{"id":7585,"date":"2025-02-28T16:54:48","date_gmt":"2025-02-28T15:54:48","guid":{"rendered":"https:\/\/d10.ai\/?p=7585"},"modified":"2025-03-06T15:27:25","modified_gmt":"2025-03-06T14:27:25","slug":"komand-rapid7-automatisation-securite-ia","status":"publish","type":"post","link":"https:\/\/d10.ai\/es\/komand-rapid7-automatisation-securite-ia\/","title":{"rendered":"Optimice sus procesos B2B con Komand (Rapid7)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7585\" class=\"elementor elementor-7585\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0644c7c e-flex e-con-boxed e-con e-parent\" data-id=\"0644c7c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3b77382 elementor-widget elementor-widget-heading\" data-id=\"3b77382\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1. PRESENTACI\u00d3N CONCISA<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32058c2 elementor-widget elementor-widget-text-editor\" data-id=\"32058c2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 1 []\">Komand (Rapid7) es una soluci\u00f3n de automatizaci\u00f3n y orquestaci\u00f3n de seguridad (SOAR) que permite a las empresas agilizar y optimizar sus procesos de respuesta a incidentes. Gracias a la inteligencia artificial, automatiza la identificaci\u00f3n de amenazas, la remediaci\u00f3n y la investigaci\u00f3n, reduciendo la carga de trabajo de los equipos de ciberseguridad y mejorando la capacidad de respuesta ante ataques. Su interfaz intuitiva y sus m\u00faltiples integraciones facilitan la configuraci\u00f3n y el despliegue en entornos complejos.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c301c48 elementor-widget elementor-widget-heading\" data-id=\"c301c48\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2. CONDICIONES DE USO<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80ac738 elementor-widget elementor-widget-text-editor\" data-id=\"80ac738\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"638\" data-end=\"747\"><strong data-start=\"640\" data-end=\"664\">Requisitos t\u00e9cnicos:<\/strong> Infraestructura segura con acceso API a soluciones de ciberseguridad existentes.<\/li><li data-start=\"748\" data-end=\"871\"><strong data-start=\"750\" data-end=\"778\">Competencias requeridas:<\/strong> Conocimientos en gesti\u00f3n de incidentes y automatizaci\u00f3n de flujos de trabajo de seguridad.<\/li><li data-start=\"872\" data-end=\"975\"><strong data-start=\"874\" data-end=\"890\">Integraci\u00f3n:<\/strong> Compatible con SIEM, herramientas de gesti\u00f3n de vulnerabilidades y soluciones EDR.<\/li><li data-start=\"976\" data-end=\"1074\"><strong data-start=\"978\" data-end=\"989\">Costos:<\/strong> Basado en el volumen de datos analizados y la cantidad de playbooks automatizados.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ae036d elementor-widget elementor-widget-image\" data-id=\"3ae036d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"552\" src=\"https:\/\/d10.ai\/wp-content\/uploads\/2025\/02\/d10-Rapid7-768x552-1.png\" class=\"attachment-large size-large wp-image-7587\" alt=\"\" srcset=\"https:\/\/d10.ai\/wp-content\/uploads\/2025\/02\/d10-Rapid7-768x552-1.png 768w, https:\/\/d10.ai\/wp-content\/uploads\/2025\/02\/d10-Rapid7-768x552-1-300x216.png 300w, https:\/\/d10.ai\/wp-content\/uploads\/2025\/02\/d10-Rapid7-768x552-1-40x29.png 40w, https:\/\/d10.ai\/wp-content\/uploads\/2025\/02\/d10-Rapid7-768x552-1-100x72.png 100w, https:\/\/d10.ai\/wp-content\/uploads\/2025\/02\/d10-Rapid7-768x552-1-200x144.png 200w, https:\/\/d10.ai\/wp-content\/uploads\/2025\/02\/d10-Rapid7-768x552-1-714x513.png 714w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4e9bd9 elementor-widget elementor-widget-heading\" data-id=\"e4e9bd9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3. BENEFICIOS CUANTIFICABLES<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d1ff81f elementor-widget elementor-widget-text-editor\" data-id=\"d1ff81f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"1112\" data-end=\"1190\"><strong data-start=\"1114\" data-end=\"1129\">Eficiencia:<\/strong> Reducci\u00f3n del tiempo de respuesta a incidentes en un 80 %.<\/li><li data-start=\"1191\" data-end=\"1283\"><strong data-start=\"1193\" data-end=\"1201\">ROI:<\/strong> Disminuci\u00f3n de los costos operativos relacionados con investigaciones manuales.<\/li><li data-start=\"1284\" data-end=\"1374\"><strong data-start=\"1286\" data-end=\"1305\">Competitividad:<\/strong> Automatizaci\u00f3n avanzada que reduce la fatiga de los analistas SOC.<\/li><li data-start=\"1375\" data-end=\"1488\"><strong data-start=\"1377\" data-end=\"1394\">Casos de uso:<\/strong> Detecci\u00f3n y remediaci\u00f3n automatizadas de amenazas, orquestaci\u00f3n de respuestas a incidentes.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65a4156 elementor-widget elementor-widget-heading\" data-id=\"65a4156\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4. LIMITACIONES Y DESAF\u00cdOS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f33647 elementor-widget elementor-widget-text-editor\" data-id=\"1f33647\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"1524\" data-end=\"1604\"><strong data-start=\"1526\" data-end=\"1539\">Barreras:<\/strong> Requiere una integraci\u00f3n avanzada con los sistemas existentes.<\/li><li data-start=\"1605\" data-end=\"1696\"><strong data-start=\"1607\" data-end=\"1633\">Limitaciones t\u00e9cnicas:<\/strong> Puede necesitar ajustes para minimizar los falsos positivos.<\/li><li data-start=\"1697\" data-end=\"1786\"><strong data-start=\"1699\" data-end=\"1711\">Riesgos:<\/strong> Posibles errores en la automatizaci\u00f3n si la configuraci\u00f3n no es precisa.<\/li><li data-start=\"1787\" data-end=\"1910\"><strong data-start=\"1789\" data-end=\"1814\">Curva de aprendizaje:<\/strong> Se necesita formaci\u00f3n para crear y gestionar eficazmente los flujos de trabajo automatizados.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8213deb elementor-widget elementor-widget-heading\" data-id=\"8213deb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">5. COMPARACI\u00d3N CON ALTERNATIVAS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b103ff elementor-widget elementor-widget-text-editor\" data-id=\"3b103ff\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"1951\" data-end=\"2024\"><strong data-start=\"1953\" data-end=\"1970\">Competidores:<\/strong> Palo Alto Cortex XSOAR, Splunk SOAR, IBM Resilient.<\/li><li data-start=\"2025\" data-end=\"2120\"><strong data-start=\"2027\" data-end=\"2042\">Fortalezas:<\/strong> Interfaz intuitiva, alta capacidad de integraci\u00f3n, automatizaci\u00f3n avanzada.<\/li><li data-start=\"2121\" data-end=\"2218\"><strong data-start=\"2123\" data-end=\"2139\">Debilidades:<\/strong> Configuraci\u00f3n inicial compleja, costo de adquisici\u00f3n potencialmente elevado.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11814b4 elementor-widget elementor-widget-heading\" data-id=\"11814b4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">6. APLICACIONES SECTORIALES \u00d3PTIMAS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0fcd130 elementor-widget elementor-widget-text-editor\" data-id=\"0fcd130\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"2263\" data-end=\"2351\"><strong data-start=\"2265\" data-end=\"2278\">Finanzas:<\/strong> Reducci\u00f3n del tiempo de respuesta ante fraudes y amenazas financieras.<\/li><li data-start=\"2352\" data-end=\"2446\"><strong data-start=\"2354\" data-end=\"2369\">E-commerce:<\/strong> Protecci\u00f3n proactiva contra ciberataques dirigidos a plataformas en l\u00ednea.<\/li><li data-start=\"2447\" data-end=\"2537\"><strong data-start=\"2449\" data-end=\"2459\">Salud:<\/strong> Seguridad en el manejo de historiales m\u00e9dicos y detecci\u00f3n de ciberamenazas.<\/li><li data-start=\"2538\" data-end=\"2608\"><strong data-start=\"2540\" data-end=\"2554\">Log\u00edstica:<\/strong> Prevenci\u00f3n de ataques en infraestructuras cr\u00edticas.<\/li><li data-start=\"2609\" data-end=\"2702\"><strong data-start=\"2611\" data-end=\"2624\">Gobierno:<\/strong> Protecci\u00f3n de datos sensibles y respuesta r\u00e1pida a incidentes de seguridad.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73e265d elementor-widget elementor-widget-heading\" data-id=\"73e265d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">7. ESTUDIOS DE CASO DOCUMENTADOS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d9ea4b elementor-widget elementor-widget-text-editor\" data-id=\"6d9ea4b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2744\" data-end=\"2777\"><strong data-start=\"2744\" data-end=\"2775\">Caso 1: Banco internacional<\/strong><\/p><ul data-start=\"2778\" data-end=\"3048\"><li data-start=\"2778\" data-end=\"2858\"><strong data-start=\"2780\" data-end=\"2793\">Problema:<\/strong> Largos tiempos de respuesta ante incidentes de ciberseguridad.<\/li><li data-start=\"2859\" data-end=\"2942\"><strong data-start=\"2861\" data-end=\"2874\">Soluci\u00f3n:<\/strong> Implementaci\u00f3n de Komand para automatizar la gesti\u00f3n de amenazas.<\/li><li data-start=\"2943\" data-end=\"3048\"><strong data-start=\"2945\" data-end=\"2960\">Resultados:<\/strong> Reducci\u00f3n del tiempo de investigaci\u00f3n en un 75 % y mejora del cumplimiento normativo.<\/li><\/ul><p data-start=\"3050\" data-end=\"3093\"><strong data-start=\"3050\" data-end=\"3091\">Caso 2: Gran plataforma de e-commerce<\/strong><\/p><ul data-start=\"3094\" data-end=\"3355\"><li data-start=\"3094\" data-end=\"3168\"><strong data-start=\"3096\" data-end=\"3109\">Problema:<\/strong> Incremento de ataques de phishing dirigidos a empleados.<\/li><li data-start=\"3169\" data-end=\"3266\"><strong data-start=\"3171\" data-end=\"3184\">Soluci\u00f3n:<\/strong> Uso de Komand para detectar y neutralizar autom\u00e1ticamente intentos de phishing.<\/li><li data-start=\"3267\" data-end=\"3355\"><strong data-start=\"3269\" data-end=\"3284\">Resultados:<\/strong> Reducci\u00f3n del 60 % de incidentes relacionados con ingenier\u00eda social.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52dd706 elementor-widget elementor-widget-heading\" data-id=\"52dd706\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">8. CONSIDERACIONES ESTRAT\u00c9GICAS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52c575b elementor-widget elementor-widget-text-editor\" data-id=\"52c575b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"3396\" data-end=\"3507\"><strong data-start=\"3398\" data-end=\"3425\">Transformaci\u00f3n digital:<\/strong> Integraci\u00f3n de la automatizaci\u00f3n en los procesos de ciberseguridad empresarial.<\/li><li data-start=\"3508\" data-end=\"3614\"><strong data-start=\"3510\" data-end=\"3536\">Evoluci\u00f3n tecnol\u00f3gica:<\/strong> Creciente adopci\u00f3n de soluciones SOAR para la gesti\u00f3n avanzada de amenazas.<\/li><li data-start=\"3615\" data-end=\"3770\" data-is-last-node=\"\"><strong data-start=\"3617\" data-end=\"3637\">Recomendaciones:<\/strong> Implementaci\u00f3n progresiva con pruebas en casos de uso espec\u00edficos para ajustar las reglas de automatizaci\u00f3n y maximizar la eficacia.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ed62e48 e-flex e-con-boxed e-con e-parent\" data-id=\"ed62e48\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-040e3da elementor-widget elementor-widget-template\" data-id=\"040e3da\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"container\" data-elementor-id=\"8031\" class=\"elementor elementor-8031 elementor-4711\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39bedd52 e-flex e-con-boxed e-con e-parent\" data-id=\"39bedd52\" data-element_type=\"container\" id=\"cta\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2d1bb796 e-con-full e-flex e-con e-child\" data-id=\"2d1bb796\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57fd44d2 elementor-widget elementor-widget-heading\" data-id=\"57fd44d2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfListo para pasar a la acci\u00f3n?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6444d11f elementor-widget elementor-widget-text-editor\" data-id=\"6444d11f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0Para iniciar una conversaci\u00f3n, completa este formulario indicando cu\u00e1ndo deseas ser llamado.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e755ded elementor-widget elementor-widget-shortcode\" data-id=\"e755ded\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class='fluentform ff-default fluentform_wrapper_1 ffs_default_wrap'><form data-form_id=\"1\" id=\"fluentform_1\" class=\"frm-fluent-form fluent_form_1 ff-el-form-top ff_form_instance_1_1 ff-form-loading ffs_default\" data-form_instance=\"ff_form_instance_1_1\" method=\"POST\" ><fieldset  style=\"border: none!important;margin: 0!important;padding: 0!important;background-color: transparent!important;box-shadow: none!important;outline: none!important; min-inline-size: 100%;\">\n                    <legend class=\"ff_screen_reader_title\" style=\"display: block; margin: 0!important;padding: 0!important;height: 0!important;text-indent: -999999px;width: 0!important;overflow:hidden;\">Universel Contact<\/legend><input type='hidden' name='__fluent_form_embded_post_id' value='7585' \/><input type=\"hidden\" id=\"_fluentform_1_fluentformnonce\" name=\"_fluentform_1_fluentformnonce\" value=\"80edcf4625\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/es\/wp-json\/wp\/v2\/posts\/7585\" \/><div data-type=\"name-element\" data-name=\"names\" class=\" ff-field_container ff-name-field-wrapper\" ><div class='ff-t-container'><div class='ff-t-cell '><div class='ff-el-group  ff-el-form-hide_label'><div class=\"ff-el-input--label ff-el-is-required asterisk-right\"><label for='ff_1_names_first_name_' id='label_ff_1_names_first_name_' >Pr\u00e9nom<\/label><\/div><div class='ff-el-input--content'><input type=\"text\" name=\"names[first_name]\" value=\"\" id=\"ff_1_names_first_name_\" class=\"ff-el-form-control\" placeholder=\"Pr\u00e9nom\" aria-invalid=\"false\" aria-required=true><\/div><\/div><\/div><div class='ff-t-cell '><div class='ff-el-group  ff-el-form-hide_label'><div class=\"ff-el-input--label ff-el-is-required asterisk-right\"><label for='ff_1_names_last_name_' id='label_ff_1_names_last_name_' >Nom<\/label><\/div><div class='ff-el-input--content'><input type=\"text\" name=\"names[last_name]\" value=\"\" id=\"ff_1_names_last_name_\" class=\"ff-el-form-control\" placeholder=\"Nom\" aria-invalid=\"false\" aria-required=true><\/div><\/div><\/div><\/div><\/div><div data-name=\"ff_cn_id_1\"  class='ff-t-container ff-column-container ff_columns_total_2 '><div class='ff-t-cell ff-t-column-1' style='flex-basis: 50%;'><div class='ff-el-group ff-el-form-hide_label'><div class=\"ff-el-input--label ff-el-is-required asterisk-right\"><label for='ff_1_email' id='label_ff_1_email' aria-label=\"Email\">Email<\/label><\/div><div class='ff-el-input--content'><input type=\"email\" name=\"email\" value=\"\" id=\"ff_1_email\" class=\"ff-el-form-control\" placeholder=\"Address Email\" data-name=\"email\"  aria-invalid=\"false\" aria-required=true><\/div><\/div><\/div><div class='ff-t-cell ff-t-column-2' style='flex-basis: 50%;'><\/div><\/div><div data-name=\"ff_cn_id_2\"  class='ff-t-container ff-column-container ff_columns_total_2 '><div class='ff-t-cell ff-t-column-1' style='flex-basis: 50%;'><div class='ff-el-group ff-el-form-hide_label'><div class=\"ff-el-input--label ff-el-is-required asterisk-right\"><label for='ff_1_input_text' id='label_ff_1_input_text' aria-label=\"Entreprise\">Entreprise<\/label><\/div><div class='ff-el-input--content'><input type=\"text\" name=\"input_text\" class=\"ff-el-form-control\" placeholder=\"Entreprise\" data-name=\"input_text\" id=\"ff_1_input_text\"  aria-invalid=\"false\" aria-required=true><\/div><\/div><\/div><div class='ff-t-cell ff-t-column-2' style='flex-basis: 50%;'><div class='ff-el-group ff-el-form-hide_label'><div class=\"ff-el-input--label ff-el-is-required asterisk-right\"><label for='ff_1_input_text_1' id='label_ff_1_input_text_1' aria-label=\"Responsabilit\u00e9\">Responsabilit\u00e9<\/label><\/div><div class='ff-el-input--content'><input type=\"text\" name=\"input_text_1\" class=\"ff-el-form-control\" placeholder=\"Responsabilit\u00e9\" data-name=\"input_text_1\" id=\"ff_1_input_text_1\"  aria-invalid=\"false\" aria-required=true><\/div><\/div><\/div><\/div><div class='ff-el-group ff-el-form-hide_label'><div class=\"ff-el-input--label asterisk-right\"><label for='ff_1_message' id='label_ff_1_message' aria-label=\"Votre message\">Votre message<\/label><\/div><div class='ff-el-input--content'><textarea aria-required=\"false\" aria-labelledby=\"label_ff_1_message\" name=\"message\" id=\"ff_1_message\" class=\"ff-el-form-control\" placeholder=\"\u00c0 quelle date et \u00e0 quel moment de la journ\u00e9e, souhaitez-vous \u00eatre appel\u00e9 ?\" rows=\"4\" cols=\"2\" data-name=\"message\" ><\/textarea><\/div><\/div><input type=\"hidden\" name=\"hidden\" value=\"Optimice sus procesos B2B con Komand (Rapid7)\" data-name=\"hidden\" ><div class='ff-el-group ff-text-left ff_submit_btn_wrapper'><button type=\"submit\" class=\"ff-btn ff-btn-submit ff-btn-md ff_btn_style wpf_has_custom_css\"  aria-label=\"Envoyer\">Envoyer<\/button><\/div><\/fieldset><\/form><div id='fluentform_1_errors' class='ff-errors-in-stack ff_form_instance_1_1 ff-form-loading_errors ff_form_instance_1_1_errors'><\/div><\/div>            <script type=\"text\/javascript\">\n                window.fluent_form_ff_form_instance_1_1 = {\"id\":\"1\",\"settings\":{\"layout\":{\"labelPlacement\":\"top\",\"helpMessagePlacement\":\"with_label\",\"errorMessagePlacement\":\"inline\",\"cssClassName\":\"\",\"asteriskPlacement\":\"asterisk-right\"},\"restrictions\":{\"denyEmptySubmission\":{\"enabled\":false}}},\"form_instance\":\"ff_form_instance_1_1\",\"form_id_selector\":\"fluentform_1\",\"rules\":{\"names[first_name]\":{\"required\":{\"value\":true,\"message\":\"Ce champ est requis\",\"global\":false,\"global_message\":\"Ce champ est obligatoire\"}},\"names[middle_name]\":{\"required\":{\"value\":false,\"message\":\"This field is required\",\"global\":false,\"global_message\":\"Ce champ est obligatoire\"}},\"names[last_name]\":{\"required\":{\"value\":true,\"message\":\"Ce champ est requis\",\"global\":false,\"global_message\":\"Ce champ est obligatoire\"}},\"email\":{\"required\":{\"value\":true,\"message\":\"Ce champ est requis\",\"global\":false,\"global_message\":\"Ce champ est obligatoire\"},\"email\":{\"value\":true,\"message\":\"This field must contain a valid email\",\"global\":false,\"global_message\":\"Ce champ doit contenir un e-mail valide\"}},\"phone\":{\"required\":{\"value\":true,\"global\":true,\"message\":\"Ce champ est obligatoire\",\"global_message\":\"Ce champ est obligatoire\"},\"valid_phone_number\":{\"value\":true,\"global\":true,\"message\":\"Phone number is not valid\",\"global_message\":\"Phone number is not valid\"}},\"input_text\":{\"required\":{\"value\":true,\"message\":\"Ce champ est obligatoire\",\"global_message\":\"Ce champ est obligatoire\",\"global\":true}},\"input_text_1\":{\"required\":{\"value\":true,\"message\":\"Ce champ est obligatoire\",\"global_message\":\"Ce champ est obligatoire\",\"global\":true}},\"message\":{\"required\":{\"value\":false,\"message\":\"This field is required\",\"global\":false,\"global_message\":\"Ce champ est obligatoire\"}}},\"debounce_time\":300};\n                            <\/script>\n            <\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"1. PRESENTACI\u00d3N CONCISA Komand (Rapid7) es una soluci\u00f3n de automatizaci\u00f3n y orquestaci\u00f3n de seguridad (SOAR) que permite a&hellip;","protected":false},"author":11,"featured_media":7586,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_page_header_type":"","csco_page_load_nextpost":"","csco_page_subscribe_form":"","csco_page_contact_form":"","footnotes":""},"categories":[907],"tags":[977,978,979,980,981],"class_list":{"0":"post-7585","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-outils-es","8":"tag-detection-et-reponse-aux-menaces-en-temps-reel-es","9":"tag-komand-rapid7-es","10":"tag-optimisation-des-workflows-de-cybersecurite-avec-lia-es","11":"tag-orchestration-et-automatisation-de-la-securite-es","12":"tag-outil-de-gestion-des-incidents-et-de-protection-proactive-es","13":"cs-entry","14":"cs-video-wrap"},"_links":{"self":[{"href":"https:\/\/d10.ai\/es\/wp-json\/wp\/v2\/posts\/7585","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d10.ai\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/d10.ai\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/d10.ai\/es\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/d10.ai\/es\/wp-json\/wp\/v2\/comments?post=7585"}],"version-history":[{"count":0,"href":"https:\/\/d10.ai\/es\/wp-json\/wp\/v2\/posts\/7585\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/d10.ai\/es\/wp-json\/wp\/v2\/media\/7586"}],"wp:attachment":[{"href":"https:\/\/d10.ai\/es\/wp-json\/wp\/v2\/media?parent=7585"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d10.ai\/es\/wp-json\/wp\/v2\/categories?post=7585"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/d10.ai\/es\/wp-json\/wp\/v2\/tags?post=7585"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}