{"id":1223,"date":"2022-07-09T16:16:42","date_gmt":"2022-07-09T16:16:42","guid":{"rendered":"https:\/\/securitybytestech.com\/?page_id=1223"},"modified":"2022-07-10T19:12:28","modified_gmt":"2022-07-10T19:12:28","slug":"soluciones","status":"publish","type":"page","link":"https:\/\/securitybytestech.com\/en\/solutions\/","title":{"rendered":"Solutions"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1223\" class=\"elementor elementor-1223\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b05fdf0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"b05fdf0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-92a3ca4\" data-id=\"92a3ca4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1cfc1e7 de_scroll_animation_no elementor-widget elementor-widget-heading\" data-id=\"1cfc1e7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Solutions\n\n\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5029e31 elementor-hidden-tablet elementor-hidden-phone\" data-id=\"5029e31\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-74ac511f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"74ac511f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2d23164f\" data-id=\"2d23164f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67abd452 de_scroll_animation_no elementor-widget elementor-widget-image\" data-id=\"67abd452\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"533\" src=\"https:\/\/securitybytestech.com\/wp-content\/uploads\/2022\/07\/business-people-planning-strategy-1024x682.jpg\" class=\"attachment-large size-large wp-image-1851\" alt=\"Business people planning strategy\" srcset=\"https:\/\/securitybytestech.com\/wp-content\/uploads\/2022\/07\/business-people-planning-strategy-1024x682.jpg 1024w, https:\/\/securitybytestech.com\/wp-content\/uploads\/2022\/07\/business-people-planning-strategy-300x200.jpg 300w, https:\/\/securitybytestech.com\/wp-content\/uploads\/2022\/07\/business-people-planning-strategy-768x512.jpg 768w, https:\/\/securitybytestech.com\/wp-content\/uploads\/2022\/07\/business-people-planning-strategy-1536x1024.jpg 1536w, https:\/\/securitybytestech.com\/wp-content\/uploads\/2022\/07\/business-people-planning-strategy-18x12.jpg 18w, https:\/\/securitybytestech.com\/wp-content\/uploads\/2022\/07\/business-people-planning-strategy.jpg 2000w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5612730b\" data-id=\"5612730b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8af1a13 de_scroll_animation_no elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"8af1a13\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Depending on what you want to accomplish, making the right resource decisions early on will save you time and effort.<\/p><p>All of our solutions are listed below<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ba2069 elementor-nav-menu__align-start elementor-nav-menu--dropdown-tablet elementor-nav-menu__text-align-aside elementor-nav-menu--toggle elementor-nav-menu--burger de_scroll_animation_no elementor-widget elementor-widget-nav-menu\" data-id=\"0ba2069\" data-element_type=\"widget\" data-settings=\"{&quot;layout&quot;:&quot;vertical&quot;,&quot;submenu_icon&quot;:{&quot;value&quot;:&quot;&lt;i class=\\&quot;fas fa-caret-down\\&quot; aria-hidden=\\&quot;true\\&quot;&gt;&lt;\\\/i&gt;&quot;,&quot;library&quot;:&quot;fa-solid&quot;},&quot;toggle&quot;:&quot;burger&quot;}\" data-widget_type=\"nav-menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<nav aria-label=\"Menu\" class=\"elementor-nav-menu--main elementor-nav-menu__container elementor-nav-menu--layout-vertical e--pointer-none\">\n\t\t\t\t<ul id=\"menu-1-0ba2069\" class=\"elementor-nav-menu sm-vertical\"><li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1575\"><a href=\"https:\/\/securitybytestech.com\/en\/cloud-infrastructure\/\" class=\"elementor-item\">Cloud Infrastructure<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1576\"><a href=\"https:\/\/securitybytestech.com\/en\/cibersecurity2\/\" class=\"elementor-item\">Cyber Security<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1577\"><a href=\"https:\/\/securitybytestech.com\/en\/business-email-security\/\" class=\"elementor-item\">Business Email Security<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1578\"><a href=\"https:\/\/securitybytestech.com\/en\/mobile-device-security\/\" class=\"elementor-item\">Mobile Device Security<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1579\"><a href=\"https:\/\/securitybytestech.com\/en\/remote-it\/\" class=\"elementor-item\">Remote IT<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1580\"><a href=\"https:\/\/securitybytestech.com\/en\/microsoft-security\/\" class=\"elementor-item\">Microsoft Security<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1581\"><a href=\"https:\/\/securitybytestech.com\/en\/it-governance\/\" class=\"elementor-item\">IT Governance<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1582\"><a href=\"https:\/\/securitybytestech.com\/en\/it-compliance\/\" class=\"elementor-item\">IT Compliance<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1583\"><a href=\"https:\/\/securitybytestech.com\/en\/construction-it\/\" class=\"elementor-item\">Construction IT<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1584\"><a href=\"https:\/\/securitybytestech.com\/en\/telecommunications\/\" class=\"elementor-item\">Telecommunications<\/a><\/li>\n<\/ul>\t\t\t<\/nav>\n\t\t\t\t\t<div class=\"elementor-menu-toggle\" role=\"button\" tabindex=\"0\" aria-label=\"Menu Toggle\" aria-expanded=\"false\">\n\t\t\t<i aria-hidden=\"true\" role=\"presentation\" class=\"elementor-menu-toggle__icon--open eicon-menu-bar\"><\/i><i aria-hidden=\"true\" role=\"presentation\" class=\"elementor-menu-toggle__icon--close eicon-close\"><\/i>\t\t<\/div>\n\t\t\t\t\t<nav class=\"elementor-nav-menu--dropdown elementor-nav-menu__container\" aria-hidden=\"true\">\n\t\t\t\t<ul id=\"menu-2-0ba2069\" class=\"elementor-nav-menu sm-vertical\"><li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1575\"><a href=\"https:\/\/securitybytestech.com\/en\/cloud-infrastructure\/\" class=\"elementor-item\" tabindex=\"-1\">Cloud Infrastructure<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1576\"><a href=\"https:\/\/securitybytestech.com\/en\/cibersecurity2\/\" class=\"elementor-item\" tabindex=\"-1\">Cyber Security<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1577\"><a href=\"https:\/\/securitybytestech.com\/en\/business-email-security\/\" class=\"elementor-item\" tabindex=\"-1\">Business Email Security<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1578\"><a href=\"https:\/\/securitybytestech.com\/en\/mobile-device-security\/\" class=\"elementor-item\" tabindex=\"-1\">Mobile Device Security<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1579\"><a href=\"https:\/\/securitybytestech.com\/en\/remote-it\/\" class=\"elementor-item\" tabindex=\"-1\">Remote IT<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1580\"><a href=\"https:\/\/securitybytestech.com\/en\/microsoft-security\/\" class=\"elementor-item\" tabindex=\"-1\">Microsoft Security<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1581\"><a href=\"https:\/\/securitybytestech.com\/en\/it-governance\/\" class=\"elementor-item\" tabindex=\"-1\">IT Governance<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1582\"><a href=\"https:\/\/securitybytestech.com\/en\/it-compliance\/\" class=\"elementor-item\" tabindex=\"-1\">IT Compliance<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1583\"><a href=\"https:\/\/securitybytestech.com\/en\/construction-it\/\" class=\"elementor-item\" tabindex=\"-1\">Construction IT<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1584\"><a href=\"https:\/\/securitybytestech.com\/en\/telecommunications\/\" class=\"elementor-item\" tabindex=\"-1\">Telecommunications<\/a><\/li>\n<\/ul>\t\t\t<\/nav>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f009e72 de_scroll_animation_no elementor-widget elementor-widget-heading\" data-id=\"f009e72\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Make use of the solutions now! <\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-850a4a3 elementor-align-left elementor-mobile-align-justify de_scroll_animation_no elementor-invisible elementor-widget elementor-widget-button\" data-id=\"850a4a3\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;lightSpeedIn&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/securitybytestech.com\/en\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us <\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Soluciones Dependiendo de lo que desee lograr, tomar las decisiones correctas de sus recursos desde el principio le ahorrar\u00e1 tiempo y esfuerzo. Todas nuestras soluciones se enumeran a continuaci\u00f3n. \u00a1Haga uso de las soluciones ahora! Cont\u00e1ctenos<\/p>","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1223","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/pages\/1223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/comments?post=1223"}],"version-history":[{"count":33,"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/pages\/1223\/revisions"}],"predecessor-version":[{"id":1854,"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/pages\/1223\/revisions\/1854"}],"wp:attachment":[{"href":"https:\/\/securitybytestech.com\/en\/wp-json\/wp\/v2\/media?parent=1223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}