{"id":6164,"date":"2023-04-12T00:11:41","date_gmt":"2023-04-12T00:11:41","guid":{"rendered":"https:\/\/www.netvoix.com\/?page_id=6164"},"modified":"2025-01-20T21:02:27","modified_gmt":"2025-01-20T21:02:27","slug":"ciberseguridad-5","status":"publish","type":"page","link":"https:\/\/www.netvoix.com\/es\/it-services\/security-2\/","title":{"rendered":"Seguridad 2"},"content":{"rendered":"<section style=\"\" id=\"overview\" class=\"vc_section vc_custom_1681311124117\"><div style=\"\" class=\"vc_row wpb_row vc_row-fluid\"><div class=\"row-inner\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t\t\t\t<p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t\t<sr7-module data-alias=\"duo-1\" data-id=\"16\" id=\"SR7_16_1\" class=\"rs-ov-hidden\" data-version=\"6.7.52\">\n\t\t\t\t\t<sr7-adjuster><\/sr7-adjuster>\n\t\t\t\t\t<sr7-content>\n\t\t\t\t\t\t<sr7-slide id=\"SR7_16_1-24\" data-key=\"24\">\n\t\t\t\t\t\t\t<sr7-txt id=\"SR7_16_1-24-3\" class=\"sr7-layer\">NetVoiX supports your security goals<\/sr7-txt>\n\t\t\t\t\t\t\t<sr7-txt id=\"SR7_16_1-24-4\" class=\"sr7-layer\">DYNAMIC CYBERSECURITY THAT EVOLVES WITH YOUR ORGANIZATION<\/sr7-txt>\n\t\t\t\t\t\t\t<sr7-txt id=\"SR7_16_1-24-5\" class=\"sr7-layer\">Our cybersecurity solutions offer complete defense against cyberattacks, protecting businesses from the most recent online threats, such as ransomware and other malicious viruses. We provide a powerful and effective system that detects and blocks unauthorized access to critical data.<\/sr7-txt>\n\t\t\t\t\t\t<\/sr7-slide>\n\t\t\t\t\t\t<sr7-slide id=\"SR7_16_1-63\" data-key=\"63\">\n\t\t\t\t\t\t<\/sr7-slide>\n\t\t\t\t\t<\/sr7-content>\n\t\t\t\t\t<image_lists style=\"display:none\">\n\t\t\t\t\t\t<img data-src=\"\/\/www.netvoix.com\/wp-content\/uploads\/2023\/02\/banner-duo-scaled.jpg\" data-libid=\"5891\" data-lib=\"medialibrary\" alt=\"cisco-duo\" width=\"0\" height=\"0\" data-dbsrc=\"Ly93d3cubmV0dm9peC5jb20vd3AtY29udGVudC91cGxvYWRzLzIwMjMvMDIvYmFubmVyLWR1by1zY2FsZWQuanBn\"\/>\n\t\t\t\t\t<\/image_lists>\n\t\t\t\t<\/sr7-module>\n\t\t\t\t<script>\n\t\t\t\t\twindow.SR7 ??={};SR7.PMH ??={}; SR7.PMH[\"SR7_16_1\"] = {cn:100,state:false,fn: function() { if (window._tpt!==undefined && window._tpt.prepareModuleHeight !== undefined) {  _tpt.prepareModuleHeight({id:\"SR7_16_1\",el:[500,500,768,960,720],type:'standard',shdw:'0',gh:[500,500,,,],gw:[1240,1240,1024,778,480],vpt:['100px'],size:{fullWidth:true, fullHeight:false},mh:'0',onh:0,onw:0,bg:{color:'{\"orig\":\"transparent\",\"type\":\"solid\",\"string\":\"transparent\"}'}});   SR7.PMH[\"SR7_16_1\"].state=true;} else if(SR7.PMH[\"SR7_16_1\"].cn-->0)\tsetTimeout( SR7.PMH[\"SR7_16_1\"].fn,19);}};SR7.PMH[\"SR7_16_1\" ].fn();\n\t\t\t\t<\/script>\n\n\t\t\t\t<p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t\t<sr7-module data-alias=\"security-1\" data-id=\"17\" id=\"SR7_17_2\" class=\"rs-ov-hidden\" data-version=\"6.7.52\">\n\t\t\t\t\t<sr7-adjuster><\/sr7-adjuster>\n\t\t\t\t\t<sr7-content>\n\t\t\t\t\t\t<sr7-slide id=\"SR7_17_2-25\" data-key=\"25\">\n\t\t\t\t\t\t<\/sr7-slide>\n\t\t\t\t\t\t<sr7-slide id=\"SR7_17_2-64\" data-key=\"64\">\n\t\t\t\t\t\t<\/sr7-slide>\n\t\t\t\t\t<\/sr7-content>\n\t\t\t\t\t<image_lists style=\"display:none\">\n\t\t\t\t\t\t<img data-src=\"\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/1-2560px-Cisco_logo_blue_2016.svg.png\" data-libid=\"6172\" alt=\"1 2560px Cisco logo blue 2016.svg\" title=\"1 2560px Cisco logo blue 2016.svg\" width=\"0\" height=\"0\" data-dbsrc=\"Ly93d3cubmV0dm9peC5jb20vd3AtY29udGVudC91cGxvYWRzLzIwMjMvMDQvMS0yNTYwcHgtQ2lzY29fbG9nb19ibHVlXzIwMTYuc3ZnLnBuZw==\"\/>\n\t\t\t\t\t\t<img data-src=\"\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/1-logo-dark-2020.png\" data-libid=\"6174\" alt=\"1 logo dark 2020\" title=\"1 logo dark 2020\" width=\"0\" height=\"0\" data-dbsrc=\"Ly93d3cubmV0dm9peC5jb20vd3AtY29udGVudC91cGxvYWRzLzIwMjMvMDQvMS1sb2dvLWRhcmstMjAyMC5wbmc=\"\/>\n\t\t\t\t\t\t<img data-src=\"\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/1-Fortinet_logo.svg.png\" data-libid=\"6175\" alt=\"1 Fortinet logo.svg\" title=\"1 Fortinet logo.svg\" width=\"0\" height=\"0\" data-dbsrc=\"Ly93d3cubmV0dm9peC5jb20vd3AtY29udGVudC91cGxvYWRzLzIwMjMvMDQvMS1Gb3J0aW5ldF9sb2dvLnN2Zy5wbmc=\"\/>\n\t\t\t\t\t\t<img data-src=\"\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/1-Trend-Micro-Logo.png\" data-libid=\"6176\" alt=\"1 Trend Micro Logo\" title=\"1 Trend Micro Logo\" width=\"0\" height=\"0\" data-dbsrc=\"Ly93d3cubmV0dm9peC5jb20vd3AtY29udGVudC91cGxvYWRzLzIwMjMvMDQvMS1UcmVuZC1NaWNyby1Mb2dvLnBuZw==\"\/>\n\t\t\t\t\t\t<img data-src=\"\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/1-2560px-Watchguard_logo.svg (1).png\" data-libid=\"6177\" alt=\"1 2560px Watchguard logo.svg (1)\" title=\"1 2560px Watchguard logo.svg (1)\" width=\"0\" height=\"0\" data-dbsrc=\"Ly93d3cubmV0dm9peC5jb20vd3AtY29udGVudC91cGxvYWRzLzIwMjMvMDQvMS0yNTYwcHgtV2F0Y2hndWFyZF9sb2dvLnN2ZyAoMSkucG5n\"\/>\n\t\t\t\t\t<\/image_lists>\n\t\t\t\t<\/sr7-module>\n\t\t\t\t<script>\n\t\t\t\t\twindow.SR7 ??={};SR7.PMH ??={}; SR7.PMH[\"SR7_17_2\"] = {cn:100,state:false,fn: function() { if (window._tpt!==undefined && window._tpt.prepareModuleHeight !== undefined) {  _tpt.prepareModuleHeight({id:\"SR7_17_2\",el:[100,100,768,960,720],type:'standard',shdw:'0',gh:[100,100,,,],gw:[1240,1240,1024,778,480],vpt:['100px'],size:{fullWidth:true, fullHeight:false},mh:'0',onh:0,onw:0,bg:{color:'{\"orig\":\"transparent\",\"type\":\"solid\",\"string\":\"transparent\"}'}});   SR7.PMH[\"SR7_17_2\"].state=true;} else if(SR7.PMH[\"SR7_17_2\"].cn-->0)\tsetTimeout( SR7.PMH[\"SR7_17_2\"].fn,19);}};SR7.PMH[\"SR7_17_2\" ].fn();\n\t\t\t\t<\/script>\n<div class=\"vc_empty_space\"   style=\"height: 60px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><\/div><div style=\"\" class=\"vc_row wpb_row vc_row-fluid\"><div class=\"row-inner\"><div class=\"wpb_column vc_column_container vc_col-sm-3\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h6 style=\"font-size: 10px;text-align: center\" class=\"vc_custom_heading style1\" >Solutions<\/h6><div class=\"vc_empty_space\"   style=\"height: 6px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><h2 style=\"text-align: center\" class=\"vc_custom_heading\" >OUR SECURITY SOLUTIONS INCLUDES<\/h2><div class=\"vc_empty_space\"   style=\"height: 60px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><\/div><div style=\"\" class=\"vc_row wpb_row vc_row-fluid\"><div class=\"row-inner\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><ul class=\"iconlist iconlist iconlist-icon-small columns-3 gap-50\"><li><div ><div class=\"iconlist-item-icon\"><i class=\"icon-magnifying-glass\"><\/i><\/div><div class=\"iconlist-item-content\"><h4>Security Assessment<\/h4><p>We identify security flaws, device and network vulnerabilities, and malicious activity. This can be done for individual devices or organization-wide policies.<\/div><\/div><\/li><li><div ><div class=\"iconlist-item-icon\"><i class=\"icon-recycle\"><\/i><\/div><div class=\"iconlist-item-content\"><h4>Updates<\/h4><p>Keeping computers and network equipment updated is crucial to prevent security issues.<\/div><\/div><\/li><li><div ><div class=\"iconlist-item-icon\"><i class=\"icon-shield\"><\/i><\/div><div class=\"iconlist-item-content\"><h4>Firewalls<\/h4><p>Proper firewall setup and configuration are essential to prevent vulnerabilities and ensure security. Regular audits and updates are necessary to maintain effectiveness and address potential issues.<\/div><\/div><\/li><li><div ><div class=\"iconlist-item-icon\"><i class=\"icon-phone\"><\/i><\/div><div class=\"iconlist-item-content\"><h4>Multi-Factor Authentication<\/h4><p class=\"p1\">Our solution prevents account takeovers through phishing, social engineering, or stolen credentials using methods like SMS or smartphone apps.<\/p><p><\/div><\/div><\/li><li><div ><div class=\"iconlist-item-icon\"><i class=\"icon-lock\"><\/i><\/div><div class=\"iconlist-item-content\"><h4>Antivirus &#8211; Antispam<\/h4><p>We protect your business from viruses, malware, phishing attacks, and fake websites.<\/div><\/div><\/li><li><div ><div class=\"iconlist-item-icon\"><i class=\"icon-puzzle\"><\/i><\/div><div class=\"iconlist-item-content\"><h4 class=\"p1\">DNS Security<\/h4><p class=\"p1\">Securing your DNS ensures your website and online services remain available and secure, protecting your reputation and preventing financial loss.<\/p><p><\/div><\/div><\/li><\/ul>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4 style=\"text-align: center;\">Our Security Solutions are designed to protect your business. <span style=\"color: #5ab6dd;\"><a class=\"dot\" style=\"color: #5ab6dd;\" href=\"https:\/\/www.netvoix.com\/contact-us\/\">Check our latest products and services<\/a><\/span><\/h4>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 40px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section style=\"\" id=\"solutions\" class=\"vc_section fix-border vc_custom_1681310893941 vc_section-has-fill\"><div style=\"\" class=\"vc_row wpb_row vc_row-fluid vc_custom_1681308859668\"><div class=\"row-inner\"><div class=\"wpb_column vc_column_container vc_col-sm-2\/5\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_empty_space\"   style=\"height: 10px\"><span class=\"vc_empty_space_inner\"><\/span><\/div>\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"221\" height=\"127\" src=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/cisco.png\" class=\"vc_single_image-img attachment-medium\" alt=\"cisco\" title=\"cisco\" srcset=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/cisco.png 221w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/cisco-18x10.png 18w\" sizes=\"auto, (max-width: 221px) 100vw, 221px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 32px\"><span class=\"vc_empty_space_inner\"><\/span><\/div>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4><span style=\"color: #000a46;\">Security that works. Together<\/span><\/h4>\n<p>When security products communicate and work together, you get better, less resource-intensive protection.<\/p>\n<p>The Cisco Secure portfolio comprises a broad set of technologies that function as a team \u2013 providing seamless interoperability with your security infrastructure, including third-party technologies.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 40px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><div class=\"vc_btn3-container vc_btn3-left\" ><a class=\"vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-round vc_btn3-style-modern vc_btn3-color-primary\" href=\"https:\/\/www.netvoix.com\/it-services\/cisco-simple-it\/\" title=\"\">LEARN MORE<\/a><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-1\/5\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-2\/5\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-3\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><ul class=\"iconlist iconlist iconlist-icon-medium \"><li><div ><div class=\"iconlist-item-icon\"><i class=\"icon-linegraph\"><\/i><\/div><div class=\"iconlist-item-content\"><\/div><\/div><\/li><\/ul><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-9\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong><span style=\"color: #000a46;\">Network Security:<\/span><\/strong> Secure your network to secure business continuity.<\/p>\n<ul>\n<li>Flexible network protection<\/li>\n<li>Security resilience<\/li>\n<li>Zero-Trust access<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_empty_space\"   style=\"height: 20px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-3\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><ul class=\"iconlist iconlist iconlist-icon-medium \"><li><div ><div class=\"iconlist-item-icon\"><i class=\"icon-mobile\"><\/i><\/div><div class=\"iconlist-item-content\"><\/div><\/div><\/li><\/ul><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-9\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong><span style=\"color: #000a46;\">User and Endpoint Protection:<\/span><\/strong> Secure the endpoints before threats compromise your business.<\/p>\n<ul>\n<li class=\"cmp-teaser__title\">Streamline access<\/li>\n<li class=\"cmp-teaser__title\">Gain insights into critical threats<\/li>\n<li class=\"cmp-teaser__title\">Sharpen visibility<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_empty_space\"   style=\"height: 20px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-3\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><ul class=\"iconlist iconlist iconlist-icon-medium \"><li><div ><div class=\"iconlist-item-icon\"><i class=\"icon-cloud\"><\/i><\/div><div class=\"iconlist-item-content\"><\/div><\/div><\/li><\/ul><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-9\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong><span style=\"color: #000a46;\">Cloud Edge:<\/span><\/strong> Cisco secures access to the Internet and cloud app usage and detects external or internal public cloud threats.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section style=\"\" class=\"vc_section fix-border vc_custom_1681312557144 vc_section-has-fill\"><div style=\"\" class=\"vc_row wpb_row vc_row-fluid\"><div class=\"row-inner\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_empty_space\"   style=\"height: 100px\"><span class=\"vc_empty_space_inner\"><\/span><\/div>\n\t<div class=\"wpb_video_widget wpb_content_element vc_clearfix   vc_video-aspect-ratio-169 vc_video-el-width-100 vc_video-align-center\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t\n\t\t\t<div class=\"wpb_video_wrapper\"><iframe loading=\"lazy\" title=\"Antivirus Software Overview - Trend Micro Security 2021\" width=\"900\" height=\"506\" src=\"https:\/\/www.youtube.com\/embed\/x19_9Iumkak?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/div>\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 40px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_empty_space\"   style=\"height: 60px\"><span class=\"vc_empty_space_inner\"><\/span><\/div>\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2021\/06\/trendmicro.png\" width=\"500\" height=\"100\" alt=\"trendmicro\" title=\"trendmicro\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 40px\"><span class=\"vc_empty_space_inner\"><\/span><\/div>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4 style=\"text-align: center;\"><span style=\"color: #000a46;\">Security Solutions designed for your Business<\/span><\/h4>\n<p>Global leader in enterprise Data Security and Cybersecurity solutions for businesses, Data Centers, Cloud Environments, Networks, and much more &#8230;<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 40px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><div class=\"vc_btn3-container vc_btn3-center\" ><a class=\"vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-round vc_btn3-style-modern vc_btn3-color-primary\" href=\"https:\/\/www.netvoix.com\/trend-micro\/\" title=\"\">LEARN MORE<\/a><\/div><div class=\"vc_empty_space\"   style=\"height: 20px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section style=\"\" class=\"vc_section fix-border vc_custom_1681311051038 vc_section-has-fill\"><div style=\"\" class=\"vc_row wpb_row vc_row-fluid vc_column-gap-30\"><div class=\"row-inner\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_empty_space\"   style=\"height: 15px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><h2 style=\"text-align: left\" class=\"vc_custom_heading\" >BUSINESS SECURITY SYSTEMS FOR ALL SIZES<\/h2><div class=\"vc_empty_space\"   style=\"height: 35px\"><span class=\"vc_empty_space_inner\"><\/span><\/div>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Our innovative security solutions are based on a proactive defense approach, including our AI-powered monitoring platform that enables organizations to identify, monitor, analyze, and respond to cyber threats and attacks in real time.<\/p>\n<p>Protecting your company&#8217;s digital infrastructure should be your highest priority. It&#8217;s also an ongoing task that requires constant, up-to-date vigilance. Our team of experts monitors the latest cybersecurity threats and uses the most effective tools to ensure that your company&#8217;s most valuable assets are safe.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 40px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1625607472897\"><div class=\"wpb_wrapper\"><div class=\"vc_empty_space\"   style=\"height: 20px\"><span class=\"vc_empty_space_inner\"><\/span><\/div>\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1193\" src=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2021\/07\/pexels-picjumbocom-461077-2-scaled.jpg\" class=\"vc_single_image-img attachment-full\" alt=\"pexels picjumbocom 461077 2 scaled\" title=\"pexels picjumbocom 461077 2 scaled\" srcset=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2021\/07\/pexels-picjumbocom-461077-2-scaled.jpg 2560w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2021\/07\/pexels-picjumbocom-461077-2-300x140.jpg 300w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2021\/07\/pexels-picjumbocom-461077-2-1024x477.jpg 1024w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2021\/07\/pexels-picjumbocom-461077-2-768x358.jpg 768w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2021\/07\/pexels-picjumbocom-461077-2-1536x716.jpg 1536w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2021\/07\/pexels-picjumbocom-461077-2-2048x954.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 20px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><div class=\"vc_empty_space\"   style=\"height: 10px\"><span class=\"vc_empty_space_inner\"><\/span><\/div>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4 style=\"text-align: center;\">&#8220;76% of global cybersecurity professionals said attacks increased due to employees working remotely&#8221;<\/h4>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\"><a style=\"color: #ffffff;\" href=\"https:\/\/www.carbonblack.com\/resources\/global-security-insights-report-2021\/\"><span style=\"color: #30abdf;\"><strong>Read this report<\/strong>:<\/span> <span style=\"color: #000a46;\">Global Security Insights Report 2021 &#8211; Intelligence from the Global Cybersecurity Landscape.\u00a0<\/span><\/a><\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/section><section style=\"\" class=\"vc_section vc_custom_1681311684181\"><div style=\"\" class=\"vc_row wpb_row vc_row-fluid\"><div class=\"row-inner\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"87\" src=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/1-2560px-Watchguard_logo.svg (1)-300x87.png\" class=\"vc_single_image-img attachment-medium\" alt=\"1 2560px Watchguard logo.svg (1)\" title=\"1 2560px Watchguard logo.svg (1)\" srcset=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/1-2560px-Watchguard_logo.svg%20(1)-300x87.png 300w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/1-2560px-Watchguard_logo.svg%20(1)-1024x296.png 1024w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/1-2560px-Watchguard_logo.svg%20(1)-768x222.png 768w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/1-2560px-Watchguard_logo.svg%20(1)-1536x445.png 1536w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/1-2560px-Watchguard_logo.svg%20(1)-2048x593.png 2048w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/1-2560px-Watchguard_logo.svg%20(1)-18x5.png 18w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 50px\"><span class=\"vc_empty_space_inner\"><\/span><\/div>\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1327\" height=\"716\" src=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/watchguard.png\" class=\"vc_single_image-img attachment-full\" alt=\"watchguard\" title=\"watchguard\" srcset=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/watchguard.png 1327w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/watchguard-300x162.png 300w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/watchguard-1024x553.png 1024w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/watchguard-768x414.png 768w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/watchguard-18x10.png 18w\" sizes=\"auto, (max-width: 1327px) 100vw, 1327px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 40px\"><span class=\"vc_empty_space_inner\"><\/span><\/div>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4 style=\"text-align: center;\"><span style=\"color: #000a46;\">Capability, Flexibility, and Scalability<\/span><\/h4>\n<p>Introducing the ultimate cybersecurity solution for your business &#8211; WatchGuard! With state-of-the-art technology and unparalleled protection, WatchGuard is your one-stop shop for all your cybersecurity needs.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"36\" src=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/1-Fortinet_logo.svg-300x36.png\" class=\"vc_single_image-img attachment-medium\" alt=\"1 Fortinet logo.svg\" title=\"1 Fortinet logo.svg\" srcset=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/1-Fortinet_logo.svg-300x36.png 300w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/1-Fortinet_logo.svg-1024x124.png 1024w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/1-Fortinet_logo.svg-768x93.png 768w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/1-Fortinet_logo.svg-1536x186.png 1536w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/1-Fortinet_logo.svg-2048x248.png 2048w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/1-Fortinet_logo.svg-18x2.png 18w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 50px\"><span class=\"vc_empty_space_inner\"><\/span><\/div>\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2023\/04\/Fortinet-350x350.png\" width=\"350\" height=\"350\" alt=\"Fortinet\" title=\"Fortinet\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 40px\"><span class=\"vc_empty_space_inner\"><\/span><\/div>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4 style=\"text-align: center;\"><span style=\"color: #000a46;\">Broad, Integrated, Automated<\/span><\/h4>\n<p>The Fortinet Security Fabric combines the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.\u200b<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/section><section style=\"\" class=\"vc_section fix-border vc_custom_1627656320415 vc_section-has-fill\"><div style=\"\" class=\"vc_row wpb_row vc_row-fluid\"><div class=\"row-inner\"><div class=\"wpb_column vc_column_container vc_col-sm-3\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_empty_space\"   style=\"height: 6px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><div class=\"vc_empty_space\"   style=\"height: 50px\"><span class=\"vc_empty_space_inner\"><\/span><\/div>\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2021\/06\/mimecast_logo2.png\" width=\"500\" height=\"100\" alt=\"mimecast logo2\" title=\"mimecast logo2\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 6px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><h6 style=\"font-size: 10px;text-align: center\" class=\"vc_custom_heading style1\" >EMAIL SECURITY TARGETED THREAT PROTECTION<\/h6><div class=\"vc_empty_space\"   style=\"height: 20px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><\/div><div style=\"\" class=\"vc_row wpb_row vc_row-fluid\"><div class=\"row-inner\"><div class=\"wpb_column vc_column_container vc_col-sm-2\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-8\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: center;\">Mimecast\u2019s cloud-based Secure Email Gateway defends organizations against inbound spear-phishing, malware, spam, and zero-day attacks by combining innovative applications and policies with multiple detection engines and intelligence feeds.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 60px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-2\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><\/div><div style=\"\" class=\"vc_row wpb_row vc_row-fluid vc_custom_1554110332900 vc_row-o-content-middle vc_row-flex\"><div class=\"row-inner\"><div class=\"wpb_column vc_column_container vc_col-sm-1\/5 vc_col-lg-1\/5 vc_col-xs-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center  wpb_animate_when_almost_visible wpb_bounceIn bounceIn\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"75\" src=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2021\/06\/email_security.png\" class=\"vc_single_image-img attachment-medium\" alt=\"email security\" title=\"email security\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 30px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><h6 style=\"color: #ffffff;text-align: center\" class=\"vc_custom_heading\" >EMAIL SECURITY<\/h6><div class=\"vc_empty_space\"   style=\"height: 30px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-1\/5 vc_col-lg-1\/5 vc_col-xs-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center  wpb_animate_when_almost_visible wpb_bounceIn bounceIn\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"75\" src=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2021\/06\/enterprise.png\" class=\"vc_single_image-img attachment-medium\" alt=\"enterprise\" title=\"enterprise\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 30px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><h6 style=\"color: #ffffff;text-align: center\" class=\"vc_custom_heading\" >ENTERPRISE INFORMATION ARCHIVING<\/h6><div class=\"vc_empty_space\"   style=\"height: 30px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-1\/5 vc_col-lg-1\/5 vc_col-xs-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center  wpb_animate_when_almost_visible wpb_bounceIn bounceIn\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"75\" src=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2021\/06\/mailbox-1.png\" class=\"vc_single_image-img attachment-medium\" alt=\"mailbox 1\" title=\"mailbox 1\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 30px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><h6 style=\"color: #ffffff;text-align: center\" class=\"vc_custom_heading\" >MAILBOX CONTINUITY<\/h6><div class=\"vc_empty_space\"   style=\"height: 30px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-1\/5 vc_col-lg-1\/5 vc_col-xs-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center  wpb_animate_when_almost_visible wpb_bounceIn bounceIn\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"75\" src=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2021\/06\/office_logo.png\" class=\"vc_single_image-img attachment-medium\" alt=\"office logo\" title=\"office logo\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 30px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><h6 style=\"color: #ffffff;text-align: center\" class=\"vc_custom_heading\" >SERVICES FOR OFFICE 365<\/h6><div class=\"vc_empty_space\"   style=\"height: 30px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-1\/5 vc_col-lg-1\/5 vc_col-xs-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center  wpb_animate_when_almost_visible wpb_bounceIn bounceIn\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"75\" src=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2021\/06\/unified_email.png\" class=\"vc_single_image-img attachment-medium\" alt=\"\" title=\"unified_email\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 30px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><h6 style=\"color: #ffffff;text-align: center\" class=\"vc_custom_heading\" >UNIFIED EMAIL MANAGEMENT<\/h6><div class=\"vc_empty_space\"   style=\"height: 30px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section style=\"\" id=\"contact\" class=\"vc_section vc_custom_1575627102243\"><div style=\"\" class=\"vc_row wpb_row vc_row-fluid vc_row-o-equal-height vc_row-o-content-middle vc_row-flex\"><div class=\"row-inner\"><div class=\"bg-bottom wpb_column vc_column_container vc_col-sm-5 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1624980758652\"><div class=\"wpb_wrapper\"><h6 style=\"font-size: 10px;text-align: center\" class=\"vc_custom_heading style1\" >How It Works<\/h6><div class=\"vc_empty_space\"   style=\"height: 6px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><h2 style=\"font-size: 24px;color: #ffffff;text-align: center\" class=\"vc_custom_heading\" >ADVANCED SECURITY SOLUTIONS<\/h2><div class=\"vc_empty_space\"   style=\"height: 40px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid vc_custom_1537608626309\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><ul class=\"iconlist iconlist iconlist-icon-small \"><li><div ><div class=\"iconlist-item-icon\"><i class=\"icon-chat\"><\/i><\/div><div class=\"iconlist-item-content\"><h4><span style=\"color: #00ccff\">IT Consultation<\/span><\/h4><p><span style=\"color: #ffffff\">Tell us about your IT needs and any challenges you\u2019re facing. We\u2019ll talk about how you currently use technology and what you want to achieve.<\/span><\/div><\/div><\/li><li><div ><div class=\"iconlist-item-icon\"><i class=\"icon-gears\"><\/i><\/div><div class=\"iconlist-item-content\"><h4><span style=\"color: #00ccff\">Customized IT Strategy<\/span><\/h4><p><span style=\"color: #ffffff\">We\u2019ll create a personalized IT strategy that fits your goals and helps improve your operations.<\/span><\/div><\/div><\/li><li><div ><div class=\"iconlist-item-icon\"><i class=\"icon-target\"><\/i><\/div><div class=\"iconlist-item-content\"><h4><span style=\"color: #00ccff\">Implementation and Support<\/span><\/h4><p><span style=\"color: #ffffff\">Our team will implement the IT solutions and provide ongoing support to ensure seamless operation.<\/span><\/div><\/div><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"shadow wpb_column vc_column_container vc_col-sm-7 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1575627129236\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_content_element wpb_raw_html\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script>\n<script>\n  hbspt.forms.create({\n    portalId: \"23380893\",\n    formId: \"b9beed6b-01e6-4d76-85fd-901a6b6e3729\"\n  });\n<\/script>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"NetVoiX supports your security goals DYNAMIC CYBERSECURITY THAT EVOLVES WITH YOUR ORGANIZATION Our cybersecurity solutions offer complete defense against cyberattacks, protecting businesses from the most recent online threats, such as ransomware and other malicious viruses. We provide a powerful and effective system that detects and blocks unauthorized access to critical data. SolutionsOUR SECURITY SOLUTIONS INCLUDESSecurity [...]","protected":false},"author":3,"featured_media":2371,"parent":707,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"tmpl\/template-fullwidth.php","meta":{"content-type":"","footnotes":""},"class_list":["post-6164","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security 2 - NetVoiX<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.netvoix.com\/es\/servicios-informaticos\/ciberseguridad-5\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security 2 - NetVoiX\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.netvoix.com\/es\/servicios-informaticos\/ciberseguridad-5\/\" \/>\n<meta property=\"og:site_name\" content=\"NetVoiX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/Netvoix-Inc\/100064032305668\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-20T21:02:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2021\/02\/cisco-meraki-cloud.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1680\" \/>\n\t<meta property=\"og:image:height\" content=\"1002\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@netvoix\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.netvoix.com\/it-services\/security-2\/\",\"url\":\"https:\/\/www.netvoix.com\/it-services\/security-2\/\",\"name\":\"Security 2 - NetVoiX\",\"isPartOf\":{\"@id\":\"https:\/\/www.netvoix.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.netvoix.com\/it-services\/security-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.netvoix.com\/it-services\/security-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2021\/02\/cisco-meraki-cloud.jpg\",\"datePublished\":\"2023-04-12T00:11:41+00:00\",\"dateModified\":\"2025-01-20T21:02:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.netvoix.com\/it-services\/security-2\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.netvoix.com\/it-services\/security-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.netvoix.com\/it-services\/security-2\/#primaryimage\",\"url\":\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2021\/02\/cisco-meraki-cloud.jpg\",\"contentUrl\":\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2021\/02\/cisco-meraki-cloud.jpg\",\"width\":1680,\"height\":1002,\"caption\":\"cisco meraki cloud\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.netvoix.com\/it-services\/security-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.netvoix.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Our Services\",\"item\":\"https:\/\/www.netvoix.com\/it-services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.netvoix.com\/#website\",\"url\":\"https:\/\/www.netvoix.com\/\",\"name\":\"NetVoiX\",\"description\":\"Managed IT Services. Network and Wireless Infrastructure\",\"publisher\":{\"@id\":\"https:\/\/www.netvoix.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.netvoix.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.netvoix.com\/#organization\",\"name\":\"NetVoiX\",\"url\":\"https:\/\/www.netvoix.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.netvoix.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2022\/05\/logo_website_v1.png\",\"contentUrl\":\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2022\/05\/logo_website_v1.png\",\"width\":300,\"height\":100,\"caption\":\"NetVoiX\"},\"image\":{\"@id\":\"https:\/\/www.netvoix.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/people\/Netvoix-Inc\/100064032305668\/\",\"https:\/\/x.com\/netvoix\",\"https:\/\/www.linkedin.com\/company\/3362194\/admin\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Seguridad 2 - NetVoiX","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.netvoix.com\/es\/servicios-informaticos\/ciberseguridad-5\/","og_locale":"es_ES","og_type":"article","og_title":"Security 2 - NetVoiX","og_url":"https:\/\/www.netvoix.com\/es\/servicios-informaticos\/ciberseguridad-5\/","og_site_name":"NetVoiX","article_publisher":"https:\/\/www.facebook.com\/people\/Netvoix-Inc\/100064032305668\/","article_modified_time":"2025-01-20T21:02:27+00:00","og_image":[{"width":1680,"height":1002,"url":"https:\/\/www.netvoix.com\/wp-content\/uploads\/2021\/02\/cisco-meraki-cloud.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@netvoix","twitter_misc":{"Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.netvoix.com\/it-services\/security-2\/","url":"https:\/\/www.netvoix.com\/it-services\/security-2\/","name":"Seguridad 2 - NetVoiX","isPartOf":{"@id":"https:\/\/www.netvoix.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.netvoix.com\/it-services\/security-2\/#primaryimage"},"image":{"@id":"https:\/\/www.netvoix.com\/it-services\/security-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.netvoix.com\/wp-content\/uploads\/2021\/02\/cisco-meraki-cloud.jpg","datePublished":"2023-04-12T00:11:41+00:00","dateModified":"2025-01-20T21:02:27+00:00","breadcrumb":{"@id":"https:\/\/www.netvoix.com\/it-services\/security-2\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.netvoix.com\/it-services\/security-2\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.netvoix.com\/it-services\/security-2\/#primaryimage","url":"https:\/\/www.netvoix.com\/wp-content\/uploads\/2021\/02\/cisco-meraki-cloud.jpg","contentUrl":"https:\/\/www.netvoix.com\/wp-content\/uploads\/2021\/02\/cisco-meraki-cloud.jpg","width":1680,"height":1002,"caption":"cisco meraki cloud"},{"@type":"BreadcrumbList","@id":"https:\/\/www.netvoix.com\/it-services\/security-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.netvoix.com\/"},{"@type":"ListItem","position":2,"name":"Our Services","item":"https:\/\/www.netvoix.com\/it-services\/"},{"@type":"ListItem","position":3,"name":"Security 2"}]},{"@type":"WebSite","@id":"https:\/\/www.netvoix.com\/#website","url":"https:\/\/www.netvoix.com\/","name":"NetVoiX","description":"Servicios de TI gestionados. Infraestructura de red e inal\u00e1mbrica","publisher":{"@id":"https:\/\/www.netvoix.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.netvoix.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.netvoix.com\/#organization","name":"NetVoiX","url":"https:\/\/www.netvoix.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.netvoix.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.netvoix.com\/wp-content\/uploads\/2022\/05\/logo_website_v1.png","contentUrl":"https:\/\/www.netvoix.com\/wp-content\/uploads\/2022\/05\/logo_website_v1.png","width":300,"height":100,"caption":"NetVoiX"},"image":{"@id":"https:\/\/www.netvoix.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/Netvoix-Inc\/100064032305668\/","https:\/\/x.com\/netvoix","https:\/\/www.linkedin.com\/company\/3362194\/admin\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.netvoix.com\/es\/wp-json\/wp\/v2\/pages\/6164","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.netvoix.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.netvoix.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.netvoix.com\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.netvoix.com\/es\/wp-json\/wp\/v2\/comments?post=6164"}],"version-history":[{"count":70,"href":"https:\/\/www.netvoix.com\/es\/wp-json\/wp\/v2\/pages\/6164\/revisions"}],"predecessor-version":[{"id":8434,"href":"https:\/\/www.netvoix.com\/es\/wp-json\/wp\/v2\/pages\/6164\/revisions\/8434"}],"up":[{"embeddable":true,"href":"https:\/\/www.netvoix.com\/es\/wp-json\/wp\/v2\/pages\/707"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.netvoix.com\/es\/wp-json\/wp\/v2\/media\/2371"}],"wp:attachment":[{"href":"https:\/\/www.netvoix.com\/es\/wp-json\/wp\/v2\/media?parent=6164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}