{"id":51772,"date":"2025-11-10T15:31:51","date_gmt":"2025-11-10T13:31:51","guid":{"rendered":"https:\/\/sotecdev.wpenginepowered.com\/seguridad-de-la-informacion\/"},"modified":"2026-01-12T18:00:12","modified_gmt":"2026-01-12T16:00:12","slug":"information-security","status":"publish","type":"page","link":"https:\/\/sotec-consulting.com\/en\/information-security\/","title":{"rendered":"Information Security"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_enable_image=&#8221;off&#8221; background_position=&#8221;center_left&#8221; background_enable_video_mp4=&#8221;off&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;2560px&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_code _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; raw_content__hover_enabled=&#8221;off|desktop&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"banniere-video\"><!-- [et_pb_line_break_holder] -->  <video autoplay muted loop playsinline><!-- [et_pb_line_break_holder] --><source src=\"https:\/\/sotec-consulting.com\/wp-content\/uploads\/2026\/01\/information-security.mp4\" type=\"video\/mp4\"><!-- [et_pb_line_break_holder] --><\/video><!-- [et_pb_line_break_holder] --><\/div>\n<p><!-- [et_pb_line_break_holder] -->[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;10px||10px||true|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<span><span><a href=\"https:\/\/sotec-consulting.com\/en\/\">Home<\/a><\/span><\/span>[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; next_background_color=&#8221;#ffffff&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#000000&#8243; bottom_divider_style=&#8221;arrow&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1 style=\"text-align: center;\">We protect the business of our costumers<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#00C072&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">We bet on information security by offering innovative services so that your company is safe.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]Our objectives are the prevention and risk management of organizations with the aim of guaranteeing the effective development of the business. We focus on the protection of digital assets of greater value and critical for organizations, their location and we focus as a priority on prevention.<\/p>\n<p>We apply a new model of Cybersecurity: we become the trusted partner for managing the security of our customers, leading to confidence in new technologies, critical infrastructures and users[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb image=&#8221;https:\/\/sotec-consulting.com\/wp-content\/uploads\/2025\/11\/consultoria_seguridad_forense.png&#8221; image_icon_width=&#8221;125px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; body_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Forensic security consulting<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb image=&#8221;https:\/\/sotec-consulting.com\/wp-content\/uploads\/2025\/11\/consultoria_arquitecturas_seguridad.png&#8221; image_icon_width=&#8221;125px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; body_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Consulting security architecture<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb image=&#8221;https:\/\/sotec-consulting.com\/wp-content\/uploads\/2025\/11\/deteccion_intrusos.png&#8221; image_icon_width=&#8221;125px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; body_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Detection systems<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb image=&#8221;https:\/\/sotec-consulting.com\/wp-content\/uploads\/2025\/11\/aislamiento_de_activos.png&#8221; image_icon_width=&#8221;65px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; body_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Asset isolation<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb image=&#8221;https:\/\/sotec-consulting.com\/wp-content\/uploads\/2025\/11\/entornos_scada.png&#8221; image_icon_width=&#8221;125px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; body_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>SCADA environments<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb image=&#8221;https:\/\/sotec-consulting.com\/wp-content\/uploads\/2025\/11\/codigo_malicioso_analisis_APT.png&#8221; image_icon_width=&#8221;125px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; body_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>APT malware analysis<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb image=&#8221;https:\/\/sotec-consulting.com\/wp-content\/uploads\/2025\/11\/gestion_identidades.png&#8221; image_icon_width=&#8221;125px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; body_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Reduce the inherent risk in the innovation process<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p><span><span><a href=\"https:\/\/sotec-consulting.com\/en\/\">Home<\/a><\/span><\/span>We protect the business of our costumersWe bet on information security by offering innovative services so that your company is safe.Our objectives are the prevention and risk management of organizations with the aim of guaranteeing the effective development of the business. We focus on the protection of digital assets of greater value and critical for [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-51772","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Security - Sotec<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sotec-consulting.com\/en\/information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security - Sotec\" \/>\n<meta property=\"og:description\" content=\"We protect the business of our costumersWe bet on information security by offering innovative services so that your company is safe.Our objectives are the prevention and risk management of organizations with the aim of guaranteeing the effective development of the business. We focus on the protection of digital assets of greater value and critical for [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sotec-consulting.com\/en\/information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Sotec\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-12T16:00:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sotec-consulting.com\/wp-content\/uploads\/2025\/11\/logo_sotec_horizonta.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2423\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sotec-consulting.com\\\/en\\\/information-security\\\/\",\"url\":\"https:\\\/\\\/sotec-consulting.com\\\/en\\\/information-security\\\/\",\"name\":\"Information Security - Sotec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sotec-consulting.com\\\/en\\\/#website\"},\"datePublished\":\"2025-11-10T13:31:51+00:00\",\"dateModified\":\"2026-01-12T16:00:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sotec-consulting.com\\\/en\\\/information-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sotec-consulting.com\\\/en\\\/information-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sotec-consulting.com\\\/en\\\/information-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sotec-consulting.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sotec-consulting.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/sotec-consulting.com\\\/en\\\/\",\"name\":\"Sotec\",\"description\":\"Sotec\",\"publisher\":{\"@id\":\"https:\\\/\\\/sotec-consulting.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sotec-consulting.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sotec-consulting.com\\\/en\\\/#organization\",\"name\":\"Sotec\",\"alternateName\":\"Sotec\",\"url\":\"https:\\\/\\\/sotec-consulting.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sotec-consulting.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sotec-consulting.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/logo_sotec_horizonta.png\",\"contentUrl\":\"https:\\\/\\\/sotec-consulting.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/logo_sotec_horizonta.png\",\"width\":2423,\"height\":1080,\"caption\":\"Sotec\"},\"image\":{\"@id\":\"https:\\\/\\\/sotec-consulting.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security - Sotec","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sotec-consulting.com\/en\/information-security\/","og_locale":"en_US","og_type":"article","og_title":"Information Security - Sotec","og_description":"We protect the business of our costumersWe bet on information security by offering innovative services so that your company is safe.Our objectives are the prevention and risk management of organizations with the aim of guaranteeing the effective development of the business. We focus on the protection of digital assets of greater value and critical for [&hellip;]","og_url":"https:\/\/sotec-consulting.com\/en\/information-security\/","og_site_name":"Sotec","article_modified_time":"2026-01-12T16:00:12+00:00","og_image":[{"width":2423,"height":1080,"url":"https:\/\/sotec-consulting.com\/wp-content\/uploads\/2025\/11\/logo_sotec_horizonta.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sotec-consulting.com\/en\/information-security\/","url":"https:\/\/sotec-consulting.com\/en\/information-security\/","name":"Information Security - Sotec","isPartOf":{"@id":"https:\/\/sotec-consulting.com\/en\/#website"},"datePublished":"2025-11-10T13:31:51+00:00","dateModified":"2026-01-12T16:00:12+00:00","breadcrumb":{"@id":"https:\/\/sotec-consulting.com\/en\/information-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sotec-consulting.com\/en\/information-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sotec-consulting.com\/en\/information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sotec-consulting.com\/en\/"},{"@type":"ListItem","position":2,"name":"Information Security"}]},{"@type":"WebSite","@id":"https:\/\/sotec-consulting.com\/en\/#website","url":"https:\/\/sotec-consulting.com\/en\/","name":"Sotec","description":"Sotec","publisher":{"@id":"https:\/\/sotec-consulting.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sotec-consulting.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sotec-consulting.com\/en\/#organization","name":"Sotec","alternateName":"Sotec","url":"https:\/\/sotec-consulting.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sotec-consulting.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/sotec-consulting.com\/wp-content\/uploads\/2025\/11\/logo_sotec_horizonta.png","contentUrl":"https:\/\/sotec-consulting.com\/wp-content\/uploads\/2025\/11\/logo_sotec_horizonta.png","width":2423,"height":1080,"caption":"Sotec"},"image":{"@id":"https:\/\/sotec-consulting.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/sotec-consulting.com\/en\/wp-json\/wp\/v2\/pages\/51772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sotec-consulting.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sotec-consulting.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sotec-consulting.com\/en\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/sotec-consulting.com\/en\/wp-json\/wp\/v2\/comments?post=51772"}],"version-history":[{"count":0,"href":"https:\/\/sotec-consulting.com\/en\/wp-json\/wp\/v2\/pages\/51772\/revisions"}],"wp:attachment":[{"href":"https:\/\/sotec-consulting.com\/en\/wp-json\/wp\/v2\/media?parent=51772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}