{"id":44,"date":"2024-08-28T12:29:29","date_gmt":"2024-08-28T15:29:29","guid":{"rendered":"https:\/\/rufus.com.ar\/?page_id=44"},"modified":"2025-11-11T08:58:20","modified_gmt":"2025-11-11T11:58:20","slug":"home","status":"publish","type":"page","link":"https:\/\/rufus.com.ar\/","title":{"rendered":"Home"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"44\" class=\"elementor elementor-44\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-22e10db9 cyber-security-elementor-banner-section e-flex e-con-boxed e-con e-parent\" data-id=\"22e10db9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-76863a69 e-con-full banner-section-column1 e-flex e-con e-child\" data-id=\"76863a69\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-77b2a4f elementor-widget elementor-widget-heading\" data-id=\"77b2a4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Bienvenido a<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c5db0ad elementor-widget elementor-widget-text-editor\" data-id=\"6c5db0ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Consultores en ciberseguridad<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25350af0 elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"25350af0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Descubriendo los secretos de la seguridad digital<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50763d6 elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"50763d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"mailto:gerencia@mundoit.com.ar\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Descubra m\u00e1s<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-16420555 banner-section-column2 e-flex e-con-boxed e-con e-child\" data-id=\"16420555\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3271612c elementor-widget elementor-widget-image\" data-id=\"3271612c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.rsa.com\/id-iq\/\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"905\" height=\"573\" src=\"https:\/\/rufus.com.ar\/wp-content\/uploads\/2025\/11\/rsa.png\" class=\"attachment-full size-full wp-image-111\" alt=\"\" srcset=\"https:\/\/rufus.com.ar\/wp-content\/uploads\/2025\/11\/rsa.png 905w, https:\/\/rufus.com.ar\/wp-content\/uploads\/2025\/11\/rsa-300x190.png 300w, https:\/\/rufus.com.ar\/wp-content\/uploads\/2025\/11\/rsa-768x486.png 768w\" sizes=\"(max-width: 905px) 100vw, 905px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2cf879c0 cyber-security-elementor-service-section e-flex e-con-boxed e-con e-parent\" data-id=\"2cf879c0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e172e2e elementor-widget elementor-widget-heading\" data-id=\"e172e2e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Nuestro Servicio<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63e5f5a9 elementor-widget elementor-widget-heading\" data-id=\"63e5f5a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Lo que ofrecemos<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10a72d60 elementor-widget elementor-widget-text-editor\" data-id=\"10a72d60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Test de Penetraci\u00f3n<\/strong><br \/>Consiste en la ejecuci\u00f3n de ataques de impacto controlado sobre la infraestructura a evaluar, simulando las capacidades de un atacante experimentado, permitiendo detectar vulnerabilidades explotables y subsanarlas antes que sean abusadas por ofensores.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d49c70 elementor-widget elementor-widget-text-editor\" data-id=\"1d49c70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>API Testing<br \/>An\u00e1lisis de postura de seguridad de APIs. Las herramientas automatizadas fallan en detectar un amplio rango de vulnerabilidades, en particular las relacionadas con el modelo de autorizaci\u00f3n y con l\u00f3gica de negocio. La experiencia de nuestros testers en detectar tales vulnerabilidades ayudar\u00e1 a mejorar la postura de seguridad de la API, preservando los datos del negocio.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-acfeb44 elementor-widget elementor-widget-text-editor\" data-id=\"acfeb44\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An\u00e1lisis de Seguridad de Aplicaciones y Servicios<br \/>Realizamos un an\u00e1lisis de inclusi\u00f3n de requerimientos de seguridad, de dise\u00f1o y empleo de arquitecturas seguras y de implementaci\u00f3n en c\u00f3digo seguro de aplicaciones desarrolladas por terceros o in-house. La auditor\u00eda de seguridad de c\u00f3digo fuente permite detectar vulnerabilidades antes de que sean expuestas, cuando el c\u00f3digo se pasa a producci\u00f3n.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb91061 e-flex e-con-boxed e-con e-parent\" data-id=\"eb91061\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1468582 elementor-widget elementor-widget-video\" data-id=\"1468582\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/eJBfL7OOv8k?si=L94iUeFW07bil-M2&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Bienvenido a Consultores en ciberseguridad Descubriendo los secretos de la seguridad digital Descubra m\u00e1s Nuestro Servicio Lo que ofrecemos Test de Penetraci\u00f3nConsiste en la ejecuci\u00f3n de ataques de impacto controlado sobre la infraestructura a evaluar, simulando las capacidades de un atacante experimentado, permitiendo detectar vulnerabilidades explotables y subsanarlas antes que sean abusadas por ofensores. API [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/frontpage.php","meta":{"_eb_attr":"","footnotes":""},"class_list":["post-44","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/rufus.com.ar\/index.php?rest_route=\/wp\/v2\/pages\/44","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rufus.com.ar\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/rufus.com.ar\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/rufus.com.ar\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rufus.com.ar\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=44"}],"version-history":[{"count":27,"href":"https:\/\/rufus.com.ar\/index.php?rest_route=\/wp\/v2\/pages\/44\/revisions"}],"predecessor-version":[{"id":121,"href":"https:\/\/rufus.com.ar\/index.php?rest_route=\/wp\/v2\/pages\/44\/revisions\/121"}],"wp:attachment":[{"href":"https:\/\/rufus.com.ar\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=44"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}