{"id":2669,"date":"2025-01-20T23:54:50","date_gmt":"2025-01-20T23:54:50","guid":{"rendered":"https:\/\/buromc.com\/?page_id=2669"},"modified":"2025-01-23T19:24:22","modified_gmt":"2025-01-23T19:24:22","slug":"arquitectura-ciberseguridad","status":"publish","type":"page","link":"https:\/\/buromc.com\/us\/arquitectura-ciberseguridad\/","title":{"rendered":"Arquitectura de seguridad mc"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><section class=\"vc_section vc_custom_1558530290688 vc_section-has-fill\"><div class=\"firwl-vc-row-container\" ><div class=\"vc_row firwl-stickycont wpb_row firwl-vc_row\"><div class=\"firwl-rowcontainer-vc\"><div class=\"firwl-rowcontent\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t\t\t<!-- START Arquitectura de seguridad mc REVOLUTION SLIDER 6.6.15 --><p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t<rs-module-wrap id=\"rev_slider_19_1_wrapper\" data-source=\"gallery\" style=\"visibility:hidden;background:transparent;padding:0;margin:0px auto;margin-top:0;margin-bottom:0;\">\n\t\t\t\t<rs-module id=\"rev_slider_19_1\" style=\"\" data-version=\"6.6.15\">\n\t\t\t\t\t<rs-slides style=\"overflow: hidden; position: absolute;\">\n\t\t\t\t\t\t<rs-slide style=\"position: absolute;\" data-key=\"rs-30\" data-title=\"Slide\" data-in=\"o:0;col:400;\" data-out=\"a:false;\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"\/\/buromc.com\/wp-content\/plugins\/revslider\/public\/assets\/assets\/dummy.png\" alt=\"\" title=\"\u00b7 Cloud-based\" width=\"1919\" height=\"800\" class=\"rev-slidebg tp-rs-img rs-lazyload\" data-lazyload=\"\/\/buromc.com\/wp-content\/uploads\/2019\/05\/arquitectura-de-seguridad.jpg\" data-no-retina>\n<!--\n\t\t\t\t\t\t\t--><rs-group\n\t\t\t\t\t\t\t\tid=\"slider-19-slide-30-layer-0\" \n\t\t\t\t\t\t\t\tdata-type=\"group\"\n\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:43px;y:c;yo:-3px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:576px;h:284px;\"\n\t\t\t\t\t\t\t\tdata-frame_0=\"o:1;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:8700;sA:9000;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:6;\"\n\t\t\t\t\t\t\t><!--\n\t\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\t\tid=\"slider-19-slide-30-layer-1\" \n\t\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\t\tdata-color=\"#ffffff\"\n\t\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\t\tdata-xy=\"y:-3px;\"\n\t\t\t\t\t\t\t\t\tdata-pos=\"a\"\n\t\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:40;l:44;fw:500;\"\n\t\t\t\t\t\t\t\t\tdata-dim=\"w:616px;minh:0px;\"\n\t\t\t\t\t\t\t\t\tdata-frame_1=\"st:300;sp:400;sR:300;\"\n\t\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:8300;\"\n\t\t\t\t\t\t\t\t\tstyle=\"z-index:8;font-family:'Rubik';\"\n\t\t\t\t\t\t\t\t>Cybersecurity Architectures\u00a0 \n\t\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\t\tid=\"slider-19-slide-30-layer-2\" \n\t\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\t\tdata-color=\"#fff\"\n\t\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\t\tdata-xy=\"y:110px;\"\n\t\t\t\t\t\t\t\t\tdata-pos=\"a\"\n\t\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:14;l:24;ls:1;\"\n\t\t\t\t\t\t\t\t\tdata-dim=\"w:557px;minh:0px;\"\n\t\t\t\t\t\t\t\t\tdata-frame_1=\"st:680;sp:400;sR:680;\"\n\t\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:7920;\"\n\t\t\t\t\t\t\t\t\tstyle=\"z-index:7;font-family:'Roboto';\"\n\t\t\t\t\t\t\t\t>We create cybersecurity architectures that adapt to the challenging cyber threat landscape as organizations and governments expand IT services beyond the traditional perimeter under a zero-trust framework.\u00a0 \n\t\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t\t--><a\n\t\t\t\t\t\t\t\t\tid=\"slider-19-slide-30-layer-4\" \n\t\t\t\t\t\t\t\t\tclass=\"rs-layer\"\n\t\t\t\t\t\t\t\t\thref=\"#contacto\" target=\"_self\"\n\t\t\t\t\t\t\t\t\tdata-type=\"image\"\n\t\t\t\t\t\t\t\t\tdata-rsp_ch=\"on\"\n\t\t\t\t\t\t\t\t\tdata-xy=\"x:-1px;y:224px;\"\n\t\t\t\t\t\t\t\t\tdata-pos=\"a\"\n\t\t\t\t\t\t\t\t\tdata-text=\"w:normal;\"\n\t\t\t\t\t\t\t\t\tdata-dim=\"w:265px;h:62px;\"\n\t\t\t\t\t\t\t\t\tdata-frame_1=\"st:1460;sp:400;sR:1460;\"\n\t\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;sR:7240;\"\n\t\t\t\t\t\t\t\t\tdata-frame_hover=\"bri:77%;\"\n\t\t\t\t\t\t\t\t\tstyle=\"z-index:6;\"\n\t\t\t\t\t\t\t\t><img decoding=\"async\" src=\"\/\/buromc.com\/wp-content\/plugins\/revslider\/public\/assets\/assets\/dummy.png\" alt=\"\" class=\"tp-rs-img rs-lazyload\" width=\"323\" height=\"76\" data-lazyload=\"\/\/buromc.com\/wp-content\/uploads\/2019\/05\/Group-110.png\" data-no-retina> \n\t\t\t\t\t\t\t\t<\/a><!--\n\t\t\t\t\t\t\t--><\/rs-group><!--\n-->\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t<\/rs-slides>\n\t\t\t\t\t<rs-static-layers><!--\n\t\t\t\t\t--><\/rs-static-layers>\n\t\t\t\t<\/rs-module>\n\t\t\t\t<script>\n\t\t\t\t\tsetREVStartSize({c: 'rev_slider_19_1',rl:[1240,1024,778,480],el:[600],gw:[1240],gh:[600],type:'standard',justify:'',layout:'fullwidth',mh:\"0\"});if (window.RS_MODULES!==undefined && window.RS_MODULES.modules!==undefined && window.RS_MODULES.modules[\"revslider191\"]!==undefined) {window.RS_MODULES.modules[\"revslider191\"].once = false;window.revapi19 = undefined;if (window.RS_MODULES.checkMinimal!==undefined) window.RS_MODULES.checkMinimal()}\n\t\t\t\t<\/script>\n\t\t\t<\/rs-module-wrap>\n\t\t\t<!-- END REVOLUTION SLIDER -->\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><div class=\"firwl-vc-row-container\"  id=\"section-cards\" ><div id=\"firwl-intid-section-cards\" class=\"vc_row firwl-stickycont wpb_row firwl-vc_row wpb_animate_when_almost_visible wpb_fadeIn fadeIn vc_custom_1737432148305 vc_row-has-fill vc_column-gap-30\"><div class=\"firwl-container firwl-rowcontainer-vc\"><div class=\"firwl-rowcontent\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\t\t\t<hr class=\"firwl-spacer-s\">\n\t\t\n\t\t<div class=\"firwl-section-caption sec-sec-home marign-bottom-0\">\n\n\t\t\t\t\t\t\t<h6 class=\"firwl-caption firwl-gradtext\"><span>OUR MODEL<\/span><\/h6>\n\t\t\t\t\t\t\t\t<h2 class=\"firwl-capfont firwl-glitchtxt\" data-firwl-text=\"Proporciona respuestas r\u00e1pidas y eficientes\">Provides fast and efficient responses<\/h2>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<hr class=\"firwl-spacer-s\">\n\t\t\n\t<div class=\"wpb_text_column wpb_content_element text-center\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>We build a cybersecurity architecture to ensure that all components of your IT assets are protected, including cloud, networks, IoT, endpoints, and mobile.<\/p>\n<p>This architecture includes Zero Trust security models for devices, users, data, networks, workloads, automation and harmonization, visibility, and analytics to ensure the protection of your data and IT resources wherever they exist.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t\t\t<hr class=\"firwl-spacer-m\">\n\t\t<div class=\"vc_row wpb_row vc_inner firwl-vc_row\"><div class=\"firwl-container firwl-rowcontainer-vc\"><div class=\"firwl-rowcontent\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><img decoding=\"async\" class=\"w-100\" src=\"https:\/\/buromc.com\/wp-content\/uploads\/2025\/01\/Group-127.png\" alt=\"\" \/><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"firwl-vc-row-container\" ><div class=\"vc_row firwl-stickycont wpb_row firwl-vc_row vc_custom_1736485039081 vc_row-has-fill\"><div class=\"firwl-rowcontainer-vc\"><div class=\"firwl-rowcontent\"><div class=\"wpb_column vc_column_container vc_col-sm-12 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1736485090019\"><div class=\"wpb_wrapper\">\t\t\t<hr class=\"firwl-spacer-m\">\n\t\t<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"firwl-vc-row-container\" ><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row firwl-stickycont wpb_row firwl-vc_row vc_custom_1737430249629 vc_row-has-fill vc_row-o-equal-height vc_row-flex\"><div class=\"firwl-container firwl-rowcontainer-vc\"><div class=\"firwl-rowcontent\"><div class=\"wpb_column vc_column_container vc_col-sm-12 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1736485090019\"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_inner firwl-vc_row\"><div class=\"firwl-rowcontainer-vc\"><div class=\"firwl-rowcontent\"><div class=\"wpb_column vc_column_container vc_col-sm-2\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><img decoding=\"async\" class=\"w-100\" src=\"https:\/\/buromc.com\/wp-content\/uploads\/2019\/05\/Group-128.png\" alt=\"\" \/><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-10\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"contTextINtArq\">\n<div class=\"label uppercase rubik\">\u00b7 Cloud-based <span class=\"bold\">security architecture<\/span><\/div>\n<div class=\"label rubik\">Protects the outermost layer of an organization's network perimeter.<\/div>\n<\/div>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner firwl-vc_row\"><div class=\"firwl-rowcontainer-vc\"><div class=\"firwl-rowcontent\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_empty_space\"   style=\"height: 10px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner firwl-vc_row\"><div class=\"firwl-rowcontainer-vc\"><div class=\"firwl-rowcontent\"><div class=\"wpb_column vc_column_container vc_col-sm-2\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><img decoding=\"async\" class=\"w-100\" src=\"https:\/\/buromc.com\/wp-content\/uploads\/2019\/05\/Group-129.png\" alt=\"\" \/><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-10\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"contTextINtArq\">\n<div class=\"label uppercase rubik\">\u00b7 Cloud-based <span class=\"bold\">security architecture<\/span><\/div>\n<div class=\"label rubik\">Designed to secure cloud infrastructure and services.<\/div>\n<\/div>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner firwl-vc_row\"><div class=\"firwl-rowcontainer-vc\"><div class=\"firwl-rowcontent\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_empty_space\"   style=\"height: 10px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner firwl-vc_row\"><div class=\"firwl-rowcontainer-vc\"><div class=\"firwl-rowcontent\"><div class=\"wpb_column vc_column_container vc_col-sm-2\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><img decoding=\"async\" class=\"w-100\" src=\"https:\/\/buromc.com\/wp-content\/uploads\/2019\/05\/Group-130.png\" alt=\"\" \/><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-10\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"contTextINtArq\">\n<div class=\"label uppercase rubik\">\u00b7 Cloud-based <span class=\"bold\">de confianza zero<\/span><\/div>\n<div class=\"label rubik\">This type of architecture assumes that all users and devices are untrusted and requires continuous authentication and authorization across the network.<\/div>\n<\/div>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner firwl-vc_row\"><div class=\"firwl-rowcontainer-vc\"><div class=\"firwl-rowcontent\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_empty_space\"   style=\"height: 10px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner firwl-vc_row\"><div class=\"firwl-rowcontainer-vc\"><div class=\"firwl-rowcontent\"><div class=\"wpb_column vc_column_container vc_col-sm-2\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><img decoding=\"async\" class=\"w-100\" src=\"https:\/\/buromc.com\/wp-content\/uploads\/2019\/05\/Group-131.png\" alt=\"\" \/><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-10\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"contTextINtArq\">\n<div class=\"label uppercase rubik\">\u00b7 Cloud-based <span class=\"bold\">basada en la identidad<\/span><\/div>\n<div class=\"label rubik\">This type of architecture focuses on securing user identities and access to resources.<\/div>\n<\/div>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner firwl-vc_row\"><div class=\"firwl-rowcontainer-vc\"><div class=\"firwl-rowcontent\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_empty_space\"   style=\"height: 10px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner firwl-vc_row\"><div class=\"firwl-rowcontainer-vc\"><div class=\"firwl-rowcontent\"><div class=\"wpb_column vc_column_container vc_col-sm-2\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><img decoding=\"async\" class=\"w-100\" src=\"https:\/\/buromc.com\/wp-content\/uploads\/2019\/05\/Group-132.png\" alt=\"\" \/><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-10\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"contTextINtArq\">\n<div class=\"label uppercase rubik\">\u00b7 Cloud-based <span class=\"bold\">definida por software<\/span><\/div>\n<div class=\"label rubik\">This type of architecture focuses on leveraging network virtualization and software-defined networking to enforce centralized security policies and better control network traffic.<\/div>\n<\/div>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner firwl-vc_row\"><div class=\"firwl-rowcontainer-vc\"><div class=\"firwl-rowcontent\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\t\t\t<hr class=\"firwl-spacer-m\">\n\t\t<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><div class=\"firwl-vc-row-container\" ><div class=\"vc_row firwl-stickycont wpb_row firwl-vc_row suscribe-section vc_custom_1737430981989 vc_row-has-fill vc_column-gap-15\"><div class=\"firwl-container firwl-rowcontainer-vc\"><div class=\"firwl-rowcontent\"><div class=\"wpb_column vc_column_container vc_col-sm-12 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1737431156035\"><div class=\"wpb_wrapper\">\t\t\t<hr class=\"firwl-spacer-m\">\n\t\t\n\t\t<div class=\"firwl-section-caption sec-sec-home marign-bottom-0\">\n\n\t\t\t\t\t\t\t<h2 class=\"firwl-capfont firwl-glitchtxt\" data-firwl-text=\"BENEFICIOS\">BENEFITS<\/h2>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<hr class=\"firwl-spacer-s\">\n\t\t\n\t<div class=\"wpb_text_column wpb_content_element make-smaller-width\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<ul>\n<li>\u00b7 Substantial savings by achieving a reduction in TCO (Total Cost of Technology).<\/li>\n<li>\u00b7 Increases operational efficiency.<\/li>\n<li>\u00b7 Improves traceability with timely and proactive attack detection.<\/li>\n<li>\u00b7 Comprehensive security event management.<\/li>\n<li>\u00b7 Automates security across all application points.<\/li>\n<li>\u00b7 Provides complete visibility into the threat posture with a single, unified management console.<\/li>\n<li>management console.\n\n\u00b7 SIEM (Security Information and Event Management) correlation.<\/li>\n<li>\u00b7 Provides a holistic view of security, enabling faster and more accurate responses to any event.<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n\t\t\t<hr class=\"firwl-spacer-m\">\n\t\t<div class=\"vc_row wpb_row vc_inner firwl-vc_row content-suscribete margin-bottom-fixed-sicription-noc vc_custom_1737431938455 vc_row-has-fill\"><div class=\"firwl-rowcontainer-vc\"><div class=\"firwl-rowcontent\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner vc_custom_1731038607818\"><div class=\"wpb_wrapper\"><div class=\"vc_empty_space\"   style=\"height: 32px\"><span class=\"vc_empty_space_inner\"><\/span><\/div>\n\t\t<div class=\"firwl-section-caption our-model-section novedades-section2 padding-20-horizontal\">\n\n\t\t\t\t\t\t\t<h6 class=\"firwl-caption firwl-gradtext\"><span>NEWS<\/span><\/h6>\n\t\t\t\t\t\t\t\t<h2 class=\"firwl-capfont firwl-glitchtxt\" data-firwl-text=\"Suscr\u00edbete\">Subscribe<\/h2>\n\t\t\t\t\t\t\t\t<p>Receive all the most relevant information on cybersecurity, infrastructure, and digital architecture.<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t <p class=\"aligncenter\"><a href=\"https:\/\/doitdig-buromc.odoo.com\/newsletter\"  target=\"_blank\"  \n\t\tclass=\"firwl-btn  aligncenter button-azul firwl-btn__l\">Learn more<\/a><\/p><div class=\"vc_empty_space\"   style=\"height: 32px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t<hr class=\"firwl-spacer-m\">\n\t\t<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"firwl-vc-row-container\" ><div class=\"vc_row firwl-stickycont wpb_row firwl-vc_row vc_custom_1736395884263 vc_row-has-fill vc_column-gap-15 firwl-negative\"><div class=\"firwl-rowcontainer-vc\"><div class=\"firwl-rowcontent\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper firwl-vc_section\"><div id=\"contacto\" class=\"vc_row wpb_row vc_inner firwl-vc_row\"><div class=\"firwl-container firwl-rowcontainer-vc\"><div class=\"firwl-rowcontent\"><div class=\"wpb_column vc_column_container vc_col-sm-2\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-8\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\t\t\t<hr class=\"firwl-spacer-m\">\n\t\t\t\t\t<hr class=\"firwl-spacer-m\">\n\t\t\t\t\t<hr class=\"firwl-spacer-m\">\n\t\t<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-2\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner firwl-vc_row formulario-home vc_column-gap-35\"><div class=\"firwl-container firwl-rowcontainer-vc\"><div class=\"firwl-rowcontent\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner vc_custom_1731128366239\"><div class=\"wpb_wrapper\">\t\t\t<hr class=\"firwl-spacer-m\">\n\t\t\t\t<div>\n\t\t\t<h6  class=\"firwl-element-caption firwl-caption caption-form-left firwl-caption__xs\"><span  data-firwl-text=\"CONTACTO\" class=\"firwl-glitchtxt\">CONTACT<\/span><\/h6>\t\t<\/div>\n\n\t\n\n\n\t\t\n\t<div class=\"wpb_text_column wpb_content_element firwl-small text-below-caption-form-left\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>+52 55 6270 7000<br \/>\n+52 56 5100 8613<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t\t\t<hr class=\"firwl-spacer-xs\">\n\t\t\t\t<div>\n\t\t\t<h6  class=\"firwl-element-caption firwl-caption caption-form-left firwl-caption__xs\"><span  data-firwl-text=\"Mail\" class=\"firwl-glitchtxt\">Mail<\/span><\/h6>\t\t<\/div>\n\n\t\n\n\n\t\t\n\t<div class=\"wpb_text_column wpb_content_element firwl-small text-below-caption-form-left\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>admmarketing@buromc.com<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t\t\t<hr class=\"firwl-spacer-xs\">\n\t\t\t\t<div>\n\t\t\t<h6  class=\"firwl-element-caption firwl-caption caption-form-left firwl-caption__xs\"><span  data-firwl-text=\"DIRECCI\u00d3N\" class=\"firwl-glitchtxt\">ADDRESS.<\/span><\/h6>\t\t<\/div>\n\n\t\n\n\n\t\t\n\t<div class=\"wpb_text_column wpb_content_element firwl-small\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Carrillo Puerto 396. Piso 2 y 3, Gral. Pedro Mar\u00eda Anaya, C.P. 03340 Benito Ju\u00e1rez, CDMX<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element firwl-small\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><iframe class=\"maps-google\" style=\"border: 0;\" src=\"https:\/\/www.google.com\/maps\/embed?pb=!1m18!1m12!1m3!1d3764.211536938792!2d-99.1580542!3d19.3599911!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x85d1ffc7eaaaaaab%3A0x68ee34ea61c664e9!2sGrupo%20BeIT!5e0!3m2!1ses-419!2smx!4v1734750946980!5m2!1ses-419!2smx\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t\t\t<hr class=\"firwl-spacer-s\">\n\t\t<\/div><\/div><\/div><div class=\"page-contactform-style back-form-consultoria wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner vc_custom_1731128375698\"><div class=\"wpb_wrapper\"><div class=\"evc-section-title evc-shortcode\" style=\"text-align: left\">\n\t<div class=\"evc-st-inner\">\n\t\t\t\t\t<h2 class=\"evc-st-title\" style=\"color: #FFFFFF\">\n\t\t\t\tReceive specialized consulting\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>We offer innovative solutions to optimize operations and maximize revenue in a secure and efficient way.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 32px\"><span class=\"vc_empty_space_inner\"><\/span><\/div>\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f1557-o1\" lang=\"es-MX\" dir=\"ltr\" data-wpcf7-id=\"1557\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/us\/wp-json\/wp\/v2\/pages\/2669#wpcf7-f1557-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Formulario de contacto\" novalidate=\"novalidate\" data-status=\"init\" data-trp-original-action=\"\/us\/wp-json\/wp\/v2\/pages\/2669#wpcf7-f1557-o1\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"1557\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.0.6\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"es_MX\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f1557-o1\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/div>\n<div class=\"d-flex\">\n\t<div class=\"col-6 margin1Porcent inputConsultoria\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"nombre\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Name\" value=\"\" type=\"text\" name=\"nombre\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-6 inputConsultoria margin-left-lastname\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"lastname\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Surename\" value=\"\" type=\"text\" name=\"lastname\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n<\/div>\n<div class=\"col-12 inputConsultoria\">\n\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email\" value=\"\" type=\"email\" name=\"email\" \/><\/span>\n\t<\/p>\n<\/div>\n<div class=\"col-12 inputConsultoria\">\n\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"empresa\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Work place\" value=\"\" type=\"text\" name=\"empresa\" \/><\/span>\n\t<\/p>\n<\/div>\n<div class=\"col-12 inputConsultoria\">\n\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"puesto\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Job position\" value=\"\" type=\"text\" name=\"puesto\" \/><\/span>\n\t<\/p>\n<\/div>\n<div class=\"col-12 inputConsultoria\">\n\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"movil\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Phone\" value=\"\" type=\"text\" name=\"movil\" \/><\/span>\n\t<\/p>\n<\/div>\n<div class=\"col-12 inputConsultoria\">\n\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"Mensaje\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Message\" name=\"Mensaje\"><\/textarea><\/span>\n\t<\/p>\n<\/div>\n<div class=\"col-12 inputConsultoria\">\n\t<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner btn-envio col-12\" type=\"submit\" value=\"SEND\" \/>\n\t<\/p>\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<input type=\"hidden\" name=\"trp-form-language\" value=\"us\"\/><\/form>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"Arquitecturas de ciberseguridad\u00a0 Creamos arquitecturas de ciberseguridad que se adaptan al desafiante panorama de amenazas cibern\u00e9ticas a medida que las organizaciones y gobierno expanden los servicios de TI m\u00e1s all\u00e1 del per\u00edmetro tradicional bajo un marco de confianza cero.\u00a0 NUESTRO MODELO Proporciona respuestas r\u00e1pidas y eficientes Construimos una arquitectura de [...]","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-fullwidth.php","meta":{"footnotes":""},"class_list":["post-2669","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/buromc.com\/us\/wp-json\/wp\/v2\/pages\/2669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/buromc.com\/us\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/buromc.com\/us\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/buromc.com\/us\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/buromc.com\/us\/wp-json\/wp\/v2\/comments?post=2669"}],"version-history":[{"count":36,"href":"https:\/\/buromc.com\/us\/wp-json\/wp\/v2\/pages\/2669\/revisions"}],"predecessor-version":[{"id":2944,"href":"https:\/\/buromc.com\/us\/wp-json\/wp\/v2\/pages\/2669\/revisions\/2944"}],"wp:attachment":[{"href":"https:\/\/buromc.com\/us\/wp-json\/wp\/v2\/media?parent=2669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}