{"id":1938,"date":"2019-08-18T12:28:04","date_gmt":"2019-08-18T17:28:04","guid":{"rendered":"https:\/\/integrityisr.com\/?page_id=1938"},"modified":"2019-08-18T12:28:04","modified_gmt":"2019-08-18T17:28:04","slug":"monitoring-services","status":"publish","type":"page","link":"https:\/\/integrityisr.com\/es\/monitoring-services\/","title":{"rendered":"SERVICIOS DE SUPERVISI\u00d3N"},"content":{"rendered":"<p class=\"wp-block-paragraph\"><strong> Integrity ISR utiliza plataformas propias basadas en la nube para\u00a0<\/strong><em><strong>proporcionar una vigilancia persistente,\u00a0<\/strong><\/em><strong>Utilizar la informaci\u00f3n p\u00fablicamente disponible (IPD) y la informaci\u00f3n de fuente abierta para desarrollar un acceso fiable y continuado a espacios de informaci\u00f3n tanto denegados como controvertidos. Esto incluye las redes sociales, las plataformas de mensajer\u00eda e incluso los medios de comunicaci\u00f3n. <em>Web oscura<\/em>. <\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Estas capacidades, cuando se aprovechan para su organizaci\u00f3n, permiten obtener conocimientos hasta ahora inexplorados, informes de actualidad y an\u00e1lisis en profundidad del conjunto de problemas que plantean las amenazas internas. Integrity ISR puede proporcionar informaci\u00f3n oportuna para apoyar el conocimiento de la situaci\u00f3n corporativa, la gesti\u00f3n de la marca, la protecci\u00f3n ejecutiva, la mitigaci\u00f3n de las amenazas internas, la seguridad f\u00edsica y la lucha antiterrorista.<\/strong><\/p>\n\n\n\n<p style=\"background-color:#506d85;font-size:24px\" class=\"has-text-color has-background has-very-light-gray-color wp-block-paragraph\"><strong>CONOCIMIENTO DE LA SITUACI\u00d3N MUNDIAL<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Las capacidades de Integrity ISR para apoyar sus operaciones globales proporcionan un conocimiento de la situaci\u00f3n directamente desde fuentes terrestres a la velocidad de Internet, a menudo m\u00e1s r\u00e1pido que la informaci\u00f3n clasificada en \u00e1reas no cubiertas por fuentes clasificadas. Mediante el uso de capacidades entre dominios y un motor configurado a medida, los datos derivados de PAI pueden combinarse con su red cerrada o clasificada. Esto permite la explotaci\u00f3n segura de datos y la colaboraci\u00f3n para discernir patrones de dispositivos de inter\u00e9s, y puede descubrir nuevas \u00e1reas de inter\u00e9s a trav\u00e9s de medios no intrusivos y no atribuibles. <\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Nuestras capacidades se han utilizado para apoyar la Seguridad Operativa (OPSEC) mediante la supervisi\u00f3n de la huella digital global en lugares sensibles, al tiempo que se han aplicado a la validaci\u00f3n de activos. Estas funciones apoyan la investigaci\u00f3n de actos terroristas, el suministro de apoyo material o recursos a terroristas u organizaciones terroristas, la financiaci\u00f3n del terrorismo, la amenaza o el uso de armas biol\u00f3gicas, nucleares, qu\u00edmicas u otras armas de destrucci\u00f3n masiva y las amenazas de actividades militares extranjeras.<\/strong><\/p>\n\n\n\n<p style=\"background-color:#506d85;font-size:24px\" class=\"has-text-color has-background has-very-light-gray-color wp-block-paragraph\"><strong>MITIGACI\u00d3N DE RIESGOS<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>El ISR de integridad puede <\/strong><em><strong>desarrollar e implantar un plan de mitigaci\u00f3n de riesgos\u00a0<\/strong><\/em><strong>que introduce mecanismos de control (virtuales, f\u00edsicos y de procedimiento) junto con la formaci\u00f3n de los empleados para construir una defensa de primera l\u00ednea contra las amenazas internas. Contar con una plantilla preparada y formada es un elemento cr\u00edtico para mitigar la posibilidad de amenazas internas, reducir las perspectivas de robo de propiedad intelectual e industrial y controlar las posibilidades de que agentes malignos detengan la producci\u00f3n o saboteen los activos, procesos o instalaciones de la empresa. Algunos ejemplos son el desarrollo de mecanismos para limitar el acceso de los empleados en funci\u00f3n de la \"necesidad de saber\"; el desarrollo de mecanismos de registro, supervisi\u00f3n y auditor\u00eda altamente eficaces; y la capacidad de supervisar y responder a actividades potencialmente perturbadoras o sospechosas.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img fetchpriority=\"high\" decoding=\"async\" data-attachment-id=\"1945\" data-permalink=\"https:\/\/integrityisr.com\/es\/monitoring-services\/monitor\/\" data-orig-file=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor.jpeg\" data-orig-size=\"1000,635\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1566129793&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"monitor\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor-300x191.jpeg\" data-large-file=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor.jpeg\" src=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor.jpeg\" alt=\"\" class=\"wp-image-1945\" width=\"500\" height=\"318\" srcset=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor.jpeg 1000w, https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor-300x191.jpeg 300w, https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor-768x488.jpeg 768w, https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor-700x445.jpeg 700w, https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor-630x400.jpeg 630w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/figure><\/div>\n\n\n\n<p style=\"color:#c1da6c;text-align:center\" class=\"has-text-color has-large-font-size wp-block-paragraph\">#CombatProven<\/p>","protected":false},"excerpt":{"rendered":"<p>Integrity ISR uses proprietary cloud-based platforms to\u00a0provide persistent monitoring,\u00a0using Publicly Available Information (PAI) and open source information to develop dependable and continued access to both denied and contested information spaces. This includes social media sites, messaging platforms, and even the deep Dark Web. These capabilities, when harnessed for your organization, allow for previously unexplored insights, [&hellip;]<\/p>","protected":false},"author":145379797,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","_crdt_document":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-1938","page","type-page","status-publish","hentry"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>MONITORING SERVICES - Integrity ISR<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/integrityisr.com\/es\/monitoring-services\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MONITORING SERVICES - Integrity ISR\" \/>\n<meta property=\"og:description\" content=\"Integrity ISR uses proprietary cloud-based platforms to\u00a0provide persistent monitoring,\u00a0using Publicly Available Information (PAI) and open source information to develop dependable and continued access to both denied and contested information spaces. This includes social media sites, messaging platforms, and even the deep Dark Web. These capabilities, when harnessed for your organization, allow for previously unexplored insights, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"http:\/\/integrityisr.com\/es\/monitoring-services\/\" \/>\n<meta property=\"og:site_name\" content=\"Integrity ISR\" \/>\n<meta property=\"og:image\" content=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor.jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/integrityisr.com\\\/monitoring-services\\\/\",\"url\":\"http:\\\/\\\/integrityisr.com\\\/monitoring-services\\\/\",\"name\":\"MONITORING SERVICES - Integrity ISR\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/integrityisr.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\\\/\\\/integrityisr.com\\\/monitoring-services\\\/#primaryimage\"},\"image\":{\"@id\":\"http:\\\/\\\/integrityisr.com\\\/monitoring-services\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/integrityisr.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/monitor.jpeg\",\"datePublished\":\"2019-08-18T17:28:04+00:00\",\"breadcrumb\":{\"@id\":\"http:\\\/\\\/integrityisr.com\\\/monitoring-services\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\\\/\\\/integrityisr.com\\\/monitoring-services\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"http:\\\/\\\/integrityisr.com\\\/monitoring-services\\\/#primaryimage\",\"url\":\"https:\\\/\\\/integrityisr.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/monitor.jpeg\",\"contentUrl\":\"https:\\\/\\\/integrityisr.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/monitor.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\\\/\\\/integrityisr.com\\\/monitoring-services\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/integrityisr.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MONITORING SERVICES\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/integrityisr.com\\\/#website\",\"url\":\"https:\\\/\\\/integrityisr.com\\\/\",\"name\":\"Integrity ISR\",\"description\":\"Global Innovative Solutions for C4ISR, Space, and Cyberspace Strategy, Training, and Operations\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/integrityisr.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MONITORING SERVICES - Integrity ISR","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/integrityisr.com\/es\/monitoring-services\/","og_locale":"es_MX","og_type":"article","og_title":"MONITORING SERVICES - Integrity ISR","og_description":"Integrity ISR uses proprietary cloud-based platforms to\u00a0provide persistent monitoring,\u00a0using Publicly Available Information (PAI) and open source information to develop dependable and continued access to both denied and contested information spaces. This includes social media sites, messaging platforms, and even the deep Dark Web. These capabilities, when harnessed for your organization, allow for previously unexplored insights, [&hellip;]","og_url":"http:\/\/integrityisr.com\/es\/monitoring-services\/","og_site_name":"Integrity ISR","og_image":[{"url":"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor.jpeg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/integrityisr.com\/monitoring-services\/","url":"http:\/\/integrityisr.com\/monitoring-services\/","name":"MONITORING SERVICES - Integrity ISR","isPartOf":{"@id":"https:\/\/integrityisr.com\/#website"},"primaryImageOfPage":{"@id":"http:\/\/integrityisr.com\/monitoring-services\/#primaryimage"},"image":{"@id":"http:\/\/integrityisr.com\/monitoring-services\/#primaryimage"},"thumbnailUrl":"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor.jpeg","datePublished":"2019-08-18T17:28:04+00:00","breadcrumb":{"@id":"http:\/\/integrityisr.com\/monitoring-services\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["http:\/\/integrityisr.com\/monitoring-services\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"http:\/\/integrityisr.com\/monitoring-services\/#primaryimage","url":"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor.jpeg","contentUrl":"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor.jpeg"},{"@type":"BreadcrumbList","@id":"http:\/\/integrityisr.com\/monitoring-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/integrityisr.com\/"},{"@type":"ListItem","position":2,"name":"MONITORING SERVICES"}]},{"@type":"WebSite","@id":"https:\/\/integrityisr.com\/#website","url":"https:\/\/integrityisr.com\/","name":"Integridad ISR","description":"Soluciones innovadoras globales para la estrategia, la formaci\u00f3n y las operaciones C4ISR, espaciales y ciberespaciales","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/integrityisr.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"}]}},"jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/PaiUyX-vg","_links":{"self":[{"href":"https:\/\/integrityisr.com\/es\/wp-json\/wp\/v2\/pages\/1938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/integrityisr.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/integrityisr.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/integrityisr.com\/es\/wp-json\/wp\/v2\/users\/145379797"}],"replies":[{"embeddable":true,"href":"https:\/\/integrityisr.com\/es\/wp-json\/wp\/v2\/comments?post=1938"}],"version-history":[{"count":0,"href":"https:\/\/integrityisr.com\/es\/wp-json\/wp\/v2\/pages\/1938\/revisions"}],"wp:attachment":[{"href":"https:\/\/integrityisr.com\/es\/wp-json\/wp\/v2\/media?parent=1938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}