{"id":7719,"date":"2023-08-18T09:46:54","date_gmt":"2023-08-18T07:46:54","guid":{"rendered":"https:\/\/www.sgrwin.com\/?page_id=7719"},"modified":"2025-06-26T09:16:03","modified_gmt":"2025-06-26T07:16:03","slug":"vulcano","status":"publish","type":"page","link":"https:\/\/www.sgrwin.com\/es\/vulcano\/","title":{"rendered":"Gesti\u00f3n de vulnerabilidades y detecci\u00f3n de amenazas para operar en un SOC."},"content":{"rendered":"\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"network-security title\">\n<span>Datos sobre el <\/span>\n<h2 class=\"wp-block-heading\"><strong>Proyecto y financiaci\u00f3n<\/strong><\/h2>\n<\/div>\n\n\n\n<p>Este proyecto recibe <strong>respaldo financiero del Instituto Nacional de Ciberseguridad de Espa\u00f1a (INCIBE)<\/strong> a trav\u00e9s del instrumento de Compra P\u00fablica Precomercial CPP2-2022 en materia de ciberseguridad.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"4678\" height=\"410\" src=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2025\/05\/BandaLogos_INCIBE_es-1.png\" alt=\"\" class=\"wp-image-11146\" srcset=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2025\/05\/BandaLogos_INCIBE_es-1.png 4678w, https:\/\/www.sgrwin.com\/wp-content\/uploads\/2025\/05\/BandaLogos_INCIBE_es-1-300x26.png 300w, https:\/\/www.sgrwin.com\/wp-content\/uploads\/2025\/05\/BandaLogos_INCIBE_es-1-1024x90.png 1024w, https:\/\/www.sgrwin.com\/wp-content\/uploads\/2025\/05\/BandaLogos_INCIBE_es-1-768x67.png 768w, https:\/\/www.sgrwin.com\/wp-content\/uploads\/2025\/05\/BandaLogos_INCIBE_es-1-1536x135.png 1536w, https:\/\/www.sgrwin.com\/wp-content\/uploads\/2025\/05\/BandaLogos_INCIBE_es-1-2048x179.png 2048w\" sizes=\"auto, (max-width: 4678px) 100vw, 4678px\" \/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><a href=\"https:\/\/www.incibe.es\/industria-cpi\"><strong>La Compra P\u00fablica de Innovaci\u00f3n<\/strong><\/a> (CPI) se ha consolidado como un instrumento de suma utilidad para impulsar la innovaci\u00f3n y la competitividad desde los poderes p\u00fablicos, empleando la demanda p\u00fablica de productos, servicios y suministros como instrumento mediante el que poner en marcha pol\u00edticas p\u00fablicas y ejecutar los mandatos de las entidades compradoras. La Iniciativa Estrat\u00e9gica de Compra P\u00fablica de Innovaci\u00f3n (IECPI) de INCIBE est\u00e1 dotada con un presupuesto global de 224 millones de euros, en el marco del Plan de Recuperaci\u00f3n, Transformaci\u00f3n y Resiliencia (PRTR) con la financiaci\u00f3n de los Next Generation EU.<\/p>\n\n\n\n<p>Esta iniciativa, que se ejecutar\u00e1 al amparo de Ciberinnova, est\u00e1 asociada al Componente 15. Inversi\u00f3n 7 Ciberseguridad: Fortalecimiento de las capacidades de ciudadanos, PYMES y profesionales e impulso del sector.<\/p>\n\n\n\n<p>La IECPI contribuye a la materializaci\u00f3n del <strong>Programa Global de Innovaci\u00f3n en Seguridad <\/strong>actuando especialmente en uno de los seis aspectos claves de la industria recogido en los hitos 245 y 453 del Plan de Recuperaci\u00f3n, Transformaci\u00f3n y Resiliencia (PRTR): Desarrollo de soluciones y servicios de alto valor a\u00f1adido en el \u00e1mbito de la ciberseguridad.<\/p>\n\n\n\n<div style=\"height:75px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><a href=\"https:\/\/www.incibe.es\/\"><strong>El Instituto Nacional de Ciberseguridad (INCIBE)<\/strong>,<\/a> como entidad p\u00fablica para el desarrollo de la ciberseguridad, motor de transformaci\u00f3n social y oportunidad para la innovaci\u00f3n, decidi\u00f3 en el a\u00f1o 2021 explorar las posibilidades que la contrataci\u00f3n p\u00fablica estrat\u00e9gica podr\u00eda tener para desarrollar las pol\u00edticas nacionales en materia de ciberseguridad, al mismo tiempo que la entidad consegu\u00eda ejecutar su mandato relacionado con la innovaci\u00f3n y la industria. La IECPI es el resultado de la reflexi\u00f3n realizada al respecto y de su consenso con otros actores p\u00fablicos del ecosistema de la ciberseguridad y pretende realizar un conjunto de <strong>actuaciones dirigidas a impulsar la I+D+i y la creaci\u00f3n de productos y soluciones en el \u00e1mbito de la ciberseguridad.<\/strong><\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>\u00bfC\u00f3mo surge el proyecto VULCANO?<\/strong><\/strong><\/h2>\n\n\n\n<p><strong>La ciberseguridad se ha convertido en una preocupaci\u00f3n cada vez mayor<\/strong> en el campo de la distribuci\u00f3n el\u00e9ctrica debido a la <strong>complejidad de las infraestructuras<\/strong>, la <strong>diversidad de activos<\/strong> y la <strong>falta de soluciones integradas.<\/strong><\/p>\n\n\n\n<p>En respuesta a esta situaci\u00f3n, ha surgido el proyecto VULCANO.<\/p>\n\n\n\n<div style=\"height:75px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"network-security title\">\n<span>Presentamos el Proyecto de Ciberseguridad VULCANO<\/span>\n<h2 class=\"wp-block-heading\"><strong>Una visi\u00f3n general y sus objetivos<\/strong><\/h2>\n<\/div>\n\n\n\n<p>VULCANO <strong>es un proyecto de innovaci\u00f3n en el campo de ciberseguridad<\/strong> <strong>dirigido al&nbsp; sector energ\u00e9tico.<\/strong> Se trata de un proyecto que dar\u00e1 respuesta a retos como la <strong>dispersi\u00f3n geogr\u00e1fica de las infraestructuras<\/strong> y la <strong>carencia de soluciones integradas de monitorizaci\u00f3n.<\/strong><\/p>\n\n\n\n<p>La plataforma ofrecer\u00e1 <strong>una soluci\u00f3n integral adaptada a la industria de la energ\u00eda<\/strong>. &nbsp;Esta adaptaci\u00f3n <strong>es clave para proporcionar una ventaja competitiva en un mercado altamente segmentado<\/strong>.<\/p>\n\n\n\n<p>VULCANO nace para dar respuesta a los siguientes desaf\u00edos:<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column box p-4 is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2023\/11\/icon-bronze-check.png\" alt=\"\" class=\"wp-image-8501\"\/><\/figure>\n\n\n\n<h6 class=\"wp-block-heading m-0 has-text-color\" style=\"color:#0090d3\">Dise\u00f1ado para equipos de telecomunicaciones OT en entidades esenciales bajo la normativa NIS 2.<\/h6>\n<\/div>\n\n\n\n<div class=\"wp-block-column box p-4 is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2023\/11\/icon-bronze-check.png\" alt=\"\" class=\"wp-image-8501\"\/><\/figure>\n\n\n\n<h6 class=\"wp-block-heading m-0 has-text-color\" style=\"color:#0090d3\">Gesti\u00f3n de infraestructuras de gran tama\u00f1o que requieren mantenimiento y cumplimiento de ciberseguridad en entornos cr\u00edticos.<\/h6>\n<\/div>\n\n\n\n<div class=\"wp-block-column box p-4 is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2023\/11\/icon-bronze-check.png\" alt=\"\" class=\"wp-image-8501\"\/><\/figure>\n\n\n\n<h6 class=\"wp-block-heading m-0 has-text-color\" style=\"color:#0090d3\">Implementaci\u00f3n de actividades de gesti\u00f3n de riesgos de ciberseguridad.<\/h6>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column box p-4 is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2023\/11\/icon-bronze-check.png\" alt=\"\" class=\"wp-image-8501\"\/><\/figure>\n\n\n\n<h6 class=\"wp-block-heading m-0 has-text-color\" style=\"color:#0090d3\">Garantiza el cumplimiento de NIS2, ENS, ISO 27001 y otros est\u00e1ndares de ciberseguridad.<\/h6>\n<\/div>\n\n\n\n<div class=\"wp-block-column p-4 is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-column p-4 is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Nuestra soluci\u00f3n podr\u00e1 ser implantado en Centros de Operaciones de Ciberseguridad (SOC) en empresas energ\u00e9ticas con el fin de monitorizar sus infraestructuras y protegerlas frente a riesgos y amenazas.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Funcionalidades destacadas<\/strong><\/h2>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column box p-4 is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2021\/12\/performance_monitor-1.png\" alt=\"\" class=\"wp-image-3565\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2021\/12\/performance_monitor-1.png 200w, https:\/\/www.sgrwin.com\/wp-content\/uploads\/2021\/12\/performance_monitor-1-150x150.png 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h6 class=\"wp-block-heading mb-4 mt-4\"><strong><strong><strong><strong><strong>Cumplimiento normativo<\/strong><\/strong><\/strong><\/strong><\/strong><\/h6>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Garantiza el cumplimiento de NIS2, ENS, ISO 27001 y otros controles.<\/li>\n\n\n\n<li>Simplifica los procesos de cumplimiento normativo.<\/li>\n\n\n\n<li>Proporciona una lista detallada de controles aplicables.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column box p-4 is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2021\/12\/performance_analyze-1.png\" alt=\"\" class=\"wp-image-3450\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2021\/12\/performance_analyze-1.png 200w, https:\/\/www.sgrwin.com\/wp-content\/uploads\/2021\/12\/performance_analyze-1-150x150.png 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h6 class=\"wp-block-heading mb-4 mt-4\"><strong><strong>Gesti\u00f3n de vulnerabilidades<\/strong><\/strong><\/h6>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Analiza vulnerabilidades en la red de forma integral.<\/li>\n\n\n\n<li>Detecta riesgos de seguridad en los dispositivos. <\/li>\n\n\n\n<li>Eval\u00faa el impacto de las vulnerabilidades detectadas.<\/li>\n\n\n\n<li>Resuelve problemas mediante actualizaciones de dispositivos.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column box p-4 is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2021\/12\/Fault_dartboard.png\" alt=\"\" class=\"wp-image-3559\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2021\/12\/Fault_dartboard.png 200w, https:\/\/www.sgrwin.com\/wp-content\/uploads\/2021\/12\/Fault_dartboard-150x150.png 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h6 class=\"wp-block-heading mb-4 mt-4\"><strong><strong><strong><strong><strong>Gesti\u00f3n de riesgos<\/strong><\/strong><\/strong><\/strong><\/strong><\/h6>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Calcula riesgos seg\u00fan vulnerabilidades, topolog\u00eda y exposici\u00f3n.<\/li>\n\n\n\n<li>Identifica estrategias \u00f3ptimas de mitigaci\u00f3n. <\/li>\n\n\n\n<li>Prioriza actualizaciones de seguridad e instalaci\u00f3n de parches.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column box p-4 is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2024\/04\/assets_state.png\" alt=\"\" class=\"wp-image-8993\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2024\/04\/assets_state.png 200w, https:\/\/www.sgrwin.com\/wp-content\/uploads\/2024\/04\/assets_state-150x150.png 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h6 class=\"wp-block-heading mb-4 mt-4\"><strong><strong><strong><strong><strong>Detecci\u00f3n de anomal\u00edas en la red<\/strong><\/strong><\/strong><\/strong><\/strong><\/h6>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Usa IA para identificar patrones an\u00f3malos en redes IT\/OT.<\/li>\n\n\n\n<li>Integra IDS con detecci\u00f3n de ataques basada en reglas.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column box p-4 is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"201\" height=\"200\" src=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2021\/12\/iconos_alarm.png\" alt=\"\" class=\"wp-image-3182\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2021\/12\/iconos_alarm.png 201w, https:\/\/www.sgrwin.com\/wp-content\/uploads\/2021\/12\/iconos_alarm-150x150.png 150w\" sizes=\"auto, (max-width: 201px) 100vw, 201px\" \/><\/figure>\n\n\n\n<h6 class=\"wp-block-heading mb-4 mt-4\"><strong><strong><strong>Generaci\u00f3n autom\u00e1tica de informes<\/strong><\/strong><\/strong><\/h6>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Utiliza IA para crear informes de ciberseguridad.<\/li>\n\n\n\n<li>Ofrece res\u00famenes claros e intuitivos del estado de la red.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column box p-4 is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2023\/10\/iconos_maintenance.png\" alt=\"\" class=\"wp-image-8348\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2023\/10\/iconos_maintenance.png 200w, https:\/\/www.sgrwin.com\/wp-content\/uploads\/2023\/10\/iconos_maintenance-150x150.png 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h6 class=\"wp-block-heading mb-4 mt-4\"><strong><strong><strong><strong>Gesti\u00f3n de configuraci\u00f3n<\/strong><\/strong><\/strong><\/strong><\/h6>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Realiza tareas de inventario y configuraci\u00f3n base.<\/li>\n\n\n\n<li>Gestiona copias de seguridad y cambios en dispositivos.<\/li>\n\n\n\n<li>Admite autodetecci\u00f3n activa y pasiva.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column box p-4 is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2023\/10\/iconos_operation.png\" alt=\"\" class=\"wp-image-8340\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2023\/10\/iconos_operation.png 200w, https:\/\/www.sgrwin.com\/wp-content\/uploads\/2023\/10\/iconos_operation-150x150.png 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h6 class=\"wp-block-heading mb-4 mt-4\"><strong><strong><strong><strong><strong>An\u00e1lisis de tr\u00e1fico<\/strong><\/strong><\/strong><\/strong><\/strong><\/h6>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Implementa sondas multiprotocolo sin afectar la red.<\/li>\n\n\n\n<li>Identifica nuevos dispositivos y anomal\u00edas de tr\u00e1fico. <\/li>\n\n\n\n<li>Permite un despliegue escalable y de bajo costo.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column p-4 is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-column p-4 is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Colaboraci\u00f3n con Usuarios Finales<\/strong><\/h2>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>El proyecto VULCANO ha despertado el inter\u00e9s de compa\u00f1\u00edas clave en la industria energ\u00e9tica y de telecomunicaciones, como <strong>GASELEC, VIESGO y CELLNEX,<\/strong> quienes ser\u00e1n los primeros en evaluar esta soluci\u00f3n.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"200\" src=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2025\/03\/empresas-interesadas-vulcano.png\" alt=\"\" class=\"wp-image-10636\" srcset=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2025\/03\/empresas-interesadas-vulcano.png 800w, https:\/\/www.sgrwin.com\/wp-content\/uploads\/2025\/03\/empresas-interesadas-vulcano-300x75.png 300w, https:\/\/www.sgrwin.com\/wp-content\/uploads\/2025\/03\/empresas-interesadas-vulcano-768x192.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><\/div>\n<\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Estas empresas l\u00edderes experimentar\u00e1n directamente c\u00f3mo VULCANO se adapta a sus necesidades individuales y se integra para proteger su infraestructura cr\u00edtica. Su participaci\u00f3n como usuarios validadores demuestra la confianza y el respaldo que VULCANO tiene en el sector energ\u00e9tico.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Aliados estrat\u00e9gicos clave<\/strong><\/h2>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>El proyecto est\u00e1 liderado por CIC, en colaboraci\u00f3n con el Centro Tecnol\u00f3gico<strong> Vicomtech<\/strong> y la PYME c\u00e1ntabra <strong>COSMIKAL<\/strong>.<\/p>\n\n\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"910\" height=\"170\" src=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2024\/04\/logos_2.png\" alt=\"\" class=\"wp-image-8998\" srcset=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2024\/04\/logos_2.png 910w, https:\/\/www.sgrwin.com\/wp-content\/uploads\/2024\/04\/logos_2-300x56.png 300w, https:\/\/www.sgrwin.com\/wp-content\/uploads\/2024\/04\/logos_2-768x143.png 768w\" sizes=\"auto, (max-width: 910px) 100vw, 910px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><\/div>\n<\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>\u00bfPerteneces a la industria energ\u00e9tica y deseas convertirte en validador de VULCANO? \u00bfO simplemente quieres saber m\u00e1s sobre nuestro proyecto?<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><a href=\"https:\/\/www.sgrwin.com\/es\/contact\/\"><strong>\u00a1Cont\u00e1ctanos para obtener m\u00e1s informaci\u00f3n!<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Datos sobre el Proyecto y financiaci\u00f3n Este proyecto recibe respaldo financiero del Instituto Nacional de Ciberseguridad de Espa\u00f1a (INCIBE) a trav\u00e9s del instrumento de Compra P\u00fablica Precomercial CPP2-2022 en materia&#8230;<\/p>\n","protected":false},"author":1,"featured_media":9097,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/page-networkSecurity.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7719","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gesti\u00f3n de vulnerabilidades y detecci\u00f3n de amenazas para operar en un SOC. - SGRwin<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sgrwin.com\/es\/vulcano\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gesti\u00f3n de vulnerabilidades y detecci\u00f3n de amenazas para operar en un SOC. - SGRwin\" \/>\n<meta property=\"og:description\" content=\"Datos sobre el Proyecto y financiaci\u00f3n Este proyecto recibe respaldo financiero del Instituto Nacional de Ciberseguridad de Espa\u00f1a (INCIBE) a trav\u00e9s del instrumento de Compra P\u00fablica Precomercial CPP2-2022 en materia...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sgrwin.com\/es\/vulcano\/\" \/>\n<meta property=\"og:site_name\" content=\"SGRwin\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-26T07:16:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2024\/04\/VULCANO_MOCKUP_HEADER_ES.png\" \/>\n\t<meta property=\"og:image:width\" content=\"3827\" \/>\n\t<meta property=\"og:image:height\" content=\"2187\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sgrwin.com\/es\/vulcano\/\",\"url\":\"https:\/\/www.sgrwin.com\/es\/vulcano\/\",\"name\":\"Gesti\u00f3n de vulnerabilidades y detecci\u00f3n de amenazas para operar en un SOC. - SGRwin\",\"isPartOf\":{\"@id\":\"https:\/\/www.sgrwin.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sgrwin.com\/es\/vulcano\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sgrwin.com\/es\/vulcano\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2024\/04\/VULCANO_MOCKUP_HEADER_ES.png\",\"datePublished\":\"2023-08-18T07:46:54+00:00\",\"dateModified\":\"2025-06-26T07:16:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sgrwin.com\/es\/vulcano\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sgrwin.com\/es\/vulcano\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.sgrwin.com\/es\/vulcano\/#primaryimage\",\"url\":\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2024\/04\/VULCANO_MOCKUP_HEADER_ES.png\",\"contentUrl\":\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2024\/04\/VULCANO_MOCKUP_HEADER_ES.png\",\"width\":3827,\"height\":2187},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sgrwin.com\/es\/vulcano\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"SGRwin\",\"item\":\"https:\/\/www.sgrwin.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gesti\u00f3n de vulnerabilidades y detecci\u00f3n de amenazas para operar en un SOC.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sgrwin.com\/es\/#website\",\"url\":\"https:\/\/www.sgrwin.com\/es\/\",\"name\":\"SGRwin\",\"description\":\"Network Management System for multi-vendor and multi-technology networks\",\"publisher\":{\"@id\":\"https:\/\/www.sgrwin.com\/es\/#organization\"},\"alternateName\":\"SGRwin\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sgrwin.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.sgrwin.com\/es\/#organization\",\"name\":\"SGRwin\",\"alternateName\":\"SGRwin\",\"url\":\"https:\/\/www.sgrwin.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.sgrwin.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2024\/07\/logo_2.png\",\"contentUrl\":\"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2024\/07\/logo_2.png\",\"width\":1667,\"height\":1667,\"caption\":\"SGRwin\"},\"image\":{\"@id\":\"https:\/\/www.sgrwin.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/showcase\/sgrwin\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gesti\u00f3n de vulnerabilidades y detecci\u00f3n de amenazas para operar en un SOC. - SGRwin","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sgrwin.com\/es\/vulcano\/","og_locale":"es_ES","og_type":"article","og_title":"Gesti\u00f3n de vulnerabilidades y detecci\u00f3n de amenazas para operar en un SOC. - SGRwin","og_description":"Datos sobre el Proyecto y financiaci\u00f3n Este proyecto recibe respaldo financiero del Instituto Nacional de Ciberseguridad de Espa\u00f1a (INCIBE) a trav\u00e9s del instrumento de Compra P\u00fablica Precomercial CPP2-2022 en materia...","og_url":"https:\/\/www.sgrwin.com\/es\/vulcano\/","og_site_name":"SGRwin","article_modified_time":"2025-06-26T07:16:03+00:00","og_image":[{"width":3827,"height":2187,"url":"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2024\/04\/VULCANO_MOCKUP_HEADER_ES.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.sgrwin.com\/es\/vulcano\/","url":"https:\/\/www.sgrwin.com\/es\/vulcano\/","name":"Gesti\u00f3n de vulnerabilidades y detecci\u00f3n de amenazas para operar en un SOC. - SGRwin","isPartOf":{"@id":"https:\/\/www.sgrwin.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sgrwin.com\/es\/vulcano\/#primaryimage"},"image":{"@id":"https:\/\/www.sgrwin.com\/es\/vulcano\/#primaryimage"},"thumbnailUrl":"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2024\/04\/VULCANO_MOCKUP_HEADER_ES.png","datePublished":"2023-08-18T07:46:54+00:00","dateModified":"2025-06-26T07:16:03+00:00","breadcrumb":{"@id":"https:\/\/www.sgrwin.com\/es\/vulcano\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sgrwin.com\/es\/vulcano\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.sgrwin.com\/es\/vulcano\/#primaryimage","url":"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2024\/04\/VULCANO_MOCKUP_HEADER_ES.png","contentUrl":"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2024\/04\/VULCANO_MOCKUP_HEADER_ES.png","width":3827,"height":2187},{"@type":"BreadcrumbList","@id":"https:\/\/www.sgrwin.com\/es\/vulcano\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"SGRwin","item":"https:\/\/www.sgrwin.com\/es\/"},{"@type":"ListItem","position":2,"name":"Gesti\u00f3n de vulnerabilidades y detecci\u00f3n de amenazas para operar en un SOC."}]},{"@type":"WebSite","@id":"https:\/\/www.sgrwin.com\/es\/#website","url":"https:\/\/www.sgrwin.com\/es\/","name":"SGRwin","description":"Network Management System for multi-vendor and multi-technology networks","publisher":{"@id":"https:\/\/www.sgrwin.com\/es\/#organization"},"alternateName":"SGRwin","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sgrwin.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.sgrwin.com\/es\/#organization","name":"SGRwin","alternateName":"SGRwin","url":"https:\/\/www.sgrwin.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.sgrwin.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2024\/07\/logo_2.png","contentUrl":"https:\/\/www.sgrwin.com\/wp-content\/uploads\/2024\/07\/logo_2.png","width":1667,"height":1667,"caption":"SGRwin"},"image":{"@id":"https:\/\/www.sgrwin.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/showcase\/sgrwin\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.sgrwin.com\/es\/wp-json\/wp\/v2\/pages\/7719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sgrwin.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sgrwin.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sgrwin.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sgrwin.com\/es\/wp-json\/wp\/v2\/comments?post=7719"}],"version-history":[{"count":36,"href":"https:\/\/www.sgrwin.com\/es\/wp-json\/wp\/v2\/pages\/7719\/revisions"}],"predecessor-version":[{"id":11313,"href":"https:\/\/www.sgrwin.com\/es\/wp-json\/wp\/v2\/pages\/7719\/revisions\/11313"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sgrwin.com\/es\/wp-json\/wp\/v2\/media\/9097"}],"wp:attachment":[{"href":"https:\/\/www.sgrwin.com\/es\/wp-json\/wp\/v2\/media?parent=7719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}