{"id":506092,"date":"2024-02-29T16:53:03","date_gmt":"2024-02-29T15:53:03","guid":{"rendered":"https:\/\/www.stormshield.com\/endpoint-detection-response-edr\/"},"modified":"2024-09-16T13:27:15","modified_gmt":"2024-09-16T12:27:15","slug":"edr","status":"publish","type":"page","link":"https:\/\/www.stormshield.com\/es\/edr\/","title":{"rendered":"Endpoint Detection &#038; Response &#8211; EDR"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_top=\"50\" padding_bottom=\"50\" css=\".vc_custom_1708942368363{background-color: #ffffff !important;}\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner][vc_empty_space][vc_column_text]<\/p>\n<h1 style=\"text-align: center;\"><span style=\"color: #00aaf5;\"><span style=\"font-weight: 900; font-size: 1.5em;\">Endpoint Detection &amp; Response (EDR),<\/span><\/span><span style=\"color: #00aaf5;\"><span style=\"font-weight: 300; font-size: 1.5em;\"> para proteger sus terminales<\/span><\/span><\/h1>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_top=\"50\" padding_bottom=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner width=\"3\/4\" css=\".vc_custom_1708939697175{padding-right: 32px !important;padding-left: 32px !important;}\"][vc_column_text css=\"\"]<\/p>\n<h2><span style=\"font-size: 1.6em; font-weight: bold; color: black; line-height: 0.8em;\">\u00bfQu\u00e9 es EDR?<\/span><\/h2>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\">Dentro de su parque inform\u00e1tico, cada terminal conectado constituye un potencial vector de ataque y cada conexi\u00f3n es un punto de entrada a su sistema de informaci\u00f3n y sus datos sensibles. Las tecnolog\u00edas antivirus presentan limitaciones frente a los ciberataques avanzados. Limitaciones que las soluciones EDR (<em>Endpoint Detection and Response<\/em>) pueden paliar.<\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\"><strong>Estas soluciones EDR intervienen para reforzar la seguridad de los terminales con una vigilancia en tiempo real, una detecci\u00f3n inteligente de las intrusiones y su correcci\u00f3n r\u00e1pida, as\u00ed como una mejora continua de la protecci\u00f3n.<\/strong><\/span><\/p>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column_inner][vc_column_inner width=\"1\/4\"][vc_empty_space][vc_single_image image=\"266689\" img_size=\"full\" alignment=\"center\" qode_css_animation=\"\"][vc_empty_space height=\"12px\"][vc_single_image image=\"266675\" img_size=\"full\" alignment=\"center\" qode_css_animation=\"\"][vc_empty_space height=\"12px\"][vc_single_image image=\"266683\" img_size=\"full\" alignment=\"center\" qode_css_animation=\"\"][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_bottom=\"50\" css=\".vc_custom_1708939745991{padding-top: 32px !important;padding-right: 32px !important;padding-bottom: 32px !important;padding-left: 32px !important;}\" padding_top=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"grid\" text_align=\"left\" css_animation=\"\"][vc_column_inner width=\"1\/3\" css=\".vc_custom_1708939714814{padding-right: 32px !important;padding-left: 32px !important;}\"][vc_empty_space][vc_single_image image=\"267315\" img_size=\"medium\" qode_css_animation=\"\"][\/vc_column_inner][vc_column_inner width=\"2\/3\"][vc_column_text css=\"\"]<\/p>\n<h2><span style=\"font-size: 1.6em; font-weight: bold; color: black; line-height: 0.8em;\">Vigilancia en tiempo real de los terminales<\/span><\/h2>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\"><strong>La tecnolog\u00eda EDR se basa en la recopilaci\u00f3n de datos que transitan por los terminales, desde las conexiones de red hasta los diferentes procesos, pasando por los archivos abiertos, la carga de los pilotos, el uso de la memoria y del disco y el acceso a la base de datos central.<\/strong> Posteriormente, todos estos datos se transmiten a un motor de an\u00e1lisis EDR, que detectar\u00e1 comportamientos sospechosos y anormales. La clave es una visibilidad en tiempo real y completa en todas las actividades de los terminales, para identificar r\u00e1pidamente las actividades maliciosas.<\/span><\/p>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_bottom=\"50\" css=\".vc_custom_1708939745991{padding-top: 32px !important;padding-right: 32px !important;padding-bottom: 32px !important;padding-left: 32px !important;}\" padding_top=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner width=\"2\/3\"][vc_column_text css=\"\"]<\/p>\n<h2><span style=\"font-size: 1.6em; font-weight: bold; color: black; line-height: 0.8em;\">Detecci\u00f3n inteligente y correcci\u00f3n r\u00e1pida<\/span><\/h2>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\">Las tecnolog\u00edas EDR recurren al an\u00e1lisis conductual para reconocer estos comportamientos sospechosos y anormales. La fase de an\u00e1lisis de datos centralizados es fundamental, ya que corrobora la informaci\u00f3n para deducir patrones de ataque, incluidos los ciberataques tipo Zero Day. <strong>En caso de detecci\u00f3n de una ciberamenaza o de intento de intrusi\u00f3n, el EDR recomienda medidas de correcci\u00f3n, como la interrupci\u00f3n de un proceso en curso, el bloqueo de una ejecuci\u00f3n, la puesta en cuarentena de un archivo o el aislamiento de terminales infectados, etc.<\/strong> Los administradores y analistas de seguridad podr\u00e1n entonces investigar a partir de los resultados de an\u00e1lisis y aplicar las opciones de correcci\u00f3n m\u00e1s adecuadas.<\/span><\/p>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column_inner][vc_column_inner width=\"1\/3\" css=\".vc_custom_1708939721806{padding-right: 32px !important;padding-left: 32px !important;}\"][vc_empty_space][vc_single_image image=\"267309\" img_size=\"medium\" qode_css_animation=\"\"][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_bottom=\"50\" css=\".vc_custom_1708939745991{padding-top: 32px !important;padding-right: 32px !important;padding-bottom: 32px !important;padding-left: 32px !important;}\" padding_top=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner width=\"1\/3\" css=\".vc_custom_1708939727974{padding-right: 32px !important;padding-left: 32px !important;}\"][vc_empty_space][vc_single_image image=\"267300\" img_size=\"medium\" qode_css_animation=\"\"][\/vc_column_inner][vc_column_inner width=\"2\/3\"][vc_column_text css=\"\"]<\/p>\n<h2><span style=\"font-size: 1.6em; font-weight: bold; color: black; line-height: 0.8em;\">Mejora continua de la protecci\u00f3n<\/span><\/h2>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\">Frente a la evoluci\u00f3n constante de los modus operandi, la soluci\u00f3n EDR contribuye a la comprensi\u00f3n y el aprendizaje de los equipos de seguridad. <strong>Gracias a los datos recogidos y analizados en las fases de investigaci\u00f3n, est\u00e1n mejor equipados para luchar contra futuros ciberataques.<\/strong> La respuesta a incidentes permite as\u00ed, en particular, comprender mejor las acciones del pasado, por ejemplo visualizando las relaciones de causalidad de una cadena de ataque, y mejorar de forma continua la protecci\u00f3n que brinda la soluci\u00f3n EDR.<\/span><\/p>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_bottom=\"50\" css=\".vc_custom_1708939922324{padding-top: 32px !important;padding-right: 32px !important;padding-bottom: 32px !important;padding-left: 32px !important;background-color: #060051 !important;}\" padding_top=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner][vc_column_text css=\"\"]<\/p>\n<h2><span style=\"font-size: 1.6em; font-weight: bold; color: #ffffff; line-height: 0.8em;\">Stormshield Endpoint Security Evolution, su soluci\u00f3n EDR certificada<\/span><\/h2>\n<p><span style=\"color: #ffffff; font-size: 1.1em;\">Con la soluci\u00f3n Stormshield Endpoint Security Evolution (SES), aumente el nivel de protecci\u00f3n de sus puestos de trabajo con una soluci\u00f3n EDR proactiva. La soluci\u00f3n SES, basada en una tecnolog\u00eda de an\u00e1lisis sin firma, detecta los ataques y ciberamenazas y responde a ellos de una forma adecuada. Nuestra soluci\u00f3n EDR de confianza ha obtenido la certificaci\u00f3n de seguridad de primer nivel (CSPN), expedida por la ANSSI para la categor\u00eda Detecci\u00f3n de intrusiones.<\/span><\/p>\n<p><span style=\"color: #000; font-size: 1.1em;\"><span style=\"color: #ffffff;\"><strong>Descubra una soluci\u00f3n EDR para la protecci\u00f3n de terminales y servidores de nueva generaci\u00f3n.<\/strong> Y gracias a sus funciones de Cyber Threat Intelligence y Threat Hunting, disfrute de una capacidad avanzada de detecci\u00f3n de los ciberataques m\u00e1s sofisticados.<\/span><\/span>[\/vc_column_text][vc_empty_space][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner width=\"1\/3\"]<div class=\"qode_video_box\">\n\t<a itemprop=\"image\" class=\"qode_video_image\" href=\"https:\/\/youtu.be\/7bZ3jmJz3T8\" data-rel=\"prettyPhoto\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1918\" height=\"1078\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/en1.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/en1.jpg 1918w, https:\/\/www.stormshield.com\/wp-content\/uploads\/en1-300x169.jpg 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/en1-1024x576.jpg 1024w, https:\/\/www.stormshield.com\/wp-content\/uploads\/en1-768x432.jpg 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/en1-1536x863.jpg 1536w, https:\/\/www.stormshield.com\/wp-content\/uploads\/en1-1396x785.jpg 1396w, https:\/\/www.stormshield.com\/wp-content\/uploads\/en1-700x393.jpg 700w, https:\/\/www.stormshield.com\/wp-content\/uploads\/en1-539x303.jpg 539w\" sizes=\"auto, (max-width: 1918px) 100vw, 1918px\" \/>\t\t\t<span class=\"qode_video_box_button_holder\">\n\t\t\t\t<span class=\"qode_video_box_button\">\n\t\t\t\t\t<span class=\"qode_video_box_button_arrow\">\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/span>\n\t\t\t<\/span>\n\t\t\t<\/a>\n<\/div>[vc_empty_space][\/vc_column_inner][vc_column_inner width=\"1\/3\"]<div class=\"qode_video_box\">\n\t<a itemprop=\"image\" class=\"qode_video_image\" href=\"https:\/\/youtu.be\/7vAeJpk0ErA\" data-rel=\"prettyPhoto\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1276\" height=\"710\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-37.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-37.jpg 1276w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-37-300x167.jpg 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-37-1024x570.jpg 1024w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-37-768x427.jpg 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-37-700x389.jpg 700w\" sizes=\"auto, (max-width: 1276px) 100vw, 1276px\" \/>\t\t\t<span class=\"qode_video_box_button_holder\">\n\t\t\t\t<span class=\"qode_video_box_button\">\n\t\t\t\t\t<span class=\"qode_video_box_button_arrow\">\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/span>\n\t\t\t<\/span>\n\t\t\t<\/a>\n<\/div>[vc_empty_space][\/vc_column_inner][vc_column_inner width=\"1\/3\"]<div class=\"qode_video_box\">\n\t<a itemprop=\"image\" class=\"qode_video_image\" href=\"https:\/\/youtu.be\/T9KhySZFkWs\" data-rel=\"prettyPhoto\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1274\" height=\"712\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-55.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-55.jpg 1274w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-55-300x168.jpg 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-55-1024x572.jpg 1024w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-55-768x429.jpg 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-55-700x391.jpg 700w\" sizes=\"auto, (max-width: 1274px) 100vw, 1274px\" \/>\t\t\t<span class=\"qode_video_box_button_holder\">\n\t\t\t\t<span class=\"qode_video_box_button\">\n\t\t\t\t\t<span class=\"qode_video_box_button_arrow\">\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/span>\n\t\t\t<\/span>\n\t\t\t<\/a>\n<\/div>[vc_empty_space][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner]<a  itemprop=\"url\" href=\"https:\/\/www.stormshield.com\/es\/productos-y-servicios\/productos\/endpoint-protection\/stormshield-endpoint-security\/\" target=\"_blank\" data-hover-background-color=\"#d23467\" data-hover-border-color=\"#d23467\" class=\"qbutton  center white enlarge\" style=\"border-color: #ffffff; background-color:#00aaf5;\">Descubrir Stormshield Endpoint Security<i class=\"qode_icon_font_awesome fa fa-angle-right qode_button_icon_element\"><\/i><\/a>[vc_empty_space][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_bottom=\"50\" css=\".vc_custom_1708702319908{background-color: #ffffff !important;}\" padding_top=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner width=\"1\/2\"][vc_empty_space]<span class=\"separator_with_icon\" style=\"color:#060051\"><i class=\"fa fa-question\"><\/i><\/span>[vc_column_text]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\"><strong>Preguntas frecuentes: \u00bfC\u00f3mo funciona un EDR?<\/strong> Para detectar ciberataques sofisticados, el EDR identifica los comportamientos sospechosos y anormales gracias a unos indicadores de compromiso (IoC - Indicators of Compromise). No siempre se trata de acontecimientos excepcionales, pueden ser acciones banales como abrir una conexi\u00f3n en un servidor externo. Una vez identificados estos comportamientos sospechosos, la soluci\u00f3n EDR recomienda medidas de correcci\u00f3n r\u00e1pida y permite una investigaci\u00f3n posterior a partir de los resultados del an\u00e1lisis.<\/span><\/p>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column_inner][vc_column_inner width=\"1\/2\" css=\".vc_custom_1708696718516{padding-top: 32px !important;padding-right: 32px !important;padding-bottom: 32px !important;padding-left: 32px !important;background-color: #f9f9f9 !important;}\"]<span class=\"separator_with_icon\" style=\"color:#060051\"><i class=\"fa fa-question\"><\/i><\/span>[vc_column_text]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\"><strong>Preguntas frecuentes: \u00bfEDR o XDR?<\/strong> Es imprescindible que las herramientas de protecci\u00f3n de los terminales integren una capacidad de detecci\u00f3n y respuesta a incidentes. Como complemento al EDR inform\u00e1tico, la plataforma XDR (eXtended Detection and Response) pretende reunir todos los activos inform\u00e1ticos internos y externos (red, anuarios, recursos en la nube, firewalls, etc.) con el fin de ofrecer una visi\u00f3n general de los eventos del sistema de informaci\u00f3n.<\/span><\/p>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row css_animation=\u00bb\u00bb row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbgrid\u00bb angled_section=\u00bbno\u00bb text_align=\u00bbleft\u00bb background_image_as_pattern=\u00bbwithout_pattern\u00bb z_index=\u00bb\u00bb padding_top=\u00bb50&#8243; padding_bottom=\u00bb50&#8243; css=\u00bb.vc_custom_1708942368363{background-color: #ffffff !important;}\u00bb][vc_column][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb][vc_column_inner][vc_empty_space][vc_column_text] Endpoint Detection &amp; Response (EDR), para proteger sus terminales [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\u00bb\u00bb row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbgrid\u00bb angled_section=\u00bbno\u00bb text_align=\u00bbleft\u00bb background_image_as_pattern=\u00bbwithout_pattern\u00bb z_index=\u00bb\u00bb padding_top=\u00bb50&#8243; padding_bottom=\u00bb50&#8243;][vc_column][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb][vc_column_inner width=\u00bb3\/4&#8243; css=\u00bb.vc_custom_1708939697175{padding-right: 32px&#8230;<\/p>\n","protected":false},"author":31,"featured_media":0,"parent":0,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"full_width.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-506092","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>EDR - Endpoint Detection &amp; Response, protecci\u00f3n para sus dispositivos<\/title>\n<meta name=\"description\" content=\"Endpoint Detection &amp; Response, soluciones de ciberseguridad EDR de nueva generaci\u00f3n para reforzar la seguridad de los puntos finales.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/es\/edr\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EDR - Endpoint Detection &amp; Response, protecci\u00f3n para sus dispositivos\" \/>\n<meta property=\"og:description\" content=\"Endpoint Detection &amp; Response, soluciones de ciberseguridad EDR de nueva generaci\u00f3n para reforzar la seguridad de los puntos finales.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/es\/edr\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-16T12:27:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/stormshield_logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"204\" \/>\n\t<meta property=\"og:image:height\" content=\"94\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/es\\\/edr\\\/\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/es\\\/edr\\\/\",\"name\":\"EDR - Endpoint Detection & Response, protecci\u00f3n para sus dispositivos\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/es\\\/#website\"},\"datePublished\":\"2024-02-29T15:53:03+00:00\",\"dateModified\":\"2024-09-16T12:27:15+00:00\",\"description\":\"Endpoint Detection & Response, soluciones de ciberseguridad EDR de nueva generaci\u00f3n para reforzar la seguridad de los puntos finales.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/es\\\/edr\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stormshield.com\\\/es\\\/edr\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/es\\\/edr\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stormshield.com\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Endpoint Detection &#038; Response &#8211; EDR\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/es\\\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stormshield.com\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"EDR - Endpoint Detection & Response, protecci\u00f3n para sus dispositivos","description":"Endpoint Detection & Response, soluciones de ciberseguridad EDR de nueva generaci\u00f3n para reforzar la seguridad de los puntos finales.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/es\/edr\/","og_locale":"es_ES","og_type":"article","og_title":"EDR - Endpoint Detection & Response, protecci\u00f3n para sus dispositivos","og_description":"Endpoint Detection & Response, soluciones de ciberseguridad EDR de nueva generaci\u00f3n para reforzar la seguridad de los puntos finales.","og_url":"https:\/\/www.stormshield.com\/es\/edr\/","og_site_name":"Stormshield","article_modified_time":"2024-09-16T12:27:15+00:00","og_image":[{"width":204,"height":94,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/stormshield_logo.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@Stormshield","twitter_misc":{"Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/es\/edr\/","url":"https:\/\/www.stormshield.com\/es\/edr\/","name":"EDR - Endpoint Detection & Response, protecci\u00f3n para sus dispositivos","isPartOf":{"@id":"https:\/\/www.stormshield.com\/es\/#website"},"datePublished":"2024-02-29T15:53:03+00:00","dateModified":"2024-09-16T12:27:15+00:00","description":"Endpoint Detection & Response, soluciones de ciberseguridad EDR de nueva generaci\u00f3n para reforzar la seguridad de los puntos finales.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/es\/edr\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/es\/edr\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/es\/edr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/es\/"},{"@type":"ListItem","position":2,"name":"Endpoint Detection &#038; Response &#8211; EDR"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/es\/#website","url":"https:\/\/www.stormshield.com\/es\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/es\/wp-json\/wp\/v2\/pages\/506092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.stormshield.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/es\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/es\/wp-json\/wp\/v2\/comments?post=506092"}],"version-history":[{"count":6,"href":"https:\/\/www.stormshield.com\/es\/wp-json\/wp\/v2\/pages\/506092\/revisions"}],"predecessor-version":[{"id":570998,"href":"https:\/\/www.stormshield.com\/es\/wp-json\/wp\/v2\/pages\/506092\/revisions\/570998"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/es\/wp-json\/wp\/v2\/media?parent=506092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}