{"id":2039,"date":"2024-08-29T08:03:49","date_gmt":"2024-08-29T06:03:49","guid":{"rendered":"https:\/\/enthec.com\/kartos\/"},"modified":"2025-10-07T15:29:43","modified_gmt":"2025-10-07T13:29:43","slug":"kartos","status":"publish","type":"page","link":"https:\/\/enthec.com\/en\/kartos\/","title":{"rendered":"kartos\u25cf"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row row_height_percent=&#8221;75&#8243; back_color=&#8221;color-xsdn&#8221; back_image=&#8221;573&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;0&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; bottom_divider=&#8221;gradient&#8221; changer_back_color=&#8221;yes&#8221; uncode_shortcode_id=&#8221;115693&#8243; back_color_type=&#8221;uncode-palette&#8221;][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243; uncode_shortcode_id=&#8221;774055&#8243;][vc_row_inner limit_content=&#8221;&#8221;][vc_column_inner column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;126197&#8243;][vc_single_image media=&#8221;112&#8243; media_width_use_pixel=&#8221;yes&#8221; uncode_shortcode_id=&#8221;950065&#8243; media_width_pixel=&#8221;300&#8243;][vc_custom_heading text_size=&#8221;custom&#8221; text_weight=&#8221;700&#8243; uncode_shortcode_id=&#8221;484272&#8243; heading_custom_size=&#8221;5em&#8221;]Corporate Threat Watchbots[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;h1&#8243; text_weight=&#8221;300&#8243; uncode_shortcode_id=&#8221;163781&#8243;]Advanced AI-driven Cyber-Surveillance Platform[\/vc_custom_heading][vc_button button_color=&#8221;color-165520&#8243; border_width=&#8221;0&#8243; uncode_shortcode_id=&#8221;170747&#8243; button_color_type=&#8221;uncode-palette&#8221; el_class=&#8221;popmake-1453&#8243; link=&#8221;url:https%3A%2F%2Fenthec.com%2Fen%2Fcontact%2F|title:Contact&#8221;]TEST MY COMPANY NOW[\/vc_button][vc_button button_color=&#8221;color-165520&#8243; size=&#8221;link&#8221; btn_link_underline=&#8221;btn-underline-in&#8221; scale_mobile=&#8221;no&#8221; button_color_type=&#8221;uncode-palette&#8221; icon=&#8221;fa fa-angle-right&#8221; uncode_shortcode_id=&#8221;658865&#8243; link=&#8221;url:https%3A%2F%2Fenthec.com%2Fen%2Fkartos%2Fkartos-terceras-partes%2F|title:kartos%E2%97%8F%20%7C%20Terceras%20Partes&#8221;]Information from kartos\u25cf | Third Parties[\/vc_button][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; expand_height=&#8221;yes&#8221; style=&#8221;dark&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;497754&#8243;][vc_single_image media=&#8221;195&#8243; media_width_percent=&#8221;100&#8243; css_animation=&#8221;zoom-in&#8221; uncode_shortcode_id=&#8221;207262&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; back_color=&#8221;color-xsdn&#8221; back_image=&#8221;679&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; changer_back_color=&#8221;yes&#8221; uncode_shortcode_id=&#8221;135748&#8243; back_color_type=&#8221;uncode-palette&#8221;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; back_color=&#8221;color-lxmt&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243; uncode_shortcode_id=&#8221;114674&#8243; back_color_type=&#8221;uncode-palette&#8221;][vc_row_inner][vc_column_inner column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;105117&#8243;][vc_single_image media=&#8221;595&#8243; media_width_use_pixel=&#8221;yes&#8221; uncode_shortcode_id=&#8221;100457&#8243; media_width_pixel=&#8221;60&#8243;][vc_custom_heading heading_semantic=&#8221;h1&#8243; text_weight=&#8221;700&#8243; uncode_shortcode_id=&#8221;130284&#8243;]If a cybercriminal can see it,<br \/>\nso can we.[\/vc_custom_heading][vc_single_image media=&#8221;584&#8243; media_width_use_pixel=&#8221;yes&#8221; uncode_shortcode_id=&#8221;112252&#8243; media_width_pixel=&#8221;18&#8243;][vc_custom_heading heading_semantic=&#8221;h1&#8243; text_size=&#8221;h5&#8243; text_weight=&#8221;300&#8243; uncode_shortcode_id=&#8221;108954&#8243;]Kartos is an automated monitoring tool, independent of third-party applications, non-intrusive and continuous, that provides data and alerts on open and exposed vulnerabilities in real time by simply entering the domain of the company to be monitored.[\/vc_custom_heading][vc_button button_color=&#8221;color-165520&#8243; size=&#8221;btn-sm&#8221; border_width=&#8221;0&#8243; uncode_shortcode_id=&#8221;597080&#8243; button_color_type=&#8221;uncode-palette&#8221; el_class=&#8221;popmake-1453&#8243; link=&#8221;url:https%3A%2F%2Fenthec.com%2Fen%2Fcontact%2F|title:Contact&#8221;]I WANT TO TRY KARTOS[\/vc_button][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;931176&#8243;][vc_single_image media=&#8221;1674&#8243; media_width_percent=&#8221;100&#8243; lb_video_advanced=&#8221;yes&#8221; lb_autoplay=&#8221;yes&#8221; lb_muted=&#8221;no&#8221; uncode_shortcode_id=&#8221;140407&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; back_color=&#8221;color-lxmt&#8221; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; changer_back_color=&#8221;yes&#8221; uncode_shortcode_id=&#8221;208098&#8243; back_color_type=&#8221;uncode-palette&#8221;][vc_column column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;2&#8243; style=&#8221;light&#8221; back_image=&#8221;385&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;118844&#8243;][vc_empty_space empty_h=&#8221;3&#8243;][vc_single_image media=&#8221;112&#8243; media_width_use_pixel=&#8221;yes&#8221; alignment=&#8221;center&#8221; uncode_shortcode_id=&#8221;132559&#8243; media_width_pixel=&#8221;150&#8243;][vc_custom_heading text_size=&#8221;h3&#8243; text_weight=&#8221;700&#8243; uncode_shortcode_id=&#8221;683285&#8243;]Corporate Threat Watchbots[\/vc_custom_heading][vc_column_text text_color=&#8221;color-jevc&#8221; uncode_shortcode_id=&#8221;120422&#8243; text_color_type=&#8221;uncode-palette&#8221;]Kartos is an automated monitoring tool, independent of third-party applications, non-intrusive and continuous, that provides data and alerts on open and exposed vulnerabilities in real time by simply entering the domain of the company to be monitored.[\/vc_column_text][vc_button button_color=&#8221;color-165520&#8243; size=&#8221;btn-sm&#8221; border_width=&#8221;0&#8243; uncode_shortcode_id=&#8221;513670&#8243; button_color_type=&#8221;uncode-palette&#8221; el_class=&#8221;popmake-1453&#8243; link=&#8221;url:https%3A%2F%2Fenthec.com%2Fen%2Fcontact%2F|title:Contact&#8221;]I WANT TO TRY KARTOS[\/vc_button][vc_empty_space empty_h=&#8221;3&#8243;][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;164364&#8243;][vc_custom_heading text_size=&#8221;h3&#8243; text_weight=&#8221;700&#8243; uncode_shortcode_id=&#8221;155523&#8243;]False positives are now history[\/vc_custom_heading][vc_separator sep_color=&#8221;color-165520&#8243; icon_position=&#8221;left&#8221; uncode_shortcode_id=&#8221;808979&#8243; sep_color_type=&#8221;uncode-palette&#8221; el_width=&#8221;50px&#8221; el_height=&#8221;2px&#8221;][vc_column_text uncode_shortcode_id=&#8221;126183&#8243;]<strong>Kartos&#8217; unique AI-based contextual tags to completely eliminate false positives in search results.<\/strong>[\/vc_column_text][uncode_list icon=&#8221;fa fa-circle&#8221; icon_color=&#8221;color-165520&#8243; uncode_shortcode_id=&#8221;514399&#8243; icon_color_type=&#8221;uncode-palette&#8221;]<\/p>\n<ul>\n<li><strong>Ciber-intelligence:<\/strong><br \/>\nLocate your organisation&#8217;s open and exposed information and vulnerabilities on the Internet, the Deep web, the Dark web and Social Networking sites.<\/li>\n<li><strong>Cybersecurity:<\/strong><br \/>\nExtends the cyber security strategy beyond the corporate IT perimeter.<\/li>\n<li><strong>Scoring:<\/strong><br \/>\nCorporate cybersecurity score based on objective data taken in real time.<\/li>\n<li><strong>Compliance:<\/strong><br \/>\nCorporate compliance based on real-time objective data.<\/li>\n<\/ul>\n<p>[\/uncode_list][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;2&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; uncode_shortcode_id=&#8221;985026&#8243; limit_content=&#8221;&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_button button_color=&#8221;color-165520&#8243; size=&#8221;link&#8221; btn_link_underline=&#8221;btn-underline-in&#8221; scale_mobile=&#8221;no&#8221; button_color_type=&#8221;uncode-palette&#8221; icon=&#8221;fa fa-document&#8221; uncode_shortcode_id=&#8221;205361&#8243; link=&#8221;url:https%3A%2F%2Fenthec.com%2Fen%2Fdownloadables%2F|title:Descargables&#8221;]View Documentation[\/vc_button][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_button button_color=&#8221;color-165520&#8243; size=&#8221;link&#8221; btn_link_underline=&#8221;btn-underline-in&#8221; scale_mobile=&#8221;no&#8221; button_color_type=&#8221;uncode-palette&#8221; icon=&#8221;fa fa-download5&#8243; uncode_shortcode_id=&#8221;202892&#8243; link=&#8221;url:https%3A%2F%2Fenthec.com%2Fen%2Fdownloadables%2F|title:Descargables&#8221;]Download Resources[\/vc_button][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_button button_color=&#8221;color-165520&#8243; size=&#8221;link&#8221; btn_link_underline=&#8221;btn-underline-in&#8221; scale_mobile=&#8221;no&#8221; button_color_type=&#8221;uncode-palette&#8221; icon=&#8221;fa fa-scope&#8221; uncode_shortcode_id=&#8221;179935&#8243; link=&#8221;url:https%3A%2F%2Fenthec.com%2Fen%2Fuse-cases%2F|title:Casos%20de%20Uso&#8221;]Use Cases[\/vc_button][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; back_color=&#8221;color-lxmt&#8221; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; changer_back_color=&#8221;yes&#8221; uncode_shortcode_id=&#8221;135573&#8243; back_color_type=&#8221;uncode-palette&#8221;][vc_column column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;2&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243; uncode_shortcode_id=&#8221;384660&#8243;][vc_tabs vertical=&#8221;yes&#8221; typography=&#8221;advanced&#8221; tab_h_border=&#8221;yes&#8221; border_100=&#8221;yes&#8221; valign_middle=&#8221;yes&#8221; tab_custom_size=&#8221;yes&#8221; tab_size=&#8221;4&#8243; tab_gap=&#8221;2&#8243; custom_padding=&#8221;yes&#8221; gutter_tab=&#8221;1&#8243; active_bg_color=&#8221;color-xsdn&#8221; active_txt_color=&#8221;color-jevc&#8221; shadow=&#8221;std&#8221; titles_weight=&#8221;700&#8243; excerpt_text_size=&#8221;small&#8221; uncode_shortcode_id=&#8221;308902&#8243; active_bg_color_type=&#8221;uncode-palette&#8221; active_txt_color_type=&#8221;uncode-palette&#8221;][vc_tab icon=&#8221;fa fa-circle&#8221; gutter_size=&#8221;2&#8243; column_padding=&#8221;2&#8243; title=&#8221;More protection against phishing and ransomware&#8221; tab_id=&#8221;1724237769-1-181727776063419&#8243; excerpt=&#8221;Detection of phishing, fraud and scam campaigns on social networks&#8221;][vc_row_inner limit_content=&#8221;&#8221;][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;656112&#8243;][vc_single_image media=&#8221;112&#8243; media_width_use_pixel=&#8221;yes&#8221; uncode_shortcode_id=&#8221;181461&#8243; media_width_pixel=&#8221;100&#8243;][vc_custom_heading text_size=&#8221;h4&#8243; uncode_shortcode_id=&#8221;352716&#8243;]Detection of phishing, fraud and scam campaigns on social networks[\/vc_custom_heading][vc_column_text text_lead=&#8221;small&#8221; text_color=&#8221;color-jevc&#8221; uncode_shortcode_id=&#8221;772462&#8243; text_color_type=&#8221;uncode-palette&#8221;]<\/p>\n<ul>\n<li>DNS Health: Squatting, Social Networking, domains and subdomains.<\/li>\n<li>AI analysis of the phishing, fraud and scam campaign and all its infrastructures in different countries.<\/li>\n<li>Transfer of IPs, domains and URLs information necessary to deactivate the campaign.<\/li>\n<li>Control and monitoring of the entire campaign and all its infrastructures.<\/li>\n<li>Takedown service<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_button button_color=&#8221;color-165520&#8243; size=&#8221;btn-sm&#8221; border_width=&#8221;0&#8243; uncode_shortcode_id=&#8221;336749&#8243; button_color_type=&#8221;uncode-palette&#8221; el_class=&#8221;popmake-1453&#8243; link=&#8221;url:https%3A%2F%2Fenthec.com%2Fen%2Fcontact%2F|title:Contact&#8221;]I WANT TO TRY KARTOS[\/vc_button][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image media=&#8221;195&#8243; media_width_percent=&#8221;100&#8243; css_animation=&#8221;right-t-left&#8221; uncode_shortcode_id=&#8221;387448&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_tab][vc_tab icon=&#8221;fa fa-circle&#8221; gutter_size=&#8221;2&#8243; column_padding=&#8221;2&#8243; title=&#8221;Do you need Brand Protection?&#8221; tab_id=&#8221;1724237769-2-11727776063419&#8243; excerpt=&#8221;Detection of brand impersonation and fraudulent use of intellectual and industrial property.&#8221;][vc_row_inner limit_content=&#8221;&#8221;][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;656112&#8243;][vc_single_image media=&#8221;112&#8243; media_width_use_pixel=&#8221;yes&#8221; uncode_shortcode_id=&#8221;181461&#8243; media_width_pixel=&#8221;100&#8243;][vc_custom_heading text_size=&#8221;h4&#8243; uncode_shortcode_id=&#8221;169427&#8243;]Detection of brand impersonation and fraudulent use of intellectual and industrial property.[\/vc_custom_heading][vc_column_text text_lead=&#8221;small&#8221; text_color=&#8221;color-jevc&#8221; uncode_shortcode_id=&#8221;141765&#8243; text_color_type=&#8221;uncode-palette&#8221;]<\/p>\n<ul>\n<li>Social Media Intelligence: Telegram, Facebook, X, LinkedIn, Instagram, Youtube and Spotify.<\/li>\n<li>Tracking of social networks for accounts containing cloned or similar corporate identity elements.<\/li>\n<li>Analysis of the profiles detected.<\/li>\n<li>Issuance of real-time alerts.<\/li>\n<li>Continuous monitoring until deactivation.<\/li>\n<li>Takedown service<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_button button_color=&#8221;color-165520&#8243; size=&#8221;btn-sm&#8221; border_width=&#8221;0&#8243; uncode_shortcode_id=&#8221;138488&#8243; button_color_type=&#8221;uncode-palette&#8221; el_class=&#8221;popmake-1453&#8243; link=&#8221;url:https%3A%2F%2Fenthec.com%2Fen%2Fcontact%2F|title:Contact&#8221;]I WANT TO TRY KARTOS[\/vc_button][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image media=&#8221;1517&#8243; media_width_percent=&#8221;100&#8243; uncode_shortcode_id=&#8221;143263&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_tab][vc_tab icon=&#8221;fa fa-circle&#8221; gutter_size=&#8221;2&#8243; column_padding=&#8221;2&#8243; title=&#8221;Have your credentials been leaked?&#8221; tab_id=&#8221;1724240119397-2-91727776063419&#8243;][vc_row_inner limit_content=&#8221;&#8221;][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;656112&#8243;][vc_single_image media=&#8221;112&#8243; media_width_use_pixel=&#8221;yes&#8221; uncode_shortcode_id=&#8221;181461&#8243; media_width_pixel=&#8221;100&#8243;][vc_custom_heading text_size=&#8221;h4&#8243; uncode_shortcode_id=&#8221;187090&#8243;]Credential Leak[\/vc_custom_heading][vc_column_text text_lead=&#8221;small&#8221; text_color=&#8221;color-jevc&#8221; uncode_shortcode_id=&#8221;922028&#8243; text_color_type=&#8221;uncode-palette&#8221;]<\/p>\n<ul>\n<li>Location of leaked and exposed corporate credentials.<\/li>\n<li>Location of compromised corporate email accounts.<\/li>\n<li>Detection of the security breaches causing the leakage<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_button button_color=&#8221;color-165520&#8243; size=&#8221;btn-sm&#8221; border_width=&#8221;0&#8243; uncode_shortcode_id=&#8221;275347&#8243; button_color_type=&#8221;uncode-palette&#8221; el_class=&#8221;popmake-1453&#8243; link=&#8221;url:https%3A%2F%2Fenthec.com%2Fen%2Fcontact%2F|title:Contact&#8221;]I WANT TO TRY KARTOS[\/vc_button][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image media=&#8221;1516&#8243; media_width_percent=&#8221;100&#8243; uncode_shortcode_id=&#8221;100487&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_tab][vc_tab icon=&#8221;fa fa-circle&#8221; gutter_size=&#8221;2&#8243; column_padding=&#8221;2&#8243; title=&#8221;Do you comply with the regulations?&#8221; tab_id=&#8221;1724240158901-4-71727776063419&#8243;][vc_row_inner limit_content=&#8221;&#8221;][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;656112&#8243;][vc_single_image media=&#8221;112&#8243; media_width_use_pixel=&#8221;yes&#8221; uncode_shortcode_id=&#8221;181461&#8243; media_width_pixel=&#8221;100&#8243;][vc_custom_heading text_size=&#8221;h4&#8243; uncode_shortcode_id=&#8221;605168&#8243;]Regulatory compliance[\/vc_custom_heading][vc_column_text text_lead=&#8221;small&#8221; text_color=&#8221;color-jevc&#8221; uncode_shortcode_id=&#8221;306365&#8243; text_color_type=&#8221;uncode-palette&#8221;]<\/p>\n<ul>\n<li>Data protection<\/li>\n<li>Certifications and standards: ENS, ISO 27001, PCI&#8230;<\/li>\n<li>Assessment of compliance with all external and certain internal attack surface controls.<\/li>\n<li>Assistance in the implementation or renewal of certifications.<\/li>\n<li>Compliance testing based on objective data taken in real time for third parties and legal claims.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_button button_color=&#8221;color-165520&#8243; size=&#8221;btn-sm&#8221; border_width=&#8221;0&#8243; uncode_shortcode_id=&#8221;108009&#8243; button_color_type=&#8221;uncode-palette&#8221; el_class=&#8221;popmake-1453&#8243; link=&#8221;url:https%3A%2F%2Fenthec.com%2Fen%2Fcontact%2F|title:Contact&#8221;]I WANT TO TRY KARTOS[\/vc_button][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image media=&#8221;1515&#8243; media_width_percent=&#8221;100&#8243; uncode_shortcode_id=&#8221;413918&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_tab][vc_tab icon=&#8221;fa fa-circle&#8221; gutter_size=&#8221;2&#8243; column_padding=&#8221;2&#8243; title=&#8221;Third Party Risk&#8221; tab_id=&#8221;1724240145085-3-31727776063419&#8243;][vc_row_inner limit_content=&#8221;&#8221;][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;656112&#8243;][vc_single_image media=&#8221;112&#8243; media_width_use_pixel=&#8221;yes&#8221; uncode_shortcode_id=&#8221;181461&#8243; media_width_pixel=&#8221;100&#8243;][vc_custom_heading text_size=&#8221;h4&#8243; uncode_shortcode_id=&#8221;214594&#8243;]Third party risk and value chain control[\/vc_custom_heading][vc_column_text text_lead=&#8221;small&#8221; text_color=&#8221;color-jevc&#8221; uncode_shortcode_id=&#8221;103500&#8243; text_color_type=&#8221;uncode-palette&#8221;]<\/p>\n<ul>\n<li>Real-time value chain risk control<\/li>\n<li>Non-intrusive, no third party permission needed<\/li>\n<li>Objective data obtained in real time<\/li>\n<li>Complement to traditional valuation tests such as pentesting or due diligence for mergers or acquisitions<\/li>\n<li>Third party cybersecurity scoring<\/li>\n<li>Third party compliance<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_button button_color=&#8221;color-165520&#8243; size=&#8221;btn-sm&#8221; border_width=&#8221;0&#8243; uncode_shortcode_id=&#8221;137683&#8243; button_color_type=&#8221;uncode-palette&#8221; el_class=&#8221;popmake-1453&#8243; link=&#8221;url:https%3A%2F%2Fenthec.com%2Fen%2Fcontact%2F|title:Contact&#8221;]I WANT TO TRY KARTOS[\/vc_button][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image media=&#8221;1514&#8243; media_width_percent=&#8221;100&#8243; uncode_shortcode_id=&#8221;984104&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_tab][vc_tab icon=&#8221;fa fa-circle&#8221; gutter_size=&#8221;2&#8243; column_padding=&#8221;2&#8243; title=&#8221;External Attack Surface (EASM)&#8221; tab_id=&#8221;1724240187205-5-81727776063419&#8243;][vc_row_inner limit_content=&#8221;&#8221;][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;656112&#8243;][vc_single_image media=&#8221;112&#8243; media_width_use_pixel=&#8221;yes&#8221; uncode_shortcode_id=&#8221;181461&#8243; media_width_pixel=&#8221;100&#8243;][vc_custom_heading text_size=&#8221;h4&#8243; uncode_shortcode_id=&#8221;185973&#8243;]External Attack Surface Management (EASM)[\/vc_custom_heading][vc_column_text text_lead=&#8221;small&#8221; text_color=&#8221;color-jevc&#8221; uncode_shortcode_id=&#8221;198201&#8243; text_color_type=&#8221;uncode-palette&#8221;]<\/p>\n<ul>\n<li>Threat Hunting<\/li>\n<li>Net<\/li>\n<li>CVEs<\/li>\n<li>Localization of filtered and exposed databases<\/li>\n<li>Locating leaked and exposed corporate information<\/li>\n<li>Patch management<\/li>\n<li>IP Reputation<\/li>\n<li>Web security<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_button button_color=&#8221;color-165520&#8243; size=&#8221;btn-sm&#8221; border_width=&#8221;0&#8243; uncode_shortcode_id=&#8221;451681&#8243; button_color_type=&#8221;uncode-palette&#8221; el_class=&#8221;popmake-1453&#8243; link=&#8221;url:https%3A%2F%2Fenthec.com%2Fen%2Fcontact%2F|title:Contact&#8221;]I WANT TO TRY KARTOS[\/vc_button][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image media=&#8221;1518&#8243; media_width_percent=&#8221;100&#8243; uncode_shortcode_id=&#8221;197645&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_tab][\/vc_tabs][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; back_color=&#8221;color-lxmt&#8221; back_image=&#8221;630&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; changer_back_color=&#8221;yes&#8221; uncode_shortcode_id=&#8221;614404&#8243; back_color_type=&#8221;uncode-palette&#8221;][vc_column column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;2&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243; uncode_shortcode_id=&#8221;384660&#8243;][vc_custom_heading text_size=&#8221;h4&#8243; uncode_shortcode_id=&#8221;120956&#8243;]Features kartos\u25cf[\/vc_custom_heading][vc_separator sep_color=&#8221;color-521277&#8243; icon_position=&#8221;left&#8221; uncode_shortcode_id=&#8221;208572&#8243; sep_color_type=&#8221;uncode-palette&#8221; el_width=&#8221;50px&#8221; el_height=&#8221;2px&#8221;][vc_row_inner][vc_column_inner column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;4&#8243; width=&#8221;1\/3&#8243; uncode_shortcode_id=&#8221;161154&#8243;][vc_single_image media=&#8221;603&#8243; media_width_use_pixel=&#8221;yes&#8221; alignment=&#8221;center&#8221; uncode_shortcode_id=&#8221;445406&#8243; media_width_pixel=&#8221;40&#8243;][vc_custom_heading text_size=&#8221;h4&#8243; uncode_shortcode_id=&#8221;170326&#8243;]100% AI<br \/>\nNo HumInt[\/vc_custom_heading][vc_column_text text_lead=&#8221;small&#8221; text_color=&#8221;color-jevc&#8221; uncode_shortcode_id=&#8221;417605&#8243; text_color_type=&#8221;uncode-palette&#8221;]The use of Kartos&#8217; artificial intelligence automates the management of information, <strong>guaranteeing confidentiality and allowing the continuous detection of incidents<\/strong> and alerts in real time, without human intervention.[\/vc_column_text][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;4&#8243; width=&#8221;1\/3&#8243; uncode_shortcode_id=&#8221;152386&#8243;][vc_single_image media=&#8221;608&#8243; media_width_use_pixel=&#8221;yes&#8221; alignment=&#8221;center&#8221; uncode_shortcode_id=&#8221;153940&#8243; media_width_pixel=&#8221;40&#8243;][vc_custom_heading text_size=&#8221;h4&#8243; uncode_shortcode_id=&#8221;970156&#8243;]100% AI<br \/>\nNon Intrusive[\/vc_custom_heading][vc_column_text text_lead=&#8221;small&#8221; text_color=&#8221;color-jevc&#8221; uncode_shortcode_id=&#8221;123395&#8243; text_color_type=&#8221;uncode-palette&#8221;]The search is done <strong>outside the company perimeter<\/strong>, on the Internet, <strong>Deep and Dark web<\/strong>, forums, social networks and <strong>open sources<\/strong>. It locates information that <strong>cybercriminals<\/strong> could find, and delivers it to companies for their <strong>protection<\/strong>, without carrying out attacks.[\/vc_column_text][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243; uncode_shortcode_id=&#8221;163277&#8243;][vc_single_image media=&#8221;609&#8243; media_width_use_pixel=&#8221;yes&#8221; alignment=&#8221;center&#8221; uncode_shortcode_id=&#8221;883265&#8243; media_width_pixel=&#8221;40&#8243;][vc_custom_heading text_size=&#8221;h4&#8243; uncode_shortcode_id=&#8221;142040&#8243;]Information<br \/>\nin real time[\/vc_custom_heading][vc_column_text text_lead=&#8221;small&#8221; text_color=&#8221;color-jevc&#8221; uncode_shortcode_id=&#8221;127388&#8243; text_color_type=&#8221;uncode-palette&#8221;]<strong>Speed in detecting<\/strong> and defending against vulnerabilities is critical. The longer it remains open, the easier it is for a <strong>cybercriminal<\/strong> to exploit. <strong>Automation<\/strong> makes it possible to detect and deliver information in near <strong>real time<\/strong>.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;4&#8243; width=&#8221;1\/3&#8243; uncode_shortcode_id=&#8221;140004&#8243;][vc_single_image media=&#8221;610&#8243; media_width_use_pixel=&#8221;yes&#8221; alignment=&#8221;center&#8221; uncode_shortcode_id=&#8221;282607&#8243; media_width_pixel=&#8221;40&#8243;][vc_custom_heading text_size=&#8221;h4&#8243; uncode_shortcode_id=&#8221;935526&#8243;]Customization of<br \/>\nfeatures[\/vc_custom_heading][vc_column_text text_lead=&#8221;small&#8221; text_color=&#8221;color-jevc&#8221; uncode_shortcode_id=&#8221;159711&#8243; text_color_type=&#8221;uncode-palette&#8221;]A <strong>flexible licensing model<\/strong> allows for an intelligence platform that is almost <strong>tailor-made<\/strong> for each company, combining licenses for <strong>in-house protection<\/strong> and <strong>risk detection in third parties according<\/strong> to their access to critical information.[\/vc_column_text][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;4&#8243; width=&#8221;1\/3&#8243; uncode_shortcode_id=&#8221;584906&#8243;][vc_single_image media=&#8221;612&#8243; media_width_use_pixel=&#8221;yes&#8221; alignment=&#8221;center&#8221; uncode_shortcode_id=&#8221;450549&#8243; media_width_pixel=&#8221;40&#8243;][vc_custom_heading text_size=&#8221;h4&#8243; uncode_shortcode_id=&#8221;204409&#8243;]Simplicity in the<br \/>\ninterpretation and use[\/vc_custom_heading][vc_column_text text_lead=&#8221;small&#8221; text_color=&#8221;color-jevc&#8221; uncode_shortcode_id=&#8221;495932&#8243; text_color_type=&#8221;uncode-palette&#8221;]<strong>Artificial Intelligence<\/strong> automatically configures the platform according to the company&#8217;s domain. No <strong>sources<\/strong>, parameters or <strong>queries<\/strong> are required. Results are delivered in <strong>stages<\/strong> for experts and non-experts.[\/vc_column_text][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243; uncode_shortcode_id=&#8221;882758&#8243;][vc_single_image media=&#8221;611&#8243; media_width_use_pixel=&#8221;yes&#8221; alignment=&#8221;center&#8221; uncode_shortcode_id=&#8221;168622&#8243; media_width_pixel=&#8221;40&#8243;][vc_custom_heading text_size=&#8221;h4&#8243; uncode_shortcode_id=&#8221;398840&#8243;]Unlimited users for<br \/>\neach license[\/vc_custom_heading][vc_column_text text_lead=&#8221;small&#8221; text_color=&#8221;color-jevc&#8221; uncode_shortcode_id=&#8221;150629&#8243; text_color_type=&#8221;uncode-palette&#8221;]Each company has <strong>multiple profiles<\/strong> that need access to information according to their role. This belongs to the company, so the number of <strong>users<\/strong> and <strong>profiles<\/strong> is not limited, offering <strong>maximum flexibility<\/strong> in permissions and alerts.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space empty_h=&#8221;2&#8243;][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;85&#8243; back_color=&#8221;color-jevc&#8221; back_image=&#8221;17&#8243; overlay_color=&#8221;color-jevc&#8221; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;1&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; enable_top_divider=&#8221;default&#8221; top_divider=&#8221;gradient&#8221; shape_top_h_use_pixel=&#8221;&#8221; shape_top_height=&#8221;150&#8243; shape_top_color=&#8221;color-jevc&#8221; shape_top_opacity=&#8221;100&#8243; shape_top_index=&#8221;0&#8243; enable_bottom_divider=&#8221;default&#8221; bottom_divider=&#8221;gradient&#8221; shape_bottom_h_use_pixel=&#8221;&#8221; shape_bottom_height=&#8221;250&#8243; shape_bottom_color=&#8221;color-jevc&#8221; shape_bottom_opacity=&#8221;100&#8243; shape_bottom_index=&#8221;0&#8243; changer_back_color=&#8221;yes&#8221; uncode_shortcode_id=&#8221;373746&#8243; back_color_type=&#8221;uncode-palette&#8221; shape_bottom_color_type=&#8221;uncode-palette&#8221; overlay_color_type=&#8221;uncode-palette&#8221; shape_top_color_type=&#8221;uncode-palette&#8221;][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;2&#8243; style=&#8221;dark&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;2\/3&#8243; uncode_shortcode_id=&#8221;152365&#8243;][vc_single_image media=&#8221;200&#8243; media_width_use_pixel=&#8221;yes&#8221; uncode_shortcode_id=&#8221;902626&#8243; media_width_pixel=&#8221;200&#8243;][vc_custom_heading text_size=&#8221;custom&#8221; text_weight=&#8221;700&#8243; uncode_shortcode_id=&#8221;624728&#8243; heading_custom_size=&#8221;5em&#8221;]Corporate Threat Watchbots[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;h1&#8243; text_weight=&#8221;300&#8243; uncode_shortcode_id=&#8221;139021&#8243;]Analysis of 11 Vectors[\/vc_custom_heading][uncode_list larger=&#8221;small&#8221; icon=&#8221;fa fa-circle&#8221; icon_color=&#8221;color-165520&#8243; uncode_shortcode_id=&#8221;209232&#8243; icon_color_type=&#8221;uncode-palette&#8221;]<\/p>\n<ul>\n<li>Algorithms<\/li>\n<li>Certificates<\/li>\n<li>Services \/ IoT \/ VoIP<\/li>\n<li>DNS Health\/Phishing<\/li>\n<li>Patch Management<\/li>\n<li>IP Reputation<\/li>\n<li>Web Security<\/li>\n<li>Email Security<\/li>\n<li>Document Leaks<\/li>\n<li>Credential Leaks<\/li>\n<li>Social Networks<\/li>\n<\/ul>\n<p>[\/uncode_list][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;2&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;2&#8243; style=&#8221;light&#8221; overlay_color=&#8221;color-jevc&#8221; overlay_alpha=&#8221;95&#8243; border_color=&#8221;color-xsdn&#8221; border_style=&#8221;solid&#8221; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243; uncode_shortcode_id=&#8221;173895&#8243; overlay_color_type=&#8221;uncode-palette&#8221; css=&#8221;.vc_custom_1724397098188{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;}&#8221; border_color_type=&#8221;uncode-palette&#8221;][vc_single_image media=&#8221;18&#8243; media_width_use_pixel=&#8221;yes&#8221; uncode_shortcode_id=&#8221;160012&#8243; media_width_pixel=&#8221;80&#8243;][vc_custom_heading text_size=&#8221;h4&#8243; uncode_shortcode_id=&#8221;384733&#8243;]Testing your company<br \/>\ndoesn&#8217;t cost anything[\/vc_custom_heading]\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f2081-o1\" lang=\"es-ES\" dir=\"ltr\" data-wpcf7-id=\"2081\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/2039#wpcf7-f2081-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Formulario de contacto\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"2081\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"es_ES\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f2081-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<p class=\"wpcf7-inline-wide\"><span class=\"wpcf7-form-control-wrap\" data-name=\"email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" id=\"email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email\" value=\"\" type=\"email\" name=\"email\" \/><\/span>\n<\/p>\n<p class=\"wpcf7-inline-wide\"><span class=\"wpcf7-form-control-wrap\" data-name=\"first-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" id=\"first-name\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Name and Surname\" value=\"\" type=\"text\" name=\"first-name\" \/><\/span>\n<\/p>\n<p class=\"wpcf7-inline-wide\"><span class=\"wpcf7-form-control-wrap\" data-name=\"telf\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-text wpcf7-validates-as-tel\" aria-invalid=\"false\" placeholder=\"Phone\" value=\"\" type=\"tel\" name=\"telf\" \/><\/span>\n<\/p>\n<p class=\"wpcf7-inline-wide\"><span class=\"wpcf7-form-control-wrap\" data-name=\"cargo\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text\" aria-invalid=\"false\" placeholder=\"Position\" value=\"\" type=\"text\" name=\"cargo\" \/><\/span>\n<\/p>\n<p class=\"wpcf7-inline-wide\"><span class=\"wpcf7-form-control-wrap\" data-name=\"subject\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text\" id=\"subject\" aria-invalid=\"false\" placeholder=\"Company\" value=\"\" type=\"text\" name=\"subject\" \/><\/span>\n<\/p>\n<p><span id=\"web\" class=\"wpcf7-form-control-wrap honeypot-324-wrap\" style=\"display:none !important; visibility:hidden !important;\"><label for=\"web\" class=\"hp-message\">Por favor, deja este campo vac\u00edo.<\/label><input id=\"web\"  class=\"wpcf7-form-control wpcf7-text\" type=\"text\" name=\"honeypot-324\" value=\"\" size=\"40\" tabindex=\"-1\" autocomplete=\"new-password\" \/><\/span>\n<\/p>\n<p class=\"wpcf7-inline-wide\"><span class=\"wpcf7-form-control-wrap\" data-name=\"country\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" id=\"country\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Country\" value=\"\" type=\"text\" name=\"country\" \/><\/span>\n<\/p>\n<p class=\"wpcf7-inline-wide\"><span class=\"wpcf7-form-control-wrap\" data-name=\"asunto\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text\" id=\"asunto\" aria-invalid=\"false\" placeholder=\"Subject\" value=\"\" type=\"text\" name=\"asunto\" \/><\/span>\n<\/p>\n<p class=\"\"><span style=\"font-size: 9px !important;\">*We will not process forms with no subject or with subjects not related to our offer.<\/span>\n<\/p>\n<p class=\"\"><span class=\"wpcf7-form-control-wrap\" data-name=\"acceptance-595\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"acceptance-595\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><span style=\"font-size: 10px !important;\">I have read and understand the <a href=\"https:\/\/enthec.com\/en\/legal-notice\/\" target=\"_blank\" style=\"text-decoration: underline; color: inherit;\">Legal Notice<\/a> and <a href=\"https:\/\/enthec.com\/en\/privacy-policy\/\" target=\"_blank\" style=\"text-decoration: underline; color: inherit;\">Privacy Policy<\/a><\/span><\/span><\/label><\/span><\/span><\/span>\n<\/p>\n<p class=\"\"><span class=\"wpcf7-form-control-wrap\" data-name=\"acceptance-596\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"acceptance-596\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><span style=\"font-size: 10px !important;\">I wish to receive commercial information from Enthec Solutions S.L. that may be of interest to me.<\/span><\/span><\/label><\/span><\/span><\/span>\n<\/p>\n\n<p class=\"\"style=\"line-height: 14px;\"><span style=\"font-size: 8px !important; font-weight: 400; !important;\">The data included in this form will be included in a file owned by Enthec Solutions S.L. for the main purpose of managing your interest in the company's products and, where appropriate, for sending commercial communications from Enthec Solutions S.L.<\/span>\n<\/p>\n<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner btn color-xsdn btn-block btn-lg btn-circle btn-inherit font-weight-500\" type=\"submit\" value=\"Send\" \/>\n<\/p><input type='hidden' class='wpcf7-pum' value='{\"closepopup\":false,\"closedelay\":0,\"openpopup\":false,\"openpopup_id\":0}' \/><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n[\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;0&#8243; bottom_padding=&#8221;2&#8243; back_color=&#8221;color-jevc&#8221; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; changer_back_color=&#8221;yes&#8221; uncode_shortcode_id=&#8221;155490&#8243; back_color_type=&#8221;uncode-palette&#8221;][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; style=&#8221;dark&#8221; back_color=&#8221;color-165520&#8243; overlay_alpha=&#8221;50&#8243; radius=&#8221;xl&#8221; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243; uncode_shortcode_id=&#8221;116470&#8243; back_color_type=&#8221;uncode-palette&#8221;][uncode_counter value=&#8221;1,509.033&#8243; counter_color=&#8221;&#8221; text=&#8221;LEAKS FOUND IN 30 DAYS&#8221; uncode_shortcode_id=&#8221;474588&#8243;][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; back_color=&#8221;color-xsdn&#8221; overlay_alpha=&#8221;50&#8243; radius=&#8221;xl&#8221; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243; uncode_shortcode_id=&#8221;916654&#8243; back_color_type=&#8221;uncode-palette&#8221;][uncode_counter value=&#8221;100&#8243; counter_color=&#8221;&#8221; text=&#8221;OF LINKS REVIEWED DAILY&#8221; uncode_shortcode_id=&#8221;518298&#8243; suffix=&#8221;M&#8221;][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; style=&#8221;dark&#8221; back_color=&#8221;color-nhtu&#8221; overlay_alpha=&#8221;50&#8243; radius=&#8221;xl&#8221; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243; uncode_shortcode_id=&#8221;791826&#8243; back_color_type=&#8221;uncode-palette&#8221;][uncode_counter value=&#8221;2.500&#8243; counter_color=&#8221;&#8221; text=&#8221;DEEP WEB&#8221; uncode_shortcode_id=&#8221;180314&#8243;][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; back_color=&#8221;color-jevc&#8221; back_image=&#8221;105&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; enable_bottom_divider=&#8221;default&#8221; bottom_divider=&#8221;step&#8221; shape_bottom_h_use_pixel=&#8221;&#8221; shape_bottom_height=&#8221;500&#8243; shape_bottom_color=&#8221;color-xsdn&#8221; shape_bottom_opacity=&#8221;100&#8243; shape_bottom_index=&#8221;0&#8243; changer_back_color=&#8221;yes&#8221; uncode_shortcode_id=&#8221;155255&#8243; back_color_type=&#8221;uncode-palette&#8221; shape_bottom_color_type=&#8221;uncode-palette&#8221;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;2&#8243; style=&#8221;light&#8221; back_color=&#8221;color-xsdn&#8221; overlay_alpha=&#8221;50&#8243; shadow=&#8221;std&#8221; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;10&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243; uncode_shortcode_id=&#8221;100752&#8243; back_color_type=&#8221;uncode-palette&#8221;][vc_custom_heading text_size=&#8221;h4&#8243; uncode_shortcode_id=&#8221;110436&#8243;]Discover the threat before anyone else does[\/vc_custom_heading][vc_separator sep_color=&#8221;color-521277&#8243; icon_position=&#8221;left&#8221; uncode_shortcode_id=&#8221;208572&#8243; sep_color_type=&#8221;uncode-palette&#8221; el_width=&#8221;50px&#8221; el_height=&#8221;2px&#8221;][vc_row_inner][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;165457&#8243;][vc_single_image media=&#8221;112&#8243; media_width_use_pixel=&#8221;yes&#8221; uncode_shortcode_id=&#8221;161392&#8243; media_width_pixel=&#8221;200&#8243;][vc_custom_heading text_size=&#8221;custom&#8221; text_weight=&#8221;700&#8243; uncode_shortcode_id=&#8221;535352&#8243; heading_custom_size=&#8221;2.5em&#8221;]Heads of Cybersecurity and CISO[\/vc_custom_heading][vc_single_image media=&#8221;584&#8243; media_width_use_pixel=&#8221;yes&#8221; uncode_shortcode_id=&#8221;112252&#8243; media_width_pixel=&#8221;18&#8243;][vc_custom_heading heading_semantic=&#8221;h1&#8243; text_size=&#8221;h5&#8243; text_weight=&#8221;300&#8243; uncode_shortcode_id=&#8221;885363&#8243;]Kartos resolves the management of the organisation&#8217;s exposure to its own and third-party threats in a single automated, autonomous and continuously operating platform. Kartos allows the CISO to implement a proactive cybersecurity strategy that identifies threats before they materialise into attacks and simplifies their management, strengthening corporate protection, facilitating data-driven decision-making and the involvement of the rest of the board in the strategy and ensuring legal compliance.[\/vc_custom_heading][vc_button button_color=&#8221;color-165520&#8243; size=&#8221;btn-sm&#8221; border_width=&#8221;0&#8243; uncode_shortcode_id=&#8221;166164&#8243; button_color_type=&#8221;uncode-palette&#8221; link=&#8221;url:https%3A%2F%2Fenthec.com%2Fen%2Fcontact%2F|title:Contact&#8221;]I WANT TO TRY KARTOS[\/vc_button][vc_button button_color=&#8221;color-165520&#8243; size=&#8221;link&#8221; btn_link_underline=&#8221;btn-underline-in&#8221; scale_mobile=&#8221;no&#8221; button_color_type=&#8221;uncode-palette&#8221; icon=&#8221;fa fa-scope&#8221; uncode_shortcode_id=&#8221;153626&#8243; link=&#8221;url:https%3A%2F%2Fenthec.com%2Fen%2Fuse-cases%2F|title:Use%20cases&#8221;]Case Studies[\/vc_button][vc_button button_color=&#8221;color-165520&#8243; size=&#8221;link&#8221; btn_link_underline=&#8221;btn-underline-in&#8221; scale_mobile=&#8221;no&#8221; button_color_type=&#8221;uncode-palette&#8221; icon=&#8221;fa fa-document&#8221; uncode_shortcode_id=&#8221;491621&#8243; link=&#8221;url:https%3A%2F%2Fenthec.com%2Fen%2Fdownloadables%2F|title:Downloadables&#8221;]Download Kartos documentation[\/vc_button][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;470109&#8243;][vc_single_image media=&#8221;669&#8243; media_width_percent=&#8221;100&#8243; uncode_shortcode_id=&#8221;136976&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;0&#8243; bottom_padding=&#8221;0&#8243; back_color=&#8221;color-xsdn&#8221; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; bottom_divider=&#8221;step&#8221; uncode_shortcode_id=&#8221;134973&#8243; back_color_type=&#8221;uncode-palette&#8221;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;2&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;10&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;810267&#8243;][vc_custom_heading text_size=&#8221;h4&#8243; uncode_shortcode_id=&#8221;111740&#8243;]Third Party Risk Assessment[\/vc_custom_heading][vc_separator sep_color=&#8221;color-521277&#8243; icon_position=&#8221;left&#8221; uncode_shortcode_id=&#8221;208572&#8243; sep_color_type=&#8221;uncode-palette&#8221; el_width=&#8221;50px&#8221; el_height=&#8221;2px&#8221;][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; expand_height=&#8221;yes&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;732931&#8243;][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; back_color=&#8221;color-xsdn&#8221; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; bottom_divider=&#8221;step&#8221; uncode_shortcode_id=&#8221;103161&#8243; back_color_type=&#8221;uncode-palette&#8221;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;2&#8243; style=&#8221;light&#8221; back_color=&#8221;color-xsdn&#8221; overlay_alpha=&#8221;50&#8243; shadow=&#8221;std&#8221; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;10&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;265059&#8243; back_color_type=&#8221;uncode-palette&#8221;][vc_single_image media=&#8221;636&#8243; media_width_percent=&#8221;100&#8243; uncode_shortcode_id=&#8221;111798&#8243;][vc_custom_heading uncode_shortcode_id=&#8221;159624&#8243;]<span style=\"color: #f2273b;\">Third Party<\/span> Risks[\/vc_custom_heading][vc_separator sep_color=&#8221;color-165520&#8243; icon_position=&#8221;left&#8221; uncode_shortcode_id=&#8221;808979&#8243; sep_color_type=&#8221;uncode-palette&#8221; el_width=&#8221;50px&#8221; el_height=&#8221;2px&#8221;][vc_column_text text_lead=&#8221;small&#8221; text_color=&#8221;color-jevc&#8221; uncode_shortcode_id=&#8221;171136&#8243; text_color_type=&#8221;uncode-palette&#8221;]Companies have always needed third parties to develop their business. But the transformation processes in which most of them are immersed mean that the dependence and level of integration of these third parties is increasing and that they have practically become part of their structure, thus extending their attack surface. Kartos provides the necessary information to extend the requirement in terms of risk level to these third parties, and makes it possible to <strong>assess their cybersecurity at any time<\/strong>, without the need for authorisation and under objective parameters.[\/vc_column_text][vc_button button_color=&#8221;color-165520&#8243; size=&#8221;btn-sm&#8221; border_width=&#8221;0&#8243; uncode_shortcode_id=&#8221;160293&#8243; button_color_type=&#8221;uncode-palette&#8221; el_class=&#8221;popmake-1453&#8243;]ASSESS MY THIRD PARTY RISK[\/vc_button][vc_button button_color=&#8221;color-165520&#8243; size=&#8221;link&#8221; btn_link_underline=&#8221;btn-underline-in&#8221; scale_mobile=&#8221;no&#8221; button_color_type=&#8221;uncode-palette&#8221; icon=&#8221;fa fa-angle-right&#8221; uncode_shortcode_id=&#8221;167881&#8243; link=&#8221;url:https%3A%2F%2Fenthec.com%2Fen%2Fkartos%2Fkartos-terceras-partes%2F|title:kartos%E2%97%8F%20%7C%20Terceras%20Partes&#8221;]Information from kartos\u25cf | Third Parties[\/vc_button][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;2&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;2&#8243; expand_height=&#8221;yes&#8221; back_color=&#8221;color-xsdn&#8221; overlay_alpha=&#8221;50&#8243; shadow=&#8221;std&#8221; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; uncode_shortcode_id=&#8221;111944&#8243; back_color_type=&#8221;uncode-palette&#8221;][vc_single_image media=&#8221;647&#8243; media_width_percent=&#8221;100&#8243; uncode_shortcode_id=&#8221;213099&#8243;][vc_custom_heading uncode_shortcode_id=&#8221;798035&#8243;]<span style=\"color: #f2273b;\">Supplier<\/span> Evaluation[\/vc_custom_heading][vc_separator sep_color=&#8221;color-165520&#8243; icon_position=&#8221;left&#8221; uncode_shortcode_id=&#8221;808979&#8243; sep_color_type=&#8221;uncode-palette&#8221; el_width=&#8221;50px&#8221; el_height=&#8221;2px&#8221;][vc_column_text text_lead=&#8221;small&#8221; text_color=&#8221;color-jevc&#8221; uncode_shortcode_id=&#8221;746598&#8243; text_color_type=&#8221;uncode-palette&#8221;]Assessing the level of supplier cybersecurity risk is close in importance to the well-known credit risk assessment. This is due to the enormous impact it can have on the corporate risk of companies and the economic and operational cost that an attack can have. <strong>Kartos provides<\/strong> the internal departments of companies whose core business is the evaluation of third party risks with the <strong>necessary information to determine the level of cybersecurity risk<\/strong> in supplier evaluation, approval and assessment processes.[\/vc_column_text][vc_button button_color=&#8221;color-165520&#8243; size=&#8221;btn-sm&#8221; border_width=&#8221;0&#8243; uncode_shortcode_id=&#8221;704370&#8243; button_color_type=&#8221;uncode-palette&#8221; el_class=&#8221;popmake-1453&#8243;]I WANT AN EVALUATION OF MY SUPPLIERS[\/vc_button][vc_button button_color=&#8221;color-165520&#8243; size=&#8221;link&#8221; btn_link_underline=&#8221;btn-underline-in&#8221; scale_mobile=&#8221;no&#8221; button_color_type=&#8221;uncode-palette&#8221; icon=&#8221;fa fa-angle-right&#8221; uncode_shortcode_id=&#8221;608422&#8243; link=&#8221;url:https%3A%2F%2Fenthec.com%2Fen%2Fkartos%2Fkartos-terceras-partes%2F|title:kartos%E2%97%8F%20%7C%20Terceras%20Partes&#8221;]Information from kartos\u25cf | Third Parties[\/vc_button][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row row_height_percent=&#8221;75&#8243; back_color=&#8221;color-xsdn&#8221; back_image=&#8221;573&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;0&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; bottom_divider=&#8221;gradient&#8221; changer_back_color=&#8221;yes&#8221; uncode_shortcode_id=&#8221;115693&#8243; back_color_type=&#8221;uncode-palette&#8221;][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2039","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u25b7 Kartos | Cybersurveillance Platform for Companies<\/title>\n<meta name=\"description\" content=\"Locate your organization&#039;s vulnerabilities with Kartos: the automated and independent monitoring tool\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/en\/kartos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u25b7 Kartos | Cybersurveillance Platform for Companies\" \/>\n<meta property=\"og:description\" content=\"Locate your organization&#039;s vulnerabilities with Kartos: the automated and independent monitoring tool\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/en\/kartos\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-07T13:29:43+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/en\/kartos\/\",\"url\":\"https:\/\/enthec.com\/en\/kartos\/\",\"name\":\"\u25b7 Kartos | Cybersurveillance Platform for Companies\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"datePublished\":\"2024-08-29T06:03:49+00:00\",\"dateModified\":\"2025-10-07T13:29:43+00:00\",\"description\":\"Locate your organization's vulnerabilities with Kartos: the automated and independent monitoring tool\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/en\/kartos\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/en\/kartos\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/en\/kartos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"kartos\u25cf\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC\",\"description\":\"Advanced AI-driven Cyber-Surveillance Platform\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u25b7 Kartos | Cybersurveillance Platform for Companies","description":"Locate your organization's vulnerabilities with Kartos: the automated and independent monitoring tool","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/en\/kartos\/","og_locale":"en_US","og_type":"article","og_title":"\u25b7 Kartos | Cybersurveillance Platform for Companies","og_description":"Locate your organization's vulnerabilities with Kartos: the automated and independent monitoring tool","og_url":"https:\/\/enthec.com\/en\/kartos\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","article_modified_time":"2025-10-07T13:29:43+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/enthec.com\/en\/kartos\/","url":"https:\/\/enthec.com\/en\/kartos\/","name":"\u25b7 Kartos | Cybersurveillance Platform for Companies","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"datePublished":"2024-08-29T06:03:49+00:00","dateModified":"2025-10-07T13:29:43+00:00","description":"Locate your organization's vulnerabilities with Kartos: the automated and independent monitoring tool","breadcrumb":{"@id":"https:\/\/enthec.com\/en\/kartos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/en\/kartos\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/en\/kartos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/en\/"},{"@type":"ListItem","position":2,"name":"kartos\u25cf"}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC","description":"Advanced AI-driven Cyber-Surveillance Platform","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/pages\/2039","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/comments?post=2039"}],"version-history":[{"count":0,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/pages\/2039\/revisions"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media?parent=2039"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}