[{"data":1,"prerenderedAt":323},["ShallowReactive",2],{"vF6ce30087":3,"FVKFkmThXl":29,"VoZzVYDLtI":43,"pWerYMK3Rd":67,"BlXPQ5G11M":84,"r6ZPWwsNpE":101,"8obHQo6HIo":118,"8sMTHfVuIO":129,"N2NWepdos5":143,"8WCR0T0chT":157,"47DEQpj8HB":174,"rvxe0rG0Ow":180,"7tgMnZfG2u":212,"mBVAZZt47M":229,"f7pC5HFufS":248,"HTSOox3oYZ":272,"jRZh5zkKtA":288,"UlklaDxV7Q":299},{"data":4,"body":7,"excerpt":-1,"toc":26},{"title":5,"description":6},"","Omniac: Cyber Intelligence para su empresa",{"type":8,"children":9},"root",[10],{"type":11,"tag":12,"props":13,"children":14},"element","p",{},[15,18,24],{"type":16,"value":17},"text","Omniac: ",{"type":11,"tag":19,"props":20,"children":21},"strong",{},[22],{"type":16,"value":23},"Cyber Intelligence",{"type":16,"value":25}," para su empresa",{"title":5,"searchDepth":27,"depth":27,"links":28},2,[],{"data":30,"body":32,"excerpt":-1,"toc":41},{"title":5,"description":31},"Detecte la suplantación de identidades y el robo de datos a tiempo. Identifique superficies de ataque globales antes de que los ciberdelincuentes puedan actuar.",{"type":8,"children":33},[34],{"type":11,"tag":12,"props":35,"children":36},{},[37],{"type":11,"tag":19,"props":38,"children":39},{},[40],{"type":16,"value":31},{"title":5,"searchDepth":27,"depth":27,"links":42},[],{"data":44,"body":46,"excerpt":-1,"toc":65},{"title":5,"description":45},"Omniac supervisa de forma continua los datos de acceso expuestos en Internet y en la Dark Web, así como las superficies de ataque externas mediante métodos no invasivos. Le informamos de inmediato sobre identidades robadas, la TI invisible (\"shadow IT\") y puntos vulnerables.",{"type":8,"children":47},[48,52],{"type":11,"tag":12,"props":49,"children":50},{},[51],{"type":16,"value":45},{"type":11,"tag":12,"props":53,"children":54},{},[55,57,63],{"type":16,"value":56},"De este modo, evitará secuestros de cuentas (\"Account Take Over ",{"type":11,"tag":58,"props":59,"children":60},"span",{},[61],{"type":16,"value":62},"ATO",{"type":16,"value":64},"\") y reforzará su postura de defensa.",{"title":5,"searchDepth":27,"depth":27,"links":66},[],{"data":68,"body":70,"excerpt":-1,"toc":82},{"title":5,"description":69},"Todos los sectores. En todo el mundo.",{"type":8,"children":71},[72],{"type":11,"tag":12,"props":73,"children":74},{},[75,77],{"type":16,"value":76},"Todos los sectores. ",{"type":11,"tag":19,"props":78,"children":79},{},[80],{"type":16,"value":81},"En todo el mundo.",{"title":5,"searchDepth":27,"depth":27,"links":83},[],{"data":85,"body":87,"excerpt":-1,"toc":99},{"title":5,"description":86},"Sus ventajas",{"type":8,"children":88},[89],{"type":11,"tag":12,"props":90,"children":91},{},[92,94],{"type":16,"value":93},"Sus ",{"type":11,"tag":19,"props":95,"children":96},{},[97],{"type":16,"value":98},"ventajas",{"title":5,"searchDepth":27,"depth":27,"links":100},[],{"data":102,"body":104,"excerpt":-1,"toc":116},{"title":5,"description":103},"360° Cyber Threat Intelligence y protección de la identidad",{"type":8,"children":105},[106],{"type":11,"tag":12,"props":107,"children":108},{},[109,114],{"type":11,"tag":19,"props":110,"children":111},{},[112],{"type":16,"value":113},"360° Cyber Threat Intelligence",{"type":16,"value":115}," y protección de la identidad",{"title":5,"searchDepth":27,"depth":27,"links":117},[],{"data":119,"body":121,"excerpt":-1,"toc":127},{"title":5,"description":120},"Gestión de la superficie de ataque externa (EASM)",{"type":8,"children":122},[123],{"type":11,"tag":12,"props":124,"children":125},{},[126],{"type":16,"value":120},{"title":5,"searchDepth":27,"depth":27,"links":128},[],{"data":130,"body":132,"excerpt":-1,"toc":141},{"title":5,"description":131},"Inteligencia de credenciales y prevención del secuestro de cuentas (ATO)",{"type":8,"children":133},[134],{"type":11,"tag":12,"props":135,"children":136},{},[137],{"type":11,"tag":19,"props":138,"children":139},{},[140],{"type":16,"value":131},{"title":5,"searchDepth":27,"depth":27,"links":142},[],{"data":144,"body":146,"excerpt":-1,"toc":155},{"title":5,"description":145},"Protección ante riesgos digitales",{"type":8,"children":147},[148],{"type":11,"tag":12,"props":149,"children":150},{},[151],{"type":11,"tag":19,"props":152,"children":153},{},[154],{"type":16,"value":145},{"title":5,"searchDepth":27,"depth":27,"links":156},[],{"data":158,"body":160,"excerpt":-1,"toc":172},{"title":5,"description":159},"Supervisión de datos mediante panel web y API",{"type":8,"children":161},[162],{"type":11,"tag":12,"props":163,"children":164},{},[165,167],{"type":16,"value":166},"Supervisión de datos mediante ",{"type":11,"tag":19,"props":168,"children":169},{},[170],{"type":16,"value":171},"panel web y API",{"title":5,"searchDepth":27,"depth":27,"links":173},[],{"data":175,"body":176,"excerpt":-1,"toc":178},{"title":5,"description":5},{"type":8,"children":177},[],{"title":5,"searchDepth":27,"depth":27,"links":179},[],{"data":181,"body":183,"excerpt":-1,"toc":210},{"title":5,"description":182},"Panel web",{"type":8,"children":184},[185,192,197,205],{"type":11,"tag":12,"props":186,"children":187},{},[188],{"type":11,"tag":19,"props":189,"children":190},{},[191],{"type":16,"value":182},{"type":11,"tag":12,"props":193,"children":194},{},[195],{"type":16,"value":196},"Gracias a nuestro panel, puede definir los datos y ámbitos que desea supervisar. Los resultados de los análisis no invasivos, realizados varias veces al día, se muestran en paneles claros e intuitivos; además, puede configurar alertas automáticas y analizar los datos sin procesar. Mantenga en todo momento la visibilidad de su estado de amenazas, sin necesidad de destinar esfuerzo a integrar soluciones adicionales.",{"type":11,"tag":12,"props":198,"children":199},{},[200],{"type":11,"tag":19,"props":201,"children":202},{},[203],{"type":16,"value":204},"Conectividad individual (API)",{"type":11,"tag":12,"props":206,"children":207},{},[208],{"type":16,"value":209},"Automatice con nuestra API la supervisión continua de los datos personales de sus empleados y clientes en la Darknet, la Deep Web e Internet. Con el fin de realizar una integración individual en su infraestructura tecnológica ya existente, ponemos a su disposición una API completamente documentada y le acompañamos durante su implementación.",{"title":5,"searchDepth":27,"depth":27,"links":211},[],{"data":213,"body":215,"excerpt":-1,"toc":227},{"title":5,"description":214},"Omniac supervisa todos los dominios de su empresa y de sus socios.",{"type":8,"children":216},[217],{"type":11,"tag":12,"props":218,"children":219},{},[220,222],{"type":16,"value":221},"Omniac supervisa ",{"type":11,"tag":19,"props":223,"children":224},{},[225],{"type":16,"value":226},"todos los dominios de su empresa y de sus socios.",{"title":5,"searchDepth":27,"depth":27,"links":228},[],{"data":230,"body":232,"excerpt":-1,"toc":246},{"title":5,"description":231},"Gracias a su panel web, puede mantiene el estado de amenazas bajo control en todo momento.",{"type":8,"children":233},[234],{"type":11,"tag":12,"props":235,"children":236},{},[237,239,244],{"type":16,"value":238},"Gracias a su ",{"type":11,"tag":19,"props":240,"children":241},{},[242],{"type":16,"value":243},"panel web",{"type":16,"value":245},", puede mantiene el estado de amenazas bajo control en todo momento.",{"title":5,"searchDepth":27,"depth":27,"links":247},[],{"data":249,"body":251,"excerpt":-1,"toc":270},{"title":5,"description":250},"Sus datos. Nuestra responsabilidad.",{"type":8,"children":252},[253],{"type":11,"tag":12,"props":254,"children":255},{},[256,261,263,268],{"type":11,"tag":19,"props":257,"children":258},{},[259],{"type":16,"value":260},"Sus",{"type":16,"value":262}," datos. ",{"type":11,"tag":19,"props":264,"children":265},{},[266],{"type":16,"value":267},"Nuestra",{"type":16,"value":269}," responsabilidad.",{"title":5,"searchDepth":27,"depth":27,"links":271},[],{"data":273,"body":275,"excerpt":-1,"toc":286},{"title":5,"description":274},"Cumplimos totalmente con los requisitos del Reglamento General de Protección de Datos (RGPD) europeo y no tenemos ningún acceso a los datos que introduce o difunde.",{"type":8,"children":276},[277,281],{"type":11,"tag":12,"props":278,"children":279},{},[280],{"type":16,"value":274},{"type":11,"tag":12,"props":282,"children":283},{},[284],{"type":16,"value":285},"En la app de Omniac, hacemos \"hashing\", enmascaramos y ciframos sus datos, tanto durante la transmisión como en el almacenamiento. Desarrollamos y operamos en la nube segura de STACKIT en Alemania.",{"title":5,"searchDepth":27,"depth":27,"links":287},[],{"data":289,"body":291,"excerpt":-1,"toc":297},{"title":5,"description":290},"¿Su empresa está preparada para omniac Cyber Intelligence?",{"type":8,"children":292},[293],{"type":11,"tag":12,"props":294,"children":295},{},[296],{"type":16,"value":290},{"title":5,"searchDepth":27,"depth":27,"links":298},[],{"data":300,"body":302,"excerpt":-1,"toc":321},{"title":5,"description":301},"Detecte el robo de datos. Prevenga el fraude. Refuerce la confianza.",{"type":8,"children":303},[304,311,316],{"type":11,"tag":12,"props":305,"children":306},{},[307],{"type":11,"tag":19,"props":308,"children":309},{},[310],{"type":16,"value":301},{"type":11,"tag":12,"props":312,"children":313},{},[314],{"type":16,"value":315},"Póngase en contacto con nosotros para obtener información detallada sobre la cobertura de las prestaciones, las capacidades de integración y los precios.\nEsperamos poder conversar con usted.",{"type":11,"tag":12,"props":317,"children":318},{},[319],{"type":16,"value":320},"Envíenos un correo electrónico a:",{"title":5,"searchDepth":27,"depth":27,"links":322},[],1773847732791]