{"id":25167,"date":"2021-10-15T08:29:44","date_gmt":"2021-10-15T08:29:44","guid":{"rendered":"https:\/\/www.apen.es\/?p=25167"},"modified":"2025-02-28T10:48:30","modified_gmt":"2025-02-28T10:48:30","slug":"cuando-nuestro-antivirus-ya-no-es-suficiente","status":"publish","type":"post","link":"https:\/\/www.apen.es\/en\/blog\/cuando-nuestro-antivirus-ya-no-es-suficiente\/","title":{"rendered":"When our antivirus is no longer enough\u2026"},"content":{"rendered":"<p>For years the<strong>&nbsp;antivirus<\/strong>&nbsp;They have kept our small and medium-sized businesses safe. However, in recent times threat patterns are changing rapidly, and we need a complementary protection tool to safeguard ourselves.<\/p>\n\n\n\n<p>If we only have one&nbsp;<strong>antivirus<\/strong>&nbsp;Traditional vaccination only protects us against known viruses. From that point on, we increase our risk of infection.<strong>&nbsp;viruses, malware or even ransomware<\/strong>.<\/p>\n\n\n\n<p>The consequences of taking those risks can be disastrous for our business, since in addition to losing all the information, it negatively impacts customer service and our reputation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is an EDR?<\/h2>\n\n\n\n<p><strong>EDR<\/strong>, English acronym for&nbsp;<strong>Endpoint Detection Response<\/strong>, It is a system for protecting the company&#039;s equipment and infrastructure. It combines the&nbsp;<strong>antivirus<\/strong>&nbsp;traditional methods combined with monitoring tools and artificial intelligence to provide a fast and efficient response to risks and potential threats&nbsp;<strong>zero day<\/strong>.<\/p>\n\n\n\n<p>In recent times, companies of all sizes are exposed to the r<strong>Data theft, espionage, fraud, and malware infections<\/strong>&nbsp;of different natures. The impact of these types of attacks can range from service availability problems to a considerable financial impact.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How does an EDR work?<\/h2>\n\n\n\n<p>A system&nbsp;<strong>EDR<\/strong>&nbsp;monitors the activity of the<strong>&nbsp;endpoints<\/strong>&nbsp;and classifies files as safe, dangerous, or unknown. When it detects unknown files in one of the&nbsp;<strong>endpoints<\/strong>, (such as an email attachment), it automatically sends it to the cloud and remains isolated in a test environment. There, it runs, mimicking the behavior a user would have.<\/p>\n\n\n\n<p>At the same time, a machine learning system observes and learns from the behavior of that threat. After observing it for a while, our system&nbsp;<strong>EDR<\/strong>&nbsp;It will determine if it is a safe or dangerous file, blocking it on all endpoints if it considers it dangerous.<\/p>\n\n\n\n<p>In this way, if we detect that file again in any of the endpoints in the future, it will directly block it, preventing its execution.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Detects<\/h2>\n\n\n\n<p>They use AI (artificial intelligence) to reduce the false positive rate and are designed to monitor and respond to a wide range of threats, such as ransomware, malware, botnets, and other known and unknown threats. These include unauthorized access, stealth attacks for data theft, and more.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Contains<\/h2>\n\n\n\n<p>It allows for advanced threat blocking.<strong>&nbsp;EDR<\/strong>&nbsp;Not only is it capable of quickly detecting new threats, but it can also handle attacks in real time and protect us while they occur.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Investiga<\/h2>\n\n\n\n<p>He&nbsp;<strong>EDR<\/strong>&nbsp;It allows for a quick and accurate response to incidents. The goal is to stop an attack and get back to work as soon as possible; remember that any company is vulnerable to cyberattacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Elimina<\/h2>\n\n\n\n<p>Finally, the most important component of a solution&nbsp;<strong>EDR<\/strong>&nbsp;It is their ability to eliminate security threats. When a malicious file is removed, the affected parts of the network must also be repaired.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">New generations of zero-day viruses<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>RANSOMWARE<\/strong><\/li>\n<\/ul>\n\n\n\n<p>He&nbsp;<strong>Ransomware<\/strong>&nbsp;It has been a constant concern for companies worldwide since the emergence of Cryptolocker in 2013. Despite the fact that&nbsp;<strong>ransomware<\/strong>&nbsp;It has existed for a long time, but it was never a threat that particularly worried companies. However, a single incident of&nbsp;<strong>ransomware<\/strong>&nbsp;It can render a company inoperable by encrypting its most important files. When a company experiences an attack by&nbsp;<strong>ransomware<\/strong>&nbsp;And when he realizes that the backups are not recent enough, he immediately feels that his only option is to pay the ransom.<\/p>\n\n\n\n<p><strong>Our cloud security sandbox provides an additional layer of defense outside the company network to prevent ransomware from running in a production environment.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>TARGETED ATTACKS AND INFORMATION LEAKS<\/strong><\/li>\n<\/ul>\n\n\n\n<p>The current cybersecurity landscape is constantly evolving with new attack methods and threats never before seen. When an attack or data breach occurs, companies are often surprised to find their defenses compromised or are even unaware that the attack has taken place. Once they realize it, companies reactively implement measures to prevent the attack from happening again. However, this does not protect them from the next attack, which could use a completely new vector.<\/p>\n\n\n\n<p>The strategy of using a cloud security sandbox as a defense measure is far more effective than simply observing the appearance of a potential threat because it goes beyond mere appearance and instead focuses on what the potential threat is doing. This contributes to a much more conclusive determination of whether it is a targeted attack, a persistent threat, or something benign.<\/p>\n\n\n\n<p>In summary, a&nbsp;<strong>antivirus<\/strong>&nbsp;It focuses solely on perimeter prevention and aims to prevent threats from accessing the network. While the system<strong>&nbsp;EDR<\/strong>&nbsp;It focuses on advanced threats, designed to evade the first layer of defense and penetrate the network. Its function is to detect this activity and block it before it can access our network.<\/p>\n\n\n\n<p>Due to the increase in attacks with new generation viruses that encrypt data and demand a ransom, at Apen we advise all our clients to complement their antivirus software with an EDR system.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Due to the increase in attacks with new generation viruses that encrypt data and demand a ransom, from&nbsp;<a href=\"https:\/\/www.apen.es\/en\/\" target=\"_blank\" rel=\"noreferrer noopener\">Apen<\/a>, We recommend<a href=\"https:\/\/www.apen.es\/en\/soluciones-en-la-empresa\/antivirus\/\" target=\"_blank\" rel=\"noreferrer noopener\">&nbsp;<strong>ESET Essentials Plus&nbsp;<\/strong><\/a>to stay protected, prevent cyberattacks, and keep your information safe.<\/h3>","protected":false},"excerpt":{"rendered":"<p>For years, antivirus software has kept our small and medium-sized businesses safe. However, in recent times, the patterns of\u2026<\/p>","protected":false},"author":4,"featured_media":25176,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[489,47],"tags":[735,129,734],"class_list":["post-25167","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-antivirus","category-apen","tag-antivirus-eset","tag-apen","tag-edr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cuando nuestro antivirus ya no es suficiente\u2026 - Apen Inform\u00e1tica<\/title>\n<meta name=\"description\" content=\"Desde hace a\u00f1os los&nbsp;antivirus&nbsp;han mantenido seguras nuestras peque\u00f1as y medianas empresas. Sin embargo, en los \u00faltimos tiempos los patrones de\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apen.es\/en\/blog\/cuando-nuestro-antivirus-ya-no-es-suficiente\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cuando nuestro antivirus ya no es suficiente\u2026 - Apen Inform\u00e1tica\" \/>\n<meta property=\"og:description\" content=\"Desde hace a\u00f1os los&nbsp;antivirus&nbsp;han mantenido seguras nuestras peque\u00f1as y medianas empresas. Sin embargo, en los \u00faltimos tiempos los patrones de\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apen.es\/en\/blog\/cuando-nuestro-antivirus-ya-no-es-suficiente\/\" \/>\n<meta property=\"og:site_name\" content=\"Apen Inform\u00e1tica\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apensolucions\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-15T08:29:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-28T10:48:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apen.es\/wp-content\/uploads\/2021\/09\/EDR-post.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"401\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"marqueting\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"marqueting\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuando-nuestro-antivirus-ya-no-es-suficiente\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuando-nuestro-antivirus-ya-no-es-suficiente\\\/\"},\"author\":{\"name\":\"marqueting\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\"},\"headline\":\"Cuando nuestro antivirus ya no es suficiente\u2026\",\"datePublished\":\"2021-10-15T08:29:44+00:00\",\"dateModified\":\"2025-02-28T10:48:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuando-nuestro-antivirus-ya-no-es-suficiente\\\/\"},\"wordCount\":1016,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuando-nuestro-antivirus-ya-no-es-suficiente\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/EDR-post.jpg\",\"keywords\":[\"antivirus eset\",\"Apen\",\"EDR\"],\"articleSection\":[\"Antivirus\",\"Apen\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuando-nuestro-antivirus-ya-no-es-suficiente\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuando-nuestro-antivirus-ya-no-es-suficiente\\\/\",\"name\":\"Cuando nuestro antivirus ya no es suficiente\u2026 - Apen Inform\u00e1tica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuando-nuestro-antivirus-ya-no-es-suficiente\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuando-nuestro-antivirus-ya-no-es-suficiente\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/EDR-post.jpg\",\"datePublished\":\"2021-10-15T08:29:44+00:00\",\"dateModified\":\"2025-02-28T10:48:30+00:00\",\"description\":\"Desde hace a\u00f1os los&nbsp;antivirus&nbsp;han mantenido seguras nuestras peque\u00f1as y medianas empresas. Sin embargo, en los \u00faltimos tiempos los patrones de\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuando-nuestro-antivirus-ya-no-es-suficiente\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuando-nuestro-antivirus-ya-no-es-suficiente\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuando-nuestro-antivirus-ya-no-es-suficiente\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/EDR-post.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/EDR-post.jpg\",\"width\":850,\"height\":401},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuando-nuestro-antivirus-ya-no-es-suficiente\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.apen.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cuando nuestro antivirus ya no es suficiente\u2026\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"name\":\"Apen Inform\u00e1tica\",\"description\":\"Mantenimiento Inform\u00e1tico , Software de Gesti\u00f3n, Soluciones de impresi\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apen.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\",\"name\":\"Apen: Soluciones inform\u00e1ticas\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"width\":231,\"height\":82,\"caption\":\"Apen: Soluciones inform\u00e1ticas\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apensolucions\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ApenCentreInformatic\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\",\"name\":\"marqueting\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"caption\":\"marqueting\"},\"url\":\"https:\\\/\\\/www.apen.es\\\/en\\\/blog\\\/author\\\/marqueting\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"When our antivirus is no longer enough\u2026 - Apen Inform\u00e1tica","description":"For years, antivirus software has kept our small and medium-sized businesses safe. However, in recent times, the patterns of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apen.es\/en\/blog\/cuando-nuestro-antivirus-ya-no-es-suficiente\/","og_locale":"en_US","og_type":"article","og_title":"Cuando nuestro antivirus ya no es suficiente\u2026 - Apen Inform\u00e1tica","og_description":"Desde hace a\u00f1os los&nbsp;antivirus&nbsp;han mantenido seguras nuestras peque\u00f1as y medianas empresas. Sin embargo, en los \u00faltimos tiempos los patrones de","og_url":"https:\/\/www.apen.es\/en\/blog\/cuando-nuestro-antivirus-ya-no-es-suficiente\/","og_site_name":"Apen Inform\u00e1tica","article_publisher":"https:\/\/www.facebook.com\/apensolucions","article_published_time":"2021-10-15T08:29:44+00:00","article_modified_time":"2025-02-28T10:48:30+00:00","og_image":[{"width":850,"height":401,"url":"https:\/\/www.apen.es\/wp-content\/uploads\/2021\/09\/EDR-post.jpg","type":"image\/jpeg"}],"author":"marqueting","twitter_card":"summary_large_image","twitter_misc":{"Written by":"marqueting","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apen.es\/blog\/cuando-nuestro-antivirus-ya-no-es-suficiente\/#article","isPartOf":{"@id":"https:\/\/www.apen.es\/blog\/cuando-nuestro-antivirus-ya-no-es-suficiente\/"},"author":{"name":"marqueting","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2"},"headline":"Cuando nuestro antivirus ya no es suficiente\u2026","datePublished":"2021-10-15T08:29:44+00:00","dateModified":"2025-02-28T10:48:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apen.es\/blog\/cuando-nuestro-antivirus-ya-no-es-suficiente\/"},"wordCount":1016,"publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"image":{"@id":"https:\/\/www.apen.es\/blog\/cuando-nuestro-antivirus-ya-no-es-suficiente\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2021\/09\/EDR-post.jpg","keywords":["antivirus eset","Apen","EDR"],"articleSection":["Antivirus","Apen"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.apen.es\/blog\/cuando-nuestro-antivirus-ya-no-es-suficiente\/","url":"https:\/\/www.apen.es\/blog\/cuando-nuestro-antivirus-ya-no-es-suficiente\/","name":"When our antivirus is no longer enough\u2026 - Apen Inform\u00e1tica","isPartOf":{"@id":"https:\/\/www.apen.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apen.es\/blog\/cuando-nuestro-antivirus-ya-no-es-suficiente\/#primaryimage"},"image":{"@id":"https:\/\/www.apen.es\/blog\/cuando-nuestro-antivirus-ya-no-es-suficiente\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2021\/09\/EDR-post.jpg","datePublished":"2021-10-15T08:29:44+00:00","dateModified":"2025-02-28T10:48:30+00:00","description":"For years, antivirus software has kept our small and medium-sized businesses safe. However, in recent times, the patterns of","breadcrumb":{"@id":"https:\/\/www.apen.es\/blog\/cuando-nuestro-antivirus-ya-no-es-suficiente\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apen.es\/blog\/cuando-nuestro-antivirus-ya-no-es-suficiente\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/blog\/cuando-nuestro-antivirus-ya-no-es-suficiente\/#primaryimage","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2021\/09\/EDR-post.jpg","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2021\/09\/EDR-post.jpg","width":850,"height":401},{"@type":"BreadcrumbList","@id":"https:\/\/www.apen.es\/blog\/cuando-nuestro-antivirus-ya-no-es-suficiente\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.apen.es\/"},{"@type":"ListItem","position":2,"name":"Cuando nuestro antivirus ya no es suficiente\u2026"}]},{"@type":"WebSite","@id":"https:\/\/www.apen.es\/#website","url":"https:\/\/www.apen.es\/","name":"Apen Inform\u00e1tica","description":"IT Maintenance, Management Software, Printing Solutions","publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apen.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apen.es\/#organization","name":"Apen: IT Solutions","url":"https:\/\/www.apen.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","width":231,"height":82,"caption":"Apen: Soluciones inform\u00e1ticas"},"image":{"@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apensolucions","https:\/\/www.youtube.com\/user\/ApenCentreInformatic","https:\/\/www.linkedin.com\/company\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin"]},{"@type":"Person","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2","name":"marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","caption":"marqueting"},"url":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"}]}},"taxonomy_info":{"category":[{"value":489,"label":"Antivirus"},{"value":47,"label":"Apen"}],"post_tag":[{"value":735,"label":"antivirus eset"},{"value":129,"label":"Apen"},{"value":734,"label":"EDR"}]},"featured_image_src_large":["https:\/\/www.apen.es\/wp-content\/uploads\/2021\/09\/EDR-post.jpg",850,401,false],"author_info":{"display_name":"marqueting","author_link":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"},"comment_info":0,"category_info":[{"term_id":489,"name":"Antivirus","slug":"antivirus","term_group":0,"term_taxonomy_id":489,"taxonomy":"category","description":"","parent":0,"count":5,"filter":"raw","term_order":"0","cat_ID":489,"category_count":5,"category_description":"","cat_name":"Antivirus","category_nicename":"antivirus","category_parent":0},{"term_id":47,"name":"Apen","slug":"apen","term_group":0,"term_taxonomy_id":47,"taxonomy":"category","description":"","parent":0,"count":256,"filter":"raw","term_order":"0","cat_ID":47,"category_count":256,"category_description":"","cat_name":"Apen","category_nicename":"apen","category_parent":0}],"tag_info":[{"term_id":735,"name":"antivirus eset","slug":"antivirus-eset","term_group":0,"term_taxonomy_id":735,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"},{"term_id":129,"name":"Apen","slug":"apen","term_group":0,"term_taxonomy_id":129,"taxonomy":"post_tag","description":"","parent":0,"count":51,"filter":"raw","term_order":"0"},{"term_id":734,"name":"EDR","slug":"edr","term_group":0,"term_taxonomy_id":734,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"}],"_links":{"self":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/25167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/comments?post=25167"}],"version-history":[{"count":1,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/25167\/revisions"}],"predecessor-version":[{"id":53591,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/25167\/revisions\/53591"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media\/25176"}],"wp:attachment":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media?parent=25167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/categories?post=25167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/tags?post=25167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}