{"id":2012,"date":"2024-09-23T15:39:40","date_gmt":"2024-09-23T13:39:40","guid":{"rendered":"https:\/\/enthec.com\/case-studies\/continuidad-del-servicio\/"},"modified":"2024-11-05T19:08:36","modified_gmt":"2024-11-05T18:08:36","slug":"continuity-of-service","status":"publish","type":"page","link":"https:\/\/enthec.com\/en\/use-cases\/continuity-of-service\/","title":{"rendered":"Continuity of Service"},"content":{"rendered":"
[vc_row row_height_percent=”0″ back_color=”color-jevc” back_image=”105″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ content_parallax=”0″ uncode_shortcode_id=”150573″ back_color_type=”uncode-palette”][vc_column column_width_percent=”100″ gutter_size=”3″ style=”dark” overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/2″ uncode_shortcode_id=”536538″][vc_custom_heading auto_text=”yes” text_size=”custom” text_weight=”700″ uncode_shortcode_id=”283533″ heading_custom_size=”5em”]T\u00edtulo din\u00e1mico[\/vc_custom_heading][vc_single_image media=”319″ media_width_use_pixel=”yes” uncode_shortcode_id=”664052″ media_width_pixel=”250″][\/vc_column][vc_column column_width_percent=”100″ gutter_size=”3″ style=”dark” overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/2″ uncode_shortcode_id=”141236″][vc_empty_space empty_h=”3″ mobile_visibility=”yes”][vc_custom_heading heading_semantic=”h1″ text_size=”h4″ text_weight=”300″ uncode_shortcode_id=”664739″]The in-house and value chain vulnerability detection capabilities of the Kartos XTI Watchbots Cybersecurity and Cyber Intelligence platform, through automated and continuous monitoring of the external attack surface, are used by the organisation to protect the system on which its critical service depends.[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row row_height_percent=”0″ back_color=”color-jevc” back_image=”105″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ enable_bottom_divider=”default” bottom_divider=”step” shape_bottom_h_use_pixel=”” shape_bottom_height=”500″ shape_bottom_color=”color-lxmt” shape_bottom_opacity=”100″ shape_bottom_index=”0″ content_parallax=”0″ uncode_shortcode_id=”265517″ back_color_type=”uncode-palette” shape_bottom_color_type=”uncode-palette”][vc_column column_width_percent=”100″ gutter_size=”2″ style=”light” back_color=”color-xsdn” overlay_alpha=”50″ shadow=”std” shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”10″ medium_width=”0″ mobile_width=”0″ width=”1\/1″ uncode_shortcode_id=”408996″ back_color_type=”uncode-palette”][vc_custom_heading uncode_shortcode_id=”371895″]CHALLENGE[\/vc_custom_heading][vc_single_image media=”473″ media_width_use_pixel=”yes” uncode_shortcode_id=”443915″ media_width_pixel=”50″][vc_custom_heading text_size=”h4″ uncode_shortcode_id=”959584″]Our client, an organisation on whose logistics system the supply of essential products depends, needed to reinforce the protection of its system, as it was sometimes experiencing failures that put its service at risk. After an exhaustive study by its information security department, the entity had determined that these failures were not attributable to the system’s own operation and suspected the existence of open and exposed security breaches exploited by cybercriminals, which its cybersecurity tools had not prevented or detected.[\/vc_custom_heading][vc_row_inner][vc_column_inner column_width_percent=”100″ gutter_size=”2″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/2″ uncode_shortcode_id=”148772″][vc_single_image media=”747″ media_width_percent=”100″ media_ratio=”four-three” uncode_shortcode_id=”393742″][vc_custom_heading separator=”yes” uncode_shortcode_id=”176808″]Solution[\/vc_custom_heading][vc_column_text uncode_shortcode_id=”144177″]Following an analysis by the Enthec team of the client’s cybersecurity status, exposed vulnerabilities were detected, as well as those of a key member of its value chain.
\nvulnerabilities were detected, as well as those of a key member of its value chain. These own and third-party vulnerabilities were being exploited by cybercriminals to complicate the continuity of the service. Therefore, it was proposed to the client to acquire a Kartos Enterprise licence for its own monitoring, together with a Kartos Third-Party licence to control the risk of its value chain.[\/vc_column_text][\/vc_column_inner][vc_column_inner column_width_percent=”100″ gutter_size=”2″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/2″ uncode_shortcode_id=”333741″][vc_single_image media=”453″ media_width_percent=”100″ media_ratio=”four-three” uncode_shortcode_id=”145503″][vc_custom_heading separator=”yes” uncode_shortcode_id=”180245″]Result[\/vc_custom_heading][vc_column_text uncode_shortcode_id=”168432″]Once the detected vulnerabilities have been eliminated and those in its value chain that posed a risk have been alerted, the organisation guarantees the continuity of its essential service through the automated and continuous monitoring of both its own domain and its value chain, provided by our Kartos platform. In addition, thanks to Enthec, it now detects and deactivates recurring phishing, fraud and scam campaigns on social media using its brand, enabling it to maintain a reputation it has built up over its long history.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"
[vc_row row_height_percent=”0″ back_color=”color-jevc” back_image=”105″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ content_parallax=”0″ uncode_shortcode_id=”150573″ back_color_type=”uncode-palette”][vc_column column_width_percent=”100″ gutter_size=”3″ style=”dark” overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ […]<\/p>\n","protected":false},"author":1,"featured_media":2013,"parent":2010,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2012","page","type-page","status-publish","has-post-thumbnail","hentry","page_category-use-cases"],"yoast_head":"\n