{"id":4128,"date":"2023-05-16T14:54:40","date_gmt":"2023-05-16T14:54:40","guid":{"rendered":"https:\/\/centauritech.com\/?page_id=4128"},"modified":"2025-10-01T21:54:49","modified_gmt":"2025-10-01T21:54:49","slug":"information-security","status":"publish","type":"page","link":"https:\/\/centauritech.com\/en\/information-security\/","title":{"rendered":"Information Security"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"4128\" class=\"elementor elementor-4128\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4bfade2 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"4bfade2\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fba879a\" data-id=\"fba879a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5975973 elementor-widget elementor-widget-heading\" data-id=\"5975973\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Information Security is one of Centauri's strengths<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c22382f elementor-mobile-align-left elementor-align-left elementor-widget-mobile__width-inherit elementor-widget elementor-widget-button\" data-id=\"c22382f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/centauritech.com\/en\/request-information-is\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Request Demo<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9edb197 elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9edb197\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-22cdc3f\" data-id=\"22cdc3f\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e53edf4 changing_image test elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e53edf4\" data-element_type=\"section\" data-e-type=\"section\" id=\"01\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-cb87f1d\" data-id=\"cb87f1d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3066509 elementor-widget elementor-widget-image\" data-id=\"3066509\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"517\" src=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/seguridad2-1-1-1024x662.jpg\" class=\"attachment-large size-large wp-image-2116\" alt=\"\" srcset=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/seguridad2-1-1-1024x662.jpg 1024w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/seguridad2-1-1-300x194.jpg 300w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/seguridad2-1-1-768x496.jpg 768w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/seguridad2-1-1-600x388.jpg 600w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/seguridad2-1-1.jpg 1222w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-998a31a elementor-widget elementor-widget-heading\" data-id=\"998a31a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">About our Information Security Dervices<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a770838 elementor-widget elementor-widget-spacer\" data-id=\"a770838\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3280062 elementor-widget elementor-widget-text-editor\" data-id=\"3280062\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Consider us the 911 of Information Technology. When a concern or an incident arises, our staff takes a 360-degree view, from technological detail to executive and market pressures that bear on the situation. Our experience allows us to integrate all these factors into pragmatic solutions to solve the concerns.<\/p><p>We have designed and implemented information security platforms for the private and public sectors, which have operated successfully and with high visibility for years at a nationwide scale. We have designed, implemented and supervised complete information security management schemes for large operations.<\/p><p>We combine considerable experience, academic training, industry certifications and innovation skills to link your business aspirations to specific security objectives. We insist on being able to trace the relevance of the proposed security controls and their associated investments to the organization\u2019s business objectives. We like technology, we like to do a good job, we enjoy what we do.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51a4e3c elementor-widget elementor-widget-spacer\" data-id=\"51a4e3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3e9e853 changing_image hidden elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3e9e853\" data-element_type=\"section\" data-e-type=\"section\" id=\"02\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-fc534c0\" data-id=\"fc534c0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-781b6a9 elementor-widget elementor-widget-image\" data-id=\"781b6a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"517\" src=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/computer3-1-1024x662.jpg\" class=\"attachment-large size-large wp-image-2117\" alt=\"\" srcset=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/computer3-1-1024x662.jpg 1024w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/computer3-1-300x194.jpg 300w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/computer3-1-768x496.jpg 768w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/computer3-1-600x388.jpg 600w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/computer3-1.jpg 1222w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e8f5d5 elementor-widget elementor-widget-heading\" data-id=\"5e8f5d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">MANAGED SECURITY (SOC 24X7)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80790ba elementor-widget elementor-widget-spacer\" data-id=\"80790ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b166a6d elementor-widget elementor-widget-text-editor\" data-id=\"b166a6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Intruders never rest, and neither do we. Using advanced tools and highly qualified analysts we stay on the watch to protect you. Be at ease while we mind your information security.<\/p><p>We operate our Security Operations Center (SOC) with an experienced information security team and a state-of-the-art multifunctional platform, a combination that provides multiple security levels to choose from, based on business needs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ec266bf changing_image hidden gs elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ec266bf\" data-element_type=\"section\" data-e-type=\"section\" id=\"03\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-877787c\" data-id=\"877787c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6b9ea50 elementor-widget elementor-widget-image\" data-id=\"6b9ea50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"517\" src=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/gestion-de-seguridad3-1-1024x662.jpg\" class=\"attachment-large size-large wp-image-2118\" alt=\"\" srcset=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/gestion-de-seguridad3-1-1024x662.jpg 1024w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/gestion-de-seguridad3-1-300x194.jpg 300w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/gestion-de-seguridad3-1-768x496.jpg 768w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/gestion-de-seguridad3-1-600x388.jpg 600w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/gestion-de-seguridad3-1.jpg 1222w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-273321d elementor-widget elementor-widget-heading\" data-id=\"273321d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Management<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-315d58b elementor-widget elementor-widget-spacer\" data-id=\"315d58b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f5ff03c elementor-widget elementor-widget-text-editor\" data-id=\"f5ff03c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Tools are important, but operating them correctly is even more important. Our security management scheme will give you total control over your security operations, management and government, plus you will count on our expert advice for continuous improvement.<\/p><p>We convert your security objectives into strategic plans that will help you define the right investments. We will help establish security metrics to determine the security posture of the organization and to clarify without ambiguity to what extent the security objectives are being met. These metrics also facilitate increasing the maturity level of your organization&#8217;s security capabilities.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-87be247 changing_image hidden elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"87be247\" data-element_type=\"section\" data-e-type=\"section\" id=\"04\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-8cc0ec0\" data-id=\"8cc0ec0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-41f81c0 elementor-widget elementor-widget-image\" data-id=\"41f81c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"517\" src=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/forense2-1-1024x662.jpg\" class=\"attachment-large size-large wp-image-2119\" alt=\"\" srcset=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/forense2-1-1024x662.jpg 1024w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/forense2-1-300x194.jpg 300w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/forense2-1-768x496.jpg 768w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/forense2-1-600x388.jpg 600w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/forense2-1.jpg 1222w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3583db1 elementor-widget elementor-widget-heading\" data-id=\"3583db1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Risk Analysis<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1828b43 elementor-widget elementor-widget-spacer\" data-id=\"1828b43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96fe557 elementor-widget elementor-widget-text-editor\" data-id=\"96fe557\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The disconnection between security investments and real life risks is a serious yet common flaw. In security, protection should be planned based on a risk assessment; the more thoughtful, well argued and weighted, the better.<\/p><p>We identify potential risks and their impact on your business objectives.<\/p><p>We give you tools to manage your risks and we design security controls to reduce their impact, taking into account the needs and resources of your organization.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-97301e7 changing_image hidden pentest elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"97301e7\" data-element_type=\"section\" data-e-type=\"section\" id=\"05\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-b01bf8a\" data-id=\"b01bf8a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2e74989 elementor-widget elementor-widget-image\" data-id=\"2e74989\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"517\" src=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/pentes1-1-1024x662.jpg\" class=\"attachment-large size-large wp-image-2120\" alt=\"\" srcset=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/pentes1-1-1024x662.jpg 1024w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/pentes1-1-300x194.jpg 300w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/pentes1-1-768x496.jpg 768w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/pentes1-1-600x388.jpg 600w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/pentes1-1.jpg 1222w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb8d2ff elementor-widget elementor-widget-heading\" data-id=\"eb8d2ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Pentest<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-669ea65 elementor-widget elementor-widget-spacer\" data-id=\"669ea65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4912e78 elementor-widget elementor-widget-text-editor\" data-id=\"4912e78\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Put your cyber defenses to the test. Based on years of experience, our specialized team will emulate attacks to check how a real life intruder could penetrate and abuse your information platform.<\/p><p>Our team of certified and experienced Ethical Hackers test your defenses with creative penetration attempts, but in coordination with the minimal set of need-to-know staff.<\/p><p>When combined with our Cyberguard SOC service, our pentest service also lets us check the effectiveness of the organization\u2019s detection tools without having to install back doors that would contaminate the information systems; that is, the combined service emulates organized crime activities without causing harm.<\/p><p>Request our machine learning pentest service and be pleasantly surprised by the cost-benefit ratio.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-07583d9 changing_image hidden elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"07583d9\" data-element_type=\"section\" data-e-type=\"section\" id=\"14\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-16a23b8\" data-id=\"16a23b8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8203796 elementor-widget elementor-widget-image\" data-id=\"8203796\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"517\" src=\"https:\/\/centauritech.com\/wp-content\/uploads\/2023\/05\/centro-de-operaciones-de-seguridad-1024x662.jpg\" class=\"attachment-large size-large wp-image-3805\" alt=\"dos personas administrando la seguridad de la empresa\" srcset=\"https:\/\/centauritech.com\/wp-content\/uploads\/2023\/05\/centro-de-operaciones-de-seguridad-1024x662.jpg 1024w, https:\/\/centauritech.com\/wp-content\/uploads\/2023\/05\/centro-de-operaciones-de-seguridad-300x194.jpg 300w, https:\/\/centauritech.com\/wp-content\/uploads\/2023\/05\/centro-de-operaciones-de-seguridad-768x496.jpg 768w, https:\/\/centauritech.com\/wp-content\/uploads\/2023\/05\/centro-de-operaciones-de-seguridad-18x12.jpg 18w, https:\/\/centauritech.com\/wp-content\/uploads\/2023\/05\/centro-de-operaciones-de-seguridad.jpg 1222w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-090445a elementor-widget elementor-widget-heading\" data-id=\"090445a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Operation Center (SOC)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44f5e90 elementor-widget elementor-widget-spacer\" data-id=\"44f5e90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5fc395 elementor-widget elementor-widget-text-editor\" data-id=\"e5fc395\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our services include the following:<\/p><ul><li>SIEM operation and analysis.<\/li><li>Analysis (Analytics).<\/li><li>Incident response.<\/li><li>Vulnerability scan.<\/li><li>Threat hunting and intelligence.<\/li><li>Forensic analysis.<\/li><li>Orchestration and automation.<\/li><li>Security management.<\/li><li>Customer focus.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3090f52 changing_image hidden elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3090f52\" data-element_type=\"section\" data-e-type=\"section\" id=\"06\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-65b5f4c\" data-id=\"65b5f4c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0ae4f53 elementor-widget elementor-widget-image\" data-id=\"0ae4f53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"517\" src=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/forense2-1-1024x662.jpg\" class=\"attachment-large size-large wp-image-2119\" alt=\"\" srcset=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/forense2-1-1024x662.jpg 1024w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/forense2-1-300x194.jpg 300w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/forense2-1-768x496.jpg 768w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/forense2-1-600x388.jpg 600w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/forense2-1.jpg 1222w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad14df1 elementor-widget elementor-widget-heading\" data-id=\"ad14df1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Incident Response and Forensic Analysis<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72292b3 elementor-widget elementor-widget-spacer\" data-id=\"72292b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd5cee0 elementor-widget elementor-widget-text-editor\" data-id=\"dd5cee0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A security incident has happened. How do we respond? How did it start? What systems have been compromised? How do we preserve forensic evidence? What do we tell regulatory agencies?<\/p><p>We have a team of experts who are well versed in the field of battle and strong academic foundations. We have lived many times trough the heat of detecting an intruder, tracking and analyzing its actions, neutralizing, mitigating the impact and supporting the organization in the public facing response.<\/p><p>Using sophisticated tools, we will hunt down the aggressor, even beyond the obvious. We will collect evidence following methods that allow us to comply with the requirements of the law and we will give you a detailed report, in technical and managerial language, that includes what happened and how to avoid its repeating the issue.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7d094b5 changing_image hidden cn elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7d094b5\" data-element_type=\"section\" data-e-type=\"section\" id=\"07\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-e33c53b\" data-id=\"e33c53b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-944dfc2 elementor-widget elementor-widget-image\" data-id=\"944dfc2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"517\" src=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/continuidad-de-negocio2-1-1024x662.jpg\" class=\"attachment-large size-large wp-image-2128\" alt=\"\" srcset=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/continuidad-de-negocio2-1-1024x662.jpg 1024w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/continuidad-de-negocio2-1-300x194.jpg 300w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/continuidad-de-negocio2-1-768x496.jpg 768w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/continuidad-de-negocio2-1-600x388.jpg 600w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/continuidad-de-negocio2-1.jpg 1222w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1da1111 elementor-widget elementor-widget-heading\" data-id=\"1da1111\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Business Continuity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d26ac57 elementor-widget elementor-widget-spacer\" data-id=\"d26ac57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6dbee7 elementor-widget elementor-widget-text-editor\" data-id=\"f6dbee7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Don\u2019t leave it to chance. We help you build and test your plans so that, when the time comes, the business impact is manageable and the recovery process is quick and efficient.<\/p><p>We identify potential disasters that could jeopardize your services, including system failures and natural disasters, and what would be the specific impact to your business. This leads to a conversation about your risk tolerance and the planning to prepare your organization to survive an impact and return to normal as quickly as possible.<\/p><p>We also train your staff to deal with such events in order to lessen the impact for as far as possible and reduce the recovery time.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-dd49b03 changing_image hidden elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dd49b03\" data-element_type=\"section\" data-e-type=\"section\" id=\"08\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-61af089\" data-id=\"61af089\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9ac3e76 elementor-widget elementor-widget-image\" data-id=\"9ac3e76\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"517\" src=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/compu3-1-1-1024x662.jpg\" class=\"attachment-large size-large wp-image-2129\" alt=\"\" srcset=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/compu3-1-1-1024x662.jpg 1024w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/compu3-1-1-300x194.jpg 300w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/compu3-1-1-768x496.jpg 768w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/compu3-1-1-600x388.jpg 600w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/compu3-1-1.jpg 1222w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc3c117 elementor-widget elementor-widget-heading\" data-id=\"cc3c117\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Code Security Design or Review<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63d6df7 elementor-widget elementor-widget-spacer\" data-id=\"63d6df7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0eafb94 elementor-widget elementor-widget-text-editor\" data-id=\"0eafb94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We review your code to uncover security flaws, vulnerabilities, backdoors and other threats. Preferably, we help in the code security design from the beginning of the software lifecycle, to prevent risks and delays.<\/p><p>We anticipate potential security risks in your systems from design to implementation by employing security measures as part of the software requirements, pre-operational code reviews and platform testing before final deployment.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c92b906 changing_image hidden elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c92b906\" data-element_type=\"section\" data-e-type=\"section\" id=\"09\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-6865138\" data-id=\"6865138\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-af5358e elementor-widget elementor-widget-image\" data-id=\"af5358e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"517\" src=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/teletrabajo2-1-1024x662.jpg\" class=\"attachment-large size-large wp-image-2130\" alt=\"\" srcset=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/teletrabajo2-1-1024x662.jpg 1024w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/teletrabajo2-1-300x194.jpg 300w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/teletrabajo2-1-768x496.jpg 768w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/teletrabajo2-1-600x388.jpg 600w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/teletrabajo2-1.jpg 1222w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c274749 elementor-widget elementor-widget-heading\" data-id=\"c274749\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Stay-At-Home Security Review<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6003540 elementor-widget elementor-widget-spacer\" data-id=\"6003540\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b075ff1 elementor-widget elementor-widget-text-editor\" data-id=\"b075ff1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Is your staff as well protected at home as they were in the corporate network? Let us review their equipment, defenses, connection protocols and assess the risk to your organization.<\/p><p>Telecommuting was a good idea but it happened in a rush. We check for loose ends that could prove costly or spoil your brand. We test authentication mechanisms, secure connections, backups, data protection and risk mitigation in collaboration with your staff. As an option, we add our SOC managed service for 3 months.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f370e9a changing_image hidden elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f370e9a\" data-element_type=\"section\" data-e-type=\"section\" id=\"10\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-80cc3c3\" data-id=\"80cc3c3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61a6b55 elementor-widget elementor-widget-image\" data-id=\"61a6b55\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"517\" src=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/infraestructura2-1-1024x662.jpg\" class=\"attachment-large size-large wp-image-2121\" alt=\"\" srcset=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/infraestructura2-1-1024x662.jpg 1024w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/infraestructura2-1-300x194.jpg 300w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/infraestructura2-1-768x496.jpg 768w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/infraestructura2-1-600x388.jpg 600w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/infraestructura2-1.jpg 1222w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7398b53 elementor-widget elementor-widget-heading\" data-id=\"7398b53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Infrastructure and Arquitecture Design<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a02db2 elementor-widget elementor-widget-spacer\" data-id=\"8a02db2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d22a9a elementor-widget elementor-widget-text-editor\" data-id=\"2d22a9a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The effectiveness of security controls is not the sum of their individual benefits and functions. A sound design mindful of the architecture is a critical element.<\/p><p>Our staff combines academic training with battlefield experience, in mission critical national and international environments. Thus, we know how to design security architectures and infrastructures able to balance effective controls, valid surveillance, appropriate user functionality and clear governance.<\/p><p>Our staff trains solution architects at leading universities in Panama and other countries. Our international network of contacts allows us to keep up with the industry state-of-the-art and adapt it to your environment.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4f2d788 changing_image hidden elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4f2d788\" data-element_type=\"section\" data-e-type=\"section\" id=\"11\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-032f546\" data-id=\"032f546\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-65c32a1 elementor-widget elementor-widget-image\" data-id=\"65c32a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"517\" src=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/politica-de-seguridad2-1-1024x662.jpg\" class=\"attachment-large size-large wp-image-2122\" alt=\"\" srcset=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/politica-de-seguridad2-1-1024x662.jpg 1024w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/politica-de-seguridad2-1-300x194.jpg 300w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/politica-de-seguridad2-1-768x496.jpg 768w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/politica-de-seguridad2-1-600x388.jpg 600w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/politica-de-seguridad2-1.jpg 1222w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62ed0ae elementor-widget elementor-widget-heading\" data-id=\"62ed0ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Policies<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4e0cf0 elementor-widget elementor-widget-spacer\" data-id=\"f4e0cf0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4cde49b elementor-widget elementor-widget-text-editor\" data-id=\"4cde49b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Intuition and talent are important but not enough. We build or evaluate your security policies to ensure they are comprehensive, without loopholes or fuzziness, but reasonable given the nature of your organization.<\/p><p>Be an organization that complies with your own policies, translate your security strategy into action.<\/p><p>Are your policies paper-thin? We treat security policies as a habit-forming process.<\/p><p>We design policies based on your business objectives and risks, but minding the culture in your organization.<\/p><p>We recommend the best way to improve policies and to measure progress.<\/p><p>By combining this service with our security management service, you can measure your own policy compliance through a dashboard. Transform your business from a security reactive to a proactive in a short time. The secret lies in focusing on changing the habits, let us help you.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-fac9962 changing_image hidden elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fac9962\" data-element_type=\"section\" data-e-type=\"section\" id=\"12\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-289e594\" data-id=\"289e594\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e5723c6 elementor-widget elementor-widget-image\" data-id=\"e5723c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"517\" src=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/brecha2-1-1024x662.jpg\" class=\"attachment-large size-large wp-image-2123\" alt=\"\" srcset=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/brecha2-1-1024x662.jpg 1024w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/brecha2-1-300x194.jpg 300w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/brecha2-1-768x496.jpg 768w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/brecha2-1-600x388.jpg 600w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/brecha2-1.jpg 1222w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21290c3 elementor-widget elementor-widget-heading\" data-id=\"21290c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Gap Analysis and System Audit<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c37fc5 elementor-widget elementor-widget-spacer\" data-id=\"1c37fc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fe048e elementor-widget elementor-widget-text-editor\" data-id=\"4fe048e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We review your architecture against industry standards and tell you how to comply.<\/p><p>Our security gap analysis service gives you deeper understanding of your security posture against industry best practices.<\/p><p>In the same way that the skill level of a medical specialist makes a difference, our specialists are considered among the best in the region, so you can expect better results. In this service we combine powerful security investigation tools with strategic security assessment sessions with your organization&#8217;s team.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-10e627d changing_image hidden elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"10e627d\" data-element_type=\"section\" data-e-type=\"section\" id=\"13\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-8a32342\" data-id=\"8a32342\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-47fac33 elementor-widget elementor-widget-image\" data-id=\"47fac33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"517\" src=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/capacitacion2-1-1024x662.jpg\" class=\"attachment-large size-large wp-image-2124\" alt=\"\" srcset=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/capacitacion2-1-1024x662.jpg 1024w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/capacitacion2-1-300x194.jpg 300w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/capacitacion2-1-768x496.jpg 768w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/capacitacion2-1-600x388.jpg 600w, https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/capacitacion2-1.jpg 1222w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8764a9d elementor-widget elementor-widget-heading\" data-id=\"8764a9d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Training and Learning coaching<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-853a6fc elementor-widget elementor-widget-spacer\" data-id=\"853a6fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df3953b elementor-widget elementor-widget-text-editor\" data-id=\"df3953b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Tailor-made training courses, or self-study coaching, for technical staff, managers and top executives. Taught by experts with high academic and professional credentials, recognized as specialists in the field, that conduct research and teach at universities.<\/p><p>Advanced domain knowledge among your staff is the first and most important line of defense. Technology investments are of little use if there is no one that knows how to take advantage of it. We can help. We have specialists with Ph.D. and Master\u2019s level, qualified and frequently active as university professors. They also have top level experience (CEO, CIO, CISO).<\/p><p>We design courses tailored to your industry and to your needs. With us you will not only learn the how but the why.<\/p><p>Courses in the areas of:<\/p><ul class=\"list-form-capacitac\"><li>Information security.<\/li><li>Forensic analysis<\/li><li>Security management.<\/li><li>Cryptographic techniques.<\/li><li>Information Security for executives and senior managers.<\/li><\/ul><p>Our courses can be evaluated and issue competence-demonstration course certificates.<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7f7e89 elementor-widget elementor-widget-html\" data-id=\"a7f7e89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script src=\"https:\/\/code.jquery.com\/jquery-3.6.0.min.js\"><\/script>\r\n<script>\r\n$(document).ready(function() {\r\n    var currentHash = window.location.hash;\r\n   if(currentHash == \"#05\"){\r\n       $('.test').hide();\r\n       $('.pentest').show();\r\n   }\r\n   \r\n   else if (currentHash == \"#07\"){\r\n       $('.test').hide();\r\n       $('.cn').show();\r\n   }\r\n   \r\n   else if(currentHash == \"#03\"){\r\n       $('.test').hide();\r\n       $('.gs').show();\r\n   }\r\n});\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06ef099 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"06ef099\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Share in: <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e6f66d8 elementor-share-buttons--view-icon elementor-share-buttons--shape-circle elementor-share-buttons--color-custom elementor-widget__width-initial elementor-share-buttons--skin-gradient elementor-grid-0 elementor-widget elementor-widget-share-buttons\" data-id=\"e6f66d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_facebook\" role=\"button\" tabindex=\"0\" aria-label=\"Compartir en facebook\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_twitter\" role=\"button\" tabindex=\"0\" aria-label=\"Compartir en twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\" role=\"button\" tabindex=\"0\" aria-label=\"Compartir en linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_whatsapp\" role=\"button\" tabindex=\"0\" aria-label=\"Compartir en whatsapp\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-whatsapp\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_telegram\" role=\"button\" tabindex=\"0\" aria-label=\"Compartir en telegram\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-telegram\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b33169 elementor-widget elementor-widget-html\" data-id=\"2b33169\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script>\r\n    var $ = jQuery\r\n    $( document ).ready(function() {\r\n        \/\/Primer Servicio\r\n    $( \"#show_01\" ).click(function() {\r\n        $(\".changing_image\").hide();\r\n        $(\"#01\").fadeToggle();\r\n        $(\".our_nav\").removeClass(\"my_active\");\r\n\t\t \t$(\"#show_01\").addClass(\"my_active\");\r\n    });\r\n        \/\/Segundo Servicio\r\n    $( \"#show_02\" ).click( function() {\r\n        $(\".changing_image\").hide();\r\n        $(\"#02\").fadeToggle();\r\n        $(\".our_nav\").removeClass(\"my_active\");\r\n\t\t \t$(\"#show_02\").addClass(\"my_active\");\r\n    });\r\n        \/\/Tercer Servicio\r\n    $( \"#show_03\" ).click(function() {\r\n        $(\".changing_image\").hide();\r\n        $(\"#03\").fadeToggle();\r\n        $(\".our_nav\").removeClass(\"my_active\");\r\n\t\t \t$(\"#show_03\").addClass(\"my_active\");\r\n    });\r\n        \/\/Cuarto Servicio\r\n    $( \"#show_04\" ).click(function() {\r\n        $(\".changing_image\").hide();\r\n        $(\"#04\").fadeToggle();\r\n        $(\".our_nav\").removeClass(\"my_active\");\r\n\t\t \t$(\"#show_04\").addClass(\"my_active\");\r\n    });\r\n        \/\/Quinto Servicio\r\n    $( \"#show_05\" ).click(function() {\r\n        $(\".changing_image\").hide();\r\n        $(\"#05\").fadeToggle();\r\n        $(\".our_nav\").removeClass(\"my_active\");\r\n\t\t \t$(\"#show_05\").addClass(\"my_active\");\r\n    });\r\n        \/\/Sexto Servicio\r\n    $( \"#show_06\" ).click(function() {\r\n        $(\".changing_image\").hide();\r\n        $(\"#06\").fadeToggle();\r\n        $(\".our_nav\").removeClass(\"my_active\");\r\n\t\t \t$(\"#show_06\").addClass(\"my_active\");\r\n    });\r\n        \/\/Septimo Servicio\r\n    $( \"#show_07\" ).click(function() {\r\n        $(\".changing_image\").hide();\r\n        $(\"#07\").fadeToggle();\r\n        $(\".our_nav\").removeClass(\"my_active\");\r\n\t\t \t$(\"#show_07\").addClass(\"my_active\");\r\n    });\r\n        \/\/Octavo Servicio\r\n    $( \"#show_08\" ).click(function() {\r\n        $(\".changing_image\").hide();\r\n        $(\"#08\").fadeToggle();\r\n        $(\".our_nav\").removeClass(\"my_active\");\r\n\t\t \t$(\"#show_08\").addClass(\"my_active\");\r\n    });\r\n        \/\/Noveno Servicio\r\n    $( \"#show_09\" ).click(function() {\r\n        $(\".changing_image\").hide();\r\n        $(\"#09\").fadeToggle();\r\n        $(\".our_nav\").removeClass(\"my_active\");\r\n\t\t \t$(\"#show_09\").addClass(\"my_active\");\r\n    });\r\n        \/\/Decimo Servicio\r\n    $( \"#show_10\" ).click(function() {\r\n        $(\".changing_image\").hide();\r\n        $(\"#10\").fadeToggle();\r\n        $(\".our_nav\").removeClass(\"my_active\");\r\n\t\t \t$(\"#show_10\").addClass(\"my_active\");\r\n    });\r\n        \/\/Onceavo Servicio\r\n    $( \"#show_11\" ).click(function() {\r\n        $(\".changing_image\").hide();\r\n        $(\"#11\").fadeToggle();\r\n        $(\".our_nav\").removeClass(\"my_active\");\r\n\t\t \t$(\"#show_11\").addClass(\"my_active\");\r\n    });\r\n        \/\/Doceavo Servicio\r\n    $( \"#show_12\" ).click(function() {\r\n        $(\".changing_image\").hide();\r\n        $(\"#12\").fadeToggle();\r\n        $(\".our_nav\").removeClass(\"my_active\");\r\n\t\t \t$(\"#show_12\").addClass(\"my_active\");\r\n    });\r\n        \/\/Terceavo Servicio\r\n    $( \"#show_13\" ).click(function() {\r\n        $(\".changing_image\").hide();\r\n        $(\"#13\").fadeToggle();\r\n        $(\".our_nav\").removeClass(\"my_active\");\r\n\t\t \t$(\"#show_13\").addClass(\"my_active\");\r\n    });\r\n    \r\n    $( \"#show_14\" ).click(function() {\r\n        $(\".changing_image\").hide();\r\n        $(\"#14\").fadeToggle();\r\n        $(\".our_nav\").removeClass(\"my_active\");\r\n\t\t \t$(\"#show_14\").addClass(\"my_active\");\r\n    });\r\n    \r\n});\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f2b2206\" data-id=\"f2b2206\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7033d5b elementor-widget elementor-widget-heading\" data-id=\"7033d5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Service Details<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab3042d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ab3042d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b0de06 elementor-align-left our_nav my_active elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"6b0de06\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"show_01\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">About our services<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ffa83d elementor-align-left our_nav elementor-widget elementor-widget-button\" data-id=\"3ffa83d\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"show_02\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Security surveillance<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9757cc0 elementor-align-left our_nav elementor-widget elementor-widget-button\" data-id=\"9757cc0\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"show_03\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Security Management<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3500e74 elementor-align-left our_nav elementor-widget elementor-widget-button\" data-id=\"3500e74\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"show_04\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Risk Analysis<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61e8b22 elementor-align-left our_nav elementor-widget elementor-widget-button\" data-id=\"61e8b22\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"show_05\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Pentest<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee200cf elementor-align-left our_nav elementor-widget elementor-widget-button\" data-id=\"ee200cf\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"show_14\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Security Operation Center<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-658ba86 elementor-align-left our_nav elementor-widget elementor-widget-button\" data-id=\"658ba86\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"show_06\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Incident Response and F.A.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-656f24b elementor-align-left our_nav elementor-widget elementor-widget-button\" data-id=\"656f24b\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"show_07\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Business Continuity<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4cbc2dc elementor-align-left our_nav elementor-widget elementor-widget-button\" data-id=\"4cbc2dc\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"show_08\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Code security design or review<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7723092 elementor-align-left our_nav elementor-widget elementor-widget-button\" data-id=\"7723092\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"show_09\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Stay-at-home Security Review<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-540777f elementor-align-left our_nav elementor-widget elementor-widget-button\" data-id=\"540777f\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"show_10\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Infrastructure and Arquitecture Design<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dfffb24 elementor-align-left our_nav elementor-widget elementor-widget-button\" data-id=\"dfffb24\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"show_11\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Security Policies<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac95b37 elementor-align-left our_nav elementor-widget elementor-widget-button\" data-id=\"ac95b37\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"show_12\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Security Gap Analysis and System Audit<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9e25d9 elementor-align-left our_nav elementor-widget elementor-widget-button\" data-id=\"d9e25d9\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"show_13\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Training and Learning Coaching<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a89a87 elementor-widget elementor-widget-spacer\" data-id=\"5a89a87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1356be elementor-hidden-mobile elementor-widget elementor-widget-heading\" data-id=\"f1356be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Contact us for more information<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5bb605 elementor-hidden-mobile elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e5bb605\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff0f113 elementor-cta--skin-cover elementor-hidden-mobile elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"ff0f113\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/Infografia.webp);\" role=\"img\" aria-label=\"Infografia\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item elementor-animated-item--grow\">\n\t\t\t\t\t\tVisit our Resourse Page\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item elementor-animated-item--grow\">\n\t\t\t\t\t\tFind out the latest news about cybersecurity\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item elementor-animated-item--grow\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-xs\" href=\"https:\/\/centauritech.com\/en\/ctn\/\">\n\t\t\t\t\t\tGO NOW\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-ribbon elementor-ribbon-right\">\n\t\t\t\t<div class=\"elementor-ribbon-inner\">\n\t\t\t\t\t\u00a1Infographics!\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d51f179 elementor-widget elementor-widget-spacer\" data-id=\"d51f179\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-01c76e2 elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"01c76e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-48295ca elementor-hidden-desktop elementor-hidden-tablet elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"48295ca\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4a83520\" data-id=\"4a83520\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-62545ad elementor-widget elementor-widget-heading\" data-id=\"62545ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Contact Us for more information<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed5cf1b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ed5cf1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4de56f8 elementor-cta--skin-cover elementor-cta--valign-middle elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"4de56f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/Infografia.webp);\" role=\"img\" aria-label=\"Infografia\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item elementor-animated-item--grow\">\n\t\t\t\t\t\tVisit Our Resources Pages\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item elementor-animated-item--grow\">\n\t\t\t\t\t\tFind out the lastest news about cybersecurity\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item elementor-animated-item--grow\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-xs\" href=\"https:\/\/centauritech.com\/en\/resources\/\">\n\t\t\t\t\t\tGO NOW\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-ribbon elementor-ribbon-right\">\n\t\t\t\t<div class=\"elementor-ribbon-inner\">\n\t\t\t\t\t\u00a1Infographics!\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55707d8 elementor-widget elementor-widget-spacer\" data-id=\"55707d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c97b986 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c97b986\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4f86183\" data-id=\"4f86183\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-667af7c elementor-widget elementor-widget-heading\" data-id=\"667af7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">LET'S START WORK TOGETHER<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1959306 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"1959306\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ebc94a4 elementor-widget elementor-widget-text-editor\" data-id=\"ebc94a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In today\u2019s digital world, cybersecurity is essential. Let\u2019s start working together to protect your business from cyber threats and keep your information safe. Rely on our experience and expertise to strengthen your security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5ef82c4\" data-id=\"5ef82c4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-48639c1 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"48639c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/centauritech.com\/en\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Go Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Information Security is one of Centauri&#8217;s strengths Request Demo About our Information Security Dervices Consider us the 911 of Information Technology. When a concern or an incident arises, our staff takes a 360-degree view, from technological detail to executive and market pressures that bear on the situation. Our experience allows us to integrate all these [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-4128","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Security - Centauri Technologies Corporation<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/centauritech.com\/en\/information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security - Centauri Technologies Corporation\" \/>\n<meta property=\"og:description\" content=\"Information Security is one of Centauri&#8217;s strengths Request Demo About our Information Security Dervices Consider us the 911 of Information Technology. When a concern or an incident arises, our staff takes a 360-degree view, from technological detail to executive and market pressures that bear on the situation. Our experience allows us to integrate all these [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/centauritech.com\/en\/information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Centauri Technologies Corporation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-01T21:54:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/seguridad2-1-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1222\" \/>\n\t<meta property=\"og:image:height\" content=\"790\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/centauritech.com\\\/information-security\\\/\",\"url\":\"https:\\\/\\\/centauritech.com\\\/information-security\\\/\",\"name\":\"Information Security - Centauri Technologies Corporation\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/centauritech.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/centauritech.com\\\/information-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/centauritech.com\\\/information-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/centauritech.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/seguridad2-1-1-1024x662.jpg\",\"datePublished\":\"2023-05-16T14:54:40+00:00\",\"dateModified\":\"2025-10-01T21:54:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/centauritech.com\\\/information-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/centauritech.com\\\/information-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/centauritech.com\\\/information-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/centauritech.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/seguridad2-1-1-1024x662.jpg\",\"contentUrl\":\"https:\\\/\\\/centauritech.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/seguridad2-1-1-1024x662.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/centauritech.com\\\/information-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/centauritech.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/centauritech.com\\\/#website\",\"url\":\"https:\\\/\\\/centauritech.com\\\/\",\"name\":\"Centauri Technologies Corporation\",\"description\":\"Somos su brazo de innovaci\u00f3n en tecnolog\u00eda de la informaci\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/centauritech.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/centauritech.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/centauritech.com\\\/#organization\",\"name\":\"Centauri Technologies Corporation\",\"url\":\"https:\\\/\\\/centauritech.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/centauritech.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/centauritech.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/logo-centauri.png\",\"contentUrl\":\"https:\\\/\\\/centauritech.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/logo-centauri.png\",\"width\":351,\"height\":201,\"caption\":\"Centauri Technologies Corporation\"},\"image\":{\"@id\":\"https:\\\/\\\/centauritech.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security - Centauri Technologies Corporation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/centauritech.com\/en\/information-security\/","og_locale":"en_US","og_type":"article","og_title":"Information Security - Centauri Technologies Corporation","og_description":"Information Security is one of Centauri&#8217;s strengths Request Demo About our Information Security Dervices Consider us the 911 of Information Technology. When a concern or an incident arises, our staff takes a 360-degree view, from technological detail to executive and market pressures that bear on the situation. Our experience allows us to integrate all these [&hellip;]","og_url":"https:\/\/centauritech.com\/en\/information-security\/","og_site_name":"Centauri Technologies Corporation","article_modified_time":"2025-10-01T21:54:49+00:00","og_image":[{"width":1222,"height":790,"url":"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/seguridad2-1-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/centauritech.com\/information-security\/","url":"https:\/\/centauritech.com\/information-security\/","name":"Information Security - Centauri Technologies Corporation","isPartOf":{"@id":"https:\/\/centauritech.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/centauritech.com\/information-security\/#primaryimage"},"image":{"@id":"https:\/\/centauritech.com\/information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/seguridad2-1-1-1024x662.jpg","datePublished":"2023-05-16T14:54:40+00:00","dateModified":"2025-10-01T21:54:49+00:00","breadcrumb":{"@id":"https:\/\/centauritech.com\/information-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/centauritech.com\/information-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/centauritech.com\/information-security\/#primaryimage","url":"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/seguridad2-1-1-1024x662.jpg","contentUrl":"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/08\/seguridad2-1-1-1024x662.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/centauritech.com\/information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/centauritech.com\/"},{"@type":"ListItem","position":2,"name":"Information Security"}]},{"@type":"WebSite","@id":"https:\/\/centauritech.com\/#website","url":"https:\/\/centauritech.com\/","name":"Centauri Technologies Corporation","description":"Somos su brazo de innovaci\u00f3n en tecnolog\u00eda de la informaci\u00f3n","publisher":{"@id":"https:\/\/centauritech.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/centauritech.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/centauritech.com\/#organization","name":"Centauri Technologies Corporation","url":"https:\/\/centauritech.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/centauritech.com\/#\/schema\/logo\/image\/","url":"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/05\/logo-centauri.png","contentUrl":"https:\/\/centauritech.com\/wp-content\/uploads\/2022\/05\/logo-centauri.png","width":351,"height":201,"caption":"Centauri Technologies Corporation"},"image":{"@id":"https:\/\/centauritech.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/centauritech.com\/en\/wp-json\/wp\/v2\/pages\/4128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/centauritech.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/centauritech.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/centauritech.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/centauritech.com\/en\/wp-json\/wp\/v2\/comments?post=4128"}],"version-history":[{"count":52,"href":"https:\/\/centauritech.com\/en\/wp-json\/wp\/v2\/pages\/4128\/revisions"}],"predecessor-version":[{"id":4861,"href":"https:\/\/centauritech.com\/en\/wp-json\/wp\/v2\/pages\/4128\/revisions\/4861"}],"wp:attachment":[{"href":"https:\/\/centauritech.com\/en\/wp-json\/wp\/v2\/media?parent=4128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}