{"id":57,"date":"2024-06-25T16:27:57","date_gmt":"2024-06-25T14:27:57","guid":{"rendered":"https:\/\/dev.ukotek.com\/?page_id=57"},"modified":"2024-11-18T07:46:25","modified_gmt":"2024-11-18T06:46:25","slug":"proteccion-del-entorno-de-trabajo","status":"publish","type":"page","link":"https:\/\/ukotek.com\/en\/soluciones\/proteccion-del-entorno-de-trabajo\/","title":{"rendered":"Protection of the working environment"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"57\" class=\"elementor elementor-57\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b1b009e e-flex e-con-boxed e-con e-parent\" data-id=\"b1b009e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8b28449 elementor-widget elementor-widget-spacer\" data-id=\"8b28449\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-72841ab e-flex e-con-boxed e-con e-parent\" data-id=\"72841ab\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-16f1c2b e-con-full e-flex e-con e-child\" data-id=\"16f1c2b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57325e8 elementor-widget elementor-widget-heading\" data-id=\"57325e8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Proactive protection of the working environment<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-09686b4 elementor-widget elementor-widget-heading\" data-id=\"09686b4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Advanced threat protection with PERCEPTION POINT<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9b9db5a e-con-full e-flex e-con e-child\" data-id=\"9b9db5a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2015876 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"2015876\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"134\" height=\"48\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/10\/Recurso-3.svg\" class=\"attachment-full size-full wp-image-2332\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9520869 e-flex e-con-boxed e-con e-parent\" data-id=\"9520869\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc3ee1c elementor-pagination-position-outside elementor--h-position-center elementor--v-position-middle elementor-widget elementor-widget-slides\" data-id=\"fc3ee1c\" data-element_type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;dots&quot;,&quot;transition&quot;:&quot;fade&quot;,&quot;autoplay_speed&quot;:2000,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;transition_speed&quot;:500}\" data-widget_type=\"slides.default\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-slides-wrapper elementor-main-swiper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Slides\" dir=\"ltr\" data-animation=\"\" data-no-translation-aria-label=\"\">\n\t\t\t\t<div class=\"swiper-wrapper elementor-slides\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-repeater-item-4355350 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\" role=\"img\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><h3 class=\"elementor-slide-heading\">Ready to neutralise advanced phishing threats?<\/h3><\/div><\/div><\/div><div class=\"elementor-repeater-item-de8bff6 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\" role=\"img\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><h3 class=\"elementor-slide-heading\">Ready to detect malware in real time?<\/h3><\/div><\/div><\/div><div class=\"elementor-repeater-item-6f7e703 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\" role=\"img\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><h3 class=\"elementor-slide-heading\">Ready to eliminate threats in collaborative applications?<\/h3><\/div><\/div><\/div><div class=\"elementor-repeater-item-81bf0bd swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\" role=\"img\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><h3 class=\"elementor-slide-heading\">Protected against evasion and obfuscation attacks?<\/h3><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d3d6e5b e-flex e-con-boxed e-con e-parent\" data-id=\"d3d6e5b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ad5b8b3 e-con-full e-flex e-con e-child\" data-id=\"ad5b8b3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9adb53c elementor-widget elementor-widget-text-editor\" data-id=\"9adb53c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Perception Point combines an advanced AI-powered threat prevention platform with a managed incident response service to protect the workspace.<\/p><p>By fusing GenAI technology and human knowledge, Perception Point protects the company's most important channels against any threat.<\/p><p>Recognised as the market leader in detection with a 99.5% rate, Perception Point protects organisations against phishing, malware and other cyber threats, ensuring secure and uninterrupted communication.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46ac13d elementor-widget elementor-widget-premium-addon-button\" data-id=\"46ac13d\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"premium-addon-button.default\">\n\t\t\t\t\t\r\n\r\n\t\t<a class=\"premium-button premium-button-style2 premium-btn-sm premium-button-style2-shutouthor\" href=\"https:\/\/meetings-eu1.hubspot.com\/alejandro-perez-lopez-de-brinas\" target=\"_blank\">\r\n\t\t\t<div class=\"premium-button-text-icon-wrapper\">\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<span >\r\n\t\t\t\t\t\tRequest a Consultation\t\t\t\t\t<\/span>\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t<\/a>\r\n\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-95b69da e-con-full e-flex e-con e-child\" data-id=\"95b69da\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6200616 elementor-widget elementor-widget-text-editor\" data-id=\"6200616\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>KEY DATA<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da07d1f premium-type-column elementor-widget elementor-widget-premium-icon-list\" data-id=\"da07d1f\" data-element_type=\"widget\" data-settings=\"{&quot;rbadges_repeater&quot;:[]}\" data-widget_type=\"premium-icon-list.default\">\n\t\t\t\t\t\t\t\t<ul class=\"premium-bullet-list-box\">\r\n\t\t\r\n\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-5629bd8 premium-bullet-list-content-grow-effect\">\r\n\t\t\t\t<div class=\"premium-bullet-list-text\">\r\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\r\n\t\t\t\t\t<div class=\"premium-drawable-icon\"><svg class=\"premium-svg-nodraw e-font-icon-svg e-fas-dot-circle\" aria-hidden=\"true\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg><\/div>\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t<span   data-text=\"Prevenci\u00f3n de amenazas basada en IA contra amenazas conocidas, desconocidas y evasivas\"> AI-based threat prevention against known, unknown and evasive threats <\/span>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-divider\"><\/div>\r\n\t\t\t\t\t\r\n\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-bc4eed1 premium-bullet-list-content-grow-effect\">\r\n\t\t\t\t<div class=\"premium-bullet-list-text\">\r\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\r\n\t\t\t\t\t<div class=\"premium-drawable-icon\"><svg class=\"premium-svg-nodraw e-font-icon-svg e-fas-dot-circle\" aria-hidden=\"true\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg><\/div>\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t<span   data-text=\"Protege el workspace moderno: correo electr\u00f3nico, navegadores y aplicaciones en la nube\"> Protecting the modern workspace: email, browsers and cloud applications <\/span>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-divider premium-bullet-list-divider\"><\/div>\r\n\t\t\t\t\t\r\n\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-bb67e4a premium-bullet-list-content-grow-effect\">\r\n\t\t\t\t<div class=\"premium-bullet-list-text\">\r\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\r\n\t\t\t\t\t<div class=\"premium-drawable-icon\"><svg class=\"premium-svg-nodraw e-font-icon-svg e-fas-dot-circle\" aria-hidden=\"true\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg><\/div>\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t<span   data-text=\"Respuesta a incidentes 24x7\"> 24x7 incident response <\/span>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-divider premium-bullet-list-divider premium-bullet-list-divider\"><\/div>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-86172ad e-flex e-con-boxed e-con e-parent\" data-id=\"86172ad\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1c3212c e-con-full e-flex e-con e-child\" data-id=\"1c3212c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-113b2f1 elementor-widget elementor-widget-text-editor\" data-id=\"113b2f1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>THE CHALLENGE<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a3d830 elementor-widget elementor-widget-text-editor\" data-id=\"8a3d830\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Attackers are now using new avenues such as collaboration applications and enterprise browsers to cause damage. While email remains the primary threat vector, 28% of attacks come from cloud collaboration tools. In addition, digitisation and hybrid working models have made the browser a key target for attacks that evade traditional security solutions, causing ransomware, financial loss and data breaches.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-673a9df e-con-full e-flex e-con e-child\" data-id=\"673a9df\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9c8479f elementor-invisible elementor-widget elementor-widget-image\" data-id=\"9c8479f\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1556\" height=\"932\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/UKOTEK_Perception-Point-1.png\" class=\"attachment-full size-full wp-image-1352\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/UKOTEK_Perception-Point-1.png 1556w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/UKOTEK_Perception-Point-1-300x180.png 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/UKOTEK_Perception-Point-1-1024x613.png 1024w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/UKOTEK_Perception-Point-1-768x460.png 768w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/UKOTEK_Perception-Point-1-1536x920.png 1536w\" sizes=\"(max-width: 1556px) 100vw, 1556px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0e08c5d e-flex e-con-boxed e-con e-parent\" data-id=\"0e08c5d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c3476c9 e-con-full e-flex e-con e-child\" data-id=\"c3476c9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-304e65f elementor-widget elementor-widget-text-editor\" data-id=\"304e65f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>THE SOLUTION<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f0ce11 elementor-widget elementor-widget-heading\" data-id=\"7f0ce11\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PERCEPTION POINT: Protect more, manage less.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4b84017 e-flex e-con-boxed e-con e-parent\" data-id=\"4b84017\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-36ce8de e-con-full e-flex e-con e-child\" data-id=\"36ce8de\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-90e29bd elementor-invisible elementor-widget elementor-widget-image\" data-id=\"90e29bd\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1251\" height=\"543\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Screenshot-2024-07-29-at-12.04.36-1.png\" class=\"attachment-full size-full wp-image-1353\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Screenshot-2024-07-29-at-12.04.36-1.png 1251w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Screenshot-2024-07-29-at-12.04.36-1-300x130.png 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Screenshot-2024-07-29-at-12.04.36-1-1024x444.png 1024w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Screenshot-2024-07-29-at-12.04.36-1-768x333.png 768w\" sizes=\"(max-width: 1251px) 100vw, 1251px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7ef34ea e-con-full e-flex e-con e-child\" data-id=\"7ef34ea\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55c86c3 elementor-widget elementor-widget-text-editor\" data-id=\"55c86c3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Perception Point addresses these challenges with its AI-based threat prevention to protect the modern workspace: email, browsers and SaaS applications.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e82c4e e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"3e82c4e\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-64e5d16 e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"64e5d16\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9c88033 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"9c88033\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1249\" height=\"2810\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Malware-_x2013_-threat-page-.png\" class=\"attachment-full size-full wp-image-1678\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Malware-_x2013_-threat-page-.png 1249w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Malware-_x2013_-threat-page--133x300.png 133w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Malware-_x2013_-threat-page--455x1024.png 455w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Malware-_x2013_-threat-page--768x1728.png 768w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Malware-_x2013_-threat-page--683x1536.png 683w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Malware-_x2013_-threat-page--910x2048.png 910w\" sizes=\"(max-width: 1249px) 100vw, 1249px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b18682e e-con-full e-flex e-con e-child\" data-id=\"b18682e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce11f68 elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"ce11f68\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Antispam (e-mail only): <\/h3><p class=\"elementor-image-box-description\">The patented spam filter quickly flags and filters spam and junk mail. The Anti-Spam layer includes checks for sender authentication protocols such as DMARC, DKIM and SPF, along with additional internal machine learning capabilities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-229fc6b elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"229fc6b\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Threat Intelligence: <\/h3><p class=\"elementor-image-box-description\">It combines multiple sources of threat intelligence with a unique, in-house developed engine that searches for malicious URLs and files.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f85194 elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"4f85194\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Static signatures: <\/h3><p class=\"elementor-image-box-description\">Best-in-class signature-based AV engines, combined with proprietary algorithms, identify highly complex signatures, evasive malware, ransomware and more.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae62092 elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"ae62092\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Hardware Assisted Platform (HAP\u2122): <\/h3><p class=\"elementor-image-box-description\">Patented CPU-level technology acts earlier in the threat kill chain than any other solution. Dynamic scanning and deterministic blocking of attacks in near real-time (within seconds) in the exploitation phase prior to malware launch\/execution.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d8d4d4 elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"8d8d4d4\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Recursive Unpacker: <\/h3><p class=\"elementor-image-box-description\">The advanced anti-evasion engine decompresses content into smaller units (files and URLs) to undo evasion techniques and identify hidden payloads that easily evade traditional detection systems. <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-250677a elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"250677a\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Anti-Phishing: <\/h3><p class=\"elementor-image-box-description\">Improved URL reputation and AI-powered text analysis engines, together with Perception Point's in-house image recognition technology, identify phishing techniques and all types of advanced phishing attacks.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb49c9e elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"cb49c9e\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">BEC &amp; ATO: <\/h3><p class=\"elementor-image-box-description\">Prevents payload and phishing threats such as CEO fraud, VEC and supply chain attacks that do not necessarily include malicious content. Intercepts account takeover attempts using artificial intelligence and contextual and behavioural analysis.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d80c896 e-flex e-con-boxed e-con e-parent\" data-id=\"d80c896\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-00c084f elementor-invisible elementor-widget elementor-widget-image\" data-id=\"00c084f\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1447\" height=\"545\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/threats-evolved-img-1.png\" class=\"attachment-full size-full wp-image-1682\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/threats-evolved-img-1.png 1447w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/threats-evolved-img-1-300x113.png 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/threats-evolved-img-1-1024x386.png 1024w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/threats-evolved-img-1-768x289.png 768w\" sizes=\"(max-width: 1447px) 100vw, 1447px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9d53d5d e-flex e-con-boxed e-con e-parent\" data-id=\"9d53d5d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b54a350 e-con-full e-flex e-con e-child\" data-id=\"b54a350\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fe4f27a elementor-widget elementor-widget-heading\" data-id=\"fe4f27a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">UKOTEK - Certified PERCEPTION POINT Partner in Spain<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-deae6b2 elementor-widget elementor-widget-text-editor\" data-id=\"deae6b2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>With more than 20 years in the cybersecurity sector, the Ukotek team assists organisations in implementing advanced solutions to protect their digital assets and ensure their operational continuity.<\/p><p>We specialise in delivering innovative technologies that protect businesses from ever-evolving cyber threats. Our team of experts provides personalised advice and technical support to ensure each customer receives optimal protection.<\/p><p>We offer scalable solutions adapted to the needs of each organisation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5c752ef e-con-full e-flex e-con e-child\" data-id=\"5c752ef\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-232be54 elementor-widget elementor-widget-heading\" data-id=\"232be54\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">I would like to receive more information about Perception Point<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-638d5c3 elementor-widget elementor-widget-html\" data-id=\"638d5c3\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js\"><\/script>\r\n<script>\r\n  hbspt.forms.create({\r\n    region: \"eu1\",\r\n    portalId: \"144892228\",\r\n    formId: \"75af3df5-2ae8-4109-8326-4f8e45bd339a\"\r\n  });\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Protecci\u00f3n proactiva del entorno de trabajo Protecci\u00f3n avanzada contra amenazas con PERCEPTION POINT \u00bfListo para neutralizar amenazas avanzadas de phishing? \u00bfPreparado para detectar malware en tiempo real? \u00bfListo para eliminar amenazas en aplicaciones de colaboraci\u00f3n? \u00bfProtegido contra ataques de evasi\u00f3n y ofuscaci\u00f3n? Perception Point combina una plataforma avanzada de prevenci\u00f3n de amenazas impulsada por IA [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":46,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-57","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Protecci\u00f3n del Entorno de trabajo - Ukotek<\/title>\n<meta name=\"description\" content=\"Junto con su partner Perception Point, Ukotek ofrece una plataforma avanzada de prevenci\u00f3n de amenazas impulsada por IA, con un servicio gestionado de respuesta a incidentes 24\/7 para proteger el workspace moderno: correo electr\u00f3nico, navegadores y aplicaciones en la nube.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ukotek.com\/en\/soluciones\/proteccion-del-entorno-de-trabajo\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecci\u00f3n del Entorno de trabajo - Ukotek\" \/>\n<meta property=\"og:description\" content=\"Junto con su partner Perception Point, Ukotek ofrece una plataforma avanzada de prevenci\u00f3n de amenazas impulsada por IA, con un servicio gestionado de respuesta a incidentes 24\/7 para proteger el workspace moderno: correo electr\u00f3nico, navegadores y aplicaciones en la nube.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ukotek.com\/en\/soluciones\/proteccion-del-entorno-de-trabajo\/\" \/>\n<meta property=\"og:site_name\" content=\"Ukotek\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-18T06:46:25+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/\",\"url\":\"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/\",\"name\":\"Protecci\u00f3n del Entorno de trabajo - Ukotek\",\"isPartOf\":{\"@id\":\"https:\/\/ukotek.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/10\/Recurso-3.svg\",\"datePublished\":\"2024-06-25T14:27:57+00:00\",\"dateModified\":\"2024-11-18T06:46:25+00:00\",\"description\":\"Junto con su partner Perception Point, Ukotek ofrece una plataforma avanzada de prevenci\u00f3n de amenazas impulsada por IA, con un servicio gestionado de respuesta a incidentes 24\/7 para proteger el workspace moderno: correo electr\u00f3nico, navegadores y aplicaciones en la nube.\",\"breadcrumb\":{\"@id\":\"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/#primaryimage\",\"url\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/10\/Recurso-3.svg\",\"contentUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/10\/Recurso-3.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/ukotek.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Soluciones\",\"item\":\"https:\/\/ukotek.com\/soluciones\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Protecci\u00f3n del Entorno de trabajo\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ukotek.com\/#website\",\"url\":\"https:\/\/ukotek.com\/\",\"name\":\"Ukotek\",\"description\":\"Ciber Security\",\"publisher\":{\"@id\":\"https:\/\/ukotek.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ukotek.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ukotek.com\/#organization\",\"name\":\"Ukotek\",\"url\":\"https:\/\/ukotek.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/ukotek.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png\",\"contentUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png\",\"width\":783,\"height\":224,\"caption\":\"Ukotek\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecci\u00f3n del Entorno de trabajo - Ukotek","description":"Junto con su partner Perception Point, Ukotek ofrece una plataforma avanzada de prevenci\u00f3n de amenazas impulsada por IA, con un servicio gestionado de respuesta a incidentes 24\/7 para proteger el workspace moderno: correo electr\u00f3nico, navegadores y aplicaciones en la nube.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ukotek.com\/en\/soluciones\/proteccion-del-entorno-de-trabajo\/","og_locale":"en_GB","og_type":"article","og_title":"Protecci\u00f3n del Entorno de trabajo - Ukotek","og_description":"Junto con su partner Perception Point, Ukotek ofrece una plataforma avanzada de prevenci\u00f3n de amenazas impulsada por IA, con un servicio gestionado de respuesta a incidentes 24\/7 para proteger el workspace moderno: correo electr\u00f3nico, navegadores y aplicaciones en la nube.","og_url":"https:\/\/ukotek.com\/en\/soluciones\/proteccion-del-entorno-de-trabajo\/","og_site_name":"Ukotek","article_modified_time":"2024-11-18T06:46:25+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/","url":"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/","name":"Protecci\u00f3n del Entorno de trabajo - Ukotek","isPartOf":{"@id":"https:\/\/ukotek.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/#primaryimage"},"image":{"@id":"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/#primaryimage"},"thumbnailUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/10\/Recurso-3.svg","datePublished":"2024-06-25T14:27:57+00:00","dateModified":"2024-11-18T06:46:25+00:00","description":"Junto con su partner Perception Point, Ukotek ofrece una plataforma avanzada de prevenci\u00f3n de amenazas impulsada por IA, con un servicio gestionado de respuesta a incidentes 24\/7 para proteger el workspace moderno: correo electr\u00f3nico, navegadores y aplicaciones en la nube.","breadcrumb":{"@id":"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/#primaryimage","url":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/10\/Recurso-3.svg","contentUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/10\/Recurso-3.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/ukotek.com\/"},{"@type":"ListItem","position":2,"name":"Soluciones","item":"https:\/\/ukotek.com\/soluciones\/"},{"@type":"ListItem","position":3,"name":"Protecci\u00f3n del Entorno de trabajo"}]},{"@type":"WebSite","@id":"https:\/\/ukotek.com\/#website","url":"https:\/\/ukotek.com\/","name":"Ukotek","description":"Ciber Security","publisher":{"@id":"https:\/\/ukotek.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ukotek.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/ukotek.com\/#organization","name":"Ukotek","url":"https:\/\/ukotek.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ukotek.com\/#\/schema\/logo\/image\/","url":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png","contentUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png","width":783,"height":224,"caption":"Ukotek"},"image":{"@id":"https:\/\/ukotek.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/pages\/57","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/comments?post=57"}],"version-history":[{"count":89,"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/pages\/57\/revisions"}],"predecessor-version":[{"id":2535,"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/pages\/57\/revisions\/2535"}],"up":[{"embeddable":true,"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/pages\/46"}],"wp:attachment":[{"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/media?parent=57"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}