{"id":40925,"date":"2025-08-08T15:47:16","date_gmt":"2025-08-08T13:47:16","guid":{"rendered":"https:\/\/stage2.convotis.com\/es\/?page_id=40925"},"modified":"2025-08-26T08:28:30","modified_gmt":"2025-08-26T06:28:30","slug":"security-consulting","status":"publish","type":"page","link":"https:\/\/www.convotis.com\/es\/en\/security-services\/security-consulting\/","title":{"rendered":"Security Consulting"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"40925\" class=\"elementor elementor-40925\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bc35d92 e-flex e-con-boxed e-con e-parent\" data-id=\"bc35d92\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a64812 e-con-full e-flex e-con e-parent\" data-id=\"2a64812\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-43530c5 e-con-full e-flex e-con e-child\" data-id=\"43530c5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3789806 e-con-full container-offering-headerimage e-flex e-con e-child\" data-id=\"3789806\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5dcca1f elementor-widget elementor-widget-image\" data-id=\"5dcca1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1090\" height=\"670\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Security-Consulting.png\" class=\"attachment-1536x1536 size-1536x1536 wp-image-32261\" alt=\"Security consulting experts discussing cybersecurity strategies and risk management in a professional consulting environment\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Security-Consulting.png 1090w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Security-Consulting-300x184.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Security-Consulting-1024x629.png 1024w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Security-Consulting-768x472.png 768w\" sizes=\"auto, (max-width: 1090px) 100vw, 1090px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-907feba e-con-full e-flex e-con e-child\" data-id=\"907feba\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-837c28a e-con-full container-offering-header e-flex e-con e-child\" data-id=\"837c28a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1acc71b elementor-widget elementor-widget-heading\" data-id=\"1acc71b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Your strategic Security Consulting<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3972dea elementor-widget elementor-widget-text-editor\" data-id=\"3972dea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"176\" data-end=\"541\">For companies that want to future-proof their security architecture and minimise cyber risks in a targeted manner, we offer in-depth security analyses, zero trust architecture consulting and compliance-oriented strategies &#8211; for resilient infrastructures, superior cloud security and legally compliant IT governance through professional security consulting.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02312b3 elementor-widget elementor-widget-convotis-bootstrap-button\" data-id=\"02312b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"convotis-bootstrap-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/www.convotis.com\/es\/en\/security-services\/security-consulting\/#offering\" class=\"btn btn-iris\">How we support you<\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-952d3d4 e-flex e-con-boxed e-con e-child\" data-id=\"952d3d4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-66671c4 e-con-full e-flex e-con e-child\" data-id=\"66671c4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9fb8140 elementor-widget elementor-widget-heading\" data-id=\"9fb8140\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity needs strategy. And advice that exposes critical vulnerabilities.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86f1d41 elementor-widget elementor-widget-text-editor\" data-id=\"86f1d41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>When IT security becomes a risk factor, it is rarely due to a lack of technology &#8211; but rather to distributed system landscapes, evolved structures and a lack of strategic control. Many companies only secure selectively and lose sight of the big picture: Which assets are really worth protecting? Which risks are real? And how can compliance be implemented in a technically sustainable way?<\/p><p>Unclear responsibilities, high audit costs and inconsistent measures lead to security gaps &#8211; ideal points of attack for cyberattacks with massive consequences for operations, data and reputation. CONVOTIS Security Consulting closes this gap with in-depth analyses, strategic architecture consulting and regulatory clarity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-35c5075 e-con-full e-flex e-con e-child\" data-id=\"35c5075\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-b97f00c e-con-full e-flex e-con e-child\" data-id=\"b97f00c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e10539 elementor-widget elementor-widget-text-editor\" data-id=\"1e10539\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>Expertise that protects &#8211; for more resilient systems and fewer attack surfaces.<\/h4>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dd62df6 e-con-full e-flex e-con e-child\" data-id=\"dd62df6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-289fc59 e-con-full e-flex e-con e-child\" data-id=\"289fc59\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2a6a2a2 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"2a6a2a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-check-thin\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Security Assessments in accordance with ISO\/IEC 27001, BSI IT-Grundschutz<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-check-thin\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Zero Trust Readiness Checks and architecture consulting<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-check-thin\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Vulnerability management and penetration testing for web applications, APIs and networks<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-check-thin\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cloud security audits for Microsoft 365, Azure, AWS and sovereign cloud architectures<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-check-thin\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Security architecture reviews for hybrid IT landscapes<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e84020b e-con-full e-flex e-con e-child\" data-id=\"e84020b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7b3bb70 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"7b3bb70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-check-thin\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Governance, risk, and compliance workshops (including NIS2, DORA, TISAX, GDPR)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-check-thin\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Tool expertise: Nessus, Burp Suite, OpenVAS, Microsoft Defender, Microsoft Sentinel<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-check-thin\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Methodical integration into existing IT processes (e.g. ITIL, TOGAF, CIS Controls)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-check-thin\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Identity &amp; Access Management Strategieberatung (IAM)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-792f44c elementor-widget elementor-widget-loop-carousel\" data-id=\"792f44c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;template_id&quot;:&quot;28317&quot;,&quot;slides_to_show&quot;:&quot;6&quot;,&quot;slides_to_show_tablet&quot;:&quot;4&quot;,&quot;slides_to_show_mobile&quot;:&quot;2&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:40,&quot;sizes&quot;:[]},&quot;autoplay_speed&quot;:2500,&quot;speed&quot;:1000,&quot;_skin&quot;:&quot;post&quot;,&quot;slides_to_show_laptop&quot;:&quot;3&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;.elementor-loop-container&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;offset_sides&quot;:&quot;none&quot;,&quot;image_spacing_custom_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-carousel.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"swiper elementor-loop-container elementor-grid\" role=\"list\" dir=\"ltr\">\n\t\t\t\t<div class=\"swiper-wrapper\" aria-live=\"off\">\n\t\t<style id=\"loop-28317\">.elementor-element-6c28d89 .elementor-widget-off-canvas .e-off-canvas__main .e-off-canvas__content {\nheight: auto;\n}.elementor-28317 .elementor-element.elementor-element-7fa25d85{--display:flex;--flex-direction:column;--container-widget-width:100%;--container-widget-height:initial;--container-widget-flex-grow:0;--container-widget-align-self:initial;--flex-wrap-mobile:wrap;--border-radius:40px 40px 40px 0px;--padding-top:40px;--padding-bottom:40px;--padding-left:0px;--padding-right:0px;}.elementor-28317 .elementor-element.elementor-element-7fa25d85:not(.elementor-motion-effects-element-type-background), .elementor-28317 .elementor-element.elementor-element-7fa25d85 > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-color:var( --e-global-color-5ab2af4 );}.elementor-28317 .elementor-element.elementor-element-486d2a4d img{filter:brightness( 100% ) contrast( 100% ) saturate( 0% ) blur( 0px ) hue-rotate( 0deg );transition-duration:0.3s;}.elementor-28317 .elementor-element.elementor-element-486d2a4d:hover img{filter:brightness( 100% ) contrast( 100% ) saturate( 100% ) blur( 0px ) hue-rotate( 0deg );}@media(max-width:992px){.elementor-28317 .elementor-element.elementor-element-7fa25d85{--min-height:0px;--border-radius:24px 24px 24px 0px;}.elementor-28317 .elementor-element.elementor-element-486d2a4d img{max-width:75%;}}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-44967 post-44967 references type-references status-publish has-post-thumbnail hentry references-service-data-science_ai-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/HOFF-300x173.png\" class=\"attachment-medium size-medium wp-image-30623\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/HOFF-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/HOFF.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-44866 post-44866 references type-references status-publish has-post-thumbnail hentry references-service-data-science_ai-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/World2meet-300x173.png\" class=\"attachment-medium size-medium wp-image-32441\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/World2meet-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/World2meet.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-44961 post-44961 references type-references status-publish has-post-thumbnail hentry references-service-cloud_solutions_es references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/EU-Kommission-300x173.png\" class=\"attachment-medium size-medium wp-image-31046\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/EU-Kommission-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/EU-Kommission.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-44839 post-44839 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Cosentino-300x173.png\" class=\"attachment-medium size-medium wp-image-32937\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Cosentino-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Cosentino.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-44965 post-44965 references type-references status-publish has-post-thumbnail hentry references-service-data-science_ai-es references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/cajamar-300x173.png\" class=\"attachment-medium size-medium wp-image-16903\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/cajamar-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/cajamar.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-44819 post-44819 references type-references status-publish has-post-thumbnail hentry references-service-data-science_ai-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/Enel-300x173.png\" class=\"attachment-medium size-medium wp-image-30631\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/Enel-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/Enel.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-44867 post-44867 references type-references status-publish has-post-thumbnail hentry references-service-data-science_ai-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/ManoMano-300x173.png\" class=\"attachment-medium size-medium wp-image-32322\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/ManoMano-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/ManoMano.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45014 post-45014 references type-references status-publish has-post-thumbnail hentry references-service-data-science_ai-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/Pecovasa-renfe-1-300x173.png\" class=\"attachment-medium size-medium wp-image-31096\" alt=\"logo\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/Pecovasa-renfe-1-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/Pecovasa-renfe-1.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-44868 post-44868 references type-references status-publish has-post-thumbnail hentry references-service-data-science_ai-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/hotelbeds-300x173.png\" class=\"attachment-medium size-medium wp-image-32297\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/hotelbeds-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/hotelbeds.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-44746 post-44746 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Lufthansa-Cargo-300x173.png\" class=\"attachment-medium size-medium wp-image-33380\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Lufthansa-Cargo-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Lufthansa-Cargo.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-44737 post-44737 references type-references status-publish has-post-thumbnail hentry references-service-data-science_ai-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/Wallbox-300x173.png\" class=\"attachment-medium size-medium wp-image-31181\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/Wallbox-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/Wallbox.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-46127 post-46127 references type-references status-publish has-post-thumbnail hentry references-service-security-services-en\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Swica-2-300x173.png\" class=\"attachment-medium size-medium wp-image-46105\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Swica-2-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Swica-2.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-46125 post-46125 references type-references status-publish has-post-thumbnail hentry references-service-security-services-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Swica-2-300x173.png\" class=\"attachment-medium size-medium wp-image-46105\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Swica-2-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Swica-2.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-46123 post-46123 references type-references status-publish has-post-thumbnail hentry references-service-security-services-en\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Diventa-300x173.png\" class=\"attachment-medium size-medium wp-image-46073\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Diventa-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Diventa.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-46121 post-46121 references type-references status-publish has-post-thumbnail hentry references-service-security-services-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Diventa-300x173.png\" class=\"attachment-medium size-medium wp-image-46073\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Diventa-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Diventa.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45011 post-45011 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/Kundenlogo-300-x-100-px-3-300x173.png\" class=\"attachment-medium size-medium wp-image-17691\" alt=\"MENNEKES\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/Kundenlogo-300-x-100-px-3-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/Kundenlogo-300-x-100-px-3.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45012 post-45012 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Metro-Boutique-300x173.png\" class=\"attachment-medium size-medium wp-image-32725\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Metro-Boutique-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Metro-Boutique.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45013 post-45013 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/Neues-Berlin_Wohungsbaugenossenschaft-300x173.png\" class=\"attachment-medium size-medium wp-image-18695\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/Neues-Berlin_Wohungsbaugenossenschaft-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/Neues-Berlin_Wohungsbaugenossenschaft.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45015 post-45015 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/PETROL-300x173.png\" class=\"attachment-medium size-medium wp-image-16909\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/PETROL-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/PETROL.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45016 post-45016 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/Pivovarna-lasko-union-300x173.png\" class=\"attachment-medium size-medium wp-image-16918\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/Pivovarna-lasko-union-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/Pivovarna-lasko-union.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45017 post-45017 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/PKZ-300x173.png\" class=\"attachment-medium size-medium wp-image-32671\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/PKZ-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/PKZ.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45018 post-45018 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/prokon-300x173.png\" class=\"attachment-medium size-medium wp-image-17070\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/prokon-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/prokon.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45019 post-45019 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/University-of-Ljubljana_2-300x173.png\" class=\"attachment-medium size-medium wp-image-16921\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/University-of-Ljubljana_2-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/University-of-Ljubljana_2.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45020 post-45020 references type-references status-publish has-post-thumbnail hentry references-service-data-science_ai-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Vontobel-Asset-Management-AG-300x173.png\" class=\"attachment-medium size-medium wp-image-33217\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Vontobel-Asset-Management-AG-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Vontobel-Asset-Management-AG.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45022 post-45022 references type-references status-publish has-post-thumbnail hentry references-service-cloud_solutions_es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2023\/01\/blau-direkt-300x173.png\" class=\"attachment-medium size-medium wp-image-11458\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2023\/01\/blau-direkt-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2023\/01\/blau-direkt.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45023 post-45023 references type-references status-publish has-post-thumbnail hentry references-service-cloud_solutions_es references-service-data-science_ai-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Varengold-Bank-AG-1-300x173.png\" class=\"attachment-medium size-medium wp-image-33756\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Varengold-Bank-AG-1-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Varengold-Bank-AG-1.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45024 post-45024 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/STOROpack-300x173.png\" class=\"attachment-medium size-medium wp-image-5013\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/STOROpack-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/STOROpack.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45026 post-45026 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/Lueb-Wolters-300x173.png\" class=\"attachment-medium size-medium wp-image-5083\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/Lueb-Wolters-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/Lueb-Wolters.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45027 post-45027 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/Lenze-1-300x173.png\" class=\"attachment-medium size-medium wp-image-4930\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/Lenze-1-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/Lenze-1.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45031 post-45031 references type-references status-publish has-post-thumbnail hentry references-service-cloud_solutions_es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/Fahrrad-XXL-2-300x173.png\" class=\"attachment-medium size-medium wp-image-5089\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/Fahrrad-XXL-2-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/Fahrrad-XXL-2.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-efb962d e-con-full section e-flex e-con e-parent\" data-id=\"efb962d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-516aa29 e-flex e-con-boxed e-con e-child\" data-id=\"516aa29\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f249803 elementor-widget elementor-widget-text-editor\" data-id=\"f249803\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><strong>What are the specific benefits?<\/strong><br \/>More security, targeted prevention, fewer cyber risks.<\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ee2666 elementor-widget elementor-widget-convotis-callouts\" data-id=\"4ee2666\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"convotis-callouts.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"d-flex callouts row mt-4  inverse\"><div class=\"callout-block col-md-6 col-xl-3\"><i aria-hidden=\"true\" class=\"icon icon-arrow-circle-up-thin\"><\/i><div class=\"callout-text\">More transparency about risks, vulnerabilities and security gaps<\/div><\/div><div class=\"callout-block col-md-6 col-xl-3\"><i aria-hidden=\"true\" class=\"icon icon-cloud-check-thin\"><\/i><div class=\"callout-text\">Future-proof security architecture for cloud, infrastructure and applications<\/div><\/div><div class=\"callout-block col-md-6 col-xl-3\"><i aria-hidden=\"true\" class=\"icon icon-check-square-thin-1\"><\/i><div class=\"callout-text\">Increased safety through targeted prioritisation of technical measures<\/div><\/div><div class=\"callout-block col-md-6 col-xl-3\"><i aria-hidden=\"true\" class=\"icon icon-list-checks-thin\"><\/i><div class=\"callout-text\">Better preparation for audits and regulatory requirements (e.g. NIS2, DORA, ISO 27001 and TISAX)<\/div><\/div><div class=\"callout-block col-md-6 col-xl-3\"><i aria-hidden=\"true\" class=\"icon icon-shield-check-thin\"><\/i><div class=\"callout-text\">Reduced risk through zero-trust strategies and access control<\/div><\/div><div class=\"callout-block col-md-6 col-xl-3\"><i aria-hidden=\"true\" class=\"icon icon-money-thin\"><\/i><div class=\"callout-text\">Sound decision-making basis for security investments<\/div><\/div><div class=\"callout-block col-md-6 col-xl-3\"><i aria-hidden=\"true\" class=\"icon icon-lock-thin\"><\/i><div class=\"callout-text\">Greater resilience to attacks and failures<\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6c00fe1 e-con-full e-flex e-con e-parent\" data-id=\"6c00fe1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:8,&quot;sizes&quot;:[]},&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:50}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;laptop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce4a242 elementor-widget elementor-widget-menu-anchor\" data-id=\"ce4a242\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"offering\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0f6f910 e-con-full section e-flex e-con e-parent\" data-id=\"0f6f910\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-2cc9ac0 e-flex e-con-boxed e-con e-child\" data-id=\"2cc9ac0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a43ed8f e-con-full e-flex e-con e-child\" data-id=\"a43ed8f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7a3da9e elementor-widget elementor-widget-heading\" data-id=\"7a3da9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How we support you.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fba1171 elementor-widget elementor-widget-convotis-bootstrap-button\" data-id=\"fba1171\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"convotis-bootstrap-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/www.convotis.com\/es\/en\/contact\/\" target=\"_blank\" class=\"btn btn-iris\">Request a Consultation<\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-561dfc6 e-con-full e-flex e-con e-child\" data-id=\"561dfc6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-993461f elementor-widget elementor-widget-text-editor\" data-id=\"993461f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"179\" data-end=\"400\">We offer strategic Security Consulting for companies that want to reorganise their IT security holistically &#8211; from risk analysis and zero trust to compliance protection in accordance with NIS2, DORA and ISO 27001.<\/p><p data-start=\"402\" data-end=\"752\">Our consulting approaches are individually tailored to your IT landscape and business objectives and combine technical know-how with regulatory expertise. Whether cloud security assessment, architecture consulting or governance model &#8211; we create clarity, reduce attack surfaces and make your security strategy implementable and auditable.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-383e441 e-flex e-con-boxed e-con e-child\" data-id=\"383e441\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e8c7ac9 elementor-widget elementor-widget-convotis-bootstrap-content-accordion\" data-id=\"e8c7ac9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"convotis-bootstrap-content-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"accordion\" id=\"accordion-e8c7ac9\"><div class=\"accordion-item\"><div class=\"accordion-header\" id=\"accordion-e8c7ac9-item-0-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-e8c7ac9-item-0-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-e8c7ac9-item-0-collapse\"><div class=\"accordion-button-inner\"><h3 class=\"mb-0\">Safety analysis &amp; risk assessment<\/h3><span class=\"accordion-subline\">Recognise gaps. Understand the threat situation.<\/span><\/div><\/button><\/div><div id=\"accordion-e8c7ac9-item-0-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-e8c7ac9-item-0-heading\" data-bs-parent=\"#accordion-e8c7ac9\"><div class=\"accordion-body\"><p data-start=\"443\" data-end=\"1060\">As part of our Security Consulting, we start with a structured security analysis of your IT infrastructure - from on-prem systems to the cloud. We identify vulnerabilities in network architectures, operating systems, APIs and authorisation concepts. The risk assessment is based on current threat scenarios, business criticality and common standards such as ISO 27001, CVSS and BSI IT-Grundschutz. The result: a prioritised, comprehensible risk score that enables well-founded decisions and a robust security strategy.<\/p><\/div><\/div><\/div><div class=\"accordion-item\"><div class=\"accordion-header\" id=\"accordion-e8c7ac9-item-1-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-e8c7ac9-item-1-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-e8c7ac9-item-1-collapse\"><div class=\"accordion-button-inner\"><h3 class=\"mb-0\">Zero Trust &amp; Architectural Consultancy<\/h3><span class=\"accordion-subline\">Designing future-proof access concepts and security architecture.<\/span><\/div><\/button><\/div><div id=\"accordion-e8c7ac9-item-1-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-e8c7ac9-item-1-heading\" data-bs-parent=\"#accordion-e8c7ac9\"><div class=\"accordion-body\"><p>In Security Consulting, we develop Zero Trust architectures that are based on the principle of least privilege and authenticate and authorise every request independently - regardless of network location, device or user role. We evaluate your existing access infrastructure, check identity sources, role-based authorisations, endpoint trust and cloud access models. The goal is a dynamic security architecture with granular segmentation, end-to-end multi-factor authentication (MFA) and continuous validation of sensitive resources. In this way, we create the basis for modern, resilient IT security in hybrid environments.<\/p><\/div><\/div><\/div><div class=\"accordion-item\"><div class=\"accordion-header\" id=\"accordion-e8c7ac9-item-2-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-e8c7ac9-item-2-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-e8c7ac9-item-2-collapse\"><div class=\"accordion-button-inner\"><h3 class=\"mb-0\">Compliance &amp; Cloud Security Assessment<\/h3><span class=\"accordion-subline\">Fulfil requirements. Designing a secure cloud.<\/span><\/div><\/button><\/div><div id=\"accordion-e8c7ac9-item-2-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-e8c7ac9-item-2-heading\" data-bs-parent=\"#accordion-e8c7ac9\"><div class=\"accordion-body\"><p data-start=\"250\" data-end=\"887\">We develop sustainable governance structures - customised to the size of the company, risk profile and regulatory requirements. As part of our Security Consulting, we analyse existing security guidelines, define role models, implement control processes and support you in the introduction of a consistent policy framework. This includes access guidelines, acceptable use policies, incident handling and awareness concepts. The result is a documented, effective governance model that reliably combines technology, organisation and responsibility.<\/p><\/div><\/div><\/div><div class=\"accordion-item\"><div class=\"accordion-header\" id=\"accordion-e8c7ac9-item-3-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-e8c7ac9-item-3-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-e8c7ac9-item-3-collapse\"><div class=\"accordion-button-inner\"><h3 class=\"mb-0\">Governance &amp; Policy Management<\/h3><span class=\"accordion-subline\">Clarify responsibility. Secure processes.<\/span><\/div><\/button><\/div><div id=\"accordion-e8c7ac9-item-3-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-e8c7ac9-item-3-heading\" data-bs-parent=\"#accordion-e8c7ac9\"><div class=\"accordion-body\"><p data-start=\"855\" data-end=\"1340\">In Security Consulting, we develop sustainable governance structures - tailored to the size of the company, risk profile and regulatory requirements. We analyse existing security guidelines, define role models, implement control processes and support you in the introduction of a consistent policy framework. This includes access guidelines, acceptable use policies, incident handling and training concepts to increase awareness. The result is a documented, effective governance model that combines technology, organisation and responsibility.<\/p><\/div><\/div><\/div><div class=\"accordion-item\"><div class=\"accordion-header\" id=\"accordion-e8c7ac9-item-4-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-e8c7ac9-item-4-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-e8c7ac9-item-4-collapse\"><div class=\"accordion-button-inner\"><h3 class=\"mb-0\">Audit Preparation &amp; Management Enablement<\/h3><span class=\"accordion-subline\">Show safety. Take responsibility.<\/span><\/div><\/button><\/div><div id=\"accordion-e8c7ac9-item-4-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-e8c7ac9-item-4-heading\" data-bs-parent=\"#accordion-e8c7ac9\"><div class=\"accordion-body\"><p data-start=\"332\" data-end=\"696\">We support your organisation in targeted preparation for internal or external audits - from ISO 27001 and TISAX to regulatory audits in accordance with DORA or NIS2. As part of our Security Consulting, we structure the relevant evidence, strengthen your organisation's documentation capabilities and deliver comprehensible reports for the CISO, CIO and management. With risk overviews, gap analyses and roadmaps, we make your IT security manageable and verifiable - also vis-\u00e0-vis investors, partners or supervisory authorities.<\/p><\/div><\/div><\/div><div class=\"accordion-item\"><div class=\"accordion-header\" id=\"accordion-e8c7ac9-item-5-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-e8c7ac9-item-5-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-e8c7ac9-item-5-collapse\"><div class=\"accordion-button-inner\"><h3 class=\"mb-0\">Roadmap &amp; action planning<\/h3><span class=\"accordion-subline\">Prioritise risks. Implement a security strategy.<\/span><\/div><\/button><\/div><div id=\"accordion-e8c7ac9-item-5-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-e8c7ac9-item-5-heading\" data-bs-parent=\"#accordion-e8c7ac9\"><div class=\"accordion-body\"><p>Security Consulting does not end with analysis - it translates findings into concrete action. We develop realistic roadmaps for implementing your IT security strategy, prioritise measures according to risk, effort and business impact and align them with your resources and objectives. The measures range from rights management and network protection to the introduction of secure cloud controls. We help you to implement technical and organisational measures in a structured manner - verifiably, economically and in compliance with regulations.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-750bad64 section e-flex e-con-boxed e-con e-parent\" data-id=\"750bad64\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7168ba0d e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"7168ba0d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4f7dcbad e-con-full e-flex e-con e-child\" data-id=\"4f7dcbad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5b6e7153 elementor-widget elementor-widget-heading\" data-id=\"5b6e7153\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><strong>Your IT Transformation starts here.<\/strong><br>Let's talk about your goals.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18a70ffa elementor-widget elementor-widget-text-editor\" data-id=\"18a70ffa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Whether you want to fend off targeted attacks, reorganise your IT security or implement regulatory requirements such as NIS2 and DORA &#8211; we support you with strategic Security Consulting, clear risk assessment and individual architecture consulting. Together, we will create a security structure that is auditable and future-proof.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-575ee1d9 elementor-widget elementor-widget-convotis-bootstrap-button\" data-id=\"575ee1d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"convotis-bootstrap-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/www.convotis.com\/es\/en\/contact\/\" target=\"_blank\" class=\"btn btn-iris\">Plan next steps<\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-33d355d4 e-con-full e-flex e-con e-child\" data-id=\"33d355d4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a73c416 elementor-widget elementor-widget-convotis-image-box\" data-id=\"3a73c416\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;laptop&quot;,&quot;tablet&quot;],&quot;_animation&quot;:&quot;none&quot;,&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:50}},&quot;motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]}}\" data-widget_type=\"convotis-image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"image-box border-bottom-left\" style=\"max-width: auto;\">\r\n            <div class=\"image-wrapper has-img-bg\" data-background-url=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/2025\/05\/Get-in-Touch-with-CONVOTIS.png\">\r\n                            <\/div>\r\n        <\/div>\r\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-002dcaa e-con-full section e-flex e-con e-parent\" data-id=\"002dcaa\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-64634f9 e-flex e-con-boxed e-con e-child\" data-id=\"64634f9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3d7482e e-con-full e-flex e-con e-child\" data-id=\"3d7482e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-84ad361 e-con-full e-flex e-con e-child\" data-id=\"84ad361\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_offset&quot;:120,&quot;sticky_offset_tablet&quot;:40,&quot;sticky_parent&quot;:&quot;yes&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;laptop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ba8dc3f elementor-widget elementor-widget-heading\" data-id=\"ba8dc3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><strong>Dive deeper into the topic.<\/strong><br>\nExplore further resources.\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-13d714c e-con-full e-flex e-con e-child\" data-id=\"13d714c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1ece500 e-con-full e-flex e-con e-child\" data-id=\"1ece500\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-e696468 e-con-full e-flex e-con e-child\" data-id=\"e696468\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c6a7e65 e-con-full e-flex e-con e-child\" data-id=\"c6a7e65\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1df1525 elementor-widget elementor-widget-heading\" data-id=\"1df1525\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Understanding Zero Trust. Rethinking security.<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6948ce6 elementor-widget elementor-widget-text-editor\" data-id=\"6948ce6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>From access control to architecture strategy &#8211; this article provides a compact overview of how Zero Trust Security effectively protects modern IT infrastructures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3661447 elementor-widget elementor-widget-convotis-bootstrap-button\" data-id=\"3661447\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"convotis-bootstrap-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/www.convotis.com\/es\/en\/news\/zero-trust-security-the-new-standard-for-secure-it-infrastructures\/\" target=\"_blank\" class=\"btn btn-light\">Read the article<\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c69a28 e-con-full e-flex e-con e-child\" data-id=\"0c69a28\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-e61ac08 e-con-full e-flex e-con e-child\" data-id=\"e61ac08\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-33466bb e-con-full e-flex e-con e-child\" data-id=\"33466bb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ca1e1f elementor-widget elementor-widget-heading\" data-id=\"2ca1e1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">How secure interfaces protect your architecture<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f270b0 elementor-widget elementor-widget-text-editor\" data-id=\"9f270b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"299\" data-end=\"469\">How companies protect their API landscape against attacks &#8211; for reliable interfaces and maximum data security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a24b91 elementor-widget elementor-widget-convotis-bootstrap-button\" data-id=\"3a24b91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"convotis-bootstrap-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/www.convotis.com\/es\/en\/news\/api-security-secure-interfaces\/\" target=\"_blank\" class=\"btn btn-light\">Read more<\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e61ef27 e-con-full section e-flex e-con e-parent\" data-id=\"e61ef27\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-9247cd4 e-flex e-con-boxed e-con e-child\" data-id=\"9247cd4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e1fd8c3 e-con-full e-flex e-con e-child\" data-id=\"e1fd8c3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-70a0ae6 e-con-full e-flex e-con e-child\" data-id=\"70a0ae6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_offset&quot;:120,&quot;sticky_offset_tablet&quot;:40,&quot;sticky_parent&quot;:&quot;yes&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;laptop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9647a58 elementor-widget elementor-widget-heading\" data-id=\"9647a58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FAQ\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17141f6 elementor-widget elementor-widget-text-editor\" data-id=\"17141f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Do you have questions about the right security strategy?<br \/>In our FAQ you will find concise answers to key topics relating to IT security, compliance, risk analysis and Zero Trust.<\/p><p>Still have questions?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3e91f2 elementor-widget elementor-widget-convotis-bootstrap-button\" data-id=\"c3e91f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"convotis-bootstrap-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/www.convotis.com\/es\/en\/contact\/\" target=\"_blank\" class=\"btn btn-light\">Get in touch now<\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7d456b3 e-con-full e-flex e-con e-child\" data-id=\"7d456b3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b800e2b elementor-widget elementor-widget-convotis-bootstrap-accordion\" data-id=\"b800e2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"convotis-bootstrap-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"accordion faq-accordion accordion-inverse\" id=\"accordion-b800e2b\"><script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"What is Security Consulting and when do I need it?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Security Consulting is strategic IT security consulting for companies - focussing on risk assessment, security architecture, compliance and governance. It is relevant when IT risks, audit pressure or growing attack surfaces need to be addressed in a structured manner - for example when introducing Zero Trust, regulatory requirements such as NIS2 or cloud transformations.\"}},{\"@type\":\"Question\",\"name\":\"What services does professional Security Consulting include?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"\\u00a0Security Consulting includes security analyses, risk and vulnerability assessments, zero trust architecture consulting, cloud security assessments, compliance strategies (e.g. NIS2, DORA, ISO 27001), governance models and action planning. The goal is an implementable IT security strategy that securely combines technology, organisation and regulation - tailored to your corporate structure.\"}},{\"@type\":\"Question\",\"name\":\"How does Security Consulting help with the implementation of NIS2, DORA &amp; Co\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Security Consulting creates the basis for regulatory resilient IT security - technically and organisationally. We review your current security situation, evaluate existing controls and develop a roadmap for implementing NIS2, DORA, ISO 27001 or TISAX. This includes governance structures, guidelines, evidence and specific measures for auditability.\"}},{\"@type\":\"Question\",\"name\":\"How does a  Security Consulting project typically work?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"A project starts with a structured security analysis. This is followed by a risk assessment, architecture workshops, compliance checks and a prioritised roadmap of measures. Depending on the objective, we also provide support with audit preparation, policy development or technical implementation.\"}},{\"@type\":\"Question\",\"name\":\"How much does Security Consulting cost?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"The costs depend on the scope of the project, system complexity and compliance requirements. Entry-level packages such as a Security Quick Check or NIS2 assessment are already clearly calculable. For larger projects such as complete security strategies, we create a customised, targeted offer - tailored to your resources and priorities.\"}}]}<\/script><div class=\"accordion-item faq-item\"><div class=\"accordion-header\" id=\"accordion-b800e2b-item-0-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-b800e2b-item-0-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-b800e2b-item-0-collapse\"><div class=\"accordion-button-inner\"><h4 class=\"mb-0 faq-question\">What is Security Consulting and when do I need it?<\/h4><\/div><\/button><\/div><div id=\"accordion-b800e2b-item-0-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-b800e2b-item-0-heading\" data-bs-parent=\"#accordion-b800e2b\"><div class=\"accordion-body faq-answer\"><p data-start=\"375\" data-end=\"775\">Security Consulting is strategic IT security consulting for companies - focussing on risk assessment, security architecture, compliance and governance. It is relevant when IT risks, audit pressure or growing attack surfaces need to be addressed in a structured manner - for example when introducing Zero Trust, regulatory requirements such as NIS2 or cloud transformations.<\/p><\/div><\/div><\/div><div class=\"accordion-item faq-item\"><div class=\"accordion-header\" id=\"accordion-b800e2b-item-1-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-b800e2b-item-1-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-b800e2b-item-1-collapse\"><div class=\"accordion-button-inner\"><h4 class=\"mb-0 faq-question\">What services does professional Security Consulting include?<\/h4><\/div><\/button><\/div><div id=\"accordion-b800e2b-item-1-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-b800e2b-item-1-heading\" data-bs-parent=\"#accordion-b800e2b\"><div class=\"accordion-body faq-answer\"><p data-start=\"1136\" data-end=\"1536\">\u00a0Security Consulting includes security analyses, risk and vulnerability assessments, zero trust architecture consulting, cloud security assessments, compliance strategies (e.g. NIS2, DORA, ISO 27001), governance models and action planning. The goal is an implementable IT security strategy that securely combines technology, organisation and regulation - tailored to your corporate structure.<\/p><\/div><\/div><\/div><div class=\"accordion-item faq-item\"><div class=\"accordion-header\" id=\"accordion-b800e2b-item-2-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-b800e2b-item-2-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-b800e2b-item-2-collapse\"><div class=\"accordion-button-inner\"><h4 class=\"mb-0 faq-question\">How does Security Consulting help with the implementation of NIS2, DORA &amp; Co<\/h4><\/div><\/button><\/div><div id=\"accordion-b800e2b-item-2-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-b800e2b-item-2-heading\" data-bs-parent=\"#accordion-b800e2b\"><div class=\"accordion-body faq-answer\"><p>Security Consulting creates the basis for regulatory resilient IT security - technically and organisationally. We review your current security situation, evaluate existing controls and develop a roadmap for implementing NIS2, DORA, ISO 27001 or TISAX. This includes governance structures, guidelines, evidence and specific measures for auditability.<\/p><\/div><\/div><\/div><div class=\"accordion-item faq-item\"><div class=\"accordion-header\" id=\"accordion-b800e2b-item-3-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-b800e2b-item-3-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-b800e2b-item-3-collapse\"><div class=\"accordion-button-inner\"><h4 class=\"mb-0 faq-question\">How does a  Security Consulting project typically work?<\/h4><\/div><\/button><\/div><div id=\"accordion-b800e2b-item-3-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-b800e2b-item-3-heading\" data-bs-parent=\"#accordion-b800e2b\"><div class=\"accordion-body faq-answer\"><p>A project starts with a structured security analysis. This is followed by a risk assessment, architecture workshops, compliance checks and a prioritised roadmap of measures. Depending on the objective, we also provide support with audit preparation, policy development or technical implementation.<\/p><\/div><\/div><\/div><div class=\"accordion-item faq-item\"><div class=\"accordion-header\" id=\"accordion-b800e2b-item-4-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-b800e2b-item-4-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-b800e2b-item-4-collapse\"><div class=\"accordion-button-inner\"><h4 class=\"mb-0 faq-question\">How much does Security Consulting cost?<\/h4><\/div><\/button><\/div><div id=\"accordion-b800e2b-item-4-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-b800e2b-item-4-heading\" data-bs-parent=\"#accordion-b800e2b\"><div class=\"accordion-body faq-answer\"><p data-start=\"2658\" data-end=\"3107\">The costs depend on the scope of the project, system complexity and compliance requirements. Entry-level packages such as a Security Quick Check or NIS2 assessment are already clearly calculable. For larger projects such as complete security strategies, we create a customised, targeted offer - tailored to your resources and priorities.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c3456cc e-con-full section is-bg-greige e-flex e-con e-parent\" data-id=\"c3456cc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-74eb327 e-flex e-con-boxed e-con e-child\" data-id=\"74eb327\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9419d2a elementor-widget elementor-widget-text-editor\" data-id=\"9419d2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><strong>Latest Insights. <\/strong><br \/>In Security Services.<\/h2>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f43758b elementor-widget elementor-widget-featured_articles_carousel\" data-id=\"f43758b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;slides_per_view&quot;:3,&quot;slides_per_view_tablet&quot;:2,&quot;slides_per_view_mobile&quot;:1}\" data-widget_type=\"featured_articles_carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"swiper featured-carousel position-relative \"\r\n                 data-slides-desktop=\"3\"\r\n                 data-slides-tablet=\"2\"\r\n                 data-slides-mobile=\"1\">\r\n                <div class=\"swiper-wrapper\">\r\n                                                <div class=\"swiper-slide\">\r\n                                <div class=\"card\">\r\n                                    <a href=\"https:\/\/www.convotis.com\/es\/en\/news\/zero-trust-architectures-access-control-and-continuous-authorisation-in-distributed-systems\/\">\r\n                                                                                    <img decoding=\"async\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2026\/04\/Identity-Policy-und-Enforcement--768x472.png\" class=\"card-img-top img-fluid\" alt=\"Zero Trust Architectures: Access Control and Continuous Authorisation in Distributed Systems\">\r\n                                                                                <div class=\"card-body\">\r\n                                            <span class=\"info-pill\">Security Services<\/span>\r\n                                            <h4 class=\"my-3 featured-title\">Zero Trust Architectures: Access Control and Continuous Authorisation in Distributed Systems<\/h4>\r\n                                            <span class=\"read-more\">Read more<\/span>\r\n                                        <\/div>\r\n                                    <\/a>\r\n                                <\/div>\r\n                            <\/div>\r\n                                                        <div class=\"swiper-slide\">\r\n                                <div class=\"card\">\r\n                                    <a href=\"https:\/\/www.convotis.com\/es\/en\/news\/cyberattacks-in-europe-pressure-on-digital-platforms-in-germany\/\">\r\n                                                                                    <img decoding=\"async\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2026\/03\/Cyberangriffe-in-Europa-768x472.png\" class=\"card-img-top img-fluid\" alt=\"Cyberattacks in Europe: Pressure on Digital Platforms in Germany\">\r\n                                                                                <div class=\"card-body\">\r\n                                            <span class=\"info-pill\">Security Services<\/span>\r\n                                            <h4 class=\"my-3 featured-title\">Cyberattacks in Europe: Pressure on Digital Platforms in Germany<\/h4>\r\n                                            <span class=\"read-more\">Read more<\/span>\r\n                                        <\/div>\r\n                                    <\/a>\r\n                                <\/div>\r\n                            <\/div>\r\n                                                        <div class=\"swiper-slide\">\r\n                                <div class=\"card\">\r\n                                    <a href=\"https:\/\/www.convotis.com\/es\/en\/news\/identity-and-access-management-as-a-structural-control-instance-of-modern-platform-architectures\/\">\r\n                                                                                    <img decoding=\"async\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2026\/03\/Identity-and-Access-Management-768x472.png\" class=\"card-img-top img-fluid\" alt=\"Identity and Access Management as a Structural Control Instance of Modern Platform Architectures\">\r\n                                                                                <div class=\"card-body\">\r\n                                            <span class=\"info-pill\">Security Services<\/span>\r\n                                            <h4 class=\"my-3 featured-title\">Identity and Access Management as a Structural Control Instance of Modern Platform Architectures<\/h4>\r\n                                            <span class=\"read-more\">Read more<\/span>\r\n                                        <\/div>\r\n                                    <\/a>\r\n                                <\/div>\r\n                            <\/div>\r\n                                                        <div class=\"swiper-slide\">\r\n                                <div class=\"card\">\r\n                                    <a href=\"https:\/\/www.convotis.com\/es\/en\/news\/why-platform-programs-fail-at-interfaces-in-enterprise-it\/\">\r\n                                                                                    <img decoding=\"async\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2026\/02\/Enterprise-Plattformen-Interfaces-768x472.png\" class=\"card-img-top img-fluid\" alt=\"Why Platform Programs Fail at Interfaces in Enterprise IT\">\r\n                                                                                <div class=\"card-body\">\r\n                                            <span class=\"info-pill\">Cloud Solutions<\/span>\r\n                                            <h4 class=\"my-3 featured-title\">Why Platform Programs Fail at Interfaces in Enterprise IT<\/h4>\r\n                                            <span class=\"read-more\">Read more<\/span>\r\n                                        <\/div>\r\n                                    <\/a>\r\n                                <\/div>\r\n                            <\/div>\r\n                                                        <div class=\"swiper-slide\">\r\n                                <div class=\"card\">\r\n                                    <a href=\"https:\/\/www.convotis.com\/es\/en\/news\/security-architecture-for-sovereign-cloud-platforms\/\">\r\n                                                                                    <img decoding=\"async\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2026\/02\/SovereignArchitecture_Cloud-768x472.png\" class=\"card-img-top img-fluid\" alt=\"Security Architecture for Sovereign Cloud Platforms\">\r\n                                                                                <div class=\"card-body\">\r\n                                            <span class=\"info-pill\">Security Services<\/span>\r\n                                            <h4 class=\"my-3 featured-title\">Security Architecture for Sovereign Cloud Platforms<\/h4>\r\n                                            <span class=\"read-more\">Read more<\/span>\r\n                                        <\/div>\r\n                                    <\/a>\r\n                                <\/div>\r\n                            <\/div>\r\n                                                        <div class=\"swiper-slide\">\r\n                                <div class=\"card\">\r\n                                    <a href=\"https:\/\/www.convotis.com\/es\/en\/news\/incident-detection-and-response-in-modern-it-landscapes\/\">\r\n                                                                                    <img decoding=\"async\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2026\/02\/Incident-Detection-Response-768x472.png\" class=\"card-img-top img-fluid\" alt=\"Incident Detection and Response in Modern IT Landscapes\">\r\n                                                                                <div class=\"card-body\">\r\n                                            <span class=\"info-pill\">Security Services<\/span>\r\n                                            <h4 class=\"my-3 featured-title\">Incident Detection and Response in Modern IT Landscapes<\/h4>\r\n                                            <span class=\"read-more\">Read more<\/span>\r\n                                        <\/div>\r\n                                    <\/a>\r\n                                <\/div>\r\n                            <\/div>\r\n                                            <\/div>\r\n                <div class=\"d-flex justify-content-between align-items-center\">\r\n                                        <div class=\"featured-carousel-progress w-50 \">\r\n                        <div class=\"progress\">\r\n                            <div class=\"progress-bar\" role=\"progressbar\"\r\n                                 style=\"width: 0%;\"\r\n                                 aria-valuenow=\"0\" aria-valuemin=\"0\" aria-valuemax=\"100\"><\/div>\r\n                        <\/div>\r\n                    <\/div>\r\n                    <div class=\"swiper-navigation\">\r\n                        <div class=\"button-prev\">\r\n                            <i class=\"fa fa-arrow-left\"><\/i>\r\n                        <\/div>\r\n                        <div class=\"button-next\">\r\n                            <i class=\"fa fa-arrow-right\"><\/i>\r\n                        <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/div>\r\n            \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Your strategic Security Consulting For companies that want to future-proof their security architecture and minimise cyber risks in a targeted manner, we offer in-depth security analyses, zero trust architecture consulting and compliance-oriented strategies &#8211; for resilient infrastructures, superior cloud security and legally compliant IT governance through professional security consulting. How we support you Cybersecurity needs [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":40913,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-40925","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security Consulting for companies - IT security with strategy<\/title>\n<meta name=\"description\" content=\"Strategic Security Consulting for IT security, compliance and audit preparation - customised and based on regulatory requirements.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.convotis.com\/es\/en\/security-services\/security-consulting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Consulting for companies - IT security with strategy\" \/>\n<meta property=\"og:description\" content=\"Strategic Security Consulting for IT security, compliance and audit preparation - customised and based on regulatory requirements.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.convotis.com\/es\/en\/security-services\/security-consulting\/\" \/>\n<meta property=\"og:site_name\" content=\"CONVOTIS Iberia\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-26T06:28:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Security-Consulting.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"23 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/security-services\\\/security-consulting\\\/\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/security-services\\\/security-consulting\\\/\",\"name\":\"Security Consulting for companies - IT security with strategy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/security-services\\\/security-consulting\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/security-services\\\/security-consulting\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/07\\\/Security-Consulting.png\",\"datePublished\":\"2025-08-08T13:47:16+00:00\",\"dateModified\":\"2025-08-26T06:28:30+00:00\",\"description\":\"Strategic Security Consulting for IT security, compliance and audit preparation - customised and based on regulatory requirements.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/security-services\\\/security-consulting\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/security-services\\\/security-consulting\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/security-services\\\/security-consulting\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/07\\\/Security-Consulting.png\",\"contentUrl\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/07\\\/Security-Consulting.png\",\"width\":1090,\"height\":670,\"caption\":\"Security consulting experts discussing cybersecurity strategies and risk management in a professional consulting environment\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/security-services\\\/security-consulting\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security Services\",\"item\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/security-services\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Consulting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/\",\"name\":\"CONVOTIS\",\"description\":\"For Europe&#039;s digital future.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#organization\",\"name\":\"CONVOTIS\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/08\\\/Convotis_blue_cmyk300dpi-scaled.png\",\"contentUrl\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/08\\\/Convotis_blue_cmyk300dpi-scaled.png\",\"width\":2560,\"height\":411,\"caption\":\"CONVOTIS\"},\"image\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/convotis-gmbh\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Consulting for companies - IT security with strategy","description":"Strategic Security Consulting for IT security, compliance and audit preparation - customised and based on regulatory requirements.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.convotis.com\/es\/en\/security-services\/security-consulting\/","og_locale":"en_US","og_type":"article","og_title":"Security Consulting for companies - IT security with strategy","og_description":"Strategic Security Consulting for IT security, compliance and audit preparation - customised and based on regulatory requirements.","og_url":"https:\/\/www.convotis.com\/es\/en\/security-services\/security-consulting\/","og_site_name":"CONVOTIS Iberia","article_modified_time":"2025-08-26T06:28:30+00:00","og_image":[{"url":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Security-Consulting.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"23 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.convotis.com\/es\/en\/security-services\/security-consulting\/","url":"https:\/\/www.convotis.com\/es\/en\/security-services\/security-consulting\/","name":"Security Consulting for companies - IT security with strategy","isPartOf":{"@id":"https:\/\/www.convotis.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.convotis.com\/es\/en\/security-services\/security-consulting\/#primaryimage"},"image":{"@id":"https:\/\/www.convotis.com\/es\/en\/security-services\/security-consulting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Security-Consulting.png","datePublished":"2025-08-08T13:47:16+00:00","dateModified":"2025-08-26T06:28:30+00:00","description":"Strategic Security Consulting for IT security, compliance and audit preparation - customised and based on regulatory requirements.","breadcrumb":{"@id":"https:\/\/www.convotis.com\/es\/en\/security-services\/security-consulting\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.convotis.com\/es\/en\/security-services\/security-consulting\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.convotis.com\/es\/en\/security-services\/security-consulting\/#primaryimage","url":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Security-Consulting.png","contentUrl":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Security-Consulting.png","width":1090,"height":670,"caption":"Security consulting experts discussing cybersecurity strategies and risk management in a professional consulting environment"},{"@type":"BreadcrumbList","@id":"https:\/\/www.convotis.com\/es\/en\/security-services\/security-consulting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security Services","item":"https:\/\/www.convotis.com\/es\/en\/security-services\/"},{"@type":"ListItem","position":2,"name":"Security Consulting"}]},{"@type":"WebSite","@id":"https:\/\/www.convotis.com\/es\/#website","url":"https:\/\/www.convotis.com\/es\/","name":"CONVOTIS","description":"For Europe&#039;s digital future.","publisher":{"@id":"https:\/\/www.convotis.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.convotis.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.convotis.com\/es\/#organization","name":"CONVOTIS","url":"https:\/\/www.convotis.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.convotis.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Convotis_blue_cmyk300dpi-scaled.png","contentUrl":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Convotis_blue_cmyk300dpi-scaled.png","width":2560,"height":411,"caption":"CONVOTIS"},"image":{"@id":"https:\/\/www.convotis.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/convotis-gmbh\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/pages\/40925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/comments?post=40925"}],"version-history":[{"count":17,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/pages\/40925\/revisions"}],"predecessor-version":[{"id":47544,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/pages\/40925\/revisions\/47544"}],"up":[{"embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/pages\/40913"}],"wp:attachment":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/media?parent=40925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}