{"id":199,"date":"2026-04-20T15:12:50","date_gmt":"2026-04-20T21:12:50","guid":{"rendered":"https:\/\/it-securitys.com\/web\/?page_id=199"},"modified":"2026-04-20T23:32:26","modified_gmt":"2026-04-21T05:32:26","slug":"nosotros","status":"publish","type":"page","link":"https:\/\/it-securitys.com\/web\/nosotros\/","title":{"rendered":"NOSOTROS"},"content":{"rendered":"<div  data-label=\"About\" data-id=\"about--1\" data-export-id=\"about-10\" data-category=\"about\" class=\"about-10 content-section content-section-spacing-large\" id=\"about-1\" style=\"background-color: rgb(255, 255, 255);\"><div  class=\"gridContainer\"> <div  class=\"row middle-sm text-center\"><div  class=\"col-sm-5 space-bottom-xs content-column\" data-type=\"column\"> <h5  class=\"\">NUESTRA PASI\u00d3N<\/h5> <h2  class=\"\">Priorizando&nbsp;<br ><span  style=\"font-family: Playfair Display,sans-serif; font-weight: 700; font-style: italic;\" href=\"#\">la seguridad y el an\u00e1lisis de datos <\/span>se producen los mejores resultados<\/h2> <p  class=\"\">IT-SECURITYS se establecio en 2010 para introducir adecuadamente el concepto de seguridad inform\u00e1tica en sus clientes y ofrecer los mejores productos para asegurar el activo m\u00e1s volatil, tangible y valioso de cualquier empresa, sus datos.&nbsp;<\/p> <p  class=\"\">Con esa premisa hemos evolucionada para enfocarnos en el buen uso de esos datos. Aumentado la capacidad de an\u00e1lisis brindando a nuestros clientes una forma diferente de entender los mismo, el an\u00e1lisis visual de v\u00ednculos.<\/p><p  class=\"\">Impactando de manera m\u00e1s positiva en las sociedades que participamos ya que apoyamos a instituciones de orden p\u00fablico y econ\u00f3mico a luchar contra los flagelos de la actividad criminal a trav\u00e9s del an\u00e1lisis de datos.<\/p><\/div> <div  class=\"col-sm-7 flexbox middle-xs center-xs\"><div  class=\"overlay-box middle-xs center-xs flexbox box-image\"> <div  class=\"overlay-box-offset offset-border mdc-elevation--z5 border-color1 hide-xs border-radius-8\"><\/div> <img  decoding=\"async\" class=\"mdc-elevation--z10 rounded max-image\" data-size=\"480x700\" src=\"https:\/\/it-securitys.com\/web\/wp-content\/uploads\/2026\/04\/cropped-Engineer-working-in-data-center.jpeg\"><\/div> <\/div><\/div> <\/div><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"pro\/page-templates\/full-width-page.php","meta":{"footnotes":""},"class_list":["post-199","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/it-securitys.com\/web\/wp-json\/wp\/v2\/pages\/199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/it-securitys.com\/web\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/it-securitys.com\/web\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/it-securitys.com\/web\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/it-securitys.com\/web\/wp-json\/wp\/v2\/comments?post=199"}],"version-history":[{"count":3,"href":"https:\/\/it-securitys.com\/web\/wp-json\/wp\/v2\/pages\/199\/revisions"}],"predecessor-version":[{"id":232,"href":"https:\/\/it-securitys.com\/web\/wp-json\/wp\/v2\/pages\/199\/revisions\/232"}],"wp:attachment":[{"href":"https:\/\/it-securitys.com\/web\/wp-json\/wp\/v2\/media?parent=199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}