{"id":115328,"date":"2021-03-10T12:43:29","date_gmt":"2021-03-10T17:43:29","guid":{"rendered":"https:\/\/www.een.com\/ciberseguridad-recursos\/"},"modified":"2021-03-11T08:47:47","modified_gmt":"2021-03-11T13:47:47","slug":"ciberseguridad-recursos","status":"publish","type":"page","link":"https:\/\/www.een.com\/es\/ciberseguridad-recursos\/","title":{"rendered":"Recursos de ciberseguridad de Eagle Eye Networks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"115328\" class=\"elementor elementor-115328 elementor-115180\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-206122fa elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"206122fa\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-202a6d8f\" data-id=\"202a6d8f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-386191e1 elementor-widget elementor-widget-heading\" data-id=\"386191e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Recursos de ciberseguridad\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30d0c6f3 elementor-widget elementor-widget-text-editor\" data-id=\"30d0c6f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6005711 elementor-widget elementor-widget-text-editor\" data-id=\"6005711\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-text-editor elementor-clearfix\">\n<p dir=\"ltr\">La ciberseguridad est\u00e1 en el ADN de Eagle Eye Networks. Desde nuestra fundaci\u00f3n, Eagle Eye Networks dedic\u00f3 importantes recursos a crear y mantener un nivel muy alto de ciberseguridad. A continuaci\u00f3n encontrar\u00e1 recursos que le ayudar\u00e1n a implementar nuestra soluci\u00f3n de videovigilancia segura en la nube.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5c1c2a09\" data-id=\"5c1c2a09\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1776af84 elementor-widget elementor-widget-image\" data-id=\"1776af84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"846\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/camera-cybersecurity-v2-1024x846.png\" class=\"attachment-large size-large wp-image-115261\" alt=\"security camera cybersecurity\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/camera-cybersecurity-v2-1024x846.png 1024w, https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/camera-cybersecurity-v2-300x248.png 300w, https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/camera-cybersecurity-v2.png 1129w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-58165f60 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"58165f60\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-79a90a1b\" data-id=\"79a90a1b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-39ea622 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"39ea622\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3ac8f51\" data-id=\"3ac8f51\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e43948 elementor-widget elementor-widget-text-editor\" data-id=\"3e43948\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>DOCUMENTACI\u00d3N T\u00c9CNICA<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed7f296 elementor-widget elementor-widget-text-editor\" data-id=\"ed7f296\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #606e81;\">Ciberseguridad y videovigilancia en la nube<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fdcb9f4 elementor-widget elementor-widget-text-editor\" data-id=\"fdcb9f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-size: 16px; font-style: normal; font-weight: 400;\">La seguridad de los sistemas de videovigilancia puede y debe ser abordada de forma m\u00e1s completa dentro de la industria para que la ciberseguridad no quede como un problema que deban resolver los instaladores o los clientes. Conozca c\u00f3mo Eagle Eye Networks mitiga los problemas de seguridad desde la investigaci\u00f3n, el desarrollo y la implantaci\u00f3n del producto.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9f63fc elementor-widget elementor-widget-button\" data-id=\"c9f63fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/Eagle-Eye-Networks-Cyber-Security-and-Cloud-Video-Surveillance-Whitepaper-20210308.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Leer ahora<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8672a64\" data-id=\"8672a64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4d3711b elementor-widget elementor-widget-text-editor\" data-id=\"4d3711b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>DOCUMENTACI\u00d3N T\u00c9CNICA<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74a8a17 elementor-widget elementor-widget-text-editor\" data-id=\"74a8a17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #606e81;\">Reduzca las Amenazas con el Bloqueo Cibern\u00e9tico de la C\u00e1mara<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e8036a elementor-widget elementor-widget-text-editor\" data-id=\"6e8036a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Eagle Eye Networks lanz\u00f3 la funci\u00f3n Eagle Eye Camera Cyber Lockdown en 2017.<span style=\"color: #000000;\">  Esta funci\u00f3n a\u00edsla las c\u00e1maras de Internet y las protege contra las intrusiones o interceptaciones de los hackers.<\/span><\/p>\n<div class=\"yj6qo ajU\"> <\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18ef820 elementor-widget elementor-widget-button\" data-id=\"18ef820\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.een.com\/wp-content\/uploads\/2019\/02\/Eagle-Eye-Networks-Camera-Cyber-Lockdown-White-Paper-20190201.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Leer ahora<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-51c9a8f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"51c9a8f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-57df9bc\" data-id=\"57df9bc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f48419e elementor-widget elementor-widget-text-editor\" data-id=\"f48419e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>INFORME<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e9457b elementor-widget elementor-widget-text-editor\" data-id=\"7e9457b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #606e81;\">Las 12 mejores pr\u00e1cticas para sistemas de c\u00e1maras de seguridad<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91403e3 elementor-widget elementor-widget-text-editor\" data-id=\"91403e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-size: 16px; font-style: normal; font-weight: 400;\">Las c\u00e1maras de seguridad est\u00e1n cada vez m\u00e1s conectadas a Internet, impulsadas en gran parte por la demanda de los clientes de tener acceso al v\u00eddeo a distancia. Con la aceleraci\u00f3n de los ciberataques, los integradores de seguridad f\u00edsica y el personal de soporte interno deben mantenerse al d\u00eda sobre los vectores de ataque a la ciberseguridad que pueden afectar a los sistemas de gesti\u00f3n de v\u00eddeo por c\u00e1mara que venden y\/o dan soporte.  <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb53b82 elementor-widget elementor-widget-button\" data-id=\"fb53b82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/12-Best-Practices-White-Paper-20210308-1.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Leer ahora<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c98cb39\" data-id=\"c98cb39\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-56deb8a elementor-widget elementor-widget-text-editor\" data-id=\"56deb8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>PORTAL DE APOYO<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-896f062 elementor-widget elementor-widget-text-editor\" data-id=\"896f062\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #606e81;\">Activar el modo de privacidad<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eda7506 elementor-widget elementor-widget-text-editor\" data-id=\"eda7506\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\" align-left\"><span style=\"color: #000000;\">El prop\u00f3sito del modo de privacidad es bloquear el acceso a las transmisiones de su c\u00e1mara a cualquier administrador, incluyendo revendedores o empleados de Eagle Eye, que puedan acceder a su cuenta. El modo de privacidad es una funci\u00f3n muy popular para los clientes que quieren ayuda administrativa, pero tienen preocupaciones legales o de privacidad sobre qui\u00e9n puede ver el v\u00eddeo real.<\/span><\/p>\n<div class=\"yj6qo ajU\"> <\/div>\n<\/div>\n<div> <\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5102086 elementor-widget elementor-widget-button\" data-id=\"5102086\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/support.een.com\/portal\/en\/kb\/articles\/enabling-privacy-mode-10-3-2021\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Leer ahora<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Recursos de ciberseguridad La ciberseguridad est\u00e1 en el ADN de Eagle Eye Networks. Desde nuestra fundaci\u00f3n, Eagle Eye Networks dedic\u00f3 importantes recursos a crear y mantener un nivel muy alto &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/es\/ciberseguridad-recursos\/\"> <span class=\"screen-reader-text\">Recursos de ciberseguridad de Eagle Eye Networks<\/span> Leer m\u00e1s &raquo;<\/a><\/p>\n","protected":false},"author":1633,"featured_media":0,"parent":0,"menu_order":426,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"class_list":["post-115328","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/es\/wp-json\/wp\/v2\/pages\/115328","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.een.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/es\/wp-json\/wp\/v2\/users\/1633"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/es\/wp-json\/wp\/v2\/comments?post=115328"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/es\/wp-json\/wp\/v2\/pages\/115328\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/es\/wp-json\/wp\/v2\/media?parent=115328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}