{"id":28,"date":"2013-01-22T18:54:12","date_gmt":"2013-01-22T17:54:12","guid":{"rendered":"https:\/\/dsav.net\/web\/?page_id=28"},"modified":"2024-12-09T15:49:46","modified_gmt":"2024-12-09T14:49:46","slug":"seguridad-en-la-red-cortafuegos-utm-prevencion-de-intrusismo","status":"publish","type":"page","link":"https:\/\/dsav.net\/index.php\/productos\/seguridad-en-la-red-cortafuegos-utm-prevencion-de-intrusismo\/","title":{"rendered":"Seguridad en la red"},"content":{"rendered":"<p><a href=\"https:\/\/dsav.net\/wp-content\/uploads\/2024\/12\/linea-McAf-Trell-Skyg.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1799 size-full colorbox-28\" src=\"https:\/\/dsav.net\/wp-content\/uploads\/2024\/12\/linea-McAf-Trell-Skyg.jpg\" alt=\"\" width=\"920\" height=\"60\" srcset=\"https:\/\/dsav.net\/wp-content\/uploads\/2024\/12\/linea-McAf-Trell-Skyg.jpg 920w, https:\/\/dsav.net\/wp-content\/uploads\/2024\/12\/linea-McAf-Trell-Skyg-300x20.jpg 300w, https:\/\/dsav.net\/wp-content\/uploads\/2024\/12\/linea-McAf-Trell-Skyg-768x50.jpg 768w\" sizes=\"auto, (max-width: 920px) 100vw, 920px\" \/><\/a><\/p>\n<ul style=\"list-style-type: square;\">\n<li><u><b>Trellix Network Security Platform:<\/b> Protecci\u00f3n por IPS (Intrusion Prevention System) y rendimiento incomparables.<\/u><\/li>\n<li><b>Trellix Virtual Network Security Platform:<\/b> Protecci\u00f3n inteligente frente a amenazas para redes virtuales<\/li>\n<li><b>Trellix Advanced Threat Defense: <\/b>Detecci\u00f3n avanzada del malware sigiloso tipo zero-day.<\/li>\n<li><u><b>Trellix Investigator: <\/b>Detecci\u00f3n de amenazas, investigaci\u00f3n y respuesta potentes y simplificadas.<\/u><\/li>\n<li><b>Trellix Advanced Threat Defense: <\/b>Detecci\u00f3n avanzada del malware sigiloso tipo zero-day.<\/li>\n<li><b>Trellix SIEM:<\/b> Informaci\u00f3n de seguridad y administraci\u00f3n de eventos.<\/li>\n<li><b>Trellix Active Response:<\/b> Detecci\u00f3n y respuesta global frente amenazas para endpoints.<\/li>\n<li><b>Trellix MVISION EDR:<\/b> Detecci\u00f3n de amenazas, investigaci\u00f3n y respuesta potentes y simplificadas.<\/li>\n<\/ul>\n<p><a class=\"cboxElement\" href=\"https:\/\/dsav.net\/wp-content\/uploads\/2019\/06\/linea-KAS.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"colorbox-245 alignnone wp-image-1458 size-full\" src=\"https:\/\/dsav.net\/wp-content\/uploads\/2019\/06\/linea-KAS.jpg\" alt=\"\" width=\"920\" height=\"60\" srcset=\"https:\/\/dsav.net\/wp-content\/uploads\/2019\/06\/linea-KAS.jpg 920w, https:\/\/dsav.net\/wp-content\/uploads\/2019\/06\/linea-KAS-300x20.jpg 300w, https:\/\/dsav.net\/wp-content\/uploads\/2019\/06\/linea-KAS-768x50.jpg 768w\" sizes=\"auto, (max-width: 920px) 100vw, 920px\" \/><\/a><\/p>\n<ul>\n<li><a href=\"https:\/\/dsav.net\/wp-content\/uploads\/2018\/02\/KAS-EDR_ES.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Kaspersky Endpoint Detection and Response (EDR)<\/a><\/li>\n<\/ul>\n<ul style=\"list-style-type: square;\">\n<li><a href=\"https:\/\/dsav.net\/wp-content\/uploads\/2013\/01\/Cloud-folleto-ES.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Kaspersky Endpoint Security CLOUD<\/a><\/li>\n<li><a href=\"https:\/\/dsav.net\/wp-content\/uploads\/2013\/02\/Enterprise-catalogo-DSA.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Soluciones Enterprise (PDF)<\/a><\/li>\n<\/ul>\n<p><span style=\"text-decoration: underline;\"><strong><span style=\"color: #000000; text-decoration: underline;\"><a href=\"https:\/\/dsav.net\/wp-content\/uploads\/2019\/08\/linea-Eset.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1500 size-full colorbox-28\" src=\"https:\/\/dsav.net\/wp-content\/uploads\/2019\/08\/linea-Eset.jpg\" alt=\"\" width=\"920\" height=\"60\" srcset=\"https:\/\/dsav.net\/wp-content\/uploads\/2019\/08\/linea-Eset.jpg 920w, https:\/\/dsav.net\/wp-content\/uploads\/2019\/08\/linea-Eset-300x20.jpg 300w, https:\/\/dsav.net\/wp-content\/uploads\/2019\/08\/linea-Eset-768x50.jpg 768w\" sizes=\"auto, (max-width: 920px) 100vw, 920px\" \/><\/a><\/span><\/strong><\/span><\/p>\n<ul style=\"list-style-type: square;\">\n<li><a href=\"http:\/\/descargas.eset.es\/templates\/fichas_productos\/ESET_Secure_Enterprise.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #000000;\">ESET\u00a0Secure Enterprise<\/span><\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/dsav.net\/wp-content\/uploads\/2017\/04\/linea-Forcepoint.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1238 size-full colorbox-28\" src=\"https:\/\/dsav.net\/wp-content\/uploads\/2017\/04\/linea-Forcepoint.jpg\" alt=\"\" width=\"920\" height=\"60\" srcset=\"https:\/\/dsav.net\/wp-content\/uploads\/2017\/04\/linea-Forcepoint.jpg 920w, https:\/\/dsav.net\/wp-content\/uploads\/2017\/04\/linea-Forcepoint-300x20.jpg 300w, https:\/\/dsav.net\/wp-content\/uploads\/2017\/04\/linea-Forcepoint-768x50.jpg 768w\" sizes=\"auto, (max-width: 920px) 100vw, 920px\" \/><\/a><\/p>\n<p>Forcepoint New Generation Firewall (<a href=\"https:\/\/dsav.net\/wp-content\/uploads\/2017\/04\/Full-forcepoint.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">ficha t\u00e9cnica<\/a>)<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trellix Network Security Platform: Protecci\u00f3n por IPS (Intrusion Prevention System) y rendimiento incomparables. Trellix Virtual Network Security Platform: Protecci\u00f3n inteligente frente a amenazas para redes virtuales Trellix Advanced Threat Defense: Detecci\u00f3n avanzada del malware sigiloso tipo zero-day. Trellix Investigator: Detecci\u00f3n de amenazas, investigaci\u00f3n y respuesta potentes y simplificadas. Trellix Advanced Threat Defense: Detecci\u00f3n avanzada del &hellip; <\/p>\n<p><a class=\"more-link block-button\" href=\"https:\/\/dsav.net\/index.php\/productos\/seguridad-en-la-red-cortafuegos-utm-prevencion-de-intrusismo\/\">Continuar leyendo &raquo;<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"parent":5,"menu_order":3,"comment_status":"closed","ping_status":"open","template":"template-onecolumn.php","meta":{"footnotes":""},"class_list":["post-28","page","type-page","status-publish","hentry","nodate"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/dsav.net\/index.php\/wp-json\/wp\/v2\/pages\/28","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dsav.net\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dsav.net\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dsav.net\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/dsav.net\/index.php\/wp-json\/wp\/v2\/comments?post=28"}],"version-history":[{"count":0,"href":"https:\/\/dsav.net\/index.php\/wp-json\/wp\/v2\/pages\/28\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/dsav.net\/index.php\/wp-json\/wp\/v2\/pages\/5"}],"wp:attachment":[{"href":"https:\/\/dsav.net\/index.php\/wp-json\/wp\/v2\/media?parent=28"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}