{"id":8100,"date":"2025-02-05T09:27:25","date_gmt":"2025-02-05T09:27:25","guid":{"rendered":"https:\/\/cyberwatch.fr\/funciones-del-administrador-de-vulnerabilidades\/"},"modified":"2025-12-09T10:43:09","modified_gmt":"2025-12-09T10:43:09","slug":"funciones-del-administrador-de-vulnerabilidades","status":"publish","type":"page","link":"https:\/\/cyberwatch.fr\/es\/funciones-del-administrador-de-vulnerabilidades\/","title":{"rendered":"Funcionalidades del Vulnerability Manager"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbFeatures\u00bb _builder_version=\u00bb4.9.4&#8243; background_enable_color=\u00bboff\u00bb use_background_color_gradient=\u00bbon\u00bb background_color_gradient_start=\u00bb#3c4b64&#8243; background_color_gradient_end=\u00bb#3c4b64&#8243; background_color_gradient_type=\u00bbradial\u00bb background_color_gradient_start_position=\u00bb27%\u00bb background_image=\u00bbhttps:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/06\/Header_VM-3.png\u00bb background_blend=\u00bboverlay\u00bb custom_padding=\u00bb40px|0px|40px|0px||\u00bb][et_pb_row _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px||||false|false\u00bb global_module=\u00bb2861&#8243;][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb][lwp_divi_breadcrumbs home_text=\u00bbAccueil\u00bb font_icon=\u00bb%%20%%\u00bb _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb][\/lwp_divi_breadcrumbs][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px||0px||false|false\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb0px||0px||false|false\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb][et_pb_text _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbPoppins|600||on|||||\u00bb text_text_color=\u00bb#ffffff\u00bb text_font_size=\u00bb18px\u00bb text_line_height=\u00bb1em\u00bb header_font=\u00bbPoppins||||||||\u00bb header_text_color=\u00bb#FFFFFF\u00bb header_font_size=\u00bb35px\u00bb header_line_height=\u00bb1.2em\u00bb text_orientation=\u00bbcenter\u00bb width=\u00bb74%\u00bb width_tablet=\u00bb\u00bb width_phone=\u00bb100%\u00bb width_last_edited=\u00bbon|phone\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||20px||false|false\u00bb custom_padding=\u00bb||||false|false\u00bb text_font_size_tablet=\u00bb\u00bb text_font_size_phone=\u00bb14px\u00bb text_font_size_last_edited=\u00bbon|phone\u00bb]<\/p>\n<p>Cyberwatch Vulnerability Manager<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#000000&#8243; text_font_size=\u00bb16px\u00bb text_line_height=\u00bb2em\u00bb header_font=\u00bbPoppins||||||||\u00bb header_text_align=\u00bbcenter\u00bb header_text_color=\u00bb#ffffff\u00bb header_font_size=\u00bb35px\u00bb header_line_height=\u00bb1.2em\u00bb header_2_text_color=\u00bb#000000&#8243; width=\u00bb74%\u00bb width_tablet=\u00bb100%\u00bb width_phone=\u00bb\u00bb width_last_edited=\u00bbon|phone\u00bb max_width_tablet=\u00bb\u00bb max_width_phone=\u00bb150%\u00bb max_width_last_edited=\u00bbon|phone\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||||false|false\u00bb custom_padding=\u00bb5px||||false|false\u00bb hover_enabled=\u00bb0&#8243; header_font_size_tablet=\u00bb\u00bb header_font_size_phone=\u00bb25px\u00bb header_font_size_last_edited=\u00bbon|phone\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<h1>Descubre las funcionalidades de nuestra plataforma para monitorear tus vulnerabilidades<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbProduits\u00bb _builder_version=\u00bb4.9.4&#8243; background_enable_color=\u00bboff\u00bb custom_padding=\u00bb1px||40px|||\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb30px||30px||true|false\u00bb background_last_edited=\u00bbon|phone\u00bb background_enable_color_phone=\u00bboff\u00bb][et_pb_row column_structure=\u00bb1_2,1_2&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbImagen del lado derecho\u00bb _builder_version=\u00bb4.9.4&#8243; custom_padding=\u00bb40px|0px|40px|0px|true|false\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb0px|0px|30px|0px|false|false\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text _builder_version=\u00bb4.9.4&#8243; text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#636F83&#8243; text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bbPoppins||||||||\u00bb header_text_align=\u00bbleft\u00bb header_text_color=\u00bb#535b7c\u00bb header_font_size=\u00bb27px\u00bb header_line_height=\u00bb1.4em\u00bb header_2_font=\u00bbPoppins|600||on|||||\u00bb header_2_text_align=\u00bbleft\u00bb header_2_text_color=\u00bb#000000&#8243; header_2_font_size=\u00bb16px\u00bb header_2_line_height=\u00bb1.3em\u00bb header_3_text_align=\u00bbleft\u00bb header_3_font_size=\u00bb27px\u00bb header_3_line_height=\u00bb1.4em\u00bb max_width=\u00bb100%\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb0px||0px||false|false\u00bb hover_enabled=\u00bb0&#8243; text_text_color_tablet=\u00bb\u00bb text_text_color_phone=\u00bb#ffffff\u00bb text_text_color_last_edited=\u00bbon|phone\u00bb header_2_text_align_tablet=\u00bbcenter\u00bb header_2_text_align_phone=\u00bbcenter\u00bb header_2_text_align_last_edited=\u00bbon|phone\u00bb header_2_text_color_tablet=\u00bb\u00bb header_2_text_color_phone=\u00bb#000000&#8243; header_2_text_color_last_edited=\u00bbon|phone\u00bb header_3_text_align_tablet=\u00bbcenter\u00bb header_3_text_align_phone=\u00bbcenter\u00bb header_3_text_align_last_edited=\u00bbon|phone\u00bb header_3_font_size_tablet=\u00bb\u00bb header_3_font_size_phone=\u00bb22px\u00bb header_3_font_size_last_edited=\u00bbon|phone\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<h2>Cartograf\u00eda<\/h2>\n<h3>Obt\u00e9n la visibilidad completa y continua de tus activos<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.9.4&#8243; text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#636F83&#8243; text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bbPoppins||||||||\u00bb header_text_align=\u00bbleft\u00bb header_text_color=\u00bb#535b7c\u00bb header_font_size=\u00bb27px\u00bb header_line_height=\u00bb1.4em\u00bb header_2_font=\u00bbPoppins|600||on|||||\u00bb header_2_text_color=\u00bb#000000&#8243; header_2_font_size=\u00bb16px\u00bb header_2_line_height=\u00bb1.3em\u00bb header_3_line_height=\u00bb1.4em\u00bb max_width=\u00bb700px\u00bb module_alignment=\u00bbcenter\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb|0px||0px|false|false\u00bb custom_padding_last_edited=\u00bbon|phone\u00bb hover_enabled=\u00bb0&#8243; text_text_color_tablet=\u00bb\u00bb text_text_color_phone=\u00bb#3C4B64&#8243; text_text_color_last_edited=\u00bbon|phone\u00bb header_2_text_color_tablet=\u00bb\u00bb header_2_text_color_phone=\u00bb#000000&#8243; header_2_text_color_last_edited=\u00bbon|phone\u00bb text_orientation_tablet=\u00bbcenter\u00bb text_orientation_phone=\u00bbcenter\u00bb text_orientation_last_edited=\u00bbon|phone\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<p>Identifica los elementos de tu sistema de informaci\u00f3n utilizando nuestro motor de descubrimiento de activos.<\/p>\n<p>Escanea peri\u00f3dicamente tu red para identificar los \u00abShadow IT\u00bb y nuevos dominios y subdominios que te pertenecen.<\/p>\n<p>Tambi\u00e9n puedes interconectar nuestra plataforma con tus herramientas de gesti\u00f3n de infraestructura (CMDB, LDAP, Active Directory, OpenStack, VMWare, vSphere, Amazon Web Services, Microsoft Azure, Google Cloud Platform, etc.), para proteger tu superficie de exposici\u00f3n.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiIsImVuYWJsZV9odG1sIjoib2ZmIn19@\u00bb button_text=\u00bbSolicitar una demostraci\u00f3n\u00bb button_alignment=\u00bbleft\u00bb button_alignment_tablet=\u00bbcenter\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bbon|tablet\u00bb _builder_version=\u00bb4.9.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#321fdb\u00bb button_border_width=\u00bb2px\u00bb button_border_color=\u00bbRGBA(0,0,0,0)\u00bb button_border_radius=\u00bb10px\u00bb button_font=\u00bbPoppins||||||||\u00bb button_icon=\u00bb%%3%%\u00bb button_icon_color=\u00bb#ffffff\u00bb button_on_hover=\u00bboff\u00bb background_layout=\u00bbdark\u00bb custom_margin=\u00bb||||false|false\u00bb custom_padding=\u00bb10px|35px|10px|15px|false|false\u00bb global_module=\u00bb2108&#8243; saved_tabs=\u00bball\u00bb transform_styles__hover_enabled=\u00bbon|hover\u00bb transform_scale__hover_enabled=\u00bbon|hover\u00bb transform_translate__hover_enabled=\u00bbon|desktop\u00bb transform_rotate__hover_enabled=\u00bbon|desktop\u00bb transform_skew__hover_enabled=\u00bbon|desktop\u00bb transform_origin__hover_enabled=\u00bbon|desktop\u00bb button_bg_color__hover_enabled=\u00bbon|hover\u00bb button_bg_color__hover=\u00bb#301abf\u00bb button_bg_enable_color__hover=\u00bbon\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_image src=\u00bbhttps:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/cyberwatch-fr-fonctionnalites-commun-cartographie.gif\u00bb alt=\u00bbIdentifica los elementos presentes en tu sistema de informaci\u00f3n gracias al motor de descubrimiento de activos de Cyberwatch\u00bb title_text=\u00bbMapeo de activos\u00bb show_in_lightbox=\u00bbon\u00bb _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb40px||||false|false\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb0px||||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb||||false|false\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb][et_pb_divider color=\u00bb#CED2D8&#8243; divider_position=\u00bbcenter\u00bb _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb2px|||||\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_2,1_2&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbImagen del lado derecho\u00bb _builder_version=\u00bb4.9.4&#8243; custom_padding=\u00bb40px|0px|40px|0px|true|false\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb30px|0px|30px|0px|true|false\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text _builder_version=\u00bb4.9.4&#8243; text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#636F83&#8243; text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bbPoppins||||||||\u00bb header_text_align=\u00bbleft\u00bb header_text_color=\u00bb#535b7c\u00bb header_font_size=\u00bb27px\u00bb header_line_height=\u00bb1.4em\u00bb header_2_font=\u00bbPoppins|600||on|||||\u00bb header_2_text_align=\u00bbleft\u00bb header_2_text_color=\u00bb#000000&#8243; header_2_font_size=\u00bb16px\u00bb header_2_line_height=\u00bb1.3em\u00bb header_3_text_align=\u00bbleft\u00bb header_3_font_size=\u00bb27px\u00bb header_3_line_height=\u00bb1.4em\u00bb max_width=\u00bb100%\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb0px||0px||false|false\u00bb hover_enabled=\u00bb0&#8243; text_text_color_tablet=\u00bb\u00bb text_text_color_phone=\u00bb#ffffff\u00bb text_text_color_last_edited=\u00bbon|phone\u00bb header_2_text_align_tablet=\u00bbcenter\u00bb header_2_text_align_phone=\u00bbcenter\u00bb header_2_text_align_last_edited=\u00bbon|phone\u00bb header_2_text_color_tablet=\u00bb\u00bb header_2_text_color_phone=\u00bb#000000&#8243; header_2_text_color_last_edited=\u00bbon|phone\u00bb header_3_text_align_tablet=\u00bbcenter\u00bb header_3_text_align_phone=\u00bbcenter\u00bb header_3_text_align_last_edited=\u00bbon|phone\u00bb header_3_font_size_tablet=\u00bb\u00bb header_3_font_size_phone=\u00bb22px\u00bb header_3_font_size_last_edited=\u00bbon|phone\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<h2>Detecci\u00f3n<\/h2>\n<h3>Escanea tus vulnerabilidades, con o sin agente<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.9.4&#8243; text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#636F83&#8243; text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bbPoppins||||||||\u00bb header_text_align=\u00bbleft\u00bb header_text_color=\u00bb#535b7c\u00bb header_font_size=\u00bb27px\u00bb header_line_height=\u00bb1.4em\u00bb header_2_font=\u00bbPoppins|600||on|||||\u00bb header_2_text_color=\u00bb#000000&#8243; header_2_font_size=\u00bb16px\u00bb header_2_line_height=\u00bb1.3em\u00bb header_3_line_height=\u00bb1.4em\u00bb max_width=\u00bb700px\u00bb module_alignment=\u00bbcenter\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb|0px||0px|false|false\u00bb custom_padding_last_edited=\u00bbon|phone\u00bb hover_enabled=\u00bb0&#8243; text_text_color_tablet=\u00bb\u00bb text_text_color_phone=\u00bb#3C4B64&#8243; text_text_color_last_edited=\u00bbon|phone\u00bb header_2_text_color_tablet=\u00bb\u00bb header_2_text_color_phone=\u00bb#000000&#8243; header_2_text_color_last_edited=\u00bbon|phone\u00bb text_orientation_tablet=\u00bbcenter\u00bb text_orientation_phone=\u00bbcenter\u00bb text_orientation_last_edited=\u00bbon|phone\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<p>Escanea tus activos para identificar vulnerabilidades utilizando nuestro motor de escaneo patentado, que puede identificar vulnerabilidades en m\u00e1s de 70.000 tecnolog\u00edas.<\/p>\n<p>Lanza tus escaneos con o sin agente, en tus servidores, estaciones de trabajo, im\u00e1genes Docker, equipos de red o incluso en tus sitios web.<\/p>\n<p>Para activos cr\u00edticos, utiliza nuestro escaneo \u00abdesconectado\u00bb, a partir de datos de una CMDB, o de una herramienta de gesti\u00f3n de activos (Tranquil-IT WAPT, Teclib&#8217; GLPI, Microsoft SCCM, etc.) o incluso de una memoria USB.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiIsImVuYWJsZV9odG1sIjoib2ZmIn19@\u00bb button_text=\u00bbSolicitar una demostraci\u00f3n\u00bb button_alignment=\u00bbleft\u00bb button_alignment_tablet=\u00bbcenter\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bbon|tablet\u00bb _builder_version=\u00bb4.9.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#321fdb\u00bb button_border_width=\u00bb2px\u00bb button_border_color=\u00bbRGBA(0,0,0,0)\u00bb button_border_radius=\u00bb10px\u00bb button_font=\u00bbPoppins||||||||\u00bb button_icon=\u00bb%%3%%\u00bb button_icon_color=\u00bb#ffffff\u00bb button_on_hover=\u00bboff\u00bb background_layout=\u00bbdark\u00bb custom_margin=\u00bb||||false|false\u00bb custom_padding=\u00bb10px|35px|10px|15px|false|false\u00bb global_module=\u00bb2108&#8243; saved_tabs=\u00bball\u00bb transform_styles__hover_enabled=\u00bbon|hover\u00bb transform_scale__hover_enabled=\u00bbon|hover\u00bb transform_translate__hover_enabled=\u00bbon|desktop\u00bb transform_rotate__hover_enabled=\u00bbon|desktop\u00bb transform_skew__hover_enabled=\u00bbon|desktop\u00bb transform_origin__hover_enabled=\u00bbon|desktop\u00bb button_bg_color__hover_enabled=\u00bbon|hover\u00bb button_bg_color__hover=\u00bb#301abf\u00bb button_bg_enable_color__hover=\u00bbon\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_image src=\u00bbhttps:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/cyberwatch-fr-fonctionnalites-vm-detection.gif\u00bb alt=\u00bbEscanea tus activos para identificar vulnerabilidades utilizando nuestro motor de escaneo patentado, que puede identificar vulnerabilidades en m\u00e1s de 70.000 tecnolog\u00edas.\u00bb title_text=\u00bbFuncionalidades de detecci\u00f3n de vulnerabilidades del Cyberwatch Vulnerability Manager\u00bb show_in_lightbox=\u00bbon\u00bb _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb40px||||false|false\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb0px||||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb||||false|false\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb][et_pb_divider color=\u00bb#CED2D8&#8243; divider_position=\u00bbcenter\u00bb _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb2px|||||\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_2,1_2&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbImagen del lado derecho\u00bb _builder_version=\u00bb4.9.4&#8243; custom_padding=\u00bb40px|0px|40px|0px|true|false\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb30px|0px|30px|0px|true|false\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text _builder_version=\u00bb4.9.4&#8243; text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#636F83&#8243; text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bbPoppins||||||||\u00bb header_text_align=\u00bbleft\u00bb header_text_color=\u00bb#535b7c\u00bb header_font_size=\u00bb27px\u00bb header_line_height=\u00bb1.4em\u00bb header_2_font=\u00bbPoppins|600||on|||||\u00bb header_2_text_align=\u00bbleft\u00bb header_2_text_color=\u00bb#000000&#8243; header_2_font_size=\u00bb16px\u00bb header_2_line_height=\u00bb1.3em\u00bb header_3_text_align=\u00bbleft\u00bb header_3_font_size=\u00bb27px\u00bb header_3_line_height=\u00bb1.4em\u00bb max_width=\u00bb100%\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb0px||0px||false|false\u00bb hover_enabled=\u00bb0&#8243; text_text_color_tablet=\u00bb\u00bb text_text_color_phone=\u00bb#ffffff\u00bb text_text_color_last_edited=\u00bbon|phone\u00bb header_2_text_align_tablet=\u00bbcenter\u00bb header_2_text_align_phone=\u00bbcenter\u00bb header_2_text_align_last_edited=\u00bbon|phone\u00bb header_2_text_color_tablet=\u00bb\u00bb header_2_text_color_phone=\u00bb#000000&#8243; header_2_text_color_last_edited=\u00bbon|phone\u00bb header_3_text_align_tablet=\u00bbcenter\u00bb header_3_text_align_phone=\u00bbcenter\u00bb header_3_text_align_last_edited=\u00bbon|phone\u00bb header_3_font_size_tablet=\u00bb\u00bb header_3_font_size_phone=\u00bb22px\u00bb header_3_font_size_last_edited=\u00bbon|phone\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<h2>Identificaci\u00f3n<\/h2>\n<h3>Identifica los activos m\u00e1s importantes para tu negocio<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.9.4&#8243; text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#636F83&#8243; text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bbPoppins||||||||\u00bb header_text_align=\u00bbleft\u00bb header_text_color=\u00bb#535b7c\u00bb header_font_size=\u00bb27px\u00bb header_line_height=\u00bb1.4em\u00bb header_2_font=\u00bbPoppins|600||on|||||\u00bb header_2_text_color=\u00bb#000000&#8243; header_2_font_size=\u00bb16px\u00bb header_2_line_height=\u00bb1.3em\u00bb header_3_line_height=\u00bb1.4em\u00bb max_width=\u00bb700px\u00bb module_alignment=\u00bbcenter\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb|0px||0px|false|false\u00bb custom_padding_last_edited=\u00bbon|phone\u00bb hover_enabled=\u00bb0&#8243; text_text_color_tablet=\u00bb\u00bb text_text_color_phone=\u00bb#3C4B64&#8243; text_text_color_last_edited=\u00bbon|phone\u00bb header_2_text_color_tablet=\u00bb\u00bb header_2_text_color_phone=\u00bb#000000&#8243; header_2_text_color_last_edited=\u00bbon|phone\u00bb text_orientation_tablet=\u00bbcenter\u00bb text_orientation_phone=\u00bbcenter\u00bb text_orientation_last_edited=\u00bbon|phone\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<p>Define tus objetivos de disponibilidad, integridad y confidencialidad, y crea estrategias de priorizaci\u00f3n adaptadas a tus necesidades.<\/p>\n<p>Elige umbrales de vulnerabilidad para cada activo. Clasifica por grupos tus activos en funci\u00f3n del contexto y define accesos diferenciados por usuario a cada grupo. <\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiIsImVuYWJsZV9odG1sIjoib2ZmIn19@\u00bb button_text=\u00bbSolicitar una demostraci\u00f3n\u00bb button_alignment=\u00bbleft\u00bb button_alignment_tablet=\u00bbcenter\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bbon|tablet\u00bb _builder_version=\u00bb4.9.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#321fdb\u00bb button_border_width=\u00bb2px\u00bb button_border_color=\u00bbRGBA(0,0,0,0)\u00bb button_border_radius=\u00bb10px\u00bb button_font=\u00bbPoppins||||||||\u00bb button_icon=\u00bb%%3%%\u00bb button_icon_color=\u00bb#ffffff\u00bb button_on_hover=\u00bboff\u00bb background_layout=\u00bbdark\u00bb custom_margin=\u00bb||||false|false\u00bb custom_padding=\u00bb10px|35px|10px|15px|false|false\u00bb global_module=\u00bb2108&#8243; saved_tabs=\u00bball\u00bb transform_styles__hover_enabled=\u00bbon|hover\u00bb transform_scale__hover_enabled=\u00bbon|hover\u00bb transform_translate__hover_enabled=\u00bbon|desktop\u00bb transform_rotate__hover_enabled=\u00bbon|desktop\u00bb transform_skew__hover_enabled=\u00bbon|desktop\u00bb transform_origin__hover_enabled=\u00bbon|desktop\u00bb button_bg_color__hover_enabled=\u00bbon|hover\u00bb button_bg_color__hover=\u00bb#301abf\u00bb button_bg_enable_color__hover=\u00bbon\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_image src=\u00bbhttps:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/cyberwatch-fr-fonctionnalites-vm-identification.gif\u00bb alt=\u00bbDefine tus objetivos de disponibilidad, integridad y confidencialidad, y crea estrategias de priorizaci\u00f3n adaptadas a tus necesidades.\u00bb title_text=\u00bbFuncionalidades de identificaci\u00f3n de Cyberwatch Vulnerability Manager\u00bb show_in_lightbox=\u00bbon\u00bb _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb40px||||false|false\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb0px||||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb][et_pb_divider color=\u00bb#CED2D8&#8243; divider_position=\u00bbcenter\u00bb _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb2px|||||\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_2,1_2&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbImagen del lado derecho\u00bb _builder_version=\u00bb4.9.4&#8243; custom_padding=\u00bb40px|0px|40px|0px|true|false\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb30px|0px|30px|0px|true|false\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text _builder_version=\u00bb4.9.4&#8243; text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#636F83&#8243; text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bbPoppins||||||||\u00bb header_text_align=\u00bbleft\u00bb header_text_color=\u00bb#535b7c\u00bb header_font_size=\u00bb27px\u00bb header_line_height=\u00bb1.4em\u00bb header_2_font=\u00bbPoppins|600||on|||||\u00bb header_2_text_align=\u00bbleft\u00bb header_2_text_color=\u00bb#000000&#8243; header_2_font_size=\u00bb16px\u00bb header_2_line_height=\u00bb1.3em\u00bb header_3_text_align=\u00bbleft\u00bb header_3_font_size=\u00bb27px\u00bb header_3_line_height=\u00bb1.4em\u00bb max_width=\u00bb100%\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb0px||0px||false|false\u00bb hover_enabled=\u00bb0&#8243; text_text_color_tablet=\u00bb\u00bb text_text_color_phone=\u00bb#ffffff\u00bb text_text_color_last_edited=\u00bbon|phone\u00bb header_2_text_align_tablet=\u00bbcenter\u00bb header_2_text_align_phone=\u00bbcenter\u00bb header_2_text_align_last_edited=\u00bbon|phone\u00bb header_2_text_color_tablet=\u00bb\u00bb header_2_text_color_phone=\u00bb#000000&#8243; header_2_text_color_last_edited=\u00bbon|phone\u00bb header_3_text_align_tablet=\u00bbcenter\u00bb header_3_text_align_phone=\u00bbcenter\u00bb header_3_text_align_last_edited=\u00bbon|phone\u00bb header_3_font_size_tablet=\u00bb\u00bb header_3_font_size_phone=\u00bb22px\u00bb header_3_font_size_last_edited=\u00bbon|phone\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<h2>Priorizaci\u00f3n<\/h2>\n<h3>Focaliza sobre las vulnerabilidades que realmente te importan<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.9.4&#8243; text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#636F83&#8243; text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bbPoppins||||||||\u00bb header_text_align=\u00bbleft\u00bb header_text_color=\u00bb#535b7c\u00bb header_font_size=\u00bb27px\u00bb header_line_height=\u00bb1.4em\u00bb header_2_font=\u00bbPoppins|600||on|||||\u00bb header_2_text_color=\u00bb#000000&#8243; header_2_font_size=\u00bb16px\u00bb header_2_line_height=\u00bb1.3em\u00bb header_3_line_height=\u00bb1.4em\u00bb max_width=\u00bb700px\u00bb module_alignment=\u00bbcenter\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb|0px||0px|false|false\u00bb custom_padding_last_edited=\u00bbon|phone\u00bb hover_enabled=\u00bb0&#8243; text_text_color_tablet=\u00bb\u00bb text_text_color_phone=\u00bb#3C4B64&#8243; text_text_color_last_edited=\u00bbon|phone\u00bb header_2_text_color_tablet=\u00bb\u00bb header_2_text_color_phone=\u00bb#000000&#8243; header_2_text_color_last_edited=\u00bbon|phone\u00bb text_orientation_tablet=\u00bbcenter\u00bb text_orientation_phone=\u00bbcenter\u00bb text_orientation_last_edited=\u00bbon|phone\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<p>Nuestra plataforma calcula autom\u00e1ticamente el nivel de amenaza real para cada vulnerabilidad et para cada activos, utilizando el Cyberscore.<\/p>\n<p>Cyberscore es un m\u00e9todo desarrollado en base a criterios ambientales y temporales de CVSS v3.1. Compilamos datos de monitoreo realizados por Cyberwatch sobre exploits y kits de ataque p\u00fablicos. Tambi\u00e9n incluye informaci\u00f3n de tu contexto de negocio as\u00ed como indicadores sobre cada vulnerabilidad.  <\/p>\n<p>De esta manera podr\u00e1s ver muy f\u00e1cilmente las vulnerabilidades prioritarias de tu sistema de informaci\u00f3n.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiIsImVuYWJsZV9odG1sIjoib2ZmIn19@\u00bb button_text=\u00bbSolicitar una demostraci\u00f3n\u00bb button_alignment=\u00bbleft\u00bb button_alignment_tablet=\u00bbcenter\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bbon|tablet\u00bb _builder_version=\u00bb4.9.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#321fdb\u00bb button_border_width=\u00bb2px\u00bb button_border_color=\u00bbRGBA(0,0,0,0)\u00bb button_border_radius=\u00bb10px\u00bb button_font=\u00bbPoppins||||||||\u00bb button_icon=\u00bb%%3%%\u00bb button_icon_color=\u00bb#ffffff\u00bb button_on_hover=\u00bboff\u00bb background_layout=\u00bbdark\u00bb custom_margin=\u00bb||||false|false\u00bb custom_padding=\u00bb10px|35px|10px|15px|false|false\u00bb global_module=\u00bb2108&#8243; saved_tabs=\u00bball\u00bb transform_styles__hover_enabled=\u00bbon|hover\u00bb transform_scale__hover_enabled=\u00bbon|hover\u00bb transform_translate__hover_enabled=\u00bbon|desktop\u00bb transform_rotate__hover_enabled=\u00bbon|desktop\u00bb transform_skew__hover_enabled=\u00bbon|desktop\u00bb transform_origin__hover_enabled=\u00bbon|desktop\u00bb button_bg_color__hover_enabled=\u00bbon|hover\u00bb button_bg_color__hover=\u00bb#301abf\u00bb button_bg_enable_color__hover=\u00bbon\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_image src=\u00bbhttps:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/cyberwatch-fr-fonctionnalites-vm-priorisation.gif\u00bb alt=\u00bbNuestra plataforma calcula autom\u00e1ticamente el nivel de amenaza real para cada vulnerabilidad et para cada activos, utilizando el Cyberscore.\u00bb title_text=\u00bbFuncionalidades de priorizaci\u00f3n del Cyberwatch Vulnerability Manager\u00bb show_in_lightbox=\u00bbon\u00bb _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb40px||||false|false\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb0px||||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb][et_pb_divider color=\u00bb#CED2D8&#8243; divider_position=\u00bbcenter\u00bb _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb2px|||||\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_2,1_2&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbImagen del lado derecho\u00bb _builder_version=\u00bb4.9.4&#8243; custom_padding=\u00bb40px|0px|40px|0px|true|false\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb30px|0px|30px|0px|true|false\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text _builder_version=\u00bb4.9.4&#8243; text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#636F83&#8243; text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bbPoppins||||||||\u00bb header_text_align=\u00bbleft\u00bb header_text_color=\u00bb#535b7c\u00bb header_font_size=\u00bb27px\u00bb header_line_height=\u00bb1.4em\u00bb header_2_font=\u00bbPoppins|600||on|||||\u00bb header_2_text_align=\u00bbleft\u00bb header_2_text_color=\u00bb#000000&#8243; header_2_font_size=\u00bb16px\u00bb header_2_line_height=\u00bb1.3em\u00bb header_3_text_align=\u00bbleft\u00bb header_3_font_size=\u00bb27px\u00bb header_3_line_height=\u00bb1.4em\u00bb max_width=\u00bb100%\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb0px||0px||false|false\u00bb hover_enabled=\u00bb0&#8243; text_text_color_tablet=\u00bb\u00bb text_text_color_phone=\u00bb#ffffff\u00bb text_text_color_last_edited=\u00bbon|phone\u00bb header_2_text_align_tablet=\u00bbcenter\u00bb header_2_text_align_phone=\u00bbcenter\u00bb header_2_text_align_last_edited=\u00bbon|phone\u00bb header_2_text_color_tablet=\u00bb\u00bb header_2_text_color_phone=\u00bb#000000&#8243; header_2_text_color_last_edited=\u00bbon|phone\u00bb header_3_text_align_tablet=\u00bbcenter\u00bb header_3_text_align_phone=\u00bbcenter\u00bb header_3_text_align_last_edited=\u00bbon|phone\u00bb header_3_font_size_tablet=\u00bb\u00bb header_3_font_size_phone=\u00bb22px\u00bb header_3_font_size_last_edited=\u00bbon|phone\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<h2>AYUDA A LA DECISI\u00d3N<\/h2>\n<h3>Toma las decisiones correctas y realiza un seguimiento de tus acciones.<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.9.4&#8243; text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#636F83&#8243; text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bbPoppins||||||||\u00bb header_text_align=\u00bbleft\u00bb header_text_color=\u00bb#535b7c\u00bb header_font_size=\u00bb27px\u00bb header_line_height=\u00bb1.4em\u00bb header_2_font=\u00bbPoppins|600||on|||||\u00bb header_2_text_color=\u00bb#000000&#8243; header_2_font_size=\u00bb16px\u00bb header_2_line_height=\u00bb1.3em\u00bb header_3_line_height=\u00bb1.4em\u00bb max_width=\u00bb700px\u00bb module_alignment=\u00bbcenter\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb|0px||0px|false|false\u00bb custom_padding_last_edited=\u00bbon|phone\u00bb hover_enabled=\u00bb0&#8243; text_text_color_tablet=\u00bb\u00bb text_text_color_phone=\u00bb#3C4B64&#8243; text_text_color_last_edited=\u00bbon|phone\u00bb header_2_text_color_tablet=\u00bb\u00bb header_2_text_color_phone=\u00bb#000000&#8243; header_2_text_color_last_edited=\u00bbon|phone\u00bb text_orientation_tablet=\u00bbcenter\u00bb text_orientation_phone=\u00bbcenter\u00bb text_orientation_last_edited=\u00bbon|phone\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<p>Crea paneles de control adaptados y personalizables que te ayuden a tomar las decisiones m\u00e1s adecuadas para conseguir tus objetivos.<\/p>\n<p>Gestiona tus vulnerabilidades para cada activo y mide tus tiempos de remediaci\u00f3n.<\/p>\n<p>Env\u00eda solicitudes a sistemas de terceros (herramienta de tickets, CMDB, correo electr\u00f3nico&#8230;) y agrega comentarios sobre vulnerabilidades.<\/p>\n<p>Identifica las vulnerabilidades que no puedes corregir por razones de producci\u00f3n e identif\u00edcalas como riesgos aceptados para que puedas concentrarte en aquellos activos que puedas tratar.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiIsImVuYWJsZV9odG1sIjoib2ZmIn19@\u00bb button_text=\u00bbSolicitar una demostraci\u00f3n\u00bb button_alignment=\u00bbleft\u00bb button_alignment_tablet=\u00bbcenter\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bbon|tablet\u00bb _builder_version=\u00bb4.9.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#321fdb\u00bb button_border_width=\u00bb2px\u00bb button_border_color=\u00bbRGBA(0,0,0,0)\u00bb button_border_radius=\u00bb10px\u00bb button_font=\u00bbPoppins||||||||\u00bb button_icon=\u00bb%%3%%\u00bb button_icon_color=\u00bb#ffffff\u00bb button_on_hover=\u00bboff\u00bb background_layout=\u00bbdark\u00bb custom_margin=\u00bb||||false|false\u00bb custom_padding=\u00bb10px|35px|10px|15px|false|false\u00bb global_module=\u00bb2108&#8243; saved_tabs=\u00bball\u00bb transform_styles__hover_enabled=\u00bbon|hover\u00bb transform_scale__hover_enabled=\u00bbon|hover\u00bb transform_translate__hover_enabled=\u00bbon|desktop\u00bb transform_rotate__hover_enabled=\u00bbon|desktop\u00bb transform_skew__hover_enabled=\u00bbon|desktop\u00bb transform_origin__hover_enabled=\u00bbon|desktop\u00bb button_bg_color__hover_enabled=\u00bbon|hover\u00bb button_bg_color__hover=\u00bb#301abf\u00bb button_bg_enable_color__hover=\u00bbon\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_image src=\u00bbhttps:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/cyberwatch-fr-fonctionnalites-vm-aidealadecision-1.gif\u00bb alt=\u00bbCrea paneles de control adaptados y personalizables que te ayuden a tomar las decisiones m\u00e1s adecuadas para conseguir tus objetivos.\u00bb title_text=\u00bbFuncionalidades de ayuda a la decisi\u00f3n del Cyberwatch Vulnerability Manager\u00bb show_in_lightbox=\u00bbon\u00bb _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb40px||||false|false\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb0px||||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb][et_pb_divider color=\u00bb#CED2D8&#8243; divider_position=\u00bbcenter\u00bb _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb2px|||||\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_2,1_2&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbImagen del lado derecho\u00bb _builder_version=\u00bb4.9.4&#8243; custom_padding=\u00bb40px|0px|0px|0px|false|false\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb30px|0px|0px|0px|false|false\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text _builder_version=\u00bb4.9.4&#8243; text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#636F83&#8243; text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bbPoppins||||||||\u00bb header_text_align=\u00bbleft\u00bb header_text_color=\u00bb#535b7c\u00bb header_font_size=\u00bb27px\u00bb header_line_height=\u00bb1.4em\u00bb header_2_font=\u00bbPoppins|600||on|||||\u00bb header_2_text_align=\u00bbleft\u00bb header_2_text_color=\u00bb#000000&#8243; header_2_font_size=\u00bb16px\u00bb header_2_line_height=\u00bb1.3em\u00bb header_3_text_align=\u00bbleft\u00bb header_3_font_size=\u00bb27px\u00bb header_3_line_height=\u00bb1.4em\u00bb max_width=\u00bb100%\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb0px||0px||false|false\u00bb hover_enabled=\u00bb0&#8243; text_text_color_tablet=\u00bb\u00bb text_text_color_phone=\u00bb#ffffff\u00bb text_text_color_last_edited=\u00bbon|phone\u00bb header_2_text_align_tablet=\u00bbcenter\u00bb header_2_text_align_phone=\u00bbcenter\u00bb header_2_text_align_last_edited=\u00bbon|phone\u00bb header_2_text_color_tablet=\u00bb\u00bb header_2_text_color_phone=\u00bb#000000&#8243; header_2_text_color_last_edited=\u00bbon|phone\u00bb header_3_text_align_tablet=\u00bbcenter\u00bb header_3_text_align_phone=\u00bbcenter\u00bb header_3_text_align_last_edited=\u00bbon|phone\u00bb header_3_font_size_tablet=\u00bb\u00bb header_3_font_size_phone=\u00bb22px\u00bb header_3_font_size_last_edited=\u00bbon|phone\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<h2>Correcci\u00f3n<\/h2>\n<h3>Implementa los parches necesarios y neutraliza tus vulnerabilidades<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.9.4&#8243; text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#636F83&#8243; text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bbPoppins||||||||\u00bb header_text_align=\u00bbleft\u00bb header_text_color=\u00bb#535b7c\u00bb header_font_size=\u00bb27px\u00bb header_line_height=\u00bb1.4em\u00bb header_2_font=\u00bbPoppins|600||on|||||\u00bb header_2_text_color=\u00bb#000000&#8243; header_2_font_size=\u00bb16px\u00bb header_2_line_height=\u00bb1.3em\u00bb header_3_line_height=\u00bb1.4em\u00bb max_width=\u00bb700px\u00bb module_alignment=\u00bbcenter\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb|0px||0px|false|false\u00bb custom_padding_last_edited=\u00bbon|phone\u00bb hover_enabled=\u00bb0&#8243; text_text_color_tablet=\u00bb\u00bb text_text_color_phone=\u00bb#3C4B64&#8243; text_text_color_last_edited=\u00bbon|phone\u00bb header_2_text_color_tablet=\u00bb\u00bb header_2_text_color_phone=\u00bb#000000&#8243; header_2_text_color_last_edited=\u00bbon|phone\u00bb text_orientation_tablet=\u00bbcenter\u00bb text_orientation_phone=\u00bbcenter\u00bb text_orientation_last_edited=\u00bbon|phone\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<p>Configura nuestra plataforma para que instale parches de seguridad y as\u00ed corregir tus vulnerabilidades, con o sin agente, a trav\u00e9s de nuestro m\u00f3dulo de aplicaci\u00f3n y gesti\u00f3n de parches.<\/p>\n<p>Aplica actualizaciones de seguridad en sistemas Linux y Microsoft Windows, respetando tus configuraciones. Nuestra plataforma es capaz de detectar autom\u00e1ticamente la presencia de un WSUS y utilizar sus repositorios de paquetes como fuentes de actualizaci\u00f3n.  <\/p>\n<p>Conecta Cyberwatch a tus sistemas para corregir vulnerabilidades con tus herramientas de producci\u00f3n.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiIsImVuYWJsZV9odG1sIjoib2ZmIn19@\u00bb button_text=\u00bbSolicitar una demostraci\u00f3n\u00bb button_alignment=\u00bbleft\u00bb button_alignment_tablet=\u00bbcenter\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bbon|tablet\u00bb _builder_version=\u00bb4.9.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#321fdb\u00bb button_border_width=\u00bb2px\u00bb button_border_color=\u00bbRGBA(0,0,0,0)\u00bb button_border_radius=\u00bb10px\u00bb button_font=\u00bbPoppins||||||||\u00bb button_icon=\u00bb%%3%%\u00bb button_icon_color=\u00bb#ffffff\u00bb button_on_hover=\u00bboff\u00bb background_layout=\u00bbdark\u00bb custom_margin=\u00bb||||false|false\u00bb custom_padding=\u00bb10px|35px|10px|15px|false|false\u00bb global_module=\u00bb2108&#8243; saved_tabs=\u00bball\u00bb transform_styles__hover_enabled=\u00bbon|hover\u00bb transform_scale__hover_enabled=\u00bbon|hover\u00bb transform_translate__hover_enabled=\u00bbon|desktop\u00bb transform_rotate__hover_enabled=\u00bbon|desktop\u00bb transform_skew__hover_enabled=\u00bbon|desktop\u00bb transform_origin__hover_enabled=\u00bbon|desktop\u00bb button_bg_color__hover_enabled=\u00bbon|hover\u00bb button_bg_color__hover=\u00bb#301abf\u00bb button_bg_enable_color__hover=\u00bbon\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_image src=\u00bbhttps:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/cyberwatch-fr-fonctionnalites-vm-correction.gif\u00bb alt=\u00bbConfigura nuestra plataforma para que instale parches de seguridad y as\u00ed corregir tus vulnerabilidades, con o sin agente, a trav\u00e9s de nuestro m\u00f3dulo de aplicaci\u00f3n y gesti\u00f3n de parches.\u00bb title_text=\u00bbFuncionalidades de correcci\u00f3n del Cyberwatch Vulnerability Manager\u00bb show_in_lightbox=\u00bbon\u00bb _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb40px||||false|false\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb0px||||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbFeatures\u00bb _builder_version=\u00bb4.9.4&#8243; background_color=\u00bb#321FDB\u00bb use_background_color_gradient=\u00bbon\u00bb background_color_gradient_start=\u00bb#000000&#8243; background_color_gradient_end=\u00bb#3c4b64&#8243; background_color_gradient_direction=\u00bb1deg\u00bb background_color_gradient_end_position=\u00bb0%\u00bb background_image=\u00bbhttps:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/coding-background-texture.jpg\u00bb background_blend=\u00bboverlay\u00bb custom_padding=\u00bb40px|0px|40px|0px|true|\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb30px||30px||true|false\u00bb][et_pb_row admin_label=\u00bb\u00c1rea de t\u00edtulo\u00bb _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb2px||23px|||\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text admin_label=\u00bbTitle\u00bb _builder_version=\u00bb4.9.4&#8243; text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#ffffff\u00bb text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bb||||||||\u00bb header_2_font=\u00bbPoppins||||||||\u00bb header_2_text_color=\u00bb#FFFFFF\u00bb header_2_font_size=\u00bb28px\u00bb header_2_line_height=\u00bb1.4em\u00bb text_orientation=\u00bbcenter\u00bb max_width=\u00bb78%\u00bb max_width_tablet=\u00bb100%\u00bb max_width_phone=\u00bb100%\u00bb max_width_last_edited=\u00bbon|phone\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||10px|\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb0px|0px|0px|0px|true|false\u00bb custom_padding_last_edited=\u00bbon|phone\u00bb animation_direction=\u00bbtop\u00bb hover_enabled=\u00bb0&#8243; header_2_font_size_tablet=\u00bb\u00bb header_2_font_size_phone=\u00bb22px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<h2>Completa tu an\u00e1lisis de riesgos utilizando nuestra enciclopedia de vulnerabilidades<\/h2>\n<p>Consulta <a href=\"https:\/\/cyberwatch.fr\/es\/enciclopedia\/\">la base de conocimiento<\/a> integrada a nuestra plataforma para obtener informaci\u00f3n adicional sobre vulnerabilidades, con enlaces a kits de ataque p\u00fablicos, alertas de proveedores y avisos de las autoridades.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; admin_label=\u00bb\u00c1rea de Servicios\u00bb _builder_version=\u00bb4.9.4&#8243; min_height=\u00bb92.7px\u00bb custom_padding=\u00bb2px||1px|||\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_image src=\u00bbhttps:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/book.png\u00bb alt=\u00bbBase de conocimientos sobre vulnerabilidades, integrada en la plataforma Cyberwatch\u00bb title_text=\u00bbEnciclopedia de vulnerabilidades\u00bb align=\u00bbcenter\u00bb align_tablet=\u00bbcenter\u00bb align_phone=\u00bb\u00bb align_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.9.4&#8243; max_width=\u00bb50px\u00bb custom_margin=\u00bb||0px||false|false\u00bb filter_invert=\u00bb100%\u00bb][\/et_pb_image][et_pb_cta title=\u00bbBase de conocimiento sobre vulnerabilidades, integrada en nuestra plataforma\u00bb button_url=\u00bb#\u00bb admin_label=\u00bbServicio\u00bb _builder_version=\u00bb4.9.4&#8243; header_level=\u00bbh3&#8243; header_font=\u00bbPoppins||||||||\u00bb header_text_align=\u00bbcenter\u00bb header_text_color=\u00bb#FFFFFF\u00bb header_font_size=\u00bb18px\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbPoppins|300|||||||\u00bb body_text_align=\u00bbcenter\u00bb body_text_color=\u00bb#FFFFFF\u00bb body_font_size=\u00bb16px\u00bb body_line_height=\u00bb1.8em\u00bb use_background_color=\u00bboff\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#8b20bb\u00bb button_bg_color=\u00bbrgba(0,0,0,0)\u00bb button_border_width=\u00bb0px\u00bb button_letter_spacing=\u00bb2px\u00bb button_font=\u00bbPoppins|600||on|||||\u00bb button_icon=\u00bb%%3%%\u00bb button_alignment=\u00bbleft\u00bb text_orientation=\u00bbleft\u00bb custom_margin=\u00bb15px||||false|false\u00bb custom_padding=\u00bb||||false|false\u00bb text_orientation_tablet=\u00bb\u00bb text_orientation_phone=\u00bbcenter\u00bb text_orientation_last_edited=\u00bbon|phone\u00bb button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb]<\/p>\n<p>Realiza el escaneo y el an\u00e1lisis de la informaci\u00f3n sobre tus vulnerabilidades de manera centralizada.<\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_image src=\u00bbhttps:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/bug-2.png\u00bb alt=\u00bbIdentifica instant\u00e1neamente los activos afectados por una vulnerabilidad\u00bb title_text=\u00bbActivos afectados por una vulnerabilidad\u00bb align=\u00bbcenter\u00bb align_tablet=\u00bbcenter\u00bb align_phone=\u00bb\u00bb align_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.9.4&#8243; max_width=\u00bb55px\u00bb custom_margin=\u00bb||0px||false|false\u00bb filter_invert=\u00bb100%\u00bb locked=\u00bboff\u00bb][\/et_pb_image][et_pb_cta title=\u00bbIdentifica instant\u00e1neamente los activos afectados por una vulnerabilidad\u00bb button_url=\u00bb#\u00bb admin_label=\u00bbServicio\u00bb _builder_version=\u00bb4.9.4&#8243; header_level=\u00bbh3&#8243; header_font=\u00bbPoppins|500|||||||\u00bb header_text_color=\u00bb#FFFFFF\u00bb header_font_size=\u00bb18px\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbPoppins|300|||||||\u00bb body_text_color=\u00bb#FFFFFF\u00bb body_font_size=\u00bb16px\u00bb body_line_height=\u00bb1.8em\u00bb use_background_color=\u00bboff\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#8b20bb\u00bb button_bg_color=\u00bbrgba(0,0,0,0)\u00bb button_border_width=\u00bb0px\u00bb button_letter_spacing=\u00bb2px\u00bb button_font=\u00bbPoppins|600||on|||||\u00bb button_icon=\u00bb%%3%%\u00bb button_alignment=\u00bbleft\u00bb custom_margin=\u00bb15px||||false|false\u00bb custom_padding=\u00bb|||\u00bb text_orientation_tablet=\u00bb\u00bb text_orientation_phone=\u00bbcenter\u00bb text_orientation_last_edited=\u00bbon|phone\u00bb locked=\u00bboff\u00bb button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb]<\/p>\n<p>Busca las vulnerabilidades que te interesan en nuestra enciclopedia y consulta los activos afectados.<\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_image src=\u00bbhttps:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/backup.png\u00bb alt=\u00bbConsigue informaci\u00f3n actualizada sobre vulnerabilidades\u00bb title_text=\u00bbDatos actualizados cada hora\u00bb align=\u00bbcenter\u00bb align_tablet=\u00bbcenter\u00bb align_phone=\u00bb\u00bb align_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.9.4&#8243; max_width=\u00bb50px\u00bb custom_margin=\u00bb||0px||false|false\u00bb filter_invert=\u00bb100%\u00bb locked=\u00bboff\u00bb][\/et_pb_image][et_pb_cta title=\u00bbDatos actualizados cada hora\u00bb button_url=\u00bb#\u00bb admin_label=\u00bbServicio\u00bb _builder_version=\u00bb4.9.4&#8243; header_level=\u00bbh3&#8243; header_font=\u00bbPoppins|500|||||||\u00bb header_text_align=\u00bbcenter\u00bb header_text_color=\u00bb#FFFFFF\u00bb header_font_size=\u00bb18px\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbPoppins|300|||||||\u00bb body_text_color=\u00bb#FFFFFF\u00bb body_font_size=\u00bb16px\u00bb body_line_height=\u00bb1.8em\u00bb use_background_color=\u00bboff\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#8b20bb\u00bb button_bg_color=\u00bbrgba(0,0,0,0)\u00bb button_border_width=\u00bb0px\u00bb button_letter_spacing=\u00bb2px\u00bb button_font=\u00bbPoppins|600||on|||||\u00bb button_icon=\u00bb%%3%%\u00bb button_alignment=\u00bbleft\u00bb custom_margin=\u00bb15px||||false|false\u00bb custom_padding=\u00bb||0px|||\u00bb text_orientation_tablet=\u00bb\u00bb text_orientation_phone=\u00bbcenter\u00bb text_orientation_last_edited=\u00bbon|phone\u00bb locked=\u00bboff\u00bb button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb]<\/p>\n<p>Consigue informaci\u00f3n actualizada cada hora sobre vulnerabilidades, procedente de proveedores y autoridades.<\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb||2px|||\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc2NyIsImVuYWJsZV9odG1sIjoib2ZmIn19@\u00bb button_text=\u00bbM\u00e1s informaci\u00f3n sobre la enciclopedia\u00bb button_alignment=\u00bbcenter\u00bb _builder_version=\u00bb4.9.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bb#ffffff\u00bb button_bg_color=\u00bbRGBA(0,0,0,0)\u00bb button_border_radius=\u00bb10px\u00bb button_icon=\u00bb%%3%%\u00bb button_icon_color=\u00bb#FFFFFF\u00bb button_on_hover=\u00bboff\u00bb custom_padding=\u00bb10px|40px|10px|20px|false|false\u00bb global_module=\u00bb2833&#8243; saved_tabs=\u00bball\u00bb button_text_color__hover_enabled=\u00bbon|desktop\u00bb button_text_color__hover=\u00bb#000000&#8243; button_border_width__hover_enabled=\u00bbon|hover\u00bb button_border_width__hover=\u00bb0px\u00bb button_bg_color__hover_enabled=\u00bbon|hover\u00bb button_bg_color__hover=\u00bb#ffffff\u00bb button_bg_enable_color__hover=\u00bbon\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb background_image=\u00bbhttps:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/Formulaire_Blanc-1.png\u00bb custom_padding=\u00bb40px||40px||true|\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb30px||30px||true|false\u00bb global_module=\u00bb2139&#8243;][et_pb_row _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb1px||1px|||\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb][et_pb_text _builder_version=\u00bb4.9.4&#8243; text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#636F83&#8243; text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bbPoppins|||on|||||\u00bb header_text_align=\u00bbleft\u00bb header_text_color=\u00bb#535b7c\u00bb header_font_size=\u00bb27px\u00bb header_line_height=\u00bb1.7em\u00bb header_2_font=\u00bbPoppins|500|||||||\u00bb header_2_text_color=\u00bb#000000&#8243; header_2_font_size=\u00bb27px\u00bb header_2_line_height=\u00bb1.3em\u00bb header_3_font=\u00bb||||||||\u00bb header_3_text_align=\u00bbcenter\u00bb header_3_text_color=\u00bb#000000&#8243; header_3_font_size=\u00bb27px\u00bb header_3_line_height=\u00bb1.4em\u00bb text_orientation=\u00bbcenter\u00bb max_width=\u00bb700px\u00bb module_alignment=\u00bbcenter\u00bb custom_padding=\u00bb||||false|false\u00bb text_text_color_tablet=\u00bb\u00bb text_text_color_phone=\u00bb#3C4B64&#8243; text_text_color_last_edited=\u00bbon|phone\u00bb header_2_text_color_tablet=\u00bb\u00bb header_2_text_color_phone=\u00bb#000000&#8243; header_2_text_color_last_edited=\u00bbon|phone\u00bb header_2_font_size_tablet=\u00bb\u00bb header_2_font_size_phone=\u00bb22px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb]<\/p>\n<h2>\u00bfTienes alguna pregunta?<br \/>\u00bfQuieres una demostraci\u00f3n?<\/h2>\n<p>Cont\u00e1ctenos y nuestros expertos le responder\u00e1n dentro de 24 horas.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiIsImVuYWJsZV9odG1sIjoib2ZmIn19@\u00bb button_text=\u00bbSolicitar una demostraci\u00f3n\u00bb button_alignment=\u00bbcenter\u00bb button_alignment_tablet=\u00bb\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.9.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#321fdb\u00bb button_border_width=\u00bb2px\u00bb button_border_color=\u00bbRGBA(0,0,0,0)\u00bb button_border_radius=\u00bb10px\u00bb button_font=\u00bbPoppins||||||||\u00bb button_icon=\u00bb%%3%%\u00bb button_icon_color=\u00bb#ffffff\u00bb button_on_hover=\u00bboff\u00bb background_layout=\u00bbdark\u00bb custom_margin=\u00bb||||false|false\u00bb custom_padding=\u00bb10px|35px|10px|15px|false|false\u00bb transform_styles__hover_enabled=\u00bbon|hover\u00bb transform_scale__hover_enabled=\u00bbon|hover\u00bb transform_translate__hover_enabled=\u00bbon|desktop\u00bb transform_rotate__hover_enabled=\u00bbon|desktop\u00bb transform_skew__hover_enabled=\u00bbon|desktop\u00bb transform_origin__hover_enabled=\u00bbon|desktop\u00bb button_bg_color__hover_enabled=\u00bbon|hover\u00bb button_bg_color__hover=\u00bb#301abf\u00bb button_bg_enable_color__hover=\u00bbon\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p><div class=\"et_pb_module lwp_divi_breadcrumbs lwp_divi_breadcrumbs_0\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"et_pb_module_inner\">\n\t\t\t\t\t<div class=\"lwp-breadcrumbs\"> <span class=\"before\"><\/span> <span vocab=\"https:\/\/schema.org\/\" typeof=\"BreadcrumbList\"><span property=\"itemListElement\" typeof=\"ListItem\"><a property=\"item\" typeof=\"WebPage\" href=\"https:\/\/cyberwatch.fr\/es\/\" class=\"home\"><span property=\"name\">Accueil<\/span><\/a><meta property=\"position\" content=\"1\"><\/span> <span class=\"separator et-pb-icon\">5<\/span> <\/span><\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>Cyberwatch Vulnerability ManagerDescubre las funcionalidades de nuestra plataforma para monitorear tus vulnerabilidadesCartograf\u00eda Obt\u00e9n la visibilidad completa y continua de tus activosIdentifica los elementos de tu sistema de informaci\u00f3n utilizando nuestro motor de descubrimiento de activos. Escanea peri\u00f3dicamente tu red para identificar los \u00abShadow IT\u00bb y nuevos dominios y subdominios que te [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7690,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-8100","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Descubre las funcionalidades del Cyberwatch Vulnerability Manager<\/title>\n<meta name=\"description\" content=\"Cyberwatch Vulnerability Manager te ayuda a gestionar tus vulnerabilidades desde la detecci\u00f3n hasta la correcci\u00f3n, pasando por la priorizaci\u00f3n.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberwatch.fr\/es\/funciones-del-administrador-de-vulnerabilidades\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Descubre las funcionalidades del Cyberwatch Vulnerability Manager\" \/>\n<meta property=\"og:description\" content=\"Cyberwatch Vulnerability Manager te ayuda a gestionar tus vulnerabilidades realizando la detecci\u00f3n, la priorizaci\u00f3n y la remediaci\u00f3n.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberwatch.fr\/es\/funciones-del-administrador-de-vulnerabilidades\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberwatch\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-09T10:43:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch-1024x536.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Descubre las funcionalidades del Cyberwatch Vulnerability Manager\" \/>\n<meta name=\"twitter:description\" content=\"Cyberwatch Vulnerability Manager te ayuda a gestionar tus vulnerabilidades realizando la detecci\u00f3n, la priorizaci\u00f3n y la remediaci\u00f3n.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch-1024x536.png\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/funciones-del-administrador-de-vulnerabilidades\\\/\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/funciones-del-administrador-de-vulnerabilidades\\\/\",\"name\":\"Descubre las funcionalidades del Cyberwatch Vulnerability Manager\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/funciones-del-administrador-de-vulnerabilidades\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/funciones-del-administrador-de-vulnerabilidades\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/meta-cyberwatch.png\",\"datePublished\":\"2025-02-05T09:27:25+00:00\",\"dateModified\":\"2025-12-09T10:43:09+00:00\",\"description\":\"Cyberwatch Vulnerability Manager te ayuda a gestionar tus vulnerabilidades desde la detecci\u00f3n hasta la correcci\u00f3n, pasando por la priorizaci\u00f3n.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/funciones-del-administrador-de-vulnerabilidades\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/funciones-del-administrador-de-vulnerabilidades\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/funciones-del-administrador-de-vulnerabilidades\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/meta-cyberwatch.png\",\"contentUrl\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/meta-cyberwatch.png\",\"width\":1200,\"height\":628,\"caption\":\"Logo cyberwatch\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/funciones-del-administrador-de-vulnerabilidades\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Funcionalidades del Vulnerability Manager\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/\",\"name\":\"Cyberwatch\",\"description\":\"Supervisez vos vuln\u00e9rabilit\u00e9s. Contr\u00f4lez vos conformit\u00e9s.\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/#organization\",\"name\":\"Cyberwatch\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo_simple_black.png\",\"contentUrl\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo_simple_black.png\",\"width\":1883,\"height\":500,\"caption\":\"Cyberwatch\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Descubre las funcionalidades del Cyberwatch Vulnerability Manager","description":"Cyberwatch Vulnerability Manager te ayuda a gestionar tus vulnerabilidades desde la detecci\u00f3n hasta la correcci\u00f3n, pasando por la priorizaci\u00f3n.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberwatch.fr\/es\/funciones-del-administrador-de-vulnerabilidades\/","og_locale":"es_ES","og_type":"article","og_title":"Descubre las funcionalidades del Cyberwatch Vulnerability Manager","og_description":"Cyberwatch Vulnerability Manager te ayuda a gestionar tus vulnerabilidades realizando la detecci\u00f3n, la priorizaci\u00f3n y la remediaci\u00f3n.","og_url":"https:\/\/cyberwatch.fr\/es\/funciones-del-administrador-de-vulnerabilidades\/","og_site_name":"Cyberwatch","article_modified_time":"2025-12-09T10:43:09+00:00","og_image":[{"url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch-1024x536.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_title":"Descubre las funcionalidades del Cyberwatch Vulnerability Manager","twitter_description":"Cyberwatch Vulnerability Manager te ayuda a gestionar tus vulnerabilidades realizando la detecci\u00f3n, la priorizaci\u00f3n y la remediaci\u00f3n.","twitter_image":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch-1024x536.png","twitter_misc":{"Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberwatch.fr\/es\/funciones-del-administrador-de-vulnerabilidades\/","url":"https:\/\/cyberwatch.fr\/es\/funciones-del-administrador-de-vulnerabilidades\/","name":"Descubre las funcionalidades del Cyberwatch Vulnerability Manager","isPartOf":{"@id":"https:\/\/cyberwatch.fr\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberwatch.fr\/es\/funciones-del-administrador-de-vulnerabilidades\/#primaryimage"},"image":{"@id":"https:\/\/cyberwatch.fr\/es\/funciones-del-administrador-de-vulnerabilidades\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch.png","datePublished":"2025-02-05T09:27:25+00:00","dateModified":"2025-12-09T10:43:09+00:00","description":"Cyberwatch Vulnerability Manager te ayuda a gestionar tus vulnerabilidades desde la detecci\u00f3n hasta la correcci\u00f3n, pasando por la priorizaci\u00f3n.","breadcrumb":{"@id":"https:\/\/cyberwatch.fr\/es\/funciones-del-administrador-de-vulnerabilidades\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberwatch.fr\/es\/funciones-del-administrador-de-vulnerabilidades\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/cyberwatch.fr\/es\/funciones-del-administrador-de-vulnerabilidades\/#primaryimage","url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch.png","contentUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch.png","width":1200,"height":628,"caption":"Logo cyberwatch"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberwatch.fr\/es\/funciones-del-administrador-de-vulnerabilidades\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberwatch.fr\/es\/"},{"@type":"ListItem","position":2,"name":"Funcionalidades del Vulnerability Manager"}]},{"@type":"WebSite","@id":"https:\/\/cyberwatch.fr\/es\/#website","url":"https:\/\/cyberwatch.fr\/es\/","name":"Cyberwatch","description":"Supervisez vos vuln\u00e9rabilit\u00e9s. Contr\u00f4lez vos conformit\u00e9s.","publisher":{"@id":"https:\/\/cyberwatch.fr\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberwatch.fr\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/cyberwatch.fr\/es\/#organization","name":"Cyberwatch","url":"https:\/\/cyberwatch.fr\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/cyberwatch.fr\/es\/#\/schema\/logo\/image\/","url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png","contentUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png","width":1883,"height":500,"caption":"Cyberwatch"},"image":{"@id":"https:\/\/cyberwatch.fr\/es\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cyberwatch.fr\/es\/wp-json\/wp\/v2\/pages\/8100","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberwatch.fr\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberwatch.fr\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/es\/wp-json\/wp\/v2\/comments?post=8100"}],"version-history":[{"count":12,"href":"https:\/\/cyberwatch.fr\/es\/wp-json\/wp\/v2\/pages\/8100\/revisions"}],"predecessor-version":[{"id":9426,"href":"https:\/\/cyberwatch.fr\/es\/wp-json\/wp\/v2\/pages\/8100\/revisions\/9426"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/es\/wp-json\/wp\/v2\/media\/7690"}],"wp:attachment":[{"href":"https:\/\/cyberwatch.fr\/es\/wp-json\/wp\/v2\/media?parent=8100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}