{"id":41319,"date":"2025-08-09T07:44:56","date_gmt":"2025-08-09T05:44:56","guid":{"rendered":"https:\/\/stage2.convotis.com\/es\/?page_id=41319"},"modified":"2025-08-26T08:29:43","modified_gmt":"2025-08-26T06:29:43","slug":"security-operations","status":"publish","type":"page","link":"https:\/\/www.convotis.com\/es\/en\/security-services\/security-operations\/","title":{"rendered":"Security Operations"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"41319\" class=\"elementor elementor-41319\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bc35d92 e-flex e-con-boxed e-con e-parent\" data-id=\"bc35d92\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a64812 e-con-full e-flex e-con e-parent\" data-id=\"2a64812\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-43530c5 e-con-full e-flex e-con e-child\" data-id=\"43530c5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3789806 e-con-full container-offering-headerimage e-flex e-con e-child\" data-id=\"3789806\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5dcca1f elementor-widget elementor-widget-image\" data-id=\"5dcca1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1090\" height=\"670\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/03\/Security-Awareness.png\" class=\"attachment-1536x1536 size-1536x1536 wp-image-28854\" alt=\"Security Operations environment with monitoring dashboards and analysts \u2013 representing real-time threat detection, incident response, and continuous protection in enterprise IT.\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/03\/Security-Awareness.png 1090w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/03\/Security-Awareness-300x184.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/03\/Security-Awareness-1024x629.png 1024w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/03\/Security-Awareness-768x472.png 768w\" sizes=\"auto, (max-width: 1090px) 100vw, 1090px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-907feba e-con-full e-flex e-con e-child\" data-id=\"907feba\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-837c28a e-con-full container-offering-header e-flex e-con e-child\" data-id=\"837c28a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1acc71b elementor-widget elementor-widget-heading\" data-id=\"1acc71b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Security Operations for System Protection<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3972dea elementor-widget elementor-widget-text-editor\" data-id=\"3972dea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"176\" data-end=\"541\">For companies that need to reliably detect cyberattacks, respond automatically, and secure their IT systems around the clock. With targeted detection and response, SOC processes, and end-to-end monitoring \u2013 enabling rapid reaction, minimizing damage, and ensuring constant protection during ongoing operations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02312b3 elementor-widget elementor-widget-convotis-bootstrap-button\" data-id=\"02312b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"convotis-bootstrap-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/www.convotis.com\/es\/en\/security-services\/security-operations\/#offering\" class=\"btn btn-iris\">How we support you<\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-952d3d4 e-flex e-con-boxed e-con e-child\" data-id=\"952d3d4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-66671c4 e-con-full e-flex e-con e-child\" data-id=\"66671c4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9fb8140 elementor-widget elementor-widget-heading\" data-id=\"9fb8140\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity requires prompt response and reliable protection in any emergency.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86f1d41 elementor-widget elementor-widget-text-editor\" data-id=\"86f1d41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>When attacks become reality, traditional prevention alone is not enough. Security operations are essential for detecting suspicious activity early, responding automatically, and effectively containing security incidents. Without continuous monitoring, attack detection, and incident response, organizations risk identifying critical threats too late \u2013 or not at all.<\/p><p>Compromised systems, data breaches, and operational downtime have severe consequences for availability, trust, and business continuity. Without robust IT security, dangerous gaps emerge \u2013 both technically and organizationally.<\/p><p>With CONVOTIS Security Operations, we detect threats early, prevent escalation, and safeguard operations \u2013 24\/7, when it matters most.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-35c5075 e-con-full e-flex e-con e-child\" data-id=\"35c5075\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-b97f00c e-con-full e-flex e-con e-child\" data-id=\"b97f00c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e10539 elementor-widget elementor-widget-text-editor\" data-id=\"1e10539\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>Technology that protects \u2013 for agile, effective security operations.<\/h4>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dd62df6 e-con-full e-flex e-con e-child\" data-id=\"dd62df6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-289fc59 e-con-full e-flex e-con e-child\" data-id=\"289fc59\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2a6a2a2 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"2a6a2a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-check-thin\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">24\/7 security monitoring through SIEM-based attack detection<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-check-thin\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Integration of external and internal log sources (network, cloud, endpoints)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-check-thin\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Alarm prioritisation, correlation and automated escalation<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-check-thin\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Operation of dedicated SOC structures with incident response playbooks<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e84020b e-con-full e-flex e-con e-child\" data-id=\"e84020b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7b3bb70 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"7b3bb70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-check-thin\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Support with MDR solutions (Managed Detection &amp; Response)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-check-thin\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Tool-Expertise: Microsoft Sentinel, Splunk, Elastic Security, CrowdStrike<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-check-thin\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Optional connection to SOAR platforms for automated response<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-check-thin\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Documentation &amp; reporting in accordance with ISO 27001, NIS2 and DORA specifications<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e8affd elementor-widget elementor-widget-loop-carousel\" data-id=\"9e8affd\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;template_id&quot;:&quot;28317&quot;,&quot;slides_to_show&quot;:&quot;6&quot;,&quot;slides_to_show_tablet&quot;:&quot;4&quot;,&quot;slides_to_show_mobile&quot;:&quot;2&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:40,&quot;sizes&quot;:[]},&quot;autoplay_speed&quot;:2500,&quot;speed&quot;:1000,&quot;_skin&quot;:&quot;post&quot;,&quot;slides_to_show_laptop&quot;:&quot;3&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;.elementor-loop-container&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;offset_sides&quot;:&quot;none&quot;,&quot;image_spacing_custom_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-carousel.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"swiper elementor-loop-container elementor-grid\" role=\"list\" dir=\"ltr\">\n\t\t\t\t<div class=\"swiper-wrapper\" aria-live=\"off\">\n\t\t<style id=\"loop-28317\">.elementor-element-6c28d89 .elementor-widget-off-canvas .e-off-canvas__main .e-off-canvas__content {\nheight: auto;\n}.elementor-28317 .elementor-element.elementor-element-7fa25d85{--display:flex;--flex-direction:column;--container-widget-width:100%;--container-widget-height:initial;--container-widget-flex-grow:0;--container-widget-align-self:initial;--flex-wrap-mobile:wrap;--border-radius:40px 40px 40px 0px;--padding-top:40px;--padding-bottom:40px;--padding-left:0px;--padding-right:0px;}.elementor-28317 .elementor-element.elementor-element-7fa25d85:not(.elementor-motion-effects-element-type-background), .elementor-28317 .elementor-element.elementor-element-7fa25d85 > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-color:var( --e-global-color-5ab2af4 );}.elementor-28317 .elementor-element.elementor-element-486d2a4d img{filter:brightness( 100% ) contrast( 100% ) saturate( 0% ) blur( 0px ) hue-rotate( 0deg );transition-duration:0.3s;}.elementor-28317 .elementor-element.elementor-element-486d2a4d:hover img{filter:brightness( 100% ) contrast( 100% ) saturate( 100% ) blur( 0px ) hue-rotate( 0deg );}@media(max-width:992px){.elementor-28317 .elementor-element.elementor-element-7fa25d85{--min-height:0px;--border-radius:24px 24px 24px 0px;}.elementor-28317 .elementor-element.elementor-element-486d2a4d img{max-width:75%;}}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-44967 post-44967 references type-references status-publish has-post-thumbnail hentry references-service-data-science_ai-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/HOFF-300x173.png\" class=\"attachment-medium size-medium wp-image-30623\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/HOFF-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/HOFF.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-44866 post-44866 references type-references status-publish has-post-thumbnail hentry references-service-data-science_ai-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/World2meet-300x173.png\" class=\"attachment-medium size-medium wp-image-32441\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/World2meet-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/World2meet.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-44961 post-44961 references type-references status-publish has-post-thumbnail hentry references-service-cloud_solutions_es references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/EU-Kommission-300x173.png\" class=\"attachment-medium size-medium wp-image-31046\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/EU-Kommission-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/EU-Kommission.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-44839 post-44839 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Cosentino-300x173.png\" class=\"attachment-medium size-medium wp-image-32937\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Cosentino-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Cosentino.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-44965 post-44965 references type-references status-publish has-post-thumbnail hentry references-service-data-science_ai-es references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/cajamar-300x173.png\" class=\"attachment-medium size-medium wp-image-16903\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/cajamar-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/cajamar.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-44819 post-44819 references type-references status-publish has-post-thumbnail hentry references-service-data-science_ai-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/Enel-300x173.png\" class=\"attachment-medium size-medium wp-image-30631\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/Enel-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/Enel.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-44867 post-44867 references type-references status-publish has-post-thumbnail hentry references-service-data-science_ai-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/ManoMano-300x173.png\" class=\"attachment-medium size-medium wp-image-32322\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/ManoMano-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/ManoMano.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45014 post-45014 references type-references status-publish has-post-thumbnail hentry references-service-data-science_ai-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/Pecovasa-renfe-1-300x173.png\" class=\"attachment-medium size-medium wp-image-31096\" alt=\"logo\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/Pecovasa-renfe-1-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/Pecovasa-renfe-1.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-44868 post-44868 references type-references status-publish has-post-thumbnail hentry references-service-data-science_ai-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/hotelbeds-300x173.png\" class=\"attachment-medium size-medium wp-image-32297\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/hotelbeds-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/hotelbeds.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-44746 post-44746 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Lufthansa-Cargo-300x173.png\" class=\"attachment-medium size-medium wp-image-33380\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Lufthansa-Cargo-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Lufthansa-Cargo.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-44737 post-44737 references type-references status-publish has-post-thumbnail hentry references-service-data-science_ai-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/Wallbox-300x173.png\" class=\"attachment-medium size-medium wp-image-31181\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/Wallbox-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/06\/Wallbox.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-46127 post-46127 references type-references status-publish has-post-thumbnail hentry references-service-security-services-en\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Swica-2-300x173.png\" class=\"attachment-medium size-medium wp-image-46105\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Swica-2-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Swica-2.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-46125 post-46125 references type-references status-publish has-post-thumbnail hentry references-service-security-services-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Swica-2-300x173.png\" class=\"attachment-medium size-medium wp-image-46105\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Swica-2-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Swica-2.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-46123 post-46123 references type-references status-publish has-post-thumbnail hentry references-service-security-services-en\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Diventa-300x173.png\" class=\"attachment-medium size-medium wp-image-46073\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Diventa-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Diventa.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-46121 post-46121 references type-references status-publish has-post-thumbnail hentry references-service-security-services-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Diventa-300x173.png\" class=\"attachment-medium size-medium wp-image-46073\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Diventa-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Diventa.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45011 post-45011 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/Kundenlogo-300-x-100-px-3-300x173.png\" class=\"attachment-medium size-medium wp-image-17691\" alt=\"MENNEKES\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/Kundenlogo-300-x-100-px-3-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/Kundenlogo-300-x-100-px-3.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45012 post-45012 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Metro-Boutique-300x173.png\" class=\"attachment-medium size-medium wp-image-32725\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Metro-Boutique-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Metro-Boutique.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45013 post-45013 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/Neues-Berlin_Wohungsbaugenossenschaft-300x173.png\" class=\"attachment-medium size-medium wp-image-18695\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/Neues-Berlin_Wohungsbaugenossenschaft-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/Neues-Berlin_Wohungsbaugenossenschaft.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45015 post-45015 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/PETROL-300x173.png\" class=\"attachment-medium size-medium wp-image-16909\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/PETROL-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/PETROL.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45016 post-45016 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/Pivovarna-lasko-union-300x173.png\" class=\"attachment-medium size-medium wp-image-16918\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/Pivovarna-lasko-union-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/Pivovarna-lasko-union.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45017 post-45017 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/PKZ-300x173.png\" class=\"attachment-medium size-medium wp-image-32671\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/PKZ-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/PKZ.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45018 post-45018 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/prokon-300x173.png\" class=\"attachment-medium size-medium wp-image-17070\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/prokon-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/prokon.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45019 post-45019 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/University-of-Ljubljana_2-300x173.png\" class=\"attachment-medium size-medium wp-image-16921\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/University-of-Ljubljana_2-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/01\/University-of-Ljubljana_2.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45020 post-45020 references type-references status-publish has-post-thumbnail hentry references-service-data-science_ai-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Vontobel-Asset-Management-AG-300x173.png\" class=\"attachment-medium size-medium wp-image-33217\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Vontobel-Asset-Management-AG-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Vontobel-Asset-Management-AG.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45022 post-45022 references type-references status-publish has-post-thumbnail hentry references-service-cloud_solutions_es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2023\/01\/blau-direkt-300x173.png\" class=\"attachment-medium size-medium wp-image-11458\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2023\/01\/blau-direkt-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2023\/01\/blau-direkt.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45023 post-45023 references type-references status-publish has-post-thumbnail hentry references-service-cloud_solutions_es references-service-data-science_ai-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Varengold-Bank-AG-1-300x173.png\" class=\"attachment-medium size-medium wp-image-33756\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Varengold-Bank-AG-1-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Varengold-Bank-AG-1.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45024 post-45024 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/STOROpack-300x173.png\" class=\"attachment-medium size-medium wp-image-5013\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/STOROpack-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/STOROpack.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45026 post-45026 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/Lueb-Wolters-300x173.png\" class=\"attachment-medium size-medium wp-image-5083\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/Lueb-Wolters-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/Lueb-Wolters.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45027 post-45027 references type-references status-publish has-post-thumbnail hentry references-service-digital-transformation-es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/Lenze-1-300x173.png\" class=\"attachment-medium size-medium wp-image-4930\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/Lenze-1-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/Lenze-1.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"28317\" class=\"elementor elementor-28317 swiper-slide e-loop-item e-loop-item-45031 post-45031 references type-references status-publish has-post-thumbnail hentry references-service-cloud_solutions_es\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-7fa25d85 e-flex e-con-boxed e-con e-parent\" data-id=\"7fa25d85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-486d2a4d elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"486d2a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"173\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/Fahrrad-XXL-2-300x173.png\" class=\"attachment-medium size-medium wp-image-5089\" alt=\"\" srcset=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/Fahrrad-XXL-2-300x173.png 300w, https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2022\/09\/Fahrrad-XXL-2.png 520w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-efb962d e-con-full section e-flex e-con e-parent\" data-id=\"efb962d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-516aa29 e-flex e-con-boxed e-con e-child\" data-id=\"516aa29\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f249803 elementor-widget elementor-widget-text-editor\" data-id=\"f249803\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><strong>What are the specific benefits?<\/strong><br \/>Enhanced security, better decisions, lower risk.<\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ee2666 elementor-widget elementor-widget-convotis-callouts\" data-id=\"4ee2666\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"convotis-callouts.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"d-flex callouts row mt-4  inverse\"><div class=\"callout-block col-md-6 col-xl-3\"><i aria-hidden=\"true\" class=\"icon icon-timer-thin\"><\/i><div class=\"callout-text\">Early detection of real threats through intelligent event analysis<\/div><\/div><div class=\"callout-block col-md-6 col-xl-3\"><i aria-hidden=\"true\" class=\"icon icon-check-square-thin-1\"><\/i><div class=\"callout-text\">Faster response enabled by automated alerting and escalation<\/div><\/div><div class=\"callout-block col-md-6 col-xl-3\"><i aria-hidden=\"true\" class=\"icon icon-clock-clockwise-thin\"><\/i><div class=\"callout-text\">Lower risk of critical failures with 24\/7 monitoring<\/div><\/div><div class=\"callout-block col-md-6 col-xl-3\"><i aria-hidden=\"true\" class=\"icon icon-list-checks-thin\"><\/i><div class=\"callout-text\">Audit readiness for NIS2, DORA, ISO 27001, TISAX<\/div><\/div><div class=\"callout-block col-md-6 col-xl-3\"><i aria-hidden=\"true\" class=\"icon icon-shield-check-thin\"><\/i><div class=\"callout-text\">Reduced exposure through zero-trust strategies and access control<\/div><\/div><div class=\"callout-block col-md-6 col-xl-3\"><i aria-hidden=\"true\" class=\"icon icon-caret-double-up-thin\"><\/i><div class=\"callout-text\">Improved threat intelligence for proactive defense<\/div><\/div><div class=\"callout-block col-md-6 col-xl-3\"><i aria-hidden=\"true\" class=\"icon icon-lock-thin\"><\/i><div class=\"callout-text\">Increased resilience against attacks and operational disruptions<\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6c00fe1 e-con-full e-flex e-con e-parent\" data-id=\"6c00fe1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:8,&quot;sizes&quot;:[]},&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:50}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;laptop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce4a242 elementor-widget elementor-widget-menu-anchor\" data-id=\"ce4a242\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"offering\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0f6f910 e-con-full section e-flex e-con e-parent\" data-id=\"0f6f910\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-2cc9ac0 e-flex e-con-boxed e-con e-child\" data-id=\"2cc9ac0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a43ed8f e-con-full e-flex e-con e-child\" data-id=\"a43ed8f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7a3da9e elementor-widget elementor-widget-heading\" data-id=\"7a3da9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How we support you.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a8753f3 elementor-widget elementor-widget-convotis-bootstrap-button\" data-id=\"a8753f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"convotis-bootstrap-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/www.convotis.com\/es\/en\/contact\/\" target=\"_blank\" class=\"btn btn-iris\">Request a Consultation<\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-561dfc6 e-con-full e-flex e-con e-child\" data-id=\"561dfc6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-993461f elementor-widget elementor-widget-text-editor\" data-id=\"993461f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"179\" data-end=\"400\">We offer strategic security consulting for companies that want to reorganise their IT security holistically &#8211; from risk analysis and zero trust to compliance protection in accordance with NIS2, DORA and ISO 27001.<\/p><p data-start=\"402\" data-end=\"752\">Our consulting approaches are individually tailored to your IT landscape and business objectives and combine technical know-how with regulatory expertise. Whether cloud security assessment, architecture consulting or governance model &#8211; we create clarity, reduce attack surfaces and make your security strategy implementable and auditable.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-383e441 e-flex e-con-boxed e-con e-child\" data-id=\"383e441\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e8c7ac9 elementor-widget elementor-widget-convotis-bootstrap-content-accordion\" data-id=\"e8c7ac9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"convotis-bootstrap-content-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"accordion\" id=\"accordion-e8c7ac9\"><div class=\"accordion-item\"><div class=\"accordion-header\" id=\"accordion-e8c7ac9-item-0-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-e8c7ac9-item-0-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-e8c7ac9-item-0-collapse\"><div class=\"accordion-button-inner\"><h3 class=\"mb-0\">Security Operations Center (SOC) &amp; SIEM<\/h3><span class=\"accordion-subline\">Detect attacks. Monitor systems in real time.<\/span><\/div><\/button><\/div><div id=\"accordion-e8c7ac9-item-0-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-e8c7ac9-item-0-heading\" data-bs-parent=\"#accordion-e8c7ac9\"><div class=\"accordion-body\"><p>Our Security Operations Center (SOC) safeguards IT environments through continuous monitoring, intelligent event analysis, and defined escalation procedures. SIEM platforms aggregate log data from cloud, network, and endpoints, correlate it intelligently, and automatically prioritize alerts. This enables early detection of suspicious activities \u2013 with clear workflows for incident response, forensic analysis, and post-incident actions. The result: greater visibility, faster response times, and consistent operational security.<\/p><\/div><\/div><\/div><div class=\"accordion-item\"><div class=\"accordion-header\" id=\"accordion-e8c7ac9-item-1-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-e8c7ac9-item-1-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-e8c7ac9-item-1-collapse\"><div class=\"accordion-button-inner\"><h3 class=\"mb-0\">Managed Detection &amp; Response (MDR)<\/h3><span class=\"accordion-subline\">Recognise threats. React automatically.<\/span><\/div><\/button><\/div><div id=\"accordion-e8c7ac9-item-1-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-e8c7ac9-item-1-heading\" data-bs-parent=\"#accordion-e8c7ac9\"><div class=\"accordion-body\"><p>Our MDR services combine advanced threat detection with immediate, automated response. Using specialized sensors, machine learning models, and alert filtering, we identify genuine security incidents and trigger countermeasures instantly. Playbooks, escalation paths, and forensic analysis are fully integrated into the workflow. The result: rapid protection against active attacks and minimized impact in critical situations.<\/p><\/div><\/div><\/div><div class=\"accordion-item\"><div class=\"accordion-header\" id=\"accordion-e8c7ac9-item-2-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-e8c7ac9-item-2-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-e8c7ac9-item-2-collapse\"><div class=\"accordion-button-inner\"><h3 class=\"mb-0\">Endpoint Security &amp; EDR<\/h3><span class=\"accordion-subline\">Protect endpoints. Prevent compromise.<\/span><\/div><\/button><\/div><div id=\"accordion-e8c7ac9-item-2-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-e8c7ac9-item-2-heading\" data-bs-parent=\"#accordion-e8c7ac9\"><div class=\"accordion-body\"><p>With Endpoint Detection &amp; Response (EDR), we safeguard workstations, servers, and mobile devices against targeted attacks and zero-day exploits. Behavior-based analytics detect anomalies early, trigger automated responses, and isolate affected systems. Centrally managed policies, response playbooks, and forensic analysis ensure comprehensive endpoint protection \u2013 fully integrated into security operations and aligned with compliance requirements.<\/p><\/div><\/div><\/div><div class=\"accordion-item\"><div class=\"accordion-header\" id=\"accordion-e8c7ac9-item-3-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-e8c7ac9-item-3-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-e8c7ac9-item-3-collapse\"><div class=\"accordion-button-inner\"><h3 class=\"mb-0\">Web &amp; Application Security<\/h3><span class=\"accordion-subline\">Secure web applications. Defend against attacks.<\/span><\/div><\/button><\/div><div id=\"accordion-e8c7ac9-item-3-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-e8c7ac9-item-3-heading\" data-bs-parent=\"#accordion-e8c7ac9\"><div class=\"accordion-body\"><p>We safeguard your web infrastructure with DDoS protection, a Web Application Firewall (WAF), and proactive monitoring. Traffic is continuously analyzed, malicious requests are blocked, and dangerous patterns are neutralized in real time. At the same time, we ensure stable access to websites, portals, and APIs \u2013 even under heavy load or targeted attacks. The result: robust application security without performance loss.<\/p><\/div><\/div><\/div><div class=\"accordion-item\"><div class=\"accordion-header\" id=\"accordion-e8c7ac9-item-4-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-e8c7ac9-item-4-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-e8c7ac9-item-4-collapse\"><div class=\"accordion-button-inner\"><h3 class=\"mb-0\">Access &amp; Identity Management<\/h3><span class=\"accordion-subline\">Control access. Secure identities.<\/span><\/div><\/button><\/div><div id=\"accordion-e8c7ac9-item-4-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-e8c7ac9-item-4-heading\" data-bs-parent=\"#accordion-e8c7ac9\"><div class=\"accordion-body\"><p data-start=\"855\" data-end=\"1340\">With IAM-as-a-Service, role-based access models, SSO, and MFA, we ensure secure access to IT systems \u2013 centralized, auditable, and user-friendly. Both internal and external identities are managed across all systems, with strict control over rights assignment. The result: transparent access management and significantly reduced risk from compromised accounts.<\/p><\/div><\/div><\/div><div class=\"accordion-item\"><div class=\"accordion-header\" id=\"accordion-e8c7ac9-item-5-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-e8c7ac9-item-5-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-e8c7ac9-item-5-collapse\"><div class=\"accordion-button-inner\"><h3 class=\"mb-0\">Key &amp; Certificate Management<\/h3><span class=\"accordion-subline\">Control cryptography centrally. Ensure confidentiality.<\/span><\/div><\/button><\/div><div id=\"accordion-e8c7ac9-item-5-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-e8c7ac9-item-5-heading\" data-bs-parent=\"#accordion-e8c7ac9\"><div class=\"accordion-body\"><p>Our key management solutions provide centralized control over cryptographic keys and digital certificates \u2013 secure, auditable, and highly available. We support the full key lifecycle, including creation, rotation, access control, and automated renewal. The result: consistently protected data, integrity for critical applications, and full compliance with GDPR, ISO 27001, and DORA.<\/p><\/div><\/div><\/div><div class=\"accordion-item\"><div class=\"accordion-header\" id=\"accordion-e8c7ac9-item-6-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-e8c7ac9-item-6-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-e8c7ac9-item-6-collapse\"><div class=\"accordion-button-inner\"><h3 class=\"mb-0\">SOAR &amp; Incident Automation<\/h3><span class=\"accordion-subline\">Automate response. Minimize risk.<\/span><\/div><\/button><\/div><div id=\"accordion-e8c7ac9-item-6-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-e8c7ac9-item-6-heading\" data-bs-parent=\"#accordion-e8c7ac9\"><div class=\"accordion-body\"><p>By integrating SOAR platforms, we orchestrate security processes and accelerate threat response. Playbooks, workflow engines, and integrations with ticketing systems enable full automation \u2013 from alert to remediation. The result: fewer manual errors, standardized processes, and measurable efficiency gains in security operations.<\/p><\/div><\/div><\/div><div class=\"accordion-item\"><div class=\"accordion-header\" id=\"accordion-e8c7ac9-item-7-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-e8c7ac9-item-7-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-e8c7ac9-item-7-collapse\"><div class=\"accordion-button-inner\"><h3 class=\"mb-0\">Threat Intelligence &amp; Compliance Reporting<\/h3><span class=\"accordion-subline\">Understand threats. Demonstrate compliance.<\/span><\/div><\/button><\/div><div id=\"accordion-e8c7ac9-item-7-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-e8c7ac9-item-7-heading\" data-bs-parent=\"#accordion-e8c7ac9\"><div class=\"accordion-body\"><p>We integrate global threat feeds, analyze current attack patterns, and deliver actionable insights for your security strategy. We also prepare compliance reports aligned with ISO 27001, NIS2, and DORA \u2013 tailored for IT teams, management, and auditors. The result: greater transparency, well-founded situational awareness, and complete auditability for regulatory authorities.<\/p><\/div><\/div><\/div><div class=\"accordion-item\"><div class=\"accordion-header\" id=\"accordion-e8c7ac9-item-8-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-e8c7ac9-item-8-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-e8c7ac9-item-8-collapse\"><div class=\"accordion-button-inner\"><h3 class=\"mb-0\">Secure Communication Infrastructure<\/h3><span class=\"accordion-subline\">Secure communication. Protect telecom systems.<\/span><\/div><\/button><\/div><div id=\"accordion-e8c7ac9-item-8-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-e8c7ac9-item-8-heading\" data-bs-parent=\"#accordion-e8c7ac9\"><div class=\"accordion-body\"><p>We protect your VoIP and telecommunications infrastructure against misuse, eavesdropping, and unauthorized access \u2013 using protocol analysis, access controls, and intelligent network segmentation. SIP trunking and IP-based communications are actively monitored and safeguarded. The result: uninterrupted, secure communication at every level.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-750bad64 section e-flex e-con-boxed e-con e-parent\" data-id=\"750bad64\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7168ba0d e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"7168ba0d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4f7dcbad e-con-full e-flex e-con e-child\" data-id=\"4f7dcbad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5b6e7153 elementor-widget elementor-widget-heading\" data-id=\"5b6e7153\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><strong>Your IT transformation starts here.<\/strong><br>Let's talk about your goals.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18a70ffa elementor-widget elementor-widget-text-editor\" data-id=\"18a70ffa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Whether you need to defend against targeted attacks, restructure your IT security, or meet regulatory requirements such as NIS2 and DORA \u2013 we support you with strategic security consulting, clear risk assessments, and tailored architecture design. Together, we create a security framework that is fully auditable and future-proof.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-575ee1d9 elementor-widget elementor-widget-convotis-bootstrap-button\" data-id=\"575ee1d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"convotis-bootstrap-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/www.convotis.com\/es\/en\/contact\/\" target=\"_blank\" class=\"btn btn-iris\">Plan next steps<\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-33d355d4 e-con-full e-flex e-con e-child\" data-id=\"33d355d4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a73c416 elementor-widget elementor-widget-convotis-image-box\" data-id=\"3a73c416\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;laptop&quot;,&quot;tablet&quot;],&quot;_animation&quot;:&quot;none&quot;,&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:50}},&quot;motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]}}\" data-widget_type=\"convotis-image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"image-box border-bottom-left\" style=\"max-width: auto;\">\r\n            <div class=\"image-wrapper has-img-bg\" data-background-url=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/2025\/05\/Get-in-Touch-with-CONVOTIS.png\">\r\n                            <\/div>\r\n        <\/div>\r\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-002dcaa e-con-full section e-flex e-con e-parent\" data-id=\"002dcaa\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-64634f9 e-flex e-con-boxed e-con e-child\" data-id=\"64634f9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3d7482e e-con-full e-flex e-con e-child\" data-id=\"3d7482e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-84ad361 e-con-full e-flex e-con e-child\" data-id=\"84ad361\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_offset&quot;:120,&quot;sticky_offset_tablet&quot;:40,&quot;sticky_parent&quot;:&quot;yes&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;laptop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ba8dc3f elementor-widget elementor-widget-heading\" data-id=\"ba8dc3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><strong>Dive deeper into the topic.<\/strong><br>\nExplore further resources.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-13d714c e-con-full e-flex e-con e-child\" data-id=\"13d714c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1ece500 e-con-full e-flex e-con e-child\" data-id=\"1ece500\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-e696468 e-con-full e-flex e-con e-child\" data-id=\"e696468\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c6a7e65 e-con-full e-flex e-con e-child\" data-id=\"c6a7e65\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1df1525 elementor-widget elementor-widget-heading\" data-id=\"1df1525\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Zero Trust Security: The New Standard for Secure IT <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6948ce6 elementor-widget elementor-widget-text-editor\" data-id=\"6948ce6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>From access control to architecture strategy \u2013 a concise look at how Zero Trust Security safeguards modern IT infrastructures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3661447 elementor-widget elementor-widget-convotis-bootstrap-button\" data-id=\"3661447\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"convotis-bootstrap-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/www.convotis.com\/es\/en\/news\/zero-trust-security-the-new-standard-for-secure-it-infrastructures\/\" target=\"_blank\" class=\"btn btn-light\">Read more<\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c69a28 e-con-full e-flex e-con e-child\" data-id=\"0c69a28\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-e61ac08 e-con-full e-flex e-con e-child\" data-id=\"e61ac08\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-33466bb e-con-full e-flex e-con e-child\" data-id=\"33466bb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ca1e1f elementor-widget elementor-widget-heading\" data-id=\"2ca1e1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Security Awareness<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f270b0 elementor-widget elementor-widget-text-editor\" data-id=\"9f270b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"299\" data-end=\"469\">Human risk factor: weakness or security asset? What companies should watch for in their workforce.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a24b91 elementor-widget elementor-widget-convotis-bootstrap-button\" data-id=\"3a24b91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"convotis-bootstrap-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/www.convotis.com\/es\/en\/news\/security-awareness-what-companies-should-look-for-in-their-employees\/\" target=\"_blank\" class=\"btn btn-light\">Read the article<\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e61ef27 e-con-full section e-flex e-con e-parent\" data-id=\"e61ef27\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-9247cd4 e-flex e-con-boxed e-con e-child\" data-id=\"9247cd4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e1fd8c3 e-con-full e-flex e-con e-child\" data-id=\"e1fd8c3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-70a0ae6 e-con-full e-flex e-con e-child\" data-id=\"70a0ae6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_offset&quot;:120,&quot;sticky_offset_tablet&quot;:40,&quot;sticky_parent&quot;:&quot;yes&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;laptop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9647a58 elementor-widget elementor-widget-heading\" data-id=\"9647a58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FAQ\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17141f6 elementor-widget elementor-widget-text-editor\" data-id=\"17141f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Do you have questions about operational IT security?<br \/>Our FAQ provides concise answers to key topics including attack detection, incident response, SIEM, MDR, SOAR, and 24\/7 security monitoring.<\/p><p>Still have questions?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3e91f2 elementor-widget elementor-widget-convotis-bootstrap-button\" data-id=\"c3e91f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"convotis-bootstrap-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/www.convotis.com\/es\/en\/contact\/\" target=\"_blank\" class=\"btn btn-light\">Get in touch now<\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7d456b3 e-con-full e-flex e-con e-child\" data-id=\"7d456b3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b800e2b elementor-widget elementor-widget-convotis-bootstrap-accordion\" data-id=\"b800e2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"convotis-bootstrap-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"accordion faq-accordion accordion-inverse\" id=\"accordion-b800e2b\"><script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"What is meant by security operations?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Security operations refers to the operational side of IT security \\u2013 the continuous monitoring, detection, and response to cyberattacks. Through Security Operations Centers (SOC), SIEM systems, threat intelligence, and automated incident response, IT infrastructures are actively protected around the clock, with the goal of detecting attacks early and minimizing damage.\"}},{\"@type\":\"Question\",\"name\":\"How does a Security Operations Centre (SOC) work?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"A SOC collects and analyzes security-relevant data from sources such as firewalls, endpoints, cloud systems, and network components. Using a SIEM system, this information is correlated in real time, prioritized, and automatically escalated when necessary. SOC incident response teams assess alerts, respond to threats, and document security incidents in a fully auditable manner.\"}},{\"@type\":\"Question\",\"name\":\"What advantages does Managed Detection &amp; Response (MDR) offer?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"MDR services enable organizations to quickly detect and respond to even complex cyberattacks \\u2013 without maintaining their own 24\\\/7 security resources. With automated threat detection, playbooks, and forensic analysis, MDR ensures effective attack identification and rapid response. For companies without an internal security team, MDR offers a scalable solution for maintaining operational security.\"}},{\"@type\":\"Question\",\"name\":\"What is the difference between SIEM and SOAR?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"A SIEM system (Security Information and Event Management) collects and analyzes security events, detects anomalies, and generates alerts. SOAR (Security Orchestration, Automation, and Response) builds on this by adding automated response capabilities. While SIEM focuses on detection, SOAR ensures that standardized countermeasures are automatically triggered and documented \\u2013 for example, through playbooks or integrations with ticketing systems.\"}},{\"@type\":\"Question\",\"name\":\"What role does Threat Intelligence play in Security Operations?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Threat intelligence delivers contextualized insights into current attack patterns, vulnerabilities, and global threats. In security operations, this information helps categorize alerts more accurately, refine detection capabilities, and trigger targeted countermeasures. Combined with compliance reporting (e.g., ISO 27001, NIS2, DORA), it provides a solid foundation for informed decision-making in operational IT security.\"}}]}<\/script><div class=\"accordion-item faq-item\"><div class=\"accordion-header\" id=\"accordion-b800e2b-item-0-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-b800e2b-item-0-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-b800e2b-item-0-collapse\"><div class=\"accordion-button-inner\"><h4 class=\"mb-0 faq-question\">What is meant by security operations?<\/h4><\/div><\/button><\/div><div id=\"accordion-b800e2b-item-0-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-b800e2b-item-0-heading\" data-bs-parent=\"#accordion-b800e2b\"><div class=\"accordion-body faq-answer\"><p data-start=\"375\" data-end=\"775\">Security operations refers to the operational side of IT security \u2013 the continuous monitoring, detection, and response to cyberattacks. Through Security Operations Centers (SOC), SIEM systems, threat intelligence, and automated incident response, IT infrastructures are actively protected around the clock, with the goal of detecting attacks early and minimizing damage.<\/p><\/div><\/div><\/div><div class=\"accordion-item faq-item\"><div class=\"accordion-header\" id=\"accordion-b800e2b-item-1-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-b800e2b-item-1-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-b800e2b-item-1-collapse\"><div class=\"accordion-button-inner\"><h4 class=\"mb-0 faq-question\">How does a Security Operations Centre (SOC) work?<\/h4><\/div><\/button><\/div><div id=\"accordion-b800e2b-item-1-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-b800e2b-item-1-heading\" data-bs-parent=\"#accordion-b800e2b\"><div class=\"accordion-body faq-answer\"><p>A SOC collects and analyzes security-relevant data from sources such as firewalls, endpoints, cloud systems, and network components. Using a SIEM system, this information is correlated in real time, prioritized, and automatically escalated when necessary. SOC incident response teams assess alerts, respond to threats, and document security incidents in a fully auditable manner.<\/p><\/div><\/div><\/div><div class=\"accordion-item faq-item\"><div class=\"accordion-header\" id=\"accordion-b800e2b-item-2-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-b800e2b-item-2-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-b800e2b-item-2-collapse\"><div class=\"accordion-button-inner\"><h4 class=\"mb-0 faq-question\">What advantages does Managed Detection &amp; Response (MDR) offer?<\/h4><\/div><\/button><\/div><div id=\"accordion-b800e2b-item-2-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-b800e2b-item-2-heading\" data-bs-parent=\"#accordion-b800e2b\"><div class=\"accordion-body faq-answer\"><p>MDR services enable organizations to quickly detect and respond to even complex cyberattacks \u2013 without maintaining their own 24\/7 security resources. With automated threat detection, playbooks, and forensic analysis, MDR ensures effective attack identification and rapid response. For companies without an internal security team, MDR offers a scalable solution for maintaining operational security.<\/p><\/div><\/div><\/div><div class=\"accordion-item faq-item\"><div class=\"accordion-header\" id=\"accordion-b800e2b-item-3-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-b800e2b-item-3-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-b800e2b-item-3-collapse\"><div class=\"accordion-button-inner\"><h4 class=\"mb-0 faq-question\">What is the difference between SIEM and SOAR?<\/h4><\/div><\/button><\/div><div id=\"accordion-b800e2b-item-3-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-b800e2b-item-3-heading\" data-bs-parent=\"#accordion-b800e2b\"><div class=\"accordion-body faq-answer\"><p>A SIEM system (Security Information and Event Management) collects and analyzes security events, detects anomalies, and generates alerts. SOAR (Security Orchestration, Automation, and Response) builds on this by adding automated response capabilities. While SIEM focuses on detection, SOAR ensures that standardized countermeasures are automatically triggered and documented \u2013 for example, through playbooks or integrations with ticketing systems.<\/p><\/div><\/div><\/div><div class=\"accordion-item faq-item\"><div class=\"accordion-header\" id=\"accordion-b800e2b-item-4-heading\"><button class=\"accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#accordion-b800e2b-item-4-collapse\" aria-expanded=\"false\" aria-controls=\"accordion-b800e2b-item-4-collapse\"><div class=\"accordion-button-inner\"><h4 class=\"mb-0 faq-question\">What role does Threat Intelligence play in Security Operations?<\/h4><\/div><\/button><\/div><div id=\"accordion-b800e2b-item-4-collapse\" class=\"accordion-collapse collapse \" aria-labelledby=\"accordion-b800e2b-item-4-heading\" data-bs-parent=\"#accordion-b800e2b\"><div class=\"accordion-body faq-answer\"><p>Threat intelligence delivers contextualized insights into current attack patterns, vulnerabilities, and global threats. In security operations, this information helps categorize alerts more accurately, refine detection capabilities, and trigger targeted countermeasures. Combined with compliance reporting (e.g., ISO 27001, NIS2, DORA), it provides a solid foundation for informed decision-making in operational IT security.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c3456cc e-con-full section is-bg-greige e-flex e-con e-parent\" data-id=\"c3456cc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-74eb327 e-flex e-con-boxed e-con e-child\" data-id=\"74eb327\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9419d2a elementor-widget elementor-widget-text-editor\" data-id=\"9419d2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><strong>Latest Insights. <\/strong><br \/>In Security Services .<\/h2>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f43758b elementor-widget elementor-widget-featured_articles_carousel\" data-id=\"f43758b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;slides_per_view&quot;:3,&quot;slides_per_view_tablet&quot;:2,&quot;slides_per_view_mobile&quot;:1}\" data-widget_type=\"featured_articles_carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"swiper featured-carousel position-relative \"\r\n                 data-slides-desktop=\"3\"\r\n                 data-slides-tablet=\"2\"\r\n                 data-slides-mobile=\"1\">\r\n                <div class=\"swiper-wrapper\">\r\n                                                <div class=\"swiper-slide\">\r\n                                <div class=\"card\">\r\n                                    <a href=\"https:\/\/www.convotis.com\/es\/en\/news\/zero-trust-architectures-access-control-and-continuous-authorisation-in-distributed-systems\/\">\r\n                                                                                    <img decoding=\"async\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2026\/04\/Identity-Policy-und-Enforcement--768x472.png\" class=\"card-img-top img-fluid\" alt=\"Zero Trust Architectures: Access Control and Continuous Authorisation in Distributed Systems\">\r\n                                                                                <div class=\"card-body\">\r\n                                            <span class=\"info-pill\">Security Services<\/span>\r\n                                            <h4 class=\"my-3 featured-title\">Zero Trust Architectures: Access Control and Continuous Authorisation in Distributed Systems<\/h4>\r\n                                            <span class=\"read-more\">Read more<\/span>\r\n                                        <\/div>\r\n                                    <\/a>\r\n                                <\/div>\r\n                            <\/div>\r\n                                                        <div class=\"swiper-slide\">\r\n                                <div class=\"card\">\r\n                                    <a href=\"https:\/\/www.convotis.com\/es\/en\/news\/cyberattacks-in-europe-pressure-on-digital-platforms-in-germany\/\">\r\n                                                                                    <img decoding=\"async\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2026\/03\/Cyberangriffe-in-Europa-768x472.png\" class=\"card-img-top img-fluid\" alt=\"Cyberattacks in Europe: Pressure on Digital Platforms in Germany\">\r\n                                                                                <div class=\"card-body\">\r\n                                            <span class=\"info-pill\">Security Services<\/span>\r\n                                            <h4 class=\"my-3 featured-title\">Cyberattacks in Europe: Pressure on Digital Platforms in Germany<\/h4>\r\n                                            <span class=\"read-more\">Read more<\/span>\r\n                                        <\/div>\r\n                                    <\/a>\r\n                                <\/div>\r\n                            <\/div>\r\n                                                        <div class=\"swiper-slide\">\r\n                                <div class=\"card\">\r\n                                    <a href=\"https:\/\/www.convotis.com\/es\/en\/news\/identity-and-access-management-as-a-structural-control-instance-of-modern-platform-architectures\/\">\r\n                                                                                    <img decoding=\"async\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2026\/03\/Identity-and-Access-Management-768x472.png\" class=\"card-img-top img-fluid\" alt=\"Identity and Access Management as a Structural Control Instance of Modern Platform Architectures\">\r\n                                                                                <div class=\"card-body\">\r\n                                            <span class=\"info-pill\">Security Services<\/span>\r\n                                            <h4 class=\"my-3 featured-title\">Identity and Access Management as a Structural Control Instance of Modern Platform Architectures<\/h4>\r\n                                            <span class=\"read-more\">Read more<\/span>\r\n                                        <\/div>\r\n                                    <\/a>\r\n                                <\/div>\r\n                            <\/div>\r\n                                                        <div class=\"swiper-slide\">\r\n                                <div class=\"card\">\r\n                                    <a href=\"https:\/\/www.convotis.com\/es\/en\/news\/why-platform-programs-fail-at-interfaces-in-enterprise-it\/\">\r\n                                                                                    <img decoding=\"async\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2026\/02\/Enterprise-Plattformen-Interfaces-768x472.png\" class=\"card-img-top img-fluid\" alt=\"Why Platform Programs Fail at Interfaces in Enterprise IT\">\r\n                                                                                <div class=\"card-body\">\r\n                                            <span class=\"info-pill\">Cloud Solutions<\/span>\r\n                                            <h4 class=\"my-3 featured-title\">Why Platform Programs Fail at Interfaces in Enterprise IT<\/h4>\r\n                                            <span class=\"read-more\">Read more<\/span>\r\n                                        <\/div>\r\n                                    <\/a>\r\n                                <\/div>\r\n                            <\/div>\r\n                                                        <div class=\"swiper-slide\">\r\n                                <div class=\"card\">\r\n                                    <a href=\"https:\/\/www.convotis.com\/es\/en\/news\/security-architecture-for-sovereign-cloud-platforms\/\">\r\n                                                                                    <img decoding=\"async\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2026\/02\/SovereignArchitecture_Cloud-768x472.png\" class=\"card-img-top img-fluid\" alt=\"Security Architecture for Sovereign Cloud Platforms\">\r\n                                                                                <div class=\"card-body\">\r\n                                            <span class=\"info-pill\">Security Services<\/span>\r\n                                            <h4 class=\"my-3 featured-title\">Security Architecture for Sovereign Cloud Platforms<\/h4>\r\n                                            <span class=\"read-more\">Read more<\/span>\r\n                                        <\/div>\r\n                                    <\/a>\r\n                                <\/div>\r\n                            <\/div>\r\n                                                        <div class=\"swiper-slide\">\r\n                                <div class=\"card\">\r\n                                    <a href=\"https:\/\/www.convotis.com\/es\/en\/news\/incident-detection-and-response-in-modern-it-landscapes\/\">\r\n                                                                                    <img decoding=\"async\" src=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2026\/02\/Incident-Detection-Response-768x472.png\" class=\"card-img-top img-fluid\" alt=\"Incident Detection and Response in Modern IT Landscapes\">\r\n                                                                                <div class=\"card-body\">\r\n                                            <span class=\"info-pill\">Security Services<\/span>\r\n                                            <h4 class=\"my-3 featured-title\">Incident Detection and Response in Modern IT Landscapes<\/h4>\r\n                                            <span class=\"read-more\">Read more<\/span>\r\n                                        <\/div>\r\n                                    <\/a>\r\n                                <\/div>\r\n                            <\/div>\r\n                                            <\/div>\r\n                <div class=\"d-flex justify-content-between align-items-center\">\r\n                                        <div class=\"featured-carousel-progress w-50 \">\r\n                        <div class=\"progress\">\r\n                            <div class=\"progress-bar\" role=\"progressbar\"\r\n                                 style=\"width: 0%;\"\r\n                                 aria-valuenow=\"0\" aria-valuemin=\"0\" aria-valuemax=\"100\"><\/div>\r\n                        <\/div>\r\n                    <\/div>\r\n                    <div class=\"swiper-navigation\">\r\n                        <div class=\"button-prev\">\r\n                            <i class=\"fa fa-arrow-left\"><\/i>\r\n                        <\/div>\r\n                        <div class=\"button-next\">\r\n                            <i class=\"fa fa-arrow-right\"><\/i>\r\n                        <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/div>\r\n            \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Security Operations for System Protection For companies that need to reliably detect cyberattacks, respond automatically, and secure their IT systems around the clock. With targeted detection and response, SOC processes, and end-to-end monitoring \u2013 enabling rapid reaction, minimizing damage, and ensuring constant protection during ongoing operations. How we support you Cybersecurity requires prompt response and [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":40913,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-41319","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security Operations \u2013 Operational IT Security &amp; Threat Response<\/title>\n<meta name=\"description\" content=\"Operational IT security with Security Operations: attack detection, response capability and 24\/7 monitoring - technical, scalable, effective.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.convotis.com\/es\/en\/security-services\/security-operations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Operations \u2013 Operational IT Security &amp; Threat Response\" \/>\n<meta property=\"og:description\" content=\"Operational IT security with Security Operations: attack detection, response capability and 24\/7 monitoring - technical, scalable, effective.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.convotis.com\/es\/en\/security-services\/security-operations\/\" \/>\n<meta property=\"og:site_name\" content=\"CONVOTIS Iberia\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-26T06:29:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/03\/Security-Awareness.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"23 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/security-services\\\/security-operations\\\/\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/security-services\\\/security-operations\\\/\",\"name\":\"Security Operations \u2013 Operational IT Security & Threat Response\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/security-services\\\/security-operations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/security-services\\\/security-operations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/03\\\/Security-Awareness.png\",\"datePublished\":\"2025-08-09T05:44:56+00:00\",\"dateModified\":\"2025-08-26T06:29:43+00:00\",\"description\":\"Operational IT security with Security Operations: attack detection, response capability and 24\\\/7 monitoring - technical, scalable, effective.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/security-services\\\/security-operations\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/security-services\\\/security-operations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/security-services\\\/security-operations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/03\\\/Security-Awareness.png\",\"contentUrl\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/03\\\/Security-Awareness.png\",\"width\":1090,\"height\":670,\"caption\":\"Security Operations environment with monitoring dashboards and analysts \u2013 representing real-time threat detection, incident response, and continuous protection in enterprise IT.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/security-services\\\/security-operations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security Services\",\"item\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/security-services\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Operations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/\",\"name\":\"CONVOTIS\",\"description\":\"For Europe&#039;s digital future.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#organization\",\"name\":\"CONVOTIS\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/08\\\/Convotis_blue_cmyk300dpi-scaled.png\",\"contentUrl\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/08\\\/Convotis_blue_cmyk300dpi-scaled.png\",\"width\":2560,\"height\":411,\"caption\":\"CONVOTIS\"},\"image\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/convotis-gmbh\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Operations \u2013 Operational IT Security & Threat Response","description":"Operational IT security with Security Operations: attack detection, response capability and 24\/7 monitoring - technical, scalable, effective.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.convotis.com\/es\/en\/security-services\/security-operations\/","og_locale":"en_US","og_type":"article","og_title":"Security Operations \u2013 Operational IT Security & Threat Response","og_description":"Operational IT security with Security Operations: attack detection, response capability and 24\/7 monitoring - technical, scalable, effective.","og_url":"https:\/\/www.convotis.com\/es\/en\/security-services\/security-operations\/","og_site_name":"CONVOTIS Iberia","article_modified_time":"2025-08-26T06:29:43+00:00","og_image":[{"url":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/03\/Security-Awareness.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"23 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.convotis.com\/es\/en\/security-services\/security-operations\/","url":"https:\/\/www.convotis.com\/es\/en\/security-services\/security-operations\/","name":"Security Operations \u2013 Operational IT Security & Threat Response","isPartOf":{"@id":"https:\/\/www.convotis.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.convotis.com\/es\/en\/security-services\/security-operations\/#primaryimage"},"image":{"@id":"https:\/\/www.convotis.com\/es\/en\/security-services\/security-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/03\/Security-Awareness.png","datePublished":"2025-08-09T05:44:56+00:00","dateModified":"2025-08-26T06:29:43+00:00","description":"Operational IT security with Security Operations: attack detection, response capability and 24\/7 monitoring - technical, scalable, effective.","breadcrumb":{"@id":"https:\/\/www.convotis.com\/es\/en\/security-services\/security-operations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.convotis.com\/es\/en\/security-services\/security-operations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.convotis.com\/es\/en\/security-services\/security-operations\/#primaryimage","url":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/03\/Security-Awareness.png","contentUrl":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/03\/Security-Awareness.png","width":1090,"height":670,"caption":"Security Operations environment with monitoring dashboards and analysts \u2013 representing real-time threat detection, incident response, and continuous protection in enterprise IT."},{"@type":"BreadcrumbList","@id":"https:\/\/www.convotis.com\/es\/en\/security-services\/security-operations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security Services","item":"https:\/\/www.convotis.com\/es\/en\/security-services\/"},{"@type":"ListItem","position":2,"name":"Security Operations"}]},{"@type":"WebSite","@id":"https:\/\/www.convotis.com\/es\/#website","url":"https:\/\/www.convotis.com\/es\/","name":"CONVOTIS","description":"For Europe&#039;s digital future.","publisher":{"@id":"https:\/\/www.convotis.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.convotis.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.convotis.com\/es\/#organization","name":"CONVOTIS","url":"https:\/\/www.convotis.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.convotis.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Convotis_blue_cmyk300dpi-scaled.png","contentUrl":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Convotis_blue_cmyk300dpi-scaled.png","width":2560,"height":411,"caption":"CONVOTIS"},"image":{"@id":"https:\/\/www.convotis.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/convotis-gmbh\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/pages\/41319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/comments?post=41319"}],"version-history":[{"count":17,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/pages\/41319\/revisions"}],"predecessor-version":[{"id":47547,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/pages\/41319\/revisions\/47547"}],"up":[{"embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/pages\/40913"}],"wp:attachment":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/media?parent=41319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}