{"id":9674,"date":"2025-02-12T15:40:46","date_gmt":"2025-02-12T15:40:46","guid":{"rendered":"https:\/\/www.codix.es\/seguretat-ofensiva\/"},"modified":"2025-02-12T15:40:49","modified_gmt":"2025-02-12T15:40:49","slug":"seguretat-ofensiva","status":"publish","type":"page","link":"https:\/\/www.codix.es\/ca\/seguretat-ofensiva\/","title":{"rendered":"Seguretat Ofensiva"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"9674\" class=\"elementor elementor-9674 elementor-8420\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a1df3f5 elementor-section-stretched elementor-section-full_width elementor-section-height-min-height elementor-section-height-default elementor-section-items-middle\" data-id=\"a1df3f5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_mouse&quot;:&quot;yes&quot;,&quot;background_motion_fx_mouseTrack_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_mouseTrack_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]}}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6be6bd6\" data-id=\"6be6bd6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c848fe0 elementor-widget elementor-widget-heading\" data-id=\"c848fe0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Seguretat ofensiva<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f41092a elementor-widget elementor-widget-heading\" data-id=\"f41092a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Confieu la vostra auditoria de seguretat a CODIX<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9758211 elementor-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"9758211\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ea6ce79\" data-id=\"ea6ce79\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-89d3d20 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"89d3d20\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3021cb1\" data-id=\"3021cb1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6b39a10 elementor-widget elementor-widget-text-editor\" data-id=\"6b39a10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les amenaces cibern\u00e8tiques augmenten cada dia i esdevenen m\u00e9s sofisticades.  <\/p>\n<p>En aquest context, s&#8217;ha fet imprescindible aplicar un enfocament proactiu de la seguretat per reduir el nombre de riscos a qu\u00e8 pot estar exposada una empresa.<\/p>\n<p>L&#8217;enfocament de seguretat ofensiu permet identificar les vulnerabilitats que cal corregir sense esperar un atac real.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d546d62\" data-id=\"d546d62\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-51a003e elementor-widget elementor-widget-image\" data-id=\"51a003e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"533\" src=\"https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyberseguridad-using-computer-and-programming-1024x682.webp\" class=\"attachment-large size-large wp-image-8455\" alt=\"\" srcset=\"https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyberseguridad-using-computer-and-programming-1024x682.webp 1024w, https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyberseguridad-using-computer-and-programming-300x200.webp 300w, https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyberseguridad-using-computer-and-programming-768x512.webp 768w, https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyberseguridad-using-computer-and-programming.webp 1400w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-57fbe3d elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"57fbe3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"artwork\" width=\"64\" height=\"64\" viewBox=\"0 0 64 64\"><title>Padlock<\/title><path d=\"M53,17.5H48.5V17a16.5,16.5,0,0,0-33,0v.5H11A4.50491,4.50491,0,0,0,6.5,22V52A11.5131,11.5131,0,0,0,18,63.5H46A11.5131,11.5131,0,0,0,57.5,52V22A4.50491,4.50491,0,0,0,53,17.5ZM18.5,17a13.5,13.5,0,0,1,27,0v.5h-3V17a10.5,10.5,0,0,0-21,0v.5h-3Zm6,.5V17a7.5,7.5,0,0,1,15,0v.5ZM54.5,52A8.50982,8.50982,0,0,1,46,60.5H18A8.50982,8.50982,0,0,1,9.5,52V22A1.50164,1.50164,0,0,1,11,20.5H53A1.50164,1.50164,0,0,1,54.5,22Z\"><\/path><path d=\"M47,26.5H17A1.50008,1.50008,0,0,0,15.5,28V51A3.50424,3.50424,0,0,0,19,54.5H45A3.50424,3.50424,0,0,0,48.5,51V28A1.50008,1.50008,0,0,0,47,26.5ZM34.19839,48H29.80161a1,1,0,0,1-.96623-1.25766l1.61445-6.05417a4,4,0,1,1,3.10034,0l1.61445,6.05417A1,1,0,0,1,34.19839,48Z\" style=\"fill:#3e3ef4\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tOn s\u00f3n els perills\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-02fbfa8 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"02fbfa8\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-859e7c5\" data-id=\"859e7c5\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aba05ef elementor-widget elementor-widget-image\" data-id=\"aba05ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"533\" src=\"https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyberseguridad-using-computer-and-programming-to-break-code-7-1024x682.webp\" class=\"attachment-large size-large wp-image-8457\" alt=\"\" srcset=\"https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyberseguridad-using-computer-and-programming-to-break-code-7-1024x682.webp 1024w, https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyberseguridad-using-computer-and-programming-to-break-code-7-300x200.webp 300w, https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyberseguridad-using-computer-and-programming-to-break-code-7-768x512.webp 768w, https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyberseguridad-using-computer-and-programming-to-break-code-7.webp 1400w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f920578\" data-id=\"f920578\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5639975 elementor-widget elementor-widget-text-editor\" data-id=\"5639975\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Avaluar les vulnerabilitats del sistema d&#8217;informaci\u00f3 i el nivell d&#8217;exposici\u00f3 a les ciberamenaces<\/p>\n<p>Mesurar la solidesa del maquinari i el programari implicats<\/p>\n<p>Verificar l&#8217;efic\u00e0cia dels processos i les proteccions establertes<\/p>\n<p>Prevenir i limitar les vulnerabilitats que poden ser explotades al vostre sistema d&#8217;informaci\u00f3<\/p>\n<p>Saber com reaccionar davant d&#8217;un ciberatac<\/p>\n<p>Identificar les accions i solucions que cal implementar per corregir les vulnerabilitats.  <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3ad91c6 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"3ad91c6\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-4c25f39\" data-id=\"4c25f39\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-78cd6d6 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"78cd6d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"artwork\" width=\"64\" height=\"64\" viewBox=\"0 0 64 64\"><title>Ddos<\/title><path d=\"M63.0249,53.69531,56.5,40.64551V16A4.50491,4.50491,0,0,0,52,11.5H51a1.5,1.5,0,0,0,0,3h1A1.50164,1.50164,0,0,1,53.5,16V39.5h-43V16A1.50164,1.50164,0,0,1,12,14.5h1a1.5,1.5,0,0,0,0-3H12A4.50491,4.50491,0,0,0,7.5,16V40.64551L.9751,53.69531A4.52769,4.52769,0,0,0,.5,55.708V59A4.50491,4.50491,0,0,0,5,63.5H59A4.50491,4.50491,0,0,0,63.5,59V55.708A4.52769,4.52769,0,0,0,63.0249,53.69531ZM54.07275,42.5l6,12H42.98926l-2.61035-6.09082A1.49985,1.49985,0,0,0,39,47.5H25a1.49985,1.49985,0,0,0-1.37891.90918L21.01074,54.5H3.92725l6-12ZM39.7251,54.5H24.2749l1.71436-4H38.01074ZM59,60.5H5A1.50164,1.50164,0,0,1,3.5,59V57.5h57V59A1.50164,1.50164,0,0,1,59,60.5Z\"><\/path><path d=\"M39,4.50025H25a1.50008,1.50008,0,0,0-1.5,1.5c.01278,15.33153-.02856,14.54979.03619,15.5H40.46381c.06477-.95052.02341-.172.03619-15.5A1.50008,1.50008,0,0,0,39,4.50025Z\" style=\"fill:#3e3ef4\"><\/path><path d=\"M31.40918,33.37916a1.50186,1.50186,0,0,0,1.18164,0,13.38,13.38,0,0,0,7.36212-8.87891H24.04706A13.38,13.38,0,0,0,31.40918,33.37916Z\" style=\"fill:#3e3ef4\"><\/path><path d=\"M46.25586.6995,43.5,2.27426V16.28171a15.42668,15.42668,0,0,0,5-11.342V2.00223A1.50094,1.50094,0,0,0,46.25586.6995Z\" style=\"fill:#3e3ef4\"><\/path><path d=\"M15.5,2.002V4.9395a15.42668,15.42668,0,0,0,5,11.342V2.274L17.74414.69927A1.501,1.501,0,0,0,15.5,2.002Z\" style=\"fill:#3e3ef4\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-931d1fc elementor-widget elementor-widget-heading\" data-id=\"931d1fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Les nostres solucions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0664eec elementor-widget elementor-widget-heading\" data-id=\"0664eec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">El nostre equip t\u00e8cnic us pot ajudar a realitzar diverses auditories de seguretat per mesurar el nivell de seguretat del vostre sistema d'informaci\u00f3 en cas d'atac extern i verificar l'efic\u00e0cia dels processos i proteccions.<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4e86651 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"4e86651\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-514be04\" data-id=\"514be04\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-caf781a elementor-widget elementor-widget-image\" data-id=\"caf781a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"533\" src=\"https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyberseguridad-male-teenage-hacker-sitting-in-front-of-computer-s-8-7-9-38-7--1024x682.webp\" class=\"attachment-large size-large wp-image-8451\" alt=\"\" srcset=\"https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyberseguridad-male-teenage-hacker-sitting-in-front-of-computer-s-8-7-9-38-7--1024x682.webp 1024w, https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyberseguridad-male-teenage-hacker-sitting-in-front-of-computer-s-8-7-9-38-7--300x200.webp 300w, https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyberseguridad-male-teenage-hacker-sitting-in-front-of-computer-s-8-7-9-38-7--768x512.webp 768w, https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyberseguridad-male-teenage-hacker-sitting-in-front-of-computer-s-8-7-9-38-7-.webp 1400w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1977270\" data-id=\"1977270\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-edb3ed5 elementor-widget elementor-widget-heading\" data-id=\"edb3ed5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Proves de penetraci\u00f3 - Pentest<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c5ac0a elementor-widget elementor-widget-text-editor\" data-id=\"5c5ac0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Els nostres experts certificats us poden ajudar a realitzar proves de penetraci\u00f3 (pentest) integrant els diferents escenaris per irrompre en el vostre sistema d&#8217;informaci\u00f3 i revelar les vostres vulnerabilitats davant d&#8217;un atac.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-25d10fd elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"25d10fd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5576bbb\" data-id=\"5576bbb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-00bd7bf elementor-widget elementor-widget-heading\" data-id=\"00bd7bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Auditoria de seguretat de la xarxa<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1cb7b4 elementor-widget elementor-widget-text-editor\" data-id=\"f1cb7b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Quan la xarxa d&#8217;una empresa pateix un atac, els equips inform\u00e0tics busquen respostes, per\u00f2 sense visibilitat solen estar perduts.  <\/p>\n<p>Per tenir una imatge clara del que passa a la vostra xarxa inform\u00e0tica, necessiteu una visi\u00f3 completa del tr\u00e0nsit, les amenaces i l&#8217;estat general de seguretat del vostre sistema d&#8217;informaci\u00f3.<\/p>\n<p>Realitzeu una auditoria de seguretat de la xarxa amb els nostres experts, utilitzant les nostres eines per detectar vulnerabilitats a la vostra xarxa.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-21ebd6c\" data-id=\"21ebd6c\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-afadbd5 elementor-widget elementor-widget-image\" data-id=\"afadbd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyber-security-2022-11-09-07-53-58-utc-1024x768.webp\" class=\"attachment-large size-large wp-image-8449\" alt=\"\" srcset=\"https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyber-security-2022-11-09-07-53-58-utc-1024x768.webp 1024w, https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyber-security-2022-11-09-07-53-58-utc-300x225.webp 300w, https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyber-security-2022-11-09-07-53-58-utc-768x576.webp 768w, https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyber-security-2022-11-09-07-53-58-utc.webp 1400w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Seguretat ofensiva Confieu la vostra auditoria de seguretat a CODIX Les amenaces cibern\u00e8tiques augmenten cada dia i esdevenen m\u00e9s sofisticades. En aquest context, s&#8217;ha fet imprescindible aplicar un enfocament proactiu de la seguretat per reduir el nombre de riscos a qu\u00e8 pot estar exposada una empresa. L&#8217;enfocament de seguretat ofensiu permet identificar les vulnerabilitats que [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-9674","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Seguretat Ofensiva<\/title>\n<meta name=\"description\" content=\"Us ajudem a realitzar diverses auditories de seguretat per mesurar el nivell de seguretat del vostre sistema d&#039;informaci\u00f3\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.codix.es\/ca\/seguretat-ofensiva\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seguretat Ofensiva\" \/>\n<meta property=\"og:description\" content=\"Us ajudem a realitzar diverses auditories de seguretat per mesurar el nivell de seguretat del vostre sistema d&#039;informaci\u00f3\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.codix.es\/ca\/seguretat-ofensiva\/\" \/>\n<meta property=\"og:site_name\" content=\"codix\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Codix-Sistemes-Informatics-SL-183906981636700\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-12T15:40:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyberseguridad-using-computer-and-programming.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"933\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.codix.es\\\/ca\\\/seguretat-ofensiva\\\/\",\"url\":\"https:\\\/\\\/www.codix.es\\\/ca\\\/seguretat-ofensiva\\\/\",\"name\":\"Seguretat Ofensiva\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.codix.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.codix.es\\\/ca\\\/seguretat-ofensiva\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.codix.es\\\/ca\\\/seguretat-ofensiva\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.codix.es\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/cyberseguridad-using-computer-and-programming-1024x682.webp\",\"datePublished\":\"2025-02-12T15:40:46+00:00\",\"dateModified\":\"2025-02-12T15:40:49+00:00\",\"description\":\"Us ajudem a realitzar diverses auditories de seguretat per mesurar el nivell de seguretat del vostre sistema d'informaci\u00f3\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.codix.es\\\/ca\\\/seguretat-ofensiva\\\/#breadcrumb\"},\"inLanguage\":\"ca-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.codix.es\\\/ca\\\/seguretat-ofensiva\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\\\/\\\/www.codix.es\\\/ca\\\/seguretat-ofensiva\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.codix.es\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/cyberseguridad-using-computer-and-programming-1024x682.webp\",\"contentUrl\":\"https:\\\/\\\/www.codix.es\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/cyberseguridad-using-computer-and-programming-1024x682.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.codix.es\\\/ca\\\/seguretat-ofensiva\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.codix.es\\\/ca\\\/home\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguretat Ofensiva\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.codix.es\\\/#website\",\"url\":\"https:\\\/\\\/www.codix.es\\\/\",\"name\":\"codix\",\"description\":\"informatica terrassa\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.codix.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.codix.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.codix.es\\\/#organization\",\"name\":\"codix\",\"url\":\"https:\\\/\\\/www.codix.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\\\/\\\/www.codix.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.codix.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/codix-logo-trans.svg\",\"contentUrl\":\"https:\\\/\\\/www.codix.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/codix-logo-trans.svg\",\"width\":800,\"height\":203,\"caption\":\"codix\"},\"image\":{\"@id\":\"https:\\\/\\\/www.codix.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Codix-Sistemes-Informatics-SL-183906981636700\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Seguretat Ofensiva","description":"Us ajudem a realitzar diverses auditories de seguretat per mesurar el nivell de seguretat del vostre sistema d'informaci\u00f3","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.codix.es\/ca\/seguretat-ofensiva\/","og_locale":"ca_ES","og_type":"article","og_title":"Seguretat Ofensiva","og_description":"Us ajudem a realitzar diverses auditories de seguretat per mesurar el nivell de seguretat del vostre sistema d'informaci\u00f3","og_url":"https:\/\/www.codix.es\/ca\/seguretat-ofensiva\/","og_site_name":"codix","article_publisher":"https:\/\/www.facebook.com\/Codix-Sistemes-Informatics-SL-183906981636700\/","article_modified_time":"2025-02-12T15:40:49+00:00","og_image":[{"width":1400,"height":933,"url":"https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyberseguridad-using-computer-and-programming.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.codix.es\/ca\/seguretat-ofensiva\/","url":"https:\/\/www.codix.es\/ca\/seguretat-ofensiva\/","name":"Seguretat Ofensiva","isPartOf":{"@id":"https:\/\/www.codix.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.codix.es\/ca\/seguretat-ofensiva\/#primaryimage"},"image":{"@id":"https:\/\/www.codix.es\/ca\/seguretat-ofensiva\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyberseguridad-using-computer-and-programming-1024x682.webp","datePublished":"2025-02-12T15:40:46+00:00","dateModified":"2025-02-12T15:40:49+00:00","description":"Us ajudem a realitzar diverses auditories de seguretat per mesurar el nivell de seguretat del vostre sistema d'informaci\u00f3","breadcrumb":{"@id":"https:\/\/www.codix.es\/ca\/seguretat-ofensiva\/#breadcrumb"},"inLanguage":"ca-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.codix.es\/ca\/seguretat-ofensiva\/"]}]},{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/www.codix.es\/ca\/seguretat-ofensiva\/#primaryimage","url":"https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyberseguridad-using-computer-and-programming-1024x682.webp","contentUrl":"https:\/\/www.codix.es\/wp-content\/uploads\/2022\/11\/cyberseguridad-using-computer-and-programming-1024x682.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.codix.es\/ca\/seguretat-ofensiva\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.codix.es\/ca\/home\/"},{"@type":"ListItem","position":2,"name":"Seguretat Ofensiva"}]},{"@type":"WebSite","@id":"https:\/\/www.codix.es\/#website","url":"https:\/\/www.codix.es\/","name":"codix","description":"informatica terrassa","publisher":{"@id":"https:\/\/www.codix.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.codix.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca-ES"},{"@type":"Organization","@id":"https:\/\/www.codix.es\/#organization","name":"codix","url":"https:\/\/www.codix.es\/","logo":{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/www.codix.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.codix.es\/wp-content\/uploads\/2022\/08\/codix-logo-trans.svg","contentUrl":"https:\/\/www.codix.es\/wp-content\/uploads\/2022\/08\/codix-logo-trans.svg","width":800,"height":203,"caption":"codix"},"image":{"@id":"https:\/\/www.codix.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Codix-Sistemes-Informatics-SL-183906981636700\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.codix.es\/ca\/wp-json\/wp\/v2\/pages\/9674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.codix.es\/ca\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.codix.es\/ca\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.codix.es\/ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.codix.es\/ca\/wp-json\/wp\/v2\/comments?post=9674"}],"version-history":[{"count":0,"href":"https:\/\/www.codix.es\/ca\/wp-json\/wp\/v2\/pages\/9674\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.codix.es\/ca\/wp-json\/wp\/v2\/media?parent=9674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}