{"id":7618,"date":"2025-02-27T21:47:44","date_gmt":"2025-02-27T20:47:44","guid":{"rendered":"https:\/\/d10.ai\/?p=7618"},"modified":"2025-03-06T18:02:11","modified_gmt":"2025-03-06T17:02:11","slug":"vectra-ai-cybersecurite-detection-menaces","status":"publish","type":"post","link":"https:\/\/d10.ai\/es\/vectra-ai-cybersecurite-detection-menaces\/","title":{"rendered":"Optimice sus procesos B2B con Vectra AI"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7618\" class=\"elementor elementor-7618\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0644c7c e-flex e-con-boxed e-con e-parent\" data-id=\"0644c7c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3b77382 elementor-widget elementor-widget-heading\" data-id=\"3b77382\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1. PRESENTACI\u00d3N CONCISA<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32058c2 elementor-widget elementor-widget-text-editor\" data-id=\"32058c2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 1 []\">Vectra AI es una plataforma avanzada de detecci\u00f3n de amenazas en ciberseguridad basada en aprendizaje autom\u00e1tico. Permite a las empresas monitorear en tiempo real sus entornos digitales, identificar comportamientos sospechosos y prevenir ciberataques antes de que generen da\u00f1os. Gracias a su inteligencia artificial adaptativa, Vectra AI analiza constantemente el tr\u00e1fico de red y las interacciones entre usuarios para detectar anomal\u00edas y amenazas avanzadas. Se posiciona como una soluci\u00f3n clave para fortalecer la seguridad de las infraestructuras IT empresariales.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c301c48 elementor-widget elementor-widget-heading\" data-id=\"c301c48\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2. CONDICIONES DE USO<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80ac738 elementor-widget elementor-widget-text-editor\" data-id=\"80ac738\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"678\" data-end=\"802\"><strong data-start=\"680\" data-end=\"704\">Requisitos t\u00e9cnicos:<\/strong> Conexi\u00f3n con sistemas de seguridad existentes, acceso en la nube o local, integraci\u00f3n con SIEM.<\/li><li data-start=\"803\" data-end=\"894\"><strong data-start=\"805\" data-end=\"833\">Competencias requeridas:<\/strong> Conocimientos en ciberseguridad y administraci\u00f3n de redes.<\/li><li data-start=\"895\" data-end=\"1010\"><strong data-start=\"897\" data-end=\"913\">Integraci\u00f3n:<\/strong> Compatible con Microsoft Sentinel, Splunk, AWS Security Hub y otras herramientas de seguridad.<\/li><li data-start=\"1011\" data-end=\"1105\"><strong data-start=\"1013\" data-end=\"1024\">Costos:<\/strong> Suscripci\u00f3n SaaS, tarifas de formaci\u00f3n e integraci\u00f3n, costos de mantenimiento.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ae036d elementor-widget elementor-widget-image\" data-id=\"3ae036d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"552\" src=\"https:\/\/d10.ai\/wp-content\/uploads\/2025\/02\/d10-Vectra-768x552-1.png\" class=\"attachment-large size-large wp-image-7620\" alt=\"\" srcset=\"https:\/\/d10.ai\/wp-content\/uploads\/2025\/02\/d10-Vectra-768x552-1.png 768w, https:\/\/d10.ai\/wp-content\/uploads\/2025\/02\/d10-Vectra-768x552-1-300x216.png 300w, https:\/\/d10.ai\/wp-content\/uploads\/2025\/02\/d10-Vectra-768x552-1-40x29.png 40w, https:\/\/d10.ai\/wp-content\/uploads\/2025\/02\/d10-Vectra-768x552-1-100x72.png 100w, https:\/\/d10.ai\/wp-content\/uploads\/2025\/02\/d10-Vectra-768x552-1-200x144.png 200w, https:\/\/d10.ai\/wp-content\/uploads\/2025\/02\/d10-Vectra-768x552-1-714x513.png 714w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4e9bd9 elementor-widget elementor-widget-heading\" data-id=\"e4e9bd9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3. BENEFICIOS CUANTIFICABLES<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d1ff81f elementor-widget elementor-widget-text-editor\" data-id=\"d1ff81f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"1143\" data-end=\"1247\"><strong data-start=\"1145\" data-end=\"1160\">Eficiencia:<\/strong> Reducci\u00f3n del tiempo de detecci\u00f3n y respuesta ante amenazas mediante automatizaci\u00f3n.<\/li><li data-start=\"1248\" data-end=\"1346\"><strong data-start=\"1250\" data-end=\"1258\">ROI:<\/strong> Disminuci\u00f3n de costos asociados a violaciones de datos y optimizaci\u00f3n de recursos IT.<\/li><li data-start=\"1347\" data-end=\"1433\"><strong data-start=\"1349\" data-end=\"1368\">Competitividad:<\/strong> Protecci\u00f3n proactiva contra ataques complejos como ransomware.<\/li><li data-start=\"1434\" data-end=\"1569\"><strong data-start=\"1436\" data-end=\"1453\">Casos de uso:<\/strong> Seguridad en infraestructuras en la nube, protecci\u00f3n contra amenazas internas, detecci\u00f3n avanzada de intrusiones.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65a4156 elementor-widget elementor-widget-heading\" data-id=\"65a4156\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4. LIMITACIONES Y DESAF\u00cdOS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f33647 elementor-widget elementor-widget-text-editor\" data-id=\"1f33647\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"1605\" data-end=\"1691\"><strong data-start=\"1607\" data-end=\"1620\">Barreras:<\/strong> Requiere integraci\u00f3n con herramientas de seguridad ya implementadas.<\/li><li data-start=\"1692\" data-end=\"1812\"><strong data-start=\"1694\" data-end=\"1720\">Limitaciones t\u00e9cnicas:<\/strong> Dependencia de la calidad de los datos de entrada para mejorar la precisi\u00f3n de detecci\u00f3n.<\/li><li data-start=\"1813\" data-end=\"1889\"><strong data-start=\"1815\" data-end=\"1827\">Riesgos:<\/strong> Posibles falsos positivos que requieren supervisi\u00f3n humana.<\/li><li data-start=\"1890\" data-end=\"1999\"><strong data-start=\"1892\" data-end=\"1917\">Curva de aprendizaje:<\/strong> Se necesita capacitaci\u00f3n para interpretar y gestionar alertas de manera eficaz.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8213deb elementor-widget elementor-widget-heading\" data-id=\"8213deb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">5. COMPARACI\u00d3N CON ALTERNATIVAS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b103ff elementor-widget elementor-widget-text-editor\" data-id=\"3b103ff\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"2040\" data-end=\"2136\"><strong data-start=\"2042\" data-end=\"2059\">Competidores:<\/strong> Darktrace, Palo Alto Networks Cortex XDR, Microsoft Defender for Endpoint.<\/li><li data-start=\"2137\" data-end=\"2266\"><strong data-start=\"2139\" data-end=\"2154\">Fortalezas:<\/strong> An\u00e1lisis de comportamiento avanzado, respuesta r\u00e1pida a incidentes, integraci\u00f3n con m\u00faltiples ecosistemas IT.<\/li><li data-start=\"2267\" data-end=\"2385\"><strong data-start=\"2269\" data-end=\"2285\">Debilidades:<\/strong> Dependencia de actualizaciones de modelos de IA para seguir el ritmo de la evoluci\u00f3n de amenazas.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11814b4 elementor-widget elementor-widget-heading\" data-id=\"11814b4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">6. APPLICATIONS SECTORIELLES OPTIMALES\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0fcd130 elementor-widget elementor-widget-text-editor\" data-id=\"0fcd130\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"2430\" data-end=\"2504\"><strong data-start=\"2432\" data-end=\"2455\">Finanzas y seguros:<\/strong> Protecci\u00f3n contra fraudes y ataques dirigidos.<\/li><li data-start=\"2505\" data-end=\"2581\"><strong data-start=\"2507\" data-end=\"2517\">Salud:<\/strong> Seguridad de datos de pacientes y cumplimiento de normativas.<\/li><li data-start=\"2582\" data-end=\"2666\"><strong data-start=\"2584\" data-end=\"2607\">Telecomunicaciones:<\/strong> Monitoreo de redes y prevenci\u00f3n de ciberataques masivos.<\/li><li data-start=\"2667\" data-end=\"2740\"><strong data-start=\"2669\" data-end=\"2683\">Industria:<\/strong> Protecci\u00f3n de sistemas SCADA e IoT contra intrusiones.<\/li><li data-start=\"2741\" data-end=\"2838\"><strong data-start=\"2743\" data-end=\"2765\">Comercio y retail:<\/strong> Seguridad en transacciones y detecci\u00f3n de comportamientos sospechosos.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73e265d elementor-widget elementor-widget-heading\" data-id=\"73e265d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">7. ESTUDIOS DE CASO DOCUMENTADOS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d9ea4b elementor-widget elementor-widget-text-editor\" data-id=\"6d9ea4b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2880\" data-end=\"2918\"><strong data-start=\"2880\" data-end=\"2916\">Caso 1: Gran banco internacional<\/strong><\/p><ul data-start=\"2919\" data-end=\"3195\"><li data-start=\"2919\" data-end=\"2993\"><strong data-start=\"2921\" data-end=\"2934\">Problema:<\/strong> Aumento de ciberataques dirigidos a cuentas de clientes.<\/li><li data-start=\"2994\" data-end=\"3095\"><strong data-start=\"2996\" data-end=\"3009\">Soluci\u00f3n:<\/strong> Implementaci\u00f3n de Vectra AI para monitorear actividades sospechosas en tiempo real.<\/li><li data-start=\"3096\" data-end=\"3195\"><strong data-start=\"3098\" data-end=\"3113\">Resultados:<\/strong> Reducci\u00f3n del 40 % en fraudes detectados y respuesta acelerada ante incidentes.<\/li><\/ul><p data-start=\"3197\" data-end=\"3232\"><strong data-start=\"3197\" data-end=\"3230\">Caso 2: Hospital de prestigio<\/strong><\/p><ul data-start=\"3233\" data-end=\"3508\"><li data-start=\"3233\" data-end=\"3315\"><strong data-start=\"3235\" data-end=\"3248\">Problema:<\/strong> Crecientes riesgos de ransomware que amenazan registros m\u00e9dicos.<\/li><li data-start=\"3316\" data-end=\"3414\"><strong data-start=\"3318\" data-end=\"3331\">Soluci\u00f3n:<\/strong> Integraci\u00f3n de Vectra AI para analizar el tr\u00e1fico de red y prevenir intrusiones.<\/li><li data-start=\"3415\" data-end=\"3508\"><strong data-start=\"3417\" data-end=\"3432\">Resultados:<\/strong> Bloqueo proactivo del 95 % de intentos de ataque antes de causar impacto.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52dd706 elementor-widget elementor-widget-heading\" data-id=\"52dd706\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">8. CONSIDERACIONES ESTRAT\u00c9GICAS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52c575b elementor-widget elementor-widget-text-editor\" data-id=\"52c575b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 1 []\">La adopci\u00f3n de Vectra AI en los procesos empresariales representa un avance clave hacia una ciberseguridad proactiva. Para una implementaci\u00f3n efectiva, es fundamental evaluar los riesgos espec\u00edficos, garantizar una integraci\u00f3n fluida con las infraestructuras IT existentes y capacitar a los equipos de seguridad en el uso \u00f3ptimo de la plataforma.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ed62e48 e-flex e-con-boxed e-con e-parent\" data-id=\"ed62e48\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-040e3da elementor-widget elementor-widget-template\" data-id=\"040e3da\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"container\" data-elementor-id=\"8031\" class=\"elementor elementor-8031 elementor-4711\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39bedd52 e-flex e-con-boxed e-con e-parent\" data-id=\"39bedd52\" data-element_type=\"container\" id=\"cta\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2d1bb796 e-con-full e-flex e-con e-child\" data-id=\"2d1bb796\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57fd44d2 elementor-widget elementor-widget-heading\" data-id=\"57fd44d2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfListo para pasar a la acci\u00f3n?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6444d11f elementor-widget elementor-widget-text-editor\" data-id=\"6444d11f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0Para iniciar una conversaci\u00f3n, completa este formulario indicando cu\u00e1ndo deseas ser llamado.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e755ded elementor-widget elementor-widget-shortcode\" data-id=\"e755ded\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class='fluentform ff-default fluentform_wrapper_1 ffs_default_wrap'><form data-form_id=\"1\" id=\"fluentform_1\" class=\"frm-fluent-form fluent_form_1 ff-el-form-top ff_form_instance_1_1 ff-form-loading ffs_default\" data-form_instance=\"ff_form_instance_1_1\" method=\"POST\" ><fieldset  style=\"border: none!important;margin: 0!important;padding: 0!important;background-color: transparent!important;box-shadow: none!important;outline: none!important; min-inline-size: 100%;\">\n                    <legend class=\"ff_screen_reader_title\" style=\"display: block; margin: 0!important;padding: 0!important;height: 0!important;text-indent: -999999px;width: 0!important;overflow:hidden;\">Universel Contact<\/legend><input type='hidden' name='__fluent_form_embded_post_id' value='7618' \/><input type=\"hidden\" id=\"_fluentform_1_fluentformnonce\" name=\"_fluentform_1_fluentformnonce\" value=\"80edcf4625\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/es\/wp-json\/wp\/v2\/posts\/7618\" \/><div data-type=\"name-element\" data-name=\"names\" class=\" ff-field_container ff-name-field-wrapper\" ><div class='ff-t-container'><div class='ff-t-cell '><div class='ff-el-group  ff-el-form-hide_label'><div class=\"ff-el-input--label ff-el-is-required asterisk-right\"><label for='ff_1_names_first_name_' id='label_ff_1_names_first_name_' >Pr\u00e9nom<\/label><\/div><div class='ff-el-input--content'><input type=\"text\" name=\"names[first_name]\" value=\"\" id=\"ff_1_names_first_name_\" class=\"ff-el-form-control\" placeholder=\"Pr\u00e9nom\" aria-invalid=\"false\" aria-required=true><\/div><\/div><\/div><div class='ff-t-cell '><div class='ff-el-group  ff-el-form-hide_label'><div class=\"ff-el-input--label ff-el-is-required asterisk-right\"><label for='ff_1_names_last_name_' id='label_ff_1_names_last_name_' >Nom<\/label><\/div><div class='ff-el-input--content'><input type=\"text\" name=\"names[last_name]\" value=\"\" id=\"ff_1_names_last_name_\" class=\"ff-el-form-control\" placeholder=\"Nom\" aria-invalid=\"false\" aria-required=true><\/div><\/div><\/div><\/div><\/div><div data-name=\"ff_cn_id_1\"  class='ff-t-container ff-column-container ff_columns_total_2 '><div class='ff-t-cell ff-t-column-1' style='flex-basis: 50%;'><div class='ff-el-group ff-el-form-hide_label'><div class=\"ff-el-input--label ff-el-is-required asterisk-right\"><label for='ff_1_email' id='label_ff_1_email' aria-label=\"Email\">Email<\/label><\/div><div class='ff-el-input--content'><input type=\"email\" name=\"email\" value=\"\" id=\"ff_1_email\" class=\"ff-el-form-control\" placeholder=\"Address Email\" data-name=\"email\"  aria-invalid=\"false\" aria-required=true><\/div><\/div><\/div><div class='ff-t-cell ff-t-column-2' style='flex-basis: 50%;'><\/div><\/div><div data-name=\"ff_cn_id_2\"  class='ff-t-container ff-column-container ff_columns_total_2 '><div class='ff-t-cell ff-t-column-1' style='flex-basis: 50%;'><div class='ff-el-group ff-el-form-hide_label'><div class=\"ff-el-input--label ff-el-is-required asterisk-right\"><label for='ff_1_input_text' id='label_ff_1_input_text' aria-label=\"Entreprise\">Entreprise<\/label><\/div><div class='ff-el-input--content'><input type=\"text\" name=\"input_text\" class=\"ff-el-form-control\" placeholder=\"Entreprise\" data-name=\"input_text\" id=\"ff_1_input_text\"  aria-invalid=\"false\" aria-required=true><\/div><\/div><\/div><div class='ff-t-cell ff-t-column-2' style='flex-basis: 50%;'><div class='ff-el-group ff-el-form-hide_label'><div class=\"ff-el-input--label ff-el-is-required asterisk-right\"><label for='ff_1_input_text_1' id='label_ff_1_input_text_1' aria-label=\"Responsabilit\u00e9\">Responsabilit\u00e9<\/label><\/div><div class='ff-el-input--content'><input type=\"text\" name=\"input_text_1\" class=\"ff-el-form-control\" placeholder=\"Responsabilit\u00e9\" data-name=\"input_text_1\" id=\"ff_1_input_text_1\"  aria-invalid=\"false\" aria-required=true><\/div><\/div><\/div><\/div><div class='ff-el-group ff-el-form-hide_label'><div class=\"ff-el-input--label asterisk-right\"><label for='ff_1_message' id='label_ff_1_message' aria-label=\"Votre message\">Votre message<\/label><\/div><div class='ff-el-input--content'><textarea aria-required=\"false\" aria-labelledby=\"label_ff_1_message\" name=\"message\" id=\"ff_1_message\" class=\"ff-el-form-control\" placeholder=\"\u00c0 quelle date et \u00e0 quel moment de la journ\u00e9e, souhaitez-vous \u00eatre appel\u00e9 ?\" rows=\"4\" cols=\"2\" data-name=\"message\" ><\/textarea><\/div><\/div><input type=\"hidden\" name=\"hidden\" value=\"Optimice sus procesos B2B con Vectra AI\" data-name=\"hidden\" ><div class='ff-el-group ff-text-left ff_submit_btn_wrapper'><button type=\"submit\" class=\"ff-btn ff-btn-submit ff-btn-md ff_btn_style wpf_has_custom_css\"  aria-label=\"Envoyer\">Envoyer<\/button><\/div><\/fieldset><\/form><div id='fluentform_1_errors' class='ff-errors-in-stack ff_form_instance_1_1 ff-form-loading_errors ff_form_instance_1_1_errors'><\/div><\/div>            <script type=\"text\/javascript\">\n                window.fluent_form_ff_form_instance_1_1 = {\"id\":\"1\",\"settings\":{\"layout\":{\"labelPlacement\":\"top\",\"helpMessagePlacement\":\"with_label\",\"errorMessagePlacement\":\"inline\",\"cssClassName\":\"\",\"asteriskPlacement\":\"asterisk-right\"},\"restrictions\":{\"denyEmptySubmission\":{\"enabled\":false}}},\"form_instance\":\"ff_form_instance_1_1\",\"form_id_selector\":\"fluentform_1\",\"rules\":{\"names[first_name]\":{\"required\":{\"value\":true,\"message\":\"Ce champ est requis\",\"global\":false,\"global_message\":\"Ce champ est obligatoire\"}},\"names[middle_name]\":{\"required\":{\"value\":false,\"message\":\"This field is required\",\"global\":false,\"global_message\":\"Ce champ est obligatoire\"}},\"names[last_name]\":{\"required\":{\"value\":true,\"message\":\"Ce champ est requis\",\"global\":false,\"global_message\":\"Ce champ est obligatoire\"}},\"email\":{\"required\":{\"value\":true,\"message\":\"Ce champ est requis\",\"global\":false,\"global_message\":\"Ce champ est obligatoire\"},\"email\":{\"value\":true,\"message\":\"This field must contain a valid email\",\"global\":false,\"global_message\":\"Ce champ doit contenir un e-mail valide\"}},\"phone\":{\"required\":{\"value\":true,\"global\":true,\"message\":\"Ce champ est obligatoire\",\"global_message\":\"Ce champ est obligatoire\"},\"valid_phone_number\":{\"value\":true,\"global\":true,\"message\":\"Phone number is not valid\",\"global_message\":\"Phone number is not valid\"}},\"input_text\":{\"required\":{\"value\":true,\"message\":\"Ce champ est obligatoire\",\"global_message\":\"Ce champ est obligatoire\",\"global\":true}},\"input_text_1\":{\"required\":{\"value\":true,\"message\":\"Ce champ est obligatoire\",\"global_message\":\"Ce champ est obligatoire\",\"global\":true}},\"message\":{\"required\":{\"value\":false,\"message\":\"This field is required\",\"global\":false,\"global_message\":\"Ce champ est obligatoire\"}}},\"debounce_time\":300};\n                            <\/script>\n            <\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"1. PRESENTACI\u00d3N CONCISA Vectra AI es una plataforma avanzada de detecci\u00f3n de amenazas en ciberseguridad basada en aprendizaje&hellip;","protected":false},"author":11,"featured_media":7619,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_page_header_type":"","csco_page_load_nextpost":"","csco_page_subscribe_form":"","csco_page_contact_form":"","footnotes":""},"categories":[907],"tags":[1002,1003,1004,1005,1006],"class_list":{"0":"post-7618","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-outils-es","8":"tag-creation-et-deploiement-de-modeles-ml-sans-expertise-technique-es","9":"tag-optimisation-des-processus-decisionnels-et-business-analytics-es","10":"tag-outil-accessible-pour-la-prediction-des-tendances-et-des-performances-es","11":"tag-pecan-ai-es","12":"tag-plateforme-de-machine-learning-predictif-es","13":"cs-entry","14":"cs-video-wrap"},"_links":{"self":[{"href":"https:\/\/d10.ai\/es\/wp-json\/wp\/v2\/posts\/7618","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d10.ai\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/d10.ai\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/d10.ai\/es\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/d10.ai\/es\/wp-json\/wp\/v2\/comments?post=7618"}],"version-history":[{"count":0,"href":"https:\/\/d10.ai\/es\/wp-json\/wp\/v2\/posts\/7618\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/d10.ai\/es\/wp-json\/wp\/v2\/media\/7619"}],"wp:attachment":[{"href":"https:\/\/d10.ai\/es\/wp-json\/wp\/v2\/media?parent=7618"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d10.ai\/es\/wp-json\/wp\/v2\/categories?post=7618"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/d10.ai\/es\/wp-json\/wp\/v2\/tags?post=7618"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}