiled-gallery__col\"><figure class=\"tiled-gallery__item\"><img decoding=\"async\" srcset=\"https:\/\/i0.wp.com\/blg1.j2sec.com\/wp-content\/uploads\/2022\/02\/67092c06997c5975918621619aacfeb5_300x120-2.jpg?resize=120%2C120&#038;strip=info&#038;ssl=1 120w\" alt=\"\" data-height=\"120\" data-id=\"106\" data-link=\"https:\/\/blg1.j2sec.com\/index.php\/j2sec\/67092c06997c5975918621619aacfeb5_300x120-2\/\" data-url=\"https:\/\/blg1.j2sec.com\/wp-content\/uploads\/2022\/02\/67092c06997c5975918621619aacfeb5_300x120-2.jpg\" data-width=\"253\" src=\"https:\/\/i0.wp.com\/blg1.j2sec.com\/wp-content\/uploads\/2022\/02\/67092c06997c5975918621619aacfeb5_300x120-2.jpg?ssl=1&amp;resize=120%2C120\" data-amp-layout=\"responsive\"\/><\/figure><\/div><div class=\"tiled-gallery__col\"><figure class=\"tiled-gallery__item\"><img decoding=\"async\" srcset=\"https:\/\/i2.wp.com\/blg1.j2sec.com\/wp-content\/uploads\/2022\/02\/cdcc415b28e181fd4a205fbfa6b6b7fa_290x120-3.jpg?resize=120%2C120&#038;strip=info&#038;ssl=1 120w\" alt=\"\" data-height=\"120\" data-id=\"107\" data-link=\"https:\/\/blg1.j2sec.com\/index.php\/j2sec\/cdcc415b28e181fd4a205fbfa6b6b7fa_290x120-3\/\" data-url=\"https:\/\/blg1.j2sec.com\/wp-content\/uploads\/2022\/02\/cdcc415b28e181fd4a205fbfa6b6b7fa_290x120-3.jpg\" data-width=\"253\" src=\"https:\/\/i2.wp.com\/blg1.j2sec.com\/wp-content\/uploads\/2022\/02\/cdcc415b28e181fd4a205fbfa6b6b7fa_290x120-3.jpg?ssl=1&amp;resize=120%2C120\" data-amp-layout=\"responsive\"\/><\/figure><\/div><div class=\"tiled-gallery__col\"><figure class=\"tiled-gallery__item\"><img decoding=\"async\" srcset=\"https:\/\/i0.wp.com\/blg1.j2sec.com\/wp-content\/uploads\/2022\/02\/0072da0c889be29709bb4538294a5640_380x150-2.jpg?resize=150%2C150&#038;strip=info&#038;ssl=1 150w\" alt=\"\" data-height=\"150\" data-id=\"108\" data-link=\"https:\/\/blg1.j2sec.com\/index.php\/j2sec\/0072da0c889be29709bb4538294a5640_380x150-2\/\" data-url=\"https:\/\/blg1.j2sec.com\/wp-content\/uploads\/2022\/02\/0072da0c889be29709bb4538294a5640_380x150-2.jpg\" data-width=\"307\" src=\"https:\/\/i0.wp.com\/blg1.j2sec.com\/wp-content\/uploads\/2022\/02\/0072da0c889be29709bb4538294a5640_380x150-2.jpg?ssl=1&amp;resize=150%2C150\" data-amp-layout=\"responsive\"\/><\/figure><\/div><\/div><\/div><\/div>\n\n\n\n\n\n<p>J2sec apuesta por el desarrollo de nuevas tecnolog\u00edas de seguridad encaminadas a la prevenci\u00f3n de riesgos y a la gesti\u00f3n de infraestructuras cr\u00edticas. La experiencia acumulada en el sector de las TIC durante mas de 15 a\u00f1os, nos lleva a desarrollar una labor de consultor\u00eda enfocada a la consecuci\u00f3n de objetivos de todos nuestros clientes. En J2sec pensamos que la base del \u00e9xito de cualquier proyecto se sustenta en una dedicada labor y un desarrollo tecnol\u00f3gico adecuado a las caracter\u00edsticas de cada cliente.<\/p>\n\n\n\n<p>Nuestro enfoque se basa en la detecci\u00f3n de posibles brechas de seguridad y en la implementaci\u00f3n de soluciones preventivas y de gesti\u00f3n de riesgos. Creemos en la importancia de la formaci\u00f3n continua y la actualizaci\u00f3n constante de los conocimientos tecnol\u00f3gicos para poder ofrecer a nuestros clientes las mejores soluciones del mercado.<\/p>\n\n\n\n<p>En J2sec trabajamos para adaptarnos a las necesidades espec\u00edficas de cada cliente y ofrecerles una soluci\u00f3n a medida. Trabajamos con las principales tecnolog\u00edas de seguridad del mercado y contamos con un equipo de profesionales altamente cualificados y certificados en diferentes \u00e1reas de la seguridad inform\u00e1tica.<\/p>\n\n\n\n<p>Estamos comprometidos con la satisfacci\u00f3n total de nuestros clientes y nos esforzamos por ofrecer un servicio de calidad que supere sus expectativas. En definitiva, en J2sec apostamos por el desarrollo tecnol\u00f3gico y la seguridad como dos pilares fundamentales para el \u00e9xito de cualquier proyecto.<\/p>\n\n\n\n<div style=\"height:43px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"alignwide has-text-align-wide has-gigantic-font-size wp-block-heading\" id=\"principales-tecnologias\" style=\"line-height:1.1\">Principales Tecnolog\u00edas<\/h2>\n\n\n\n<div style=\"height:26px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns alignwide are-vertically-aligned-center is-style-twentytwentyone-columns-overlap is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image alignfull size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"620\" height=\"388\" src=\"https:\/\/blg1.j2sec.com\/wp-content\/uploads\/2021\/04\/vmware-logo.png\" alt=\"\" class=\"wp-image-56\" srcset=\"https:\/\/blg1.j2sec.com\/wp-content\/uploads\/2021\/04\/vmware-logo.png 620w, https:\/\/blg1.j2sec.com\/wp-content\/uploads\/2021\/04\/vmware-logo-300x188.png 300w, https:\/\/blg1.j2sec.com\/wp-content\/uploads\/2021\/04\/vmware-logo-479x300.png 479w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/figure>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image alignfull size-large is-style-twentytwentyone-image-frame\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"356\" src=\"https:\/\/blg1.j2sec.com\/wp-content\/uploads\/2021\/04\/microsoft-logo.jpg\" alt=\"\" class=\"wp-image-58\" srcset=\"https:\/\/blg1.j2sec.com\/wp-content\/uploads\/2021\/04\/microsoft-logo.jpg 640w, https:\/\/blg1.j2sec.com\/wp-content\/uploads\/2021\/04\/microsoft-logo-300x167.jpg 300w, https:\/\/blg1.j2sec.com\/wp-content\/uploads\/2021\/04\/microsoft-logo-500x278.jpg 500w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large alignfull size-full is-style-twentytwentyone-border\"><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"350\" src=\"https:\/\/blg1.j2sec.com\/wp-content\/uploads\/2021\/04\/logo-checkpoint.jpg\" alt=\"\" class=\"wp-image-54\" srcset=\"https:\/\/blg1.j2sec.com\/wp-content\/uploads\/2021\/04\/logo-checkpoint.jpg 770w, https:\/\/blg1.j2sec.com\/wp-content\/uploads\/2021\/04\/logo-checkpoint-300x136.jpg 300w, https:\/\/blg1.j2sec.com\/wp-content\/uploads\/2021\/04\/logo-checkpoint-768x349.jpg 768w, https:\/\/blg1.j2sec.com\/wp-content\/uploads\/2021\/04\/logo-checkpoint-500x227.jpg 500w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns alignwide are-vertically-aligned-top is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"vmware\">vmware<\/h3>\n\n\n\n<p>VMware proporciona software de virtualizaci\u00f3n disponible para ordenadores compatibles X86. Entre este software se incluyen VMware Workstation, y los complementarios VMware Server y VMware Player. El software de VMware puede funcionar sobe plataformas Linux, Windows y mac OS bajo el nombre de&nbsp;<strong>VMware Fusion<\/strong>. A nivel servidor destaca la plataforma ESXi.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"checkpoint\">checkpoint<\/h3>\n\n\n\n<p>Check Point Software Technologies Ltd. es un proveedor global de soluciones de seguridad IT. Conocido por sus productos de cortafuegos y VPN, Check Point fue pionero en la industria con FireWall-1. La compa\u00f1\u00eda ha desarrollado soluciones de software que cubren todo tipo de aspectos sobre seguridad IT, incluyendo seguridad de red, seguridad endpoint y seguridad de datos.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"microsoft\">microsoft<\/h3>\n\n\n\n<p>Microsoft Corporation es una compa\u00f1\u00eda tecnol\u00f3gica multinacional con sede en Redmond, Washington, Estados Unidos. Microsoft es el acr\u00f3nimo de microcomputer y software.\u200b   Desarrolla, manufactura, licencia y provee soporte de software para computadores personales, servidores, dispositivos electr\u00f3nicos y servicios. Son los creadores del sistema operativo Windows<\/p>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SOLUCIONES, CONSULTORIA, I+D, ENERGIAS RENOVABLES J2sec apuesta por el desarrollo de nuevas tecnolog\u00edas de seguridad encaminadas a la prevenci\u00f3n de riesgos y a la gesti\u00f3n de infraestructuras cr\u00edticas. La experiencia acumulada en el sector de las TIC durante mas de &hellip; <a href=\"https:\/\/blg1.j2sec.com\/\">Sigue leyendo <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-20","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blg1.j2sec.com\/index.php\/wp-json\/wp\/v2\/pages\/20","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blg1.j2sec.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blg1.j2sec.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blg1.j2sec.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blg1.j2sec.com\/index.php\/wp-json\/wp\/v2\/comments?post=20"}],"version-history":[{"count":30,"href":"https:\/\/blg1.j2sec.com\/index.php\/wp-json\/wp\/v2\/pages\/20\/revisions"}],"predecessor-version":[{"id":163,"href":"https:\/\/blg1.j2sec.com\/index.php\/wp-json\/wp\/v2\/pages\/20\/revisions\/163"}],"wp:attachment":[{"href":"https:\/\/blg1.j2sec.com\/index.php\/wp-json\/wp\/v2\/media?parent=20"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}