{"id":37703,"date":"2023-03-27T21:49:26","date_gmt":"2023-03-28T03:49:26","guid":{"rendered":"https:\/\/softsecurityware.com\/?page_id=37703"},"modified":"2024-09-25T10:45:57","modified_gmt":"2024-09-25T16:45:57","slug":"tools","status":"publish","type":"page","link":"https:\/\/softsecurityware.com\/en\/tools\/","title":{"rendered":"Tools"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"37703\" class=\"elementor elementor-37703\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bee20d2 elementor-section-full_width elementor-section-stretched elementor-section-height-default elementor-section-height-default tm-col-stretched-none tm-bg-color-over-image\" data-id=\"bee20d2\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-555361a tm-bg-color-over-image\" data-id=\"555361a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-094e33c elementor-widget__width-auto elementor-absolute elementor-widget elementor-widget-tm-ele-animated-layers\" data-id=\"094e33c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"tm-ele-animated-layers.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"tm-sc-animated-layer-advanced\">\r\n\t\t\t<div class=\"animated-layer-advanced-inner clearfix\">\r\n\t<div class=\"layer-image-wrapper tm-animation-floating layer-blank  elementor-repeater-item-7d713aa\" style=\"\">\r\n\t<div class=\"layer-inner\">\r\n\t<\/div>\r\n<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"clearfix\"><\/div>\r\n\t\t<\/div>\r\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d022290 elementor-section-boxed elementor-section-height-default elementor-section-height-default tm-col-stretched-none tm-bg-color-over-image\" data-id=\"d022290\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-540b179 tm-bg-color-over-image\" data-id=\"540b179\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d477c50 elementor-widget elementor-widget-text-editor\" data-id=\"d477c50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At <strong>Security New Software<\/strong>, we offer a suite of advanced tools designed to protect and strengthen your organization's technology infrastructures. Our solutions range from cyber intelligence and real-time monitoring to integrated IT operations management, all developed with the goal of anticipating, identifying and mitigating cyber threats. Explore our tools to discover how we can help your business stay secure and operational in an increasingly complex and challenging digital environment.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3c46b01 elementor-section-boxed elementor-section-height-default elementor-section-height-default tm-col-stretched-none tm-bg-color-over-image\" data-id=\"3c46b01\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-252566d tm-bg-color-over-image\" data-id=\"252566d\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4d87aa1 elementor-widget elementor-widget-qi_addons_for_elementor_interactive_link_showcase\" data-id=\"4d87aa1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"qi_addons_for_elementor_interactive_link_showcase.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m qodef-qi-interactive-link-showcase qodef-layout--split qodef-hover--underline\">\n\t<div class=\"qodef-m-items\">\n\t\t<a itemprop=\"url\" class=\"qodef-m-item qodef-e\" href=\"\" target=\"_self\">\n\t<span class=\"qodef-e-title\"><span class=\"qodef-e-inner-title\">Sides<\/span><\/span>\n\t\t\t<span class=\"qodef-e-text\">An isolated, browser-less environment that manages applications in secure access, easy deployment, and service.<\/span>\n\t<\/a>\n<a itemprop=\"url\" class=\"qodef-m-item qodef-e\" href=\"\" target=\"_self\">\n\t<span class=\"qodef-e-title\"><span class=\"qodef-e-inner-title\">SEcube<\/span><\/span>\n\t\t\t<span class=\"qodef-e-text\">A powerful chip that integrates three key security elements into a single package.<\/span>\n\t<\/a>\n<a itemprop=\"url\" class=\"qodef-m-item qodef-e\" href=\"\" target=\"_self\">\n\t<span class=\"qodef-e-title\"><span class=\"qodef-e-inner-title\">SElink<\/span><\/span>\n\t\t\t<span class=\"qodef-e-text\">SElink is an evolution of traditional methods of providing services and protecting businesses against unauthorized access.<\/span>\n\t<\/a>\n<a itemprop=\"url\" class=\"qodef-m-item qodef-e\" href=\"\" target=\"_self\">\n\t<span class=\"qodef-e-title\"><span class=\"qodef-e-inner-title\">GLORY<\/span><\/span>\n\t\t\t<span class=\"qodef-e-text\">It is a global cybersecurity solution applicable to IT and OT environments. Monitor and collect events, classify them, identify anomalies and manage threats using dashboards that provide all the information in real time. GLORIA allows us to automate many processes and save your team hours of manual work.<\/span>\n\t<\/a>\n<a itemprop=\"url\" class=\"qodef-m-item qodef-e\" href=\"\" target=\"_self\">\n\t<span class=\"qodef-e-title\"><span class=\"qodef-e-inner-title\">SCADARIPPER<\/span><\/span>\n\t\t\t<span class=\"qodef-e-text\">This platform allows technical security reviews. SCADARipper can also detect protocols and devices used in industrial environments and communicate with these devices through industrial protocols.<\/span>\n\t<\/a>\n<a itemprop=\"url\" class=\"qodef-m-item qodef-e\" href=\"\" target=\"_self\">\n\t<span class=\"qodef-e-title\"><span class=\"qodef-e-inner-title\">ICS GLORY<\/span><\/span>\n\t\t\t<span class=\"qodef-e-text\">GLORIA ICS is an industrial environmental monitoring probe that consists of specific devices or virtualized solutions implemented in industrial infrastructure without affecting the monitored system. The minimally intrusive design does not block the actions of industrial plant operators or disrupt network traffic.<\/span>\n\t<\/a>\n<a itemprop=\"url\" class=\"qodef-m-item qodef-e\" href=\"\" target=\"_self\">\n\t<span class=\"qodef-e-title\"><span class=\"qodef-e-inner-title\">EMAS<\/span><\/span>\n\t\t\t<span class=\"qodef-e-text\">Emas provides an integrated environment for all types of IT service operations. Apply a layer of intelligence that supports availability, capacity, and security monitoring skills to reduce the number of events your technical teams must deal with. Emas works in accordance with the ISO 20000 quality standard and provides complete service management taking into account the key aspects of service quality management.<\/span>\n\t<\/a>\n\t<\/div>\n\t<div class=\"qodef-m-images\">\n\t\t<div class=\"qodef-e-image qodef-background\" style=\"background-image: url(https:\/\/softsecurityware.com\/wp-content\/uploads\/data4.jpg)\">\n\t<img fetchpriority=\"high\" decoding=\"async\" width=\"938\" height=\"1500\" src=\"https:\/\/softsecurityware.com\/wp-content\/uploads\/data4.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/softsecurityware.com\/wp-content\/uploads\/data4.jpg 938w, https:\/\/softsecurityware.com\/wp-content\/uploads\/data4-768x1228.jpg 768w\" sizes=\"(max-width: 938px) 100vw, 938px\" \/><\/div>\n<div class=\"qodef-e-image qodef-background\" style=\"background-image: url(https:\/\/softsecurityware.com\/wp-content\/uploads\/data4.jpg)\">\n\t<img fetchpriority=\"high\" decoding=\"async\" width=\"938\" height=\"1500\" src=\"https:\/\/softsecurityware.com\/wp-content\/uploads\/data4.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/softsecurityware.com\/wp-content\/uploads\/data4.jpg 938w, https:\/\/softsecurityware.com\/wp-content\/uploads\/data4-768x1228.jpg 768w\" sizes=\"(max-width: 938px) 100vw, 938px\" \/><\/div>\n<div class=\"qodef-e-image qodef-background\" style=\"background-image: url(https:\/\/softsecurityware.com\/wp-content\/uploads\/data4.jpg)\">\n\t<img fetchpriority=\"high\" decoding=\"async\" width=\"938\" height=\"1500\" src=\"https:\/\/softsecurityware.com\/wp-content\/uploads\/data4.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/softsecurityware.com\/wp-content\/uploads\/data4.jpg 938w, https:\/\/softsecurityware.com\/wp-content\/uploads\/data4-768x1228.jpg 768w\" sizes=\"(max-width: 938px) 100vw, 938px\" \/><\/div>\n<div class=\"qodef-e-image qodef-background\" style=\"background-image: url(https:\/\/softsecurityware.com\/wp-content\/uploads\/data4.jpg)\">\n\t<img fetchpriority=\"high\" decoding=\"async\" width=\"938\" height=\"1500\" src=\"https:\/\/softsecurityware.com\/wp-content\/uploads\/data4.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/softsecurityware.com\/wp-content\/uploads\/data4.jpg 938w, https:\/\/softsecurityware.com\/wp-content\/uploads\/data4-768x1228.jpg 768w\" sizes=\"(max-width: 938px) 100vw, 938px\" \/><\/div>\n<div class=\"qodef-e-image qodef-background\" style=\"background-image: url(https:\/\/softsecurityware.com\/wp-content\/uploads\/data4.jpg)\">\n\t<img fetchpriority=\"high\" decoding=\"async\" width=\"938\" height=\"1500\" src=\"https:\/\/softsecurityware.com\/wp-content\/uploads\/data4.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/softsecurityware.com\/wp-content\/uploads\/data4.jpg 938w, https:\/\/softsecurityware.com\/wp-content\/uploads\/data4-768x1228.jpg 768w\" sizes=\"(max-width: 938px) 100vw, 938px\" \/><\/div>\n<div class=\"qodef-e-image qodef-background\" style=\"background-image: url(https:\/\/softsecurityware.com\/wp-content\/uploads\/data4.jpg)\">\n\t<img fetchpriority=\"high\" decoding=\"async\" width=\"938\" height=\"1500\" src=\"https:\/\/softsecurityware.com\/wp-content\/uploads\/data4.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/softsecurityware.com\/wp-content\/uploads\/data4.jpg 938w, https:\/\/softsecurityware.com\/wp-content\/uploads\/data4-768x1228.jpg 768w\" sizes=\"(max-width: 938px) 100vw, 938px\" \/><\/div>\n<div class=\"qodef-e-image qodef-background\" style=\"background-image: url(https:\/\/softsecurityware.com\/wp-content\/uploads\/data4.jpg)\">\n\t<img fetchpriority=\"high\" decoding=\"async\" width=\"938\" height=\"1500\" src=\"https:\/\/softsecurityware.com\/wp-content\/uploads\/data4.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/softsecurityware.com\/wp-content\/uploads\/data4.jpg 938w, https:\/\/softsecurityware.com\/wp-content\/uploads\/data4-768x1228.jpg 768w\" sizes=\"(max-width: 938px) 100vw, 938px\" \/><\/div>\n\t<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>En Security New Software, ofrecemos una suite de herramientas avanzadas dise\u00f1adas para proteger y fortalecer las infraestructuras tecnol\u00f3gicas de su&#8230;<\/p>","protected":false},"author":4,"featured_media":37706,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-37703","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/softsecurityware.com\/en\/wp-json\/wp\/v2\/pages\/37703","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/softsecurityware.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/softsecurityware.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/softsecurityware.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/softsecurityware.com\/en\/wp-json\/wp\/v2\/comments?post=37703"}],"version-history":[{"count":25,"href":"https:\/\/softsecurityware.com\/en\/wp-json\/wp\/v2\/pages\/37703\/revisions"}],"predecessor-version":[{"id":38629,"href":"https:\/\/softsecurityware.com\/en\/wp-json\/wp\/v2\/pages\/37703\/revisions\/38629"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/softsecurityware.com\/en\/wp-json\/wp\/v2\/media\/37706"}],"wp:attachment":[{"href":"https:\/\/softsecurityware.com\/en\/wp-json\/wp\/v2\/media?parent=37703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}