{"id":14,"date":"2024-01-13T15:51:50","date_gmt":"2024-01-13T15:51:50","guid":{"rendered":"http:\/\/lanhax.com\/?page_id=14"},"modified":"2026-03-04T17:51:45","modified_gmt":"2026-03-04T17:51:45","slug":"home","status":"publish","type":"page","link":"https:\/\/lanhax.com\/es\/","title":{"rendered":"Home"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Header&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#fbfbfb&#8221; custom_padding=&#8221;5vw||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||50px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;http:\/\/lanhax.com\/wp-content\/uploads\/2024\/02\/lanhax-icon-2.png&#8221; title_text=&#8221;lanhax-icon-2&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; width_tablet=&#8221;11%&#8221; width_phone=&#8221;15%&#8221; width_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;|||-8%|false|false&#8221; custom_margin_tablet=&#8221;||43px|0px|false|false&#8221; custom_margin_phone=&#8221;||43px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;e864d11f-3dab-4fa3-ac06-4f0e1a260807&#8243; text_font=&#8221;Poppins||||||||&#8221; header_font=&#8221;Poppins|600|||||||&#8221; header_text_color=&#8221;#19222c&#8221; header_font_size=&#8221;80px&#8221; header_line_height=&#8221;1.2em&#8221; header_font_size_tablet=&#8221;40px&#8221; header_font_size_phone=&#8221;48px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>LANHAX<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.1&#8243; _module_preset=&#8221;41d5859c-fbaa-458a-88e4-5d886857f235&#8243; text_font=&#8221;Poppins||||||||&#8221; text_text_color=&#8221;#19222c&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.6em&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<span style=\"font-weight: 400;\">We are dedicated to overseeing the entire process of a cyber attack. We want to be your ally in cybersecurity, working closely with you so you can see that we operate together as a unified team.<\/span>[\/et_pb_text][et_pb_button button_url=&#8221;#contacto&#8221; button_text=&#8221;talk to us&#8221; _builder_version=&#8221;4.24.1&#8243; _module_preset=&#8221;94ef7aca-dcd9-4f9d-93b2-efa3466cebc7&#8243; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#19222c&#8221; button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_width=&#8221;4px&#8221; button_border_color=&#8221;#19222c&#8221; button_border_radius=&#8221;0px&#8221; button_font=&#8221;Archivo|800||on|||||&#8221; custom_padding=&#8221;15px|35px|15px|35px|true|true&#8221; box_shadow_style=&#8221;preset4&#8243; box_shadow_horizontal=&#8221;6px&#8221; box_shadow_vertical=&#8221;6px&#8221; box_shadow_color=&#8221;#0ec2d3&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;50px||50px||true|false&#8221; custom_padding_tablet=&#8221;0px||50px||false|false&#8221; custom_padding_phone=&#8221;||0px||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;http:\/\/lanhax.com\/wp-content\/uploads\/2024\/02\/ilustracion-home-2-01.png&#8221; title_text=&#8221;ilustracion-home-2-01&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;70%&#8221; width_phone=&#8221;80%&#8221; width_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;|-8vw|||false|false&#8221; custom_margin_tablet=&#8221;|0vw|||false|false&#8221; custom_margin_phone=&#8221;|0vw|||false|false&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;90%&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#19222c&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#1a4956&#8243; custom_padding=&#8221;30px|20px|30px|20px|true|true&#8221; custom_padding_tablet=&#8221;|30px||30px|true|true&#8221; custom_padding_phone=&#8221;|20px||20px|true|true&#8221; custom_padding_last_edited=&#8221;off|tablet&#8221; border_color_all=&#8221;#19222c&#8221; border_width_right=&#8221;2px&#8221; border_radii_tablet=&#8221;&#8221; border_radii_phone=&#8221;&#8221; border_radii_last_edited=&#8221;on|desktop&#8221; border_width_right_tablet=&#8221;0px&#8221; border_width_right_phone=&#8221;0px&#8221; border_width_right_last_edited=&#8221;on|desktop&#8221; border_width_bottom_tablet=&#8221;2px&#8221; border_width_bottom_phone=&#8221;2px&#8221; border_width_bottom_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/mano.png&#8221; title_text=&#8221;mano&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|263px|0px|||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;17px&#8221; text_line_height=&#8221;1.9em&#8221; width=&#8221;54%&#8221; width_tablet=&#8221;54%&#8221; width_phone=&#8221;55%&#8221; width_last_edited=&#8221;on|phone&#8221; custom_margin=&#8221;8px||16px||false|false&#8221; custom_padding=&#8221;3px|24px|3px|24px|true|true&#8221; custom_css_main_element=&#8221;border-radius: 100px;||padding: 10px 24px;&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>PREVENTION<\/p>\n<p>[\/et_pb_text][et_pb_code _builder_version=&#8221;4.24.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_code][et_pb_text _builder_version=&#8221;4.24.1&#8243; _module_preset=&#8221;0bd9fec6-ac32-486c-934f-18d282fbdfb4&#8243; text_font=&#8221;Poppins||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;15px&#8221; text_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;30px||||false|false&#8221; header_font_size_tablet=&#8221;55px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<span style=\"font-weight: 400;\">From the start, we stand by your side to provide guidance and furnish you with essential tools for your protection. We identify and notify about any security vulnerabilities before a cybercriminal gets the chance to exploit them.<\/span>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#1b5d6b&#8221; custom_padding=&#8221;30px|20px|30px|20px|true|true&#8221; border_color_all=&#8221;#19222c&#8221; border_width_right=&#8221;2px&#8221; border_radii_tablet=&#8221;&#8221; border_radii_phone=&#8221;&#8221; border_radii_last_edited=&#8221;on|desktop&#8221; border_width_right_tablet=&#8221;2px&#8221; border_width_right_phone=&#8221;0px&#8221; border_width_right_last_edited=&#8221;on|desktop&#8221; border_width_bottom_tablet=&#8221;&#8221; border_width_bottom_phone=&#8221;2px&#8221; border_width_bottom_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/altavoz.png&#8221; title_text=&#8221;altavoz&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|263px|0px|||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;17px&#8221; text_line_height=&#8221;1.9em&#8221; width=&#8221;51%&#8221; width_tablet=&#8221;51%&#8221; width_phone=&#8221;50%&#8221; width_last_edited=&#8221;on|phone&#8221; custom_margin=&#8221;8px||16px||false|false&#8221; custom_padding=&#8221;3px|24px|3px|24px|true|true&#8221; custom_css_main_element=&#8221;border-radius: 100px;||padding: 10px 24px;&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>RESPONSE<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.1&#8243; _module_preset=&#8221;0bd9fec6-ac32-486c-934f-18d282fbdfb4&#8243; text_font=&#8221;Poppins||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;15px&#8221; text_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;30px||||false|false&#8221; header_font_size_tablet=&#8221;55px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<span style=\"font-weight: 400;\">We act promptly to halt and block cyber attacks in real-time. We keep you informed and closely monitor the incident until an effective solution is found.<\/span>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#0ec2d3&#8243; custom_padding=&#8221;30px|20px|30px|20px|true|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/check.png&#8221; title_text=&#8221;check&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|263px|0px|||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;17px&#8221; text_line_height=&#8221;1.9em&#8221; width=&#8221;46%&#8221; width_tablet=&#8221;46%&#8221; width_phone=&#8221;50%&#8221; width_last_edited=&#8221;on|phone&#8221; custom_margin=&#8221;8px||16px||false|false&#8221; custom_padding=&#8221;3px|24px|3px|24px|true|true&#8221; custom_css_main_element=&#8221;border-radius: 100px;||padding: 10px 24px;&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>SOLUTION<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.1&#8243; _module_preset=&#8221;0bd9fec6-ac32-486c-934f-18d282fbdfb4&#8243; text_font=&#8221;Poppins||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;15px&#8221; text_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;30px||||false|false&#8221; header_font_size_tablet=&#8221;55px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<span style=\"font-weight: 400;\">We have the most advanced tools and solutions to support decision-making and resolve any incidents, spanning from hardware architecture to software model and development.<\/span>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Pricing&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;90deg&#8221; background_color_gradient_stops=&#8221;#000000 50%|rgba(48,90,107,0.7) 50%&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_color_gradient_start=&#8221;#000000&#8243; background_color_gradient_start_position=&#8221;50%&#8221; background_color_gradient_end=&#8221;rgba(246,103,31,0.9)&#8221; background_color_gradient_end_position=&#8221;50%&#8221; background_image=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/blog-foto1.jpg&#8221; background_position=&#8221;center_right&#8221; background_last_edited=&#8221;on|desktop&#8221; background_color_gradient_direction_tablet=&#8221;180deg&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;534cc526-6274-4e31-9e1a-7f18a5947bf1&#8243; header_4_font=&#8221;Poppins|700||on|||||&#8221; header_4_text_color=&#8221;#0ec2d3&#8243; header_4_font_size=&#8221;14px&#8221; header_4_letter_spacing=&#8221;2px&#8221; header_4_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span>LANHAX<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;df96b77a-cd4f-44a8-a771-2d6347592b53&#8243; header_2_font=&#8221;Poppins|600|||||||&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;50px&#8221; header_2_line_height=&#8221;1.35em&#8221; max_width=&#8221;450px&#8221; custom_margin=&#8221;||8px||false|false&#8221; header_2_font_size_tablet=&#8221;32px&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>Who We Are?<\/b><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;41d5859c-fbaa-458a-88e4-5d886857f235&#8243; text_font=&#8221;Poppins|500|||||||&#8221; text_text_color=&#8221;rgba(255,255,255,0.63)&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.6em&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">LANHAX is a company specialized in cybersecurity, known for its professionalism and close relationship with all its clients.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#1a4956&#8243; custom_padding=&#8221;30px|30px|30px|30px|true|true&#8221; custom_padding_tablet=&#8221;||45px||false|true&#8221; custom_padding_phone=&#8221;|20px|45px|20px|false|true&#8221; custom_padding_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;0bd9fec6-ac32-486c-934f-18d282fbdfb4&#8243; text_font=&#8221;Poppins||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;15px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size_tablet=&#8221;55px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">We understand the critical importance of safeguarding your company\u2019s digital assets in an increasingly challenging and dynamic environment. Our highly trained and experienced team is dedicated to providing comprehensive and customized solutions tailored to the specific needs of your organization.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#0ec2d3&#8243; custom_padding=&#8221;30px|30px|30px|30px|true|true&#8221; custom_padding_tablet=&#8221;||45px||false|true&#8221; custom_padding_phone=&#8221;|20px|45px|20px|false|true&#8221; custom_padding_last_edited=&#8221;off|desktop&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#19222c&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;0bd9fec6-ac32-486c-934f-18d282fbdfb4&#8243; text_font=&#8221;Poppins||||||||&#8221; text_text_color=&#8221;#19222c&#8221; text_font_size=&#8221;15px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size_tablet=&#8221;55px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">We are committed to staying at the forefront of the latest technologies and trends in cybersecurity to ensure that your company is protected against emerging cyber threats. Your trust in us is the driving force behind our continuous pursuit of excellence in the field of digital security.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;30px|30px|30px|30px|true|true&#8221; custom_padding_tablet=&#8221;||45px||false|true&#8221; custom_padding_phone=&#8221;|20px|45px|20px|false|true&#8221; custom_padding_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Logos&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#19222c&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;none&#8221; custom_padding=&#8221;0px||0px||true|&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;Poppins|700|||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_line_height=&#8221;1.2em&#8221; header_2_line_height_tablet=&#8221;1.2em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Our specialists hold the industry&#8217;s most sought-after certifications<\/h2>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/certificaciones-resumidas.png&#8221; title_text=&#8221;certificaciones-resumidas&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Features&#8221; module_id=&#8221;servicios&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#1b5d6b&#8221; background_image=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/08\/patern-binario.png&#8221; background_size=&#8221;initial&#8221; background_repeat=&#8221;repeat&#8221; background_blend=&#8221;soft-light&#8221; custom_margin=&#8221;80px||||false|false&#8221; custom_padding=&#8221;8vw||0vw||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;df96b77a-cd4f-44a8-a771-2d6347592b53&#8243; header_font_size=&#8221;100px&#8221; header_2_font=&#8221;Poppins|600|||||||&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;60px&#8221; header_2_line_height=&#8221;1.35em&#8221; custom_margin=&#8221;||8px||false|false&#8221; header_2_font_size_tablet=&#8221;32px&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>Services<\/b><\/h2>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=&#8221;#000000&#8243; closed_toggle_background_color=&#8221;#0ec2d3&#8243; toggle_icon=&#8221;&#x22;||divi||400&#8243; icon_color=&#8221;#FFFFFF&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;32px&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; toggle_text_color=&#8221;#FFFFFF&#8221; toggle_font=&#8221;Archivo|600|||||||&#8221; toggle_font_size=&#8221;18px&#8221; body_font=&#8221;Archivo||||||||&#8221; body_text_color=&#8221;#000000&#8243; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#19222c&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_accordion_item title=&#8221;Offensive Security&#8221; open=&#8221;on&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; body_font=&#8221;Poppins||||||||&#8221; global_colors_info=&#8221;{}&#8221; toggle_font=&#8221;Poppins|600|||||||&#8221;]<\/p>\n<p>By proactively identifying vulnerabilities in people, processes, and technologies, the goal is to strengthen organizational security. Services such as Ethical Hacking and Phishing Tests allow for a rigorous evaluation of the current security posture and the design of effective mitigation strategies.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Defensive Security&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; body_font=&#8221;Poppins||||||||&#8221; global_colors_info=&#8221;{}&#8221; toggle_level=&#8221;h5&#8243; toggle_font=&#8221;Poppins|600|||||||&#8221; open=&#8221;off&#8221;]<\/p>\n<p>It is the specialty that goes beyond reacting to attacks; it\u2019s about anticipating threats. It\u2019s like building a digital immune system, strengthening the organization&#8217;s defenses to prevent cybercriminals from finding vulnerabilities. This involves everything from protecting the most valuable assets to educating employees on best security practices.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Regulatory Compliance&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; body_font=&#8221;Poppins||||||||&#8221; global_colors_info=&#8221;{}&#8221; toggle_level=&#8221;h5&#8243; toggle_font=&#8221;Poppins|600|||||||&#8221; open=&#8221;off&#8221;]<\/p>\n<p>Comprehensive compliance service helping organizations adopt and implement the most common regulatory frameworks, regulations, and security and cybersecurity standards.<\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/08\/servicios2.png&#8221; title_text=&#8221;servicios2&#8243; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-12vw|-10vw|||false|false&#8221; custom_margin_tablet=&#8221;0vw|0vw|||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Feature&#8221; module_id=&#8221;ciber-ofensiva&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#fbfbfb&#8221; custom_padding=&#8221;||5vw||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/02\/ofensiva.png&#8221; title_text=&#8221;ofensiva&#8221; show_bottom_space_tablet=&#8221;&#8221; show_bottom_space_phone=&#8221;&#8221; show_bottom_space_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;http:\/\/lanhax.com\/wp-content\/uploads\/2024\/01\/software-img-09.png&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;bottom_center&#8221; transform_scale_tablet=&#8221;&#8221; transform_scale_phone=&#8221;&#8221; transform_scale_last_edited=&#8221;on|phone&#8221; transform_translate_tablet=&#8221;&#8221; transform_translate_phone=&#8221;&#8221; transform_translate_last_edited=&#8221;on|phone&#8221; transform_rotate_tablet=&#8221;&#8221; transform_rotate_phone=&#8221;&#8221; transform_rotate_last_edited=&#8221;on|phone&#8221; transform_skew_tablet=&#8221;&#8221; transform_skew_phone=&#8221;&#8221; transform_skew_last_edited=&#8221;on|phone&#8221; transform_origin_tablet=&#8221;&#8221; transform_origin_phone=&#8221;&#8221; transform_origin_last_edited=&#8221;on|phone&#8221; transform_styles_last_edited=&#8221;on|phone&#8221; width_tablet=&#8221;72%&#8221; width_phone=&#8221;85%&#8221; width_last_edited=&#8221;off|tablet&#8221; custom_margin=&#8221;|||-10vw|false|false&#8221; custom_margin_tablet=&#8221;|||0vw|false|false&#8221; custom_margin_phone=&#8221;|||0vw|false|false&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; transform_styles_tablet=&#8221;&#8221; transform_styles_phone=&#8221;&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;df96b77a-cd4f-44a8-a771-2d6347592b53&#8243; text_font=&#8221;Poppins||||||||&#8221; header_font=&#8221;Poppins||||||||&#8221; header_2_font=&#8221;Poppins|600|||||||&#8221; header_2_text_color=&#8221;#19222c&#8221; header_2_font_size=&#8221;50px&#8221; header_2_line_height=&#8221;1.35em&#8221; custom_margin=&#8221;||8px||false|false&#8221; header_2_font_size_tablet=&#8221;32px&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>Offensive Security<\/b><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;41d5859c-fbaa-458a-88e4-5d886857f235&#8243; text_font=&#8221;Poppins|500|||||||&#8221; text_text_color=&#8221;#19222c&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.6em&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">By proactively identifying vulnerabilities in people, processes, and technologies, we aim to strengthen the security of organizations. Services such as Ethical Hacking, Phishing-Test, and Crisis Exercises allow for a rigorous evaluation of the current security posture and the design of effective mitigation strategies.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;#contacto&#8221; button_text=&#8221;More Info&#8221; _builder_version=&#8221;4.24.1&#8243; _module_preset=&#8221;94ef7aca-dcd9-4f9d-93b2-efa3466cebc7&#8243; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#19222c&#8221; button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_width=&#8221;4px&#8221; button_border_color=&#8221;#19222c&#8221; button_border_radius=&#8221;0px&#8221; button_font=&#8221;Archivo|800||on|||||&#8221; custom_padding=&#8221;15px|35px|15px|35px|true|true&#8221; box_shadow_style=&#8221;preset4&#8243; box_shadow_horizontal=&#8221;6px&#8221; box_shadow_vertical=&#8221;6px&#8221; box_shadow_color=&#8221;#0ec2d3&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;ethical-hacking&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#e8e8e8&#8243; background_enable_image=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;800px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;534cc526-6274-4e31-9e1a-7f18a5947bf1&#8243; header_font=&#8221;Poppins|700|||||||&#8221; header_4_font=&#8221;Poppins|700||on|||||&#8221; header_4_text_color=&#8221;#1b5d6b&#8221; header_4_font_size=&#8221;14px&#8221; header_4_letter_spacing=&#8221;2px&#8221; header_4_line_height=&#8221;1.5em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>offensive security<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;df96b77a-cd4f-44a8-a771-2d6347592b53&#8243; header_font=&#8221;Poppins||||||||&#8221; header_2_font=&#8221;Poppins|600|||||||&#8221; header_2_text_color=&#8221;#19222c&#8221; header_2_font_size=&#8221;50px&#8221; header_2_line_height=&#8221;1.35em&#8221; text_orientation=&#8221;center&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||8px||false|false&#8221; header_2_font_size_tablet=&#8221;32px&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>Ethical Hacking<\/b><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;41d5859c-fbaa-458a-88e4-5d886857f235&#8243; text_font=&#8221;Poppins||||||||&#8221; text_text_color=&#8221;#19222c&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.6em&#8221; text_orientation=&#8221;center&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||50px|||&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p dir=\"ltr\"><span style=\"font-weight: 400;\">Ethical Hacking is a practice used by organizations to evaluate their IT environments for vulnerabilities. This process allows the identification of cybersecurity risks and their proper management. It involves assessing vulnerabilities, analyzing and categorizing exploited weaknesses, and providing recommendations based on the organization\u2019s priorities. Ultimately, the goal is to eliminate these vulnerabilities to ensure the organization is protected against the growing number of cyber threats.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_2,1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; width=&#8221;90%&#8221; max_width=&#8221;1280px&#8221; custom_margin_tablet=&#8221;50px||||false|false&#8221; custom_margin_phone=&#8221;50px||||false|false&#8221; custom_margin_last_edited=&#8221;off|tablet&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;75px||||false|false&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Web Ethical Hacking&#8221; image=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/web.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;5b6622d9-50d7-4d3f-91da-fc179ad88891&#8243; header_font=&#8221;Poppins|700|||||||&#8221; header_text_color=&#8221;#19222c&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|500|||||||&#8221; body_text_color=&#8221;#19222c&#8221; body_line_height=&#8221;1.6em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;||50px||false|false&#8221; custom_margin_phone=&#8221;||30px||false|false&#8221; custom_margin_last_edited=&#8221;off|tablet&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Mobile Ethical Hacking&#8221; image=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/movil.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;5b6622d9-50d7-4d3f-91da-fc179ad88891&#8243; header_font=&#8221;Poppins|700|||||||&#8221; header_text_color=&#8221;#19222c&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|500|||||||&#8221; body_text_color=&#8221;#19222c&#8221; body_line_height=&#8221;1.6em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;||50px||false|false&#8221; custom_margin_phone=&#8221;||30px||false|false&#8221; custom_margin_last_edited=&#8221;off|tablet&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/08\/servicios.png&#8221; title_text=&#8221;servicios&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;50%&#8221; width_phone=&#8221;70%&#8221; width_last_edited=&#8221;off|tablet&#8221; max_height_tablet=&#8221;500px&#8221; max_height_phone=&#8221;500px&#8221; max_height_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;75px||||false|false&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;API Ethical Hacking&#8221; image=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/API.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;5b6622d9-50d7-4d3f-91da-fc179ad88891&#8243; header_font=&#8221;Poppins|700|||||||&#8221; header_text_color=&#8221;#19222c&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|500|||||||&#8221; body_text_color=&#8221;#19222c&#8221; body_line_height=&#8221;1.6em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;||50px||false|false&#8221; custom_margin_phone=&#8221;||30px||false|false&#8221; custom_margin_last_edited=&#8221;off|tablet&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Infrastructure Ethical Hacking&#8221; image=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/infraestructura.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;5b6622d9-50d7-4d3f-91da-fc179ad88891&#8243; header_font=&#8221;Poppins|700|||||||&#8221; header_text_color=&#8221;#19222c&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|500|||||||&#8221; body_text_color=&#8221;#19222c&#8221; body_line_height=&#8221;1.6em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;||50px||false|false&#8221; custom_margin_phone=&#8221;||30px||false|false&#8221; custom_margin_last_edited=&#8221;off|tablet&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Case Studies&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#19222c&#8221; background_color_gradient_start=&#8221;rgba(37,0,48,0.9)&#8221; background_color_gradient_end=&#8221;rgba(0,0,0,0.91)&#8221; background_enable_image=&#8221;off&#8221; custom_padding=&#8221;8vw||8vw||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_enable_image=&#8221;off&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;bottom_center&#8221; background_last_edited=&#8221;off|desktop&#8221; background_position_tablet=&#8221;bottom_center&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.1&#8243; _module_preset=&#8221;534cc526-6274-4e31-9e1a-7f18a5947bf1&#8243; header_4_font=&#8221;Poppins|700||on|||||&#8221; header_4_text_color=&#8221;#0ec2d3&#8243; header_4_font_size=&#8221;14px&#8221; header_4_letter_spacing=&#8221;2px&#8221; header_4_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span>OFFENSIVE<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;df96b77a-cd4f-44a8-a771-2d6347592b53&#8243; header_2_font=&#8221;Poppins|700|||||||&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;50px&#8221; header_2_line_height=&#8221;1.35em&#8221; custom_margin=&#8221;||8px||false|false&#8221; header_2_font_size_tablet=&#8221;32px&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>Phishing Test<\/b><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;41d5859c-fbaa-458a-88e4-5d886857f235&#8243; text_font=&#8221;Poppins|500|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.6em&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">Phishing, along with its variants like vishing and smishing, is one of the most commonly used types of attacks worldwide and has the potential to affect everyone\u2014from large and small businesses to institutions and individuals. The objectives can vary greatly, from distributing malware, stealing passwords and personal data, extracting confidential information, to committing fraud. This makes it a top-tier threat.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Phishing attacks have rapidly evolved, mimicking major brands, copying the tone and style of messages, and implementing techniques designed to prevent users from suspecting the emails they are opening. Being aware of the methods used by attackers and the dangers they pose to people and organizations is crucial for creating a secure ecosystem.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#1b5d6b&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;http:\/\/lanhax.com\/wp-content\/uploads\/2024\/01\/Red-team1.png&#8221; title_text=&#8221;Red-team1&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.24.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-20px|-20px||-20px|false|true&#8221; global_colors_info=&#8221;{}&#8221; src__hover_enabled=&#8221;off|desktop&#8221; src__hover=&#8221;http:\/\/lanhax.com\/wp-content\/uploads\/2024\/01\/software-img-50.jpg&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;41d5859c-fbaa-458a-88e4-5d886857f235&#8243; text_font=&#8221;Poppins|500|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.6em&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">The Phishing Test service allows for the planning, execution, and measurement of a phishing attack in a controlled and dynamic manner. Through a Phishing Test, an organization can identify and assess existing gaps in the detection of malicious emails. This way, the organization\u2019s susceptibility to a mass phishing attack or a targeted attack in a real-world context by a cybercriminal can be determined.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;http:\/\/lanhax.com\/wp-content\/uploads\/2024\/01\/Red-team2.png&#8221; title_text=&#8221;Red-team2&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-20px|-20px||-20px|false|true&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;41d5859c-fbaa-458a-88e4-5d886857f235&#8243; text_font=&#8221;Poppins|500|||||||&#8221; text_text_color=&#8221;#19222c&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.6em&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>Features:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">360 Management<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Customized campaigns<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">We simulate a real attack<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Behavioral analysis reports<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Segmented results<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">High percentage of user non-repudiation guaranteed<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Campaign delivery status<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Email opens<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Clicks<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Information entry<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Result downloads<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Header&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f6f2ea&#8221; custom_padding=&#8221;5vw||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_4,1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;e864d11f-3dab-4fa3-ac06-4f0e1a260807&#8243; header_font=&#8221;Poppins|600|||||||&#8221; header_text_color=&#8221;#010101&#8243; header_font_size=&#8221;80px&#8221; header_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Poppins|700|||||||&#8221; header_2_text_color=&#8221;#19222c&#8221; header_2_font_size=&#8221;50px&#8221; header_font_size_tablet=&#8221;40px&#8221; header_font_size_phone=&#8221;24px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; header_2_font_size_tablet=&#8221;50px&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>Crisis Exercises<\/b><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;41d5859c-fbaa-458a-88e4-5d886857f235&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#19222c&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.6em&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"p1\">Before a cyber incident occurs, every organization must be prepared to respond effectively. Proper planning and training can make the difference between successful incident management and a disaster. Once the incident is declared, it\u2019s too late to start planning.<\/p>\n<p class=\"p1\">A cybersecurity simulation places the company in a crisis situation, simulating a real attack. This allows for the evaluation of the incident response team\u2019s (SOC) performance, the effectiveness of security protocols and established procedures, and the chain of command. In short, a realistic view of how the organization would respond to a real cyber attack is obtained.<\/p>\n<p class=\"p1\">The main objective of a simulation is to identify and correct vulnerabilities in security systems, evaluate the effectiveness of procedures, and assess team performance. This way, the organization\u2019s preparedness for future threats can be improved.<\/p>\n<p class=\"p1\">LANHAX\u2019s cybersecurity simulations are custom-designed for each client, considering factors such as the type of company, specific sector threats, the number of users, infrastructure, and latent risks. This ensures that the simulations are as realistic and effective as possible.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20%||||false|false&#8221; custom_padding_tablet=&#8221;0%||||false|false&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|600|||||||&#8221; text_text_color=&#8221;#19222c&#8221; text_font_size=&#8221;25px&#8221; text_line_height=&#8221;1.2em&#8221; text_font_size_tablet=&#8221;25px&#8221; text_font_size_phone=&#8221;20px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#0ec2d3&#8243; border_width_bottom=&#8221;2px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">Phishing Attack Simulation<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|600|||||||&#8221; text_text_color=&#8221;#19222c&#8221; text_font_size=&#8221;25px&#8221; text_line_height=&#8221;1.2em&#8221; text_font_size_tablet=&#8221;25px&#8221; text_font_size_phone=&#8221;20px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#1a4956&#8243; border_width_bottom=&#8221;2px&#8221; border_color_bottom=&#8221;#0ec2d3&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">DoS\/DDoS Attacks<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|600|||||||&#8221; text_text_color=&#8221;#19222c&#8221; text_font_size=&#8221;25px&#8221; text_line_height=&#8221;1.2em&#8221; text_font_size_tablet=&#8221;25px&#8221; text_font_size_phone=&#8221;20px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#1b5d6b&#8221; border_width_bottom=&#8221;2px&#8221; border_color_bottom=&#8221;#0ec2d3&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">Malware Infection<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|600|||||||&#8221; text_text_color=&#8221;#19222c&#8221; text_font_size=&#8221;25px&#8221; text_line_height=&#8221;1.2em&#8221; text_font_size_tablet=&#8221;25px&#8221; text_font_size_phone=&#8221;20px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; border_width_bottom=&#8221;2px&#8221; border_color_bottom=&#8221;#0ec2d3&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">Sensitive Information Leakage<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/02\/caja-blanca.png&#8221; title_text=&#8221;caja-blanca&#8221; align=&#8221;right&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;75%&#8221; width_phone=&#8221;75%&#8221; width_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;|-10vw|||false|false&#8221; custom_margin_tablet=&#8221;|0vw|||false|false&#8221; custom_margin_phone=&#8221;|0vw|||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/02\/caja-gris.png&#8221; title_text=&#8221;caja-gris&#8221; align=&#8221;right&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;75%&#8221; width_phone=&#8221;75%&#8221; width_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;|-10vw|||false|false&#8221; custom_margin_tablet=&#8221;|0vw|||false|false&#8221; custom_margin_phone=&#8221;|0vw|||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/02\/caja-negra.png&#8221; title_text=&#8221;caja-negra&#8221; align=&#8221;right&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;75%&#8221; width_phone=&#8221;75%&#8221; width_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;|-10vw|||false|false&#8221; custom_margin_tablet=&#8221;|0vw|||false|false&#8221; custom_margin_phone=&#8221;|0vw|||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Feature&#8221; module_id=&#8221;ciber-defensiva&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#fbfbfb&#8221; custom_padding=&#8221;||5vw||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;df96b77a-cd4f-44a8-a771-2d6347592b53&#8243; text_font=&#8221;Poppins||||||||&#8221; header_font=&#8221;Poppins||||||||&#8221; header_2_font=&#8221;Poppins|600|||||||&#8221; header_2_text_color=&#8221;#19222c&#8221; header_2_font_size=&#8221;50px&#8221; header_2_line_height=&#8221;1.35em&#8221; custom_margin=&#8221;||8px||false|false&#8221; header_2_font_size_tablet=&#8221;32px&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><strong>Defensive Security<\/strong><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;41d5859c-fbaa-458a-88e4-5d886857f235&#8243; text_font=&#8221;Poppins|500|||||||&#8221; text_text_color=&#8221;#19222c&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.6em&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"p1\">It is the specialty that goes beyond reacting to attacks; it\u2019s about anticipating threats. It\u2019s like building a digital immune system, strengthening the organization\u2019s defenses to prevent cybercriminals from finding vulnerabilities. This involves everything from protecting the most valuable assets to educating employees on best security practices.<\/p>\n<p class=\"p1\">\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Awareness &amp; Training<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Digital Forensics<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Hardening<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Incident Response<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Data Leak Monitoring<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;#contacto&#8221; button_text=&#8221;More Info&#8221; _builder_version=&#8221;4.24.1&#8243; _module_preset=&#8221;94ef7aca-dcd9-4f9d-93b2-efa3466cebc7&#8243; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#19222c&#8221; button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_width=&#8221;4px&#8221; button_border_color=&#8221;#19222c&#8221; button_border_radius=&#8221;0px&#8221; button_font=&#8221;Archivo|800||on|||||&#8221; custom_padding=&#8221;15px|35px|15px|35px|true|true&#8221; box_shadow_style=&#8221;preset4&#8243; box_shadow_horizontal=&#8221;6px&#8221; box_shadow_vertical=&#8221;6px&#8221; box_shadow_color=&#8221;#0ec2d3&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/02\/defensiva.png&#8221; title_text=&#8221;defensiva&#8221; align=&#8221;right&#8221; show_bottom_space_tablet=&#8221;&#8221; show_bottom_space_phone=&#8221;&#8221; show_bottom_space_last_edited=&#8221;on|phone&#8221; align_tablet=&#8221;right&#8221; align_phone=&#8221;left&#8221; align_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;http:\/\/lanhax.com\/wp-content\/uploads\/2024\/01\/software-img-09.png&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;bottom_center&#8221; transform_scale_tablet=&#8221;&#8221; transform_scale_phone=&#8221;&#8221; transform_scale_last_edited=&#8221;on|phone&#8221; transform_translate=&#8221;177px|-7px&#8221; transform_translate_tablet=&#8221;177px|-7px&#8221; transform_translate_phone=&#8221;0px|0px&#8221; transform_translate_last_edited=&#8221;on|phone&#8221; transform_translate_linked_phone=&#8221;off&#8221; transform_rotate_tablet=&#8221;&#8221; transform_rotate_phone=&#8221;&#8221; transform_rotate_last_edited=&#8221;on|phone&#8221; transform_skew_tablet=&#8221;&#8221; transform_skew_phone=&#8221;&#8221; transform_skew_last_edited=&#8221;on|phone&#8221; transform_origin_tablet=&#8221;&#8221; transform_origin_phone=&#8221;&#8221; transform_origin_last_edited=&#8221;on|phone&#8221; transform_styles_last_edited=&#8221;on|phone&#8221; width_tablet=&#8221;72%&#8221; width_phone=&#8221;85%&#8221; width_last_edited=&#8221;off|tablet&#8221; custom_margin=&#8221;|0px||-10vw|false|false&#8221; custom_margin_tablet=&#8221;|||0vw|false|false&#8221; custom_margin_phone=&#8221;|||0vw|false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;|0px|0px|0px|false|false&#8221; transform_styles_tablet=&#8221;&#8221; transform_styles_phone=&#8221;&#8221; module_alignment_tablet=&#8221;&#8221; module_alignment_phone=&#8221;left&#8221; module_alignment_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;ethical-hacking&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#e8e8e8&#8243; background_enable_image=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;800px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;534cc526-6274-4e31-9e1a-7f18a5947bf1&#8243; header_font=&#8221;Poppins|700|||||||&#8221; header_4_font=&#8221;Poppins|700||on|||||&#8221; header_4_text_color=&#8221;#1b5d6b&#8221; header_4_font_size=&#8221;14px&#8221; header_4_letter_spacing=&#8221;2px&#8221; header_4_line_height=&#8221;1.5em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>defensive security<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;df96b77a-cd4f-44a8-a771-2d6347592b53&#8243; header_font=&#8221;Poppins||||||||&#8221; header_2_font=&#8221;Poppins|600|||||||&#8221; header_2_text_color=&#8221;#19222c&#8221; header_2_font_size=&#8221;50px&#8221; header_2_line_height=&#8221;1.35em&#8221; text_orientation=&#8221;center&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||8px||false|false&#8221; header_2_font_size_tablet=&#8221;32px&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>Awareness &amp; Training<\/b><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_2,1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; width=&#8221;90%&#8221; max_width=&#8221;1280px&#8221; custom_margin_tablet=&#8221;50px||||false|false&#8221; custom_margin_phone=&#8221;50px||||false|false&#8221; custom_margin_last_edited=&#8221;off|tablet&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;75px||||false|false&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;E-learning courses&#8221; image=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/e-learning.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;5b6622d9-50d7-4d3f-91da-fc179ad88891&#8243; header_font=&#8221;Poppins|700|||||||&#8221; header_text_color=&#8221;#19222c&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|500|||||||&#8221; body_text_color=&#8221;#19222c&#8221; body_line_height=&#8221;1.6em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;||50px||false|false&#8221; custom_margin_phone=&#8221;||30px||false|false&#8221; custom_margin_last_edited=&#8221;off|tablet&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Talks&#8221; image=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/charlas.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;5b6622d9-50d7-4d3f-91da-fc179ad88891&#8243; header_font=&#8221;Poppins|700|||||||&#8221; header_text_color=&#8221;#19222c&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|500|||||||&#8221; body_text_color=&#8221;#19222c&#8221; body_line_height=&#8221;1.6em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;||50px||false|false&#8221; custom_margin_phone=&#8221;||30px||false|false&#8221; custom_margin_last_edited=&#8221;off|tablet&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Videos and microcapsules&#8221; image=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/video.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;5b6622d9-50d7-4d3f-91da-fc179ad88891&#8243; header_font=&#8221;Poppins|700|||||||&#8221; header_text_color=&#8221;#19222c&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|500|||||||&#8221; body_text_color=&#8221;#19222c&#8221; body_line_height=&#8221;1.6em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;||50px||false|false&#8221; custom_margin_phone=&#8221;||30px||false|false&#8221; custom_margin_last_edited=&#8221;off|tablet&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Newsletters&#8221; image=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/noticias.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;5b6622d9-50d7-4d3f-91da-fc179ad88891&#8243; header_font=&#8221;Poppins|700|||||||&#8221; header_text_color=&#8221;#19222c&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|500|||||||&#8221; body_text_color=&#8221;#19222c&#8221; body_line_height=&#8221;1.6em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;||50px||false|false&#8221; custom_margin_phone=&#8221;||30px||false|false&#8221; custom_margin_last_edited=&#8221;off|tablet&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;41d5859c-fbaa-458a-88e4-5d886857f235&#8243; text_font=&#8221;Poppins||||||||&#8221; text_text_color=&#8221;#19222c&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.6em&#8221; text_orientation=&#8221;center&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||50px|||&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">Today, companies and organizations invest considerably in cybersecurity technologies, policies, and services. However, no matter how advanced these solutions are, information security largely depends on user actions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">90% of security breaches originate from human error. That\u2019s why it\u2019s essential to educate employees about cybersecurity and digital fraud. Training users to identify and avoid common threats, such as fraudulent emails or malicious links, significantly reduces the risk of incidents.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When users know the best security practices, such as creating strong passwords, avoiding insecure public Wi-Fi networks, or regularly updating software, they become the organization\u2019s first line of defense. By working together, security teams and users can build a strong cybersecurity culture and protect the company\u2019s digital assets.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_blurb title=&#8221;Graphics and posters&#8221; image=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/poster.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;5b6622d9-50d7-4d3f-91da-fc179ad88891&#8243; header_font=&#8221;Poppins|700|||||||&#8221; header_text_color=&#8221;#19222c&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|500|||||||&#8221; body_text_color=&#8221;#19222c&#8221; body_line_height=&#8221;1.6em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;||50px||false|false&#8221; custom_margin_phone=&#8221;||30px||false|false&#8221; custom_margin_last_edited=&#8221;off|tablet&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;75px||||false|false&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Wallpapers&#8221; image=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/wallpaper.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;5b6622d9-50d7-4d3f-91da-fc179ad88891&#8243; header_font=&#8221;Poppins|700|||||||&#8221; header_text_color=&#8221;#19222c&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|500|||||||&#8221; body_text_color=&#8221;#19222c&#8221; body_line_height=&#8221;1.6em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;||50px||false|false&#8221; custom_margin_phone=&#8221;||30px||false|false&#8221; custom_margin_last_edited=&#8221;off|tablet&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Trivia and quizzes&#8221; image=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/quiz.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;5b6622d9-50d7-4d3f-91da-fc179ad88891&#8243; header_font=&#8221;Poppins|700|||||||&#8221; header_text_color=&#8221;#19222c&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|500|||||||&#8221; body_text_color=&#8221;#19222c&#8221; body_line_height=&#8221;1.6em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;||50px||false|false&#8221; custom_margin_phone=&#8221;||30px||false|false&#8221; custom_margin_last_edited=&#8221;off|tablet&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Social Engineering Tests&#8221; image=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/social.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;5b6622d9-50d7-4d3f-91da-fc179ad88891&#8243; header_font=&#8221;Poppins|700|||||||&#8221; header_text_color=&#8221;#19222c&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|500|||||||&#8221; body_text_color=&#8221;#19222c&#8221; body_line_height=&#8221;1.6em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;||50px||false|false&#8221; custom_margin_phone=&#8221;||30px||false|false&#8221; custom_margin_last_edited=&#8221;off|tablet&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Phishing Test&#8221; image=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/phishing.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;5b6622d9-50d7-4d3f-91da-fc179ad88891&#8243; header_font=&#8221;Poppins|700|||||||&#8221; header_text_color=&#8221;#19222c&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|500|||||||&#8221; body_text_color=&#8221;#19222c&#8221; body_line_height=&#8221;1.6em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;||50px||false|false&#8221; custom_margin_phone=&#8221;||30px||false|false&#8221; custom_margin_last_edited=&#8221;off|tablet&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Case Studies&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#1a4956&#8243; background_color_gradient_start=&#8221;rgba(37,0,48,0.9)&#8221; background_color_gradient_end=&#8221;rgba(0,0,0,0.91)&#8221; background_enable_image=&#8221;off&#8221; custom_padding=&#8221;8vw||8vw||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; background_enable_image=&#8221;off&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;bottom_center&#8221; background_last_edited=&#8221;off|desktop&#8221; background_position_tablet=&#8221;bottom_center&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;534cc526-6274-4e31-9e1a-7f18a5947bf1&#8243; header_4_font=&#8221;Poppins|700||on|||||&#8221; header_4_text_color=&#8221;#0ec2d3&#8243; header_4_font_size=&#8221;14px&#8221; header_4_letter_spacing=&#8221;2px&#8221; header_4_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span>DEFENSIVE<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;df96b77a-cd4f-44a8-a771-2d6347592b53&#8243; header_2_font=&#8221;Poppins|700|||||||&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;50px&#8221; header_2_line_height=&#8221;1.35em&#8221; custom_margin=&#8221;||8px||false|false&#8221; header_2_font_size_tablet=&#8221;32px&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>Digital Forensics<\/b><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;41d5859c-fbaa-458a-88e4-5d886857f235&#8243; text_font=&#8221;Poppins|500|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.6em&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">Digital forensics is a scientific discipline that investigates and analyzes digital data for use as evidence in legal processes. Imagine being a detective, but instead of looking for fingerprints, you\u2019re searching for clues on laptops, mobile phones, and other electronic devices.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Digital forensics specialists face very complex challenges. For example, they must extract data from devices that are damaged or have been formatted, find small clues within large amounts of information, and ensure that all evidence is collected carefully so it is valid in court.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#19222c&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;http:\/\/lanhax.com\/wp-content\/uploads\/2024\/01\/Red-team1.png&#8221; title_text=&#8221;Red-team1&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.24.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-20px|-20px||-20px|false|true&#8221; global_colors_info=&#8221;{}&#8221; src__hover_enabled=&#8221;off|desktop&#8221; src__hover=&#8221;http:\/\/lanhax.com\/wp-content\/uploads\/2024\/01\/software-img-50.jpg&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;41d5859c-fbaa-458a-88e4-5d886857f235&#8243; text_font=&#8221;Poppins|500|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.6em&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">Every case is unique. A forensic analyst may encounter very old operating systems, unknown programs, or viruses that have altered data. That\u2019s why digital forensics requires highly specialized knowledge and strong problem-solving skills.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;http:\/\/lanhax.com\/wp-content\/uploads\/2024\/01\/Red-team2.png&#8221; title_text=&#8221;Red-team2&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-20px|-20px||-20px|false|true&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;41d5859c-fbaa-458a-88e4-5d886857f235&#8243; text_font=&#8221;Poppins|500|||||||&#8221; text_text_color=&#8221;#19222c&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.6em&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">At LANHAX, we offer a very comprehensive digital forensics service. We thoroughly analyze all types of electronic devices to help you find the answers you need. Our service adapts to your needs and can be carried out in two different ways, depending on your objectives.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Header&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#19222c&#8221; custom_padding=&#8221;5vw||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_4,1_4&#8243; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;e864d11f-3dab-4fa3-ac06-4f0e1a260807&#8243; header_font=&#8221;Poppins|600|||||||&#8221; header_text_color=&#8221;#010101&#8243; header_font_size=&#8221;80px&#8221; header_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Poppins|700|||||||&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;50px&#8221; header_font_size_tablet=&#8221;40px&#8221; header_font_size_phone=&#8221;24px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; header_2_font_size_tablet=&#8221;50px&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>Hardening<\/b><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;41d5859c-fbaa-458a-88e4-5d886857f235&#8243; text_font=&#8221;Poppins|700|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.6em&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">System hardening is the process of maximizing the security of an operating system. Its main goal is to eliminate or minimize vulnerabilities that could be exploited by cyber attackers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">How does it work? Through a detailed analysis of each system component\u2019s configuration, adjustments that may pose a risk are identified and corrected. Simplifying a system\u2019s functions reduces its exposure to threats. Therefore, it is recommended to harden systems throughout their entire lifecycle.<\/span><\/p>\n<p><strong>Why is it important? Hardening allows:<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;8%||||false|false&#8221; custom_padding_tablet=&#8221;0%||||false|false&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|600|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;25px&#8221; text_line_height=&#8221;1.2em&#8221; text_font_size_tablet=&#8221;25px&#8221; text_font_size_phone=&#8221;20px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; border_width_bottom=&#8221;2px&#8221; border_color_bottom=&#8221;#0ec2d3&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">Detection of weak or incorrect configurations<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|600|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;25px&#8221; text_line_height=&#8221;1.2em&#8221; text_font_size_tablet=&#8221;25px&#8221; text_font_size_phone=&#8221;20px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; border_width_bottom=&#8221;2px&#8221; border_color_bottom=&#8221;#0ec2d3&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">Correction of vulnerabilities<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|600|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;25px&#8221; text_line_height=&#8221;1.2em&#8221; text_font_size_tablet=&#8221;25px&#8221; text_font_size_phone=&#8221;20px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; border_width_bottom=&#8221;2px&#8221; border_color_bottom=&#8221;#0ec2d3&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">Reduction of the attack surface<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|600|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;25px&#8221; text_line_height=&#8221;1.2em&#8221; text_font_size_tablet=&#8221;25px&#8221; text_font_size_phone=&#8221;20px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; border_width_bottom=&#8221;2px&#8221; border_color_bottom=&#8221;#0ec2d3&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">Increase of the system\u2019s overall security<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/02\/caja-blanca.png&#8221; title_text=&#8221;caja-blanca&#8221; align=&#8221;right&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;75%&#8221; width_phone=&#8221;75%&#8221; width_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;|-10vw|||false|false&#8221; custom_margin_tablet=&#8221;|0vw|||false|false&#8221; custom_margin_phone=&#8221;|0vw|||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/02\/caja-gris.png&#8221; title_text=&#8221;caja-gris&#8221; align=&#8221;right&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;75%&#8221; width_phone=&#8221;75%&#8221; width_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;|-10vw|||false|false&#8221; custom_margin_tablet=&#8221;|0vw|||false|false&#8221; custom_margin_phone=&#8221;|0vw|||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/02\/caja-negra.png&#8221; title_text=&#8221;caja-negra&#8221; align=&#8221;right&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;75%&#8221; width_phone=&#8221;75%&#8221; width_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;|-10vw|||false|false&#8221; custom_margin_tablet=&#8221;|0vw|||false|false&#8221; custom_margin_phone=&#8221;|0vw|||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Feature&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f6f2ea&#8221; custom_padding=&#8221;5vw||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;2_3,1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;df96b77a-cd4f-44a8-a771-2d6347592b53&#8243; header_2_font=&#8221;Poppins|600|||||||&#8221; header_2_text_color=&#8221;#19222c&#8221; header_2_font_size=&#8221;50px&#8221; header_2_line_height=&#8221;1.35em&#8221; custom_margin=&#8221;||8px||false|false&#8221; header_2_font_size_tablet=&#8221;32px&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>Incident Response<\/b><\/h2>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/indicent-response.png&#8221; title_text=&#8221;indicent-response&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; background_enable_image=&#8221;off&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;bottom_center&#8221; width_tablet=&#8221;60%&#8221; width_phone=&#8221;70%&#8221; width_last_edited=&#8221;off|tablet&#8221; custom_margin=&#8221;70px||||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;||100px||false|false&#8221; custom_padding_tablet=&#8221;||90px||false|false&#8221; custom_padding_phone=&#8221;||90px||false|false&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/indicent-response-p.png&#8221; title_text=&#8221;indicent-response-p&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;41d5859c-fbaa-458a-88e4-5d886857f235&#8243; text_font=&#8221;Poppins||||||||&#8221; text_text_color=&#8221;#19222c&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.6em&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">In the world of cybersecurity, a cyber attack is inevitable. The question is not if, but when. That\u2019s why incident response is essential for all organizations, regardless of their size or sector.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What is incident response? It is the set of actions taken when a company suffers a cyber attack. The goal is to identify who is behind the attack, stop it as soon as possible, remove any trace of the attack from our systems, and finally recover our data and services. Additionally, it\u2019s an opportunity to learn from what happened and improve our defenses.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Feature&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#fbfbfb&#8221; overflow-x=&#8221;hidden&#8221; overflow-y=&#8221;hidden&#8221; custom_padding=&#8221;5vw||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;534cc526-6274-4e31-9e1a-7f18a5947bf1&#8243; header_4_font=&#8221;Archivo|700||on|||||&#8221; header_4_text_color=&#8221;#1b5d6b&#8221; header_4_font_size=&#8221;14px&#8221; header_4_letter_spacing=&#8221;2px&#8221; header_4_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;0px||7px|||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>defensive<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;df96b77a-cd4f-44a8-a771-2d6347592b53&#8243; header_2_font=&#8221;Poppins|600|||||||&#8221; header_2_text_color=&#8221;#19222c&#8221; header_2_font_size=&#8221;50px&#8221; header_2_line_height=&#8221;1.35em&#8221; custom_margin=&#8221;||8px||false|false&#8221; header_2_font_size_tablet=&#8221;32px&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>Data Leak Monitoring<\/b><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;41d5859c-fbaa-458a-88e4-5d886857f235&#8243; text_font=&#8221;Poppins||||||||&#8221; text_text_color=&#8221;#19222c&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.6em&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">The exposure of sensitive information represents a serious threat to individuals\u2019 privacy and organizations\u2019 reputations. Whether accidental or intentional, a data leak can have devastating consequences. The cost of a security breach can be catastrophic, putting financial stability and customer trust at risk.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our Data Leak Monitoring service allows you to detect any incident that could affect your company\u2019s image and operations in a timely manner. We conduct thorough searches in various sources, including social networks, to identify possible leaks of confidential information such as personal data, credit card numbers, passwords, and internal documents.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The primary goal is to protect your business and your customers\u2019 information. By detecting a data leak early, you can respond proactively, minimizing economic and reputational damage.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Why is it so difficult to detect a data leak? Even the most experienced security teams can have difficulty identifying a sophisticated leak. Our services provide an additional layer of protection, helping you keep your organization\u2019s information secure.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/Data-leak-monitoring.png&#8221; title_text=&#8221;Data-leak-monitoring&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#19222c&#8221; background_enable_image=&#8221;off&#8221; parallax=&#8221;on&#8221; width_tablet=&#8221;65%&#8221; width_phone=&#8221;85%&#8221; width_last_edited=&#8221;off|tablet&#8221; custom_margin=&#8221;|-30vw|||false|false&#8221; custom_padding=&#8221;10%|10%|10%|10%|true|true&#8221; global_colors_info=&#8221;{}&#8221; width__hover_enabled=&#8221;off|desktop&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; module_id=&#8221;cumplimiento-normativo&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#e8e8e8&#8243; background_enable_image=&#8221;off&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;||||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;|15px||20px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;800px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;534cc526-6274-4e31-9e1a-7f18a5947bf1&#8243; header_font=&#8221;Poppins|700|||||||&#8221; header_4_font=&#8221;Poppins|700||on|||||&#8221; header_4_text_color=&#8221;#1b5d6b&#8221; header_4_font_size=&#8221;14px&#8221; header_4_letter_spacing=&#8221;2px&#8221; header_4_line_height=&#8221;1.5em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Regulatory compliance<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;df96b77a-cd4f-44a8-a771-2d6347592b53&#8243; header_font=&#8221;Poppins||||||||&#8221; header_2_font=&#8221;Poppins|600|||||||&#8221; header_2_text_color=&#8221;#19222c&#8221; header_2_font_size=&#8221;50px&#8221; header_2_line_height=&#8221;1.35em&#8221; text_orientation=&#8221;center&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||8px||false|false&#8221; header_2_font_size_tablet=&#8221;32px&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>DevSecOps Consulting<\/b><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_4,1_4&#8243; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; width=&#8221;90%&#8221; max_width=&#8221;1280px&#8221; custom_margin_tablet=&#8221;50px||||false|false&#8221; custom_margin_phone=&#8221;50px||||false|false&#8221; custom_margin_last_edited=&#8221;off|tablet&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;41d5859c-fbaa-458a-88e4-5d886857f235&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#19222c&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.6em&#8221; text_orientation=&#8221;center&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||50px|||&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"p1\" style=\"text-align: left;\">Secure software development is an approach that integrates security at every stage of the digital product creation process. Even before writing a single line of code, thorough assessments are conducted to identify and fix potential vulnerabilities. These evaluations cover aspects like authentication (who can access?), authorization (what can each user do?), confidentiality (protection of sensitive data), integrity (ensuring data is not altered), availability (guaranteeing continuous access to the service), and resilience (the ability to recover from attacks).<\/p>\n<p class=\"p1\" style=\"text-align: left;\">By incorporating activities like penetration testing, code reviews, and architecture analysis, secure software development (Secure SDLC) ensures that security is a priority at all times.<\/p>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=&#8221;#000000&#8243; open_toggle_background_color=&#8221;#fbfbfb&#8221; closed_toggle_background_color=&#8221;#1b5d6b&#8221; toggle_icon=&#8221;&#x22;||divi||400&#8243; icon_color=&#8221;#FFFFFF&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;32px&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; toggle_text_color=&#8221;#FFFFFF&#8221; toggle_font=&#8221;Archivo|600|||||||&#8221; toggle_font_size=&#8221;18px&#8221; toggle_line_height=&#8221;1.2em&#8221; body_font=&#8221;Archivo||||||||&#8221; body_text_color=&#8221;#000000&#8243; toggle_font_size_tablet=&#8221;18px&#8221; toggle_font_size_phone=&#8221;16px&#8221; toggle_font_size_last_edited=&#8221;on|tablet&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_accordion_item title=&#8221;What is DevSecOps?&#8221; open=&#8221;on&#8221; open_toggle_text_color=&#8221;#19222c&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; body_font=&#8221;Poppins||||||||&#8221; body_text_color=&#8221;#19222c&#8221; border_color_all=&#8221;#19222c&#8221; global_colors_info=&#8221;{}&#8221; toggle_font=&#8221;Poppins|600|||||||&#8221; closed_toggle_font=&#8221;Poppins||||||||&#8221;]<\/p>\n<p class=\"p1\">DevSecOps is an approach that combines software development (Dev), operations (Ops), and cybersecurity (Sec). It\u2019s like having a team of experts guiding you throughout the entire lifecycle of your project, from the initial idea to launch and maintenance.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Why is it important? DevSecOps helps you:&#8221; open_toggle_text_color=&#8221;#19222c&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; body_font=&#8221;Poppins||||||||&#8221; body_text_color=&#8221;#19222c&#8221; border_color_all=&#8221;#19222c&#8221; global_colors_info=&#8221;{}&#8221; toggle_font=&#8221;Poppins|600|||||||&#8221; closed_toggle_font=&#8221;Poppins||||||||&#8221; open=&#8221;off&#8221;]<\/p>\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s1\"><\/span>Create more secure software: By identifying and fixing security issues early on, you reduce the risk of cyberattacks.<\/li>\n<li class=\"li1\"><span class=\"s1\"><\/span>Increase security awareness: All team members learn to think about security in every decision they make.<\/li>\n<li class=\"li1\"><span class=\"s1\"><\/span>Detect and fix issues faster: Early detection reduces the time and cost required for corrections.<\/li>\n<li class=\"li1\"><span class=\"s1\"><\/span>Reduce cyber risk: You protect your business and customers from potential threats.<\/li>\n<\/ul>\n<p class=\"p2\">\n<p class=\"p1\">In summary, DevSecOps is an investment in your software&#8217;s security and your organization\u2019s peace of mind.<\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|600|||||||&#8221; text_text_color=&#8221;#19222c&#8221; text_font_size=&#8221;25px&#8221; text_line_height=&#8221;1.2em&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"p1\" style=\"text-align: center;\">Our DevSecOps service is divided into four stages:<\/p>\n<p>[\/et_pb_text][et_pb_blurb title=&#8221;Initial Assessment&#8221; image=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/evaluacion.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;5b6622d9-50d7-4d3f-91da-fc179ad88891&#8243; header_font=&#8221;Poppins|700|||||||&#8221; header_text_color=&#8221;#19222c&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|500|||||||&#8221; body_text_color=&#8221;#19222c&#8221; body_line_height=&#8221;1.6em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;||50px||false|false&#8221; custom_margin_phone=&#8221;||30px||false|false&#8221; custom_margin_last_edited=&#8221;off|tablet&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Planning&#8221; image=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/planificacion.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;5b6622d9-50d7-4d3f-91da-fc179ad88891&#8243; header_font=&#8221;Poppins|700|||||||&#8221; header_text_color=&#8221;#19222c&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|500|||||||&#8221; body_text_color=&#8221;#19222c&#8221; body_line_height=&#8221;1.6em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;||50px||false|false&#8221; custom_margin_phone=&#8221;||30px||false|false&#8221; custom_margin_last_edited=&#8221;off|tablet&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Implementation&#8221; image=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/implementacion.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;5b6622d9-50d7-4d3f-91da-fc179ad88891&#8243; header_font=&#8221;Poppins|700|||||||&#8221; header_text_color=&#8221;#19222c&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|500|||||||&#8221; body_text_color=&#8221;#19222c&#8221; body_line_height=&#8221;1.6em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;||50px||false|false&#8221; custom_margin_phone=&#8221;||30px||false|false&#8221; custom_margin_last_edited=&#8221;off|tablet&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Integration&#8221; image=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/integracion.png&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;5b6622d9-50d7-4d3f-91da-fc179ad88891&#8243; header_font=&#8221;Poppins|700|||||||&#8221; header_text_color=&#8221;#19222c&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|500|||||||&#8221; body_text_color=&#8221;#19222c&#8221; body_line_height=&#8221;1.6em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;||50px||false|false&#8221; custom_margin_phone=&#8221;||30px||false|false&#8221; custom_margin_last_edited=&#8221;off|tablet&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Features&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#fbfbfb&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;800px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;534cc526-6274-4e31-9e1a-7f18a5947bf1&#8243; header_4_font=&#8221;Poppins|700||on|||||&#8221; header_4_text_color=&#8221;#1b5d6b&#8221; header_4_font_size=&#8221;14px&#8221; header_4_letter_spacing=&#8221;2px&#8221; header_4_line_height=&#8221;1.5em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><span>Regulatory Compliance<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;df96b77a-cd4f-44a8-a771-2d6347592b53&#8243; header_2_font=&#8221;Poppins|600|||||||&#8221; header_2_text_color=&#8221;#010101&#8243; header_2_font_size=&#8221;50px&#8221; header_2_line_height=&#8221;1.35em&#8221; text_orientation=&#8221;center&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||8px||false|false&#8221; header_2_font_size_tablet=&#8221;32px&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><strong>CIS Control Consulting<\/strong><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_color_all=&#8221;#19222c&#8221; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;0px&#8221; box_shadow_spread=&#8221;-20px&#8221; box_shadow_color=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_vertical__hover_enabled=&#8221;on|hover&#8221; box_shadow_blur__hover_enabled=&#8221;on|hover&#8221; box_shadow_spread__hover_enabled=&#8221;on|desktop&#8221; box_shadow_color__hover_enabled=&#8221;off|hover&#8221; box_shadow_vertical__hover=&#8221;0px&#8221; box_shadow_color__hover=&#8221;rgba(96,91,255,0.42)&#8221; box_shadow_blur__hover=&#8221;0px&#8221; box_shadow_spread__hover=&#8221;-20px&#8221; border_width_all__hover_enabled=&#8221;on|hover&#8221; border_width_all__hover=&#8221;0px&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#19222c&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"p1\">Technology has radically transformed the way we work. Today, it is essential for almost all of our operations. However, this reliance on digital systems also exposes us to new risks. Cybersecurity has become a critical priority to protect our most valuable information.<\/p>\n<p class=\"p1\"><b>What are the CIS Controls?<\/b><\/p>\n<p class=\"p1\">The CIS Controls are a set of best practices for IT security designed to help organizations protect themselves from cyberattacks. Think of them as a user manual for securing your systems.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/lanhax.com\/wp-content\/uploads\/2024\/09\/indicent-response-p.png&#8221; title_text=&#8221;indicent-response-p&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(26,73,86,0.48)&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#19222c&#8221; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;0px&#8221; box_shadow_spread=&#8221;-20px&#8221; box_shadow_color=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221; border_width_all__hover=&#8221;2px&#8221; border_width_all__hover_enabled=&#8221;on|desktop&#8221; background_color__hover=&#8221;#544fff&#8221; background__hover_enabled=&#8221;off|desktop&#8221; box_shadow_vertical__hover=&#8221;40px&#8221; box_shadow_vertical__hover_enabled=&#8221;off|desktop&#8221; box_shadow_blur__hover=&#8221;60px&#8221; box_shadow_blur__hover_enabled=&#8221;off|desktop&#8221; box_shadow_spread__hover=&#8221;-20px&#8221; box_shadow_spread__hover_enabled=&#8221;off|desktop&#8221; box_shadow_color__hover=&#8221;rgba(96,91,255,0.42)&#8221; box_shadow_color__hover_enabled=&#8221;off|desktop&#8221; background_enable_color__hover=&#8221;on&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;0bd9fec6-ac32-486c-934f-18d282fbdfb4&#8243; text_font=&#8221;Poppins||||||||&#8221; text_text_color=&#8221;#19222c&#8221; text_font_size=&#8221;15px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size_tablet=&#8221;55px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221; text_text_color__hover_enabled=&#8221;off|desktop&#8221; text_text_color__hover=&#8221;#FFFFFF&#8221;]<\/p>\n<p class=\"p1\"><b>Our Consulting Service<\/b><\/p>\n<p class=\"p1\">Consulting allows you to evaluate your organization&#8217;s security level and create a plan to improve it. We offer:<\/p>\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s1\"><\/span>Assessment: We analyze your systems and processes to identify weak security points.<\/li>\n<li class=\"li1\"><span class=\"s1\"><\/span>Improvement Plan: We design a personalized plan to strengthen your security, prioritizing the most important actions.<\/li>\n<li class=\"li1\"><span class=\"s1\"><\/span>Implementation: We help you implement the recommended security measures.<\/li>\n<\/ul>\n<p class=\"p1\"><b>Why the CIS Controls?<\/b><\/p>\n<p class=\"p1\">CIS Controls provide a practical and effective way to improve your security. They are flexible and adaptable to organizations of all sizes and sectors. Additionally, they complement other security standards like ISO 27000 and NIST.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(27,93,107,0.55)&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#19222c&#8221; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;0px&#8221; box_shadow_spread=&#8221;-20px&#8221; box_shadow_color=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221; border_width_all__hover=&#8221;0px&#8221; border_width_all__hover_enabled=&#8221;off|desktop&#8221; background_color__hover=&#8221;#544fff&#8221; background__hover_enabled=&#8221;off|desktop&#8221; box_shadow_vertical__hover=&#8221;40px&#8221; box_shadow_vertical__hover_enabled=&#8221;off|desktop&#8221; box_shadow_blur__hover=&#8221;60px&#8221; box_shadow_blur__hover_enabled=&#8221;off|desktop&#8221; box_shadow_spread__hover=&#8221;-20px&#8221; box_shadow_spread__hover_enabled=&#8221;off|desktop&#8221; box_shadow_color__hover=&#8221;rgba(96,91,255,0.42)&#8221; box_shadow_color__hover_enabled=&#8221;off|desktop&#8221; background_enable_color__hover=&#8221;on&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;0bd9fec6-ac32-486c-934f-18d282fbdfb4&#8243; text_font=&#8221;Poppins||||||||&#8221; text_text_color=&#8221;#19222c&#8221; text_font_size=&#8221;15px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size_tablet=&#8221;55px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221; text_text_color__hover_enabled=&#8221;off|desktop&#8221; text_text_color__hover=&#8221;#FFFFFF&#8221;]<\/p>\n<p class=\"p1\"><b>Key Benefits<\/b><\/p>\n<p class=\"p1\">By implementing the CIS Controls, you will:<\/p>\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s1\"><\/span>Reduce the risk of cyberattacks: Protect your confidential information and avoid financial losses.<\/li>\n<li class=\"li1\"><span class=\"s1\"><\/span>Comply with regulations: Demonstrate your commitment to information security.<\/li>\n<li class=\"li1\"><span class=\"s1\"><\/span>Improve your reputation: Gain the trust of your clients and partners.<\/li>\n<\/ul>\n<p class=\"p1\">In summary, the CIS Controls are a powerful tool to strengthen your organization\u2019s security and protect your most valuable assets.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Contact&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f6f2ea&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;df96b77a-cd4f-44a8-a771-2d6347592b53&#8243; header_2_font=&#8221;Poppins|600|||||||&#8221; header_2_text_color=&#8221;#19222c&#8221; header_2_font_size=&#8221;50px&#8221; header_2_line_height=&#8221;1.35em&#8221; custom_margin=&#8221;||8px||false|false&#8221; header_2_font_size_tablet=&#8221;32px&#8221; header_2_font_size_phone=&#8221;28px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><strong>ISO 27001 Consulting<\/strong><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#19222c&#8221; text_font_size=&#8221;18px&#8221; header_font=&#8221;Poppins||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"p1\">Cybersecurity is fundamental to protecting businesses from digital threats. Its goal is to establish a strong defense system that detects, prevents, and responds to cyberattacks.<\/p>\n<p class=\"p1\">To achieve this, organizations need clear policies and procedures that ensure the confidentiality, integrity, and availability of their information. These documents must align with international standards like ISO 27001.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_accordion open_toggle_text_color=&#8221;#000000&#8243; open_toggle_background_color=&#8221;#fbfbfb&#8221; closed_toggle_background_color=&#8221;#0ec2d3&#8243; toggle_icon=&#8221;&#x22;||divi||400&#8243; icon_color=&#8221;#FFFFFF&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;32px&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; toggle_text_color=&#8221;#FFFFFF&#8221; toggle_font=&#8221;Archivo|600|||||||&#8221; toggle_font_size=&#8221;18px&#8221; toggle_line_height=&#8221;1.2em&#8221; body_font=&#8221;Archivo||||||||&#8221; body_text_color=&#8221;#000000&#8243; toggle_font_size_tablet=&#8221;18px&#8221; toggle_font_size_phone=&#8221;16px&#8221; toggle_font_size_last_edited=&#8221;on|tablet&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_accordion_item title=&#8221;What is ISO 27001?&#8221; open=&#8221;on&#8221; open_toggle_text_color=&#8221;#19222c&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; body_font=&#8221;Poppins||||||||&#8221; body_text_color=&#8221;#19222c&#8221; border_color_all=&#8221;#19222c&#8221; global_colors_info=&#8221;{}&#8221; toggle_font=&#8221;Poppins|600|||||||&#8221; closed_toggle_font=&#8221;Poppins||||||||&#8221;]<\/p>\n<p class=\"p1\">ISO 27001 is a globally recognized standard that provides a framework for implementing and managing an Information Security Management System (ISMS). By complying with this standard, organizations demonstrate their commitment to protecting their data and digital assets.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;How do we help you?&#8221; open_toggle_text_color=&#8221;#19222c&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; body_font=&#8221;Poppins||||||||&#8221; body_text_color=&#8221;#19222c&#8221; border_color_all=&#8221;#19222c&#8221; global_colors_info=&#8221;{}&#8221; toggle_font=&#8221;Poppins|600|||||||&#8221; closed_toggle_font=&#8221;Poppins||||||||&#8221; open=&#8221;off&#8221;]<\/p>\n<p class=\"p1\">Our ISO 27001 Consulting service supports you throughout the process of creating, updating, and reviewing your security documents. We offer:<\/p>\n<p class=\"p2\">\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s1\"><\/span>Tailored to your needs: We create personalized solutions that fit your organization&#8217;s unique characteristics.<\/li>\n<li class=\"li1\"><span class=\"s1\"><\/span>Continuous improvement: We promote a proactive approach to effectively identify and manage risks.<\/li>\n<li class=\"li1\"><span class=\"s1\"><\/span>Regulatory compliance: We ensure you comply with ISO 27001 requirements and other applicable regulations.<\/li>\n<li class=\"li1\"><span class=\"s1\"><\/span>Business protection: We reduce the likelihood and impact of security incidents.<\/li>\n<\/ul>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Why is ISO 27001 important?&#8221; open_toggle_text_color=&#8221;#19222c&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; body_font=&#8221;Poppins||||||||&#8221; body_text_color=&#8221;#19222c&#8221; border_color_all=&#8221;#19222c&#8221; global_colors_info=&#8221;{}&#8221; toggle_font=&#8221;Poppins|600|||||||&#8221; closed_toggle_font=&#8221;Poppins||||||||&#8221; open=&#8221;off&#8221;]<\/p>\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s1\"><\/span>Trust: Show your clients, partners, and employees that you take information security seriously.<\/li>\n<li class=\"li1\"><span class=\"s1\"><\/span>Asset protection: Keep your most valuable data safe.<\/li>\n<li class=\"li1\"><span class=\"s1\"><\/span>Legal compliance: Avoid penalties and fines.<\/li>\n<li class=\"li1\"><span class=\"s1\"><\/span>Process improvement: Optimize your operations and reduce costs.<\/li>\n<\/ul>\n<p class=\"p2\">\n<p class=\"p1\">In summary, ISO 27001 is an investment in your business\u2019s security. With our help, you can build a solid and reliable cyber defense system.<\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Image&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#fbfbfb&#8221; background_image=&#8221;http:\/\/lanhax.com\/wp-content\/uploads\/2024\/02\/fondo-lanhax2.png&#8221; background_position=&#8221;top_center&#8221; custom_padding=&#8221;12vw||0px||false|false&#8221; background_last_edited=&#8221;on|phone&#8221; background_size_tablet=&#8221;contain&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;http:\/\/lanhax.com\/wp-content\/uploads\/2024\/02\/descanso-lanhax.png&#8221; title_text=&#8221;descanso-lanhax&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Subscribe&#8221; module_id=&#8221;contacto&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#fbfbfb&#8221; background_enable_image=&#8221;off&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;bottom_center&#8221; background_last_edited=&#8221;off|desktop&#8221; background_size_tablet=&#8221;contain&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;800px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.1&#8243; _module_preset=&#8221;534cc526-6274-4e31-9e1a-7f18a5947bf1&#8243; header_4_font=&#8221;Poppins|700||on|||||&#8221; header_4_text_color=&#8221;#1b5d6b&#8221; header_4_font_size=&#8221;14px&#8221; header_4_letter_spacing=&#8221;2px&#8221; header_4_line_height=&#8221;1.5em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>contact<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.1&#8243; _module_preset=&#8221;df96b77a-cd4f-44a8-a771-2d6347592b53&#8243; header_2_font=&#8221;Poppins|600|||||||&#8221; header_2_text_color=&#8221;#19222c&#8221; header_2_font_size=&#8221;50px&#8221; header_2_line_height=&#8221;1.35em&#8221; text_orientation=&#8221;center&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||8px||false|false&#8221; header_2_font_size_tablet=&#8221;32px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 class=\"font-18 regular text-primary text-center\"><strong>Are you interested in any of our Services or Solutions?<\/strong><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.1&#8243; _module_preset=&#8221;41d5859c-fbaa-458a-88e4-5d886857f235&#8243; text_font=&#8221;Poppins|500|||||||&#8221; text_text_color=&#8221;#19222c&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.6em&#8221; text_orientation=&#8221;center&#8221; module_alignment=&#8221;center&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p dir=\"ltr\"><span>Write to us now and you won&#8217;t even realize how quickly we will contact you.<\/span><\/p>\n<p dir=\"ltr\"><span>This is the first step to be your partner in Cybersecurity.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_contact_form use_spam_service=&#8221;on&#8221; recaptcha_list=&#8221;lanhax-0&#8243; email=&#8221;info@lanhax.com&#8221; custom_message=&#8221;Correo enviado atraves del formulario de contacto de www.lanhax.com||et_pb_line_break_holder||||et_pb_line_break_holder||Nombre: %%Normbre%%||et_pb_line_break_holder||Mail: %%Email%%||et_pb_line_break_holder||Tel\u00e9fono: %%Telefono%%||et_pb_line_break_holder||Empresa: %%Nombre_Empresa%%||et_pb_line_break_holder||Mensaje: %%Mensaje%%&#8221; success_message=&#8221;Message sent succesfully.&#8221; submit_button_text=&#8221;Send&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; _unique_id=&#8221;a3b27168-a07b-43c3-be47-c38fadfb6d8c&#8221; form_field_background_color=&#8221;#FFFFFF&#8221; title_level=&#8221;h2&#8243; title_font=&#8221;Poppins||||||||&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;20px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#1b5d6b&#8221; button_border_color=&#8221;#19222c&#8221; button_border_radius=&#8221;0px&#8221; button_font=&#8221;Poppins||||||||&#8221; border_width_all=&#8221;2px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_contact_field field_id=&#8221;Nombre&#8221; field_title=&#8221;Name&#8221; _builder_version=&#8221;4.24.1&#8243; form_field_font=&#8221;Poppins||||||||&#8221; border_color_all=&#8221;#19222c&#8221; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Email&#8221; field_title=&#8221;E-mail&#8221; field_type=&#8221;email&#8221; _builder_version=&#8221;4.25.0&#8243; form_field_font=&#8221;Poppins||||||||&#8221; border_color_all=&#8221;#19222c&#8221; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Telefono&#8221; field_title=&#8221;Phone&#8221; allowed_symbols=&#8221;numbers&#8221; _builder_version=&#8221;4.24.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Nombre_Empresa&#8221; field_title=&#8221;Company&#8221; _builder_version=&#8221;4.24.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Mensaje&#8221; field_title=&#8221;Message&#8221; field_type=&#8221;text&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.24.1&#8243; form_field_font=&#8221;Poppins||||||||&#8221; border_color_all=&#8221;#19222c&#8221; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>LANHAXWe are dedicated to overseeing the entire process of a cyber attack. We want to be your ally in cybersecurity, working closely with you so you can see that we operate together as a unified team.PREVENTIONFrom the start, we stand by your side to provide guidance and furnish you with essential tools for your protection. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-14","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/lanhax.com\/es\/wp-json\/wp\/v2\/pages\/14","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lanhax.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/lanhax.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/lanhax.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lanhax.com\/es\/wp-json\/wp\/v2\/comments?post=14"}],"version-history":[{"count":282,"href":"https:\/\/lanhax.com\/es\/wp-json\/wp\/v2\/pages\/14\/revisions"}],"predecessor-version":[{"id":800,"href":"https:\/\/lanhax.com\/es\/wp-json\/wp\/v2\/pages\/14\/revisions\/800"}],"wp:attachment":[{"href":"https:\/\/lanhax.com\/es\/wp-json\/wp\/v2\/media?parent=14"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}