{"id":34948,"date":"2022-10-27T11:32:50","date_gmt":"2022-10-27T09:32:50","guid":{"rendered":"https:\/\/www.tranquil.it\/interfaz-tranquil-it-y-cyberwatch-para-detectar-y-corregir-vulnerabilidades-en-entornos-linux-windows-y-macos\/"},"modified":"2025-07-21T16:46:41","modified_gmt":"2025-07-21T14:46:41","slug":"interfaz-tranquil-it-y-cyberwatch-para-detectar-y-corregir-vulnerabilidades-en-entornos-linux-windows-y-macos","status":"publish","type":"post","link":"https:\/\/www.tranquil.it\/es\/interfaz-tranquil-it-y-cyberwatch-para-detectar-y-corregir-vulnerabilidades-en-entornos-linux-windows-y-macos\/","title":{"rendered":"Interfaz Tranquil IT y Cyberwatch para detectar y corregir vulnerabilidades en entornos Linux, Windows y MacOS."},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.27.4&#8243; background_color=\u00bb#009EBD\u00bb background_enable_image=\u00bboff\u00bb custom_margin=\u00bb0px||0px||true\u00bb custom_padding=\u00bb0px||0px||true\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;][et_pb_row _builder_version=\u00bb4.16&#8243; custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb40px||40px||true|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; custom_padding=\u00bb|||\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_post_title comments=\u00bboff\u00bb featured_image=\u00bboff\u00bb text_color=\u00bblight\u00bb _builder_version=\u00bb4.16&#8243; text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_post_title][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb60px||0px||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span>Preocupado por ofrecer un software cada vez m\u00e1s eficiente, Tranquil IT ha decidido asociar sus competencias con las de Cyberwatch. Ahora es posible integrar la soluci\u00f3n de Cyberwatch en la consola de WAPT.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb50px||0px||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h2><span class=\"headline_center\">Tranquil IT se enorgullece en anunciar una asociaci\u00f3n tecnol\u00f3gica con Cyberwatch<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: justify;\">Este partenariado surge directamente de las solicitudes de clientes comunes de <a href=\"https:\/\/cyberwatch.fr\/\"><u>Cyberwatch<\/u><\/a> y Tranquil IT, quienes destacaron la complementariedad y el inter\u00e9s de una colaboraci\u00f3n tecnol\u00f3gica entre ambas empresas.<\/p>\n<p style=\"text-align: justify;\">Este inter\u00e9s es natural, ya que Cyberwatch es una <strong>soluci\u00f3n para la gesti\u00f3n de vulnerabilidades inform\u00e1ticas<\/strong>, mientras que WAPT permite <strong>automatizar el despliegue de software y actualizaciones<\/strong> en un entorno inform\u00e1tico. Las vulnerabilidades suelen corregirse mediante la implementaci\u00f3n de parches. Cyberwatch puede detectar vulnerabilidades mientras que WAPT puede ayudar a desplegar los parches correspondientes.<\/p>\n<p style=\"text-align: justify;\">Este partenariado permite que los equipos t\u00e9cnicos de ambos editores colaboren para:<\/p>\n<ul style=\"text-align: justify;\">\n<li><strong>Mostrar en la consola WAPT la informaci\u00f3n de vulnerabilidades<\/strong> recuperada del servidor Cyberwatch, permitiendo al administrador del sistema <strong>priorizar sus operaciones de actualizaci\u00f3n<\/strong>.<\/li>\n<li><strong>Mostrar en la interfaz web de la consola Cyberwatch la posibilidad de desplegar una actualizaci\u00f3n<\/strong> en el equipo vulnerable, siempre que la actualizaci\u00f3n est\u00e9 disponible en WAPT Store.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">El beneficio para el cliente de esta integraci\u00f3n es ver en cada interfaz informaci\u00f3n directamente proveniente del otro producto, adem\u00e1s de <strong>disparar acciones autom\u00e1ticas l\u00f3gicas en cada producto<\/strong>. Esta automatizaci\u00f3n <strong>facilita las tareas de administraci\u00f3n del sistema y el mantenimiento de la seguridad<\/strong> para todos los equipos involucrados.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row module_id=\u00bbacl\u00bb _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb50px||0px||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h2><span class=\"headline_center\">Integraciones entre las soluciones<\/span><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=\u00bbintegration-luti\u00bb _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb min_height=\u00bb32px\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb0px||0px||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h3>Integraci\u00f3n de Cyberwatch en la consola WAPT:<\/h3>\n<p>El funcionamiento de la integraci\u00f3n de Cyberwatch en la consola WAPT se basa en el paquete de tipo auditor\u00eda \u00abtis-cyberwatch-plugin-import-from-cyberwatch\u00bb, que debe <strong>implementarse en una estaci\u00f3n de administraci\u00f3n<\/strong> de la soluci\u00f3n WAPT.<\/p>\n<p>El administrador de WAPT deber\u00e1 <strong>configurar el paquete con la URL del servidor de Cyberwatch<\/strong> y una cuenta v\u00e1lida. El paquete de auditor\u00eda interrogar\u00e1 regularmente el servidor WAPT para <strong>recuperar el inventario del parque inform\u00e1tico<\/strong> y enviar los datos relevantes al servidor Cyberwatch a trav\u00e9s de API. Luego, el servidor Cyberwatch analiza estos datos para detectar vulnerabilidades y los devuelve a la consola WAPT mediante API.<\/p>\n<p>Luego, la visualizaci\u00f3n se realiza en la consola WAPT o en la interfaz de Cyberwatch.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row module_id=\u00bbgraph-dependances\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb50px||0px||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb3px||3px||true|false\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h3>Integraci\u00f3n de WAPT en la consola Cyberwatch:<\/h3>\n<p>La integraci\u00f3n de WAPT en la interfaz de Cyberwatch se basa en la <strong>instalaci\u00f3n de un proxy ligero<\/strong>, el cual <strong>interceptar\u00e1 las solicitudes tipo \u00abhook HTTP\u00bb<\/strong> generadas por Cyberwatch. Este proxy transformar\u00e1 estas solicitudes con los par\u00e1metros adecuados hacia una solicitud v\u00e1lida para WAPT con el fin de desplegar paquetes de sistemas.<\/p>\n<p>El proxy ligero deber\u00e1 ser configurado previamente con un token de usuario y un token de aplicaci\u00f3n.<\/p>\n<p>De esta manera, la interfaz de la soluci\u00f3n Cyberwatch puede ser utilizada para iniciar un despliegue de paquetes en WAPT.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb50px||0px||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h3>Descubra c\u00f3mo nuestro socio Cyberwatch lo acompa\u00f1a en la gesti\u00f3n de vulnerabilidades:<\/h3>\n<p>Nuestro socio Cyberwatch es un <strong>editor franc\u00e9s<\/strong> de software de seguridad inform\u00e1tica, especializado en la <strong>gesti\u00f3n de vulnerabilidades y el control de conformidad<\/strong>.<\/p>\n<p>Su misi\u00f3n tambi\u00e9n incluye apoyar a <strong>empresas y administraciones<\/strong>, a los <strong>Operadores de Importancia Vital<\/strong> (OIV) y a los <strong>Operadores de Servicios Esenciales<\/strong> (OSE). Esto ayuda a reducir su riesgo inform\u00e1tico mediante an\u00e1lisis continuos e informes pertinentes adaptados a su entorno empresarial.<\/p>\n<p>As\u00ed, con m\u00e1s de 1500 nuevas vulnerabilidades reportadas por las autoridades cada mes, la gesti\u00f3n de vulnerabilidades es una de las acciones clave para asegurar un sistema de informaci\u00f3n, al igual que la instalaci\u00f3n de un antivirus o un firewall.<\/p>\n<p>Una buena gesti\u00f3n de vulnerabilidades refuerza su resistencia ante los ataques llevados a cabo por piratas inform\u00e1ticos y mejora el nivel de seguridad de su sistema de informaci\u00f3n.<\/p>\n<p><a href=\"https:\/\/cyberwatch.fr\/plateforme-vulnerabilites-conformite\/gestion-des-vulnerabilites\/\"><u>Cyberwatch<\/u><u>\u00a0<\/u><u>Vulnerability<\/u><u> Manager<\/u><\/a>\u00a0es la soluci\u00f3n de gesti\u00f3n de vulnerabilidades de nuestro socio, que le ayuda a identificar las vulnerabilidades de su sistema de informaci\u00f3n, a detectar y priorizar las vulnerabilidades m\u00e1s simples para los piratas inform\u00e1ticos y las m\u00e1s graves para sus activos.<\/p>\n<p>Este software le proporciona las acciones necesarias para abordar sus vulnerabilidades y cuenta con un m\u00f3dulo integrado de gesti\u00f3n de parches que le permite planificar y desplegar, si lo desea, parches de seguridad.<\/p>\n<p>Adem\u00e1s, los productos de Cyberwatch se despliegan en su red (On-Premise), con o sin agente, y funcionan en un entorno aislado.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb50px||0px||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb0px||0px||false|false\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><strong>\u00bfQuiere saber m\u00e1s?<\/strong><br \/>\u00bfTiene preguntas sobre Cyberwatch o desea una demostraci\u00f3n? <a href=\"https:\/\/cyberwatch.fr\/demonstration\/\"><u>Cont\u00e1ctelos<\/u><\/a> ahora mismo, sus expertos responder\u00e1n en menos de 24 horas.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.16&#8243; custom_margin=\u00bb0px||0px||false|false\u00bb custom_padding=\u00bb20px||20px||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb3_5,2_5&#8243; _builder_version=\u00bb4.16&#8243; custom_margin=\u00bb0px||0px||false|false\u00bb custom_padding=\u00bb30px||30px||false|false\u00bb animation_style=\u00bbslide\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb3_5&#8243; _builder_version=\u00bb4.16&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.16&#8243; text_orientation=\u00bbcenter\u00bb custom_margin=\u00bb0px||0px||false|false\u00bb custom_padding=\u00bb0px||20px||false|false\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h2>Avanzando con WAPT Enterprise<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.21.0&#8243; text_orientation=\u00bbcenter\u00bb custom_margin=\u00bb0px||0px||false|false\u00bb custom_padding=\u00bb0px||0px|54px|false|false\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: center;\">WAPT Enterprise es la herramienta ideal para desplegar r\u00e1pidamente software, realizar un inventario completo de su parque inform\u00e1tico o controlar las actualizaciones de Windows. Tambi\u00e9n cuenta con numerosas funcionalidades dise\u00f1adas para simplificar la administraci\u00f3n de los parques inform\u00e1ticos m\u00e1s grandes. \u00bfTodav\u00eda tiene dudas? \u00a1Puede disfrutar de un mes gratuito para probar WAPT Enterprise!<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb2_5&#8243; _builder_version=\u00bb4.16&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.tranquil.it\/wp-content\/uploads\/LOGO-ENTERPRISE-1.png\u00bb alt=\u00bblogo wapt enterprise 388&#215;134&#8243; title_text=\u00bbLOGO-ENTERPRISE\u00bb align=\u00bbcenter\u00bb _builder_version=\u00bb4.27.4&#8243; hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;][\/et_pb_image][et_pb_button button_url=\u00bbhttps:\/\/www.tranquil.it\/es\/wapt-enterprise\/\u00bb button_text=\u00bbDescubra WAPT Enterprise\u00bb button_alignment=\u00bbcenter\u00bb _builder_version=\u00bb4.27.4&#8243; custom_button=\u00bbon\u00bb button_text_color=\u00bb#ffffff\u00bb button_bg_color=\u00bb#009EBD\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb15px\u00bb button_icon=\u00bb&#x35;||divi||400&#8243; hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb button_bg_enable_color=\u00bbon\u00bb sticky_enabled=\u00bb0&#8243;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.16&#8243; custom_padding=\u00bb40px||0px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; custom_padding=\u00bb|||\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_divider _builder_version=\u00bb4.16&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][et_pb_blog fullwidth=\u00bboff\u00bb posts_number=\u00bb3&#8243; include_categories=\u00bball\u00bb excerpt_length=\u00bb90&#8243; show_author=\u00bboff\u00bb show_date=\u00bboff\u00bb show_pagination=\u00bboff\u00bb _builder_version=\u00bb4.21.0&#8243; header_font=\u00bb||||||||\u00bb body_font=\u00bb||||||||\u00bb meta_font=\u00bb||||||||\u00bb pagination_font=\u00bb||||||||\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tranquil IT y Cyberwatch: C\u00f3mo detectar y corregir vulnerabilidades en Linux, Windows y MacOS.<\/p>\n","protected":false},"author":1,"featured_media":37980,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[222,43],"tags":[],"class_list":["post-34948","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualites-es","category-actualites"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tranquil IT y Cyberwatch<\/title>\n<meta name=\"description\" content=\"Tranquil IT y Cyberwatch: C\u00f3mo detectar y corregir vulnerabilidades en Linux, Windows y MacOS.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tranquil.it\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tranquil IT y Cyberwatch\" \/>\n<meta property=\"og:description\" content=\"Tranquil IT y Cyberwatch: C\u00f3mo detectar y corregir vulnerabilidades en Linux, Windows y MacOS.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tranquil.it\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\/\" \/>\n<meta property=\"og:site_name\" content=\"Tranquil IT\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-27T09:32:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-21T14:46:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tranquil.it\/wp-content\/uploads\/4-5.png\" \/>\n\t<meta property=\"og:image:width\" content=\"705\" \/>\n\t<meta property=\"og:image:height\" content=\"429\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin-site\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TRANQUIL_IT\" \/>\n<meta name=\"twitter:site\" content=\"@TRANQUIL_IT\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\\\/\"},\"author\":{\"name\":\"admin-site\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#\\\/schema\\\/person\\\/ca2d8c4fc6339e7946b5d62845bb0d70\"},\"headline\":\"Interfaz Tranquil IT y Cyberwatch para detectar y corregir vulnerabilidades en entornos Linux, Windows y MacOS.\",\"datePublished\":\"2022-10-27T09:32:50+00:00\",\"dateModified\":\"2025-07-21T14:46:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\\\/\"},\"wordCount\":1961,\"publisher\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tranquil.it\\\/wp-content\\\/uploads\\\/4-5.png\",\"articleSection\":[\"Actualit\u00e9s\",\"Actualit\u00e9s\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\\\/\",\"url\":\"https:\\\/\\\/www.tranquil.it\\\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\\\/\",\"name\":\"Tranquil IT y Cyberwatch\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tranquil.it\\\/wp-content\\\/uploads\\\/4-5.png\",\"datePublished\":\"2022-10-27T09:32:50+00:00\",\"dateModified\":\"2025-07-21T14:46:41+00:00\",\"description\":\"Tranquil IT y Cyberwatch: C\u00f3mo detectar y corregir vulnerabilidades en Linux, Windows y MacOS.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.tranquil.it\\\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.tranquil.it\\\/wp-content\\\/uploads\\\/4-5.png\",\"contentUrl\":\"https:\\\/\\\/www.tranquil.it\\\/wp-content\\\/uploads\\\/4-5.png\",\"width\":705,\"height\":429},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.tranquil.it\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Interfaz Tranquil IT y Cyberwatch para detectar y corregir vulnerabilidades en entornos Linux, Windows y MacOS.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#website\",\"url\":\"https:\\\/\\\/www.tranquil.it\\\/\",\"name\":\"Tranquil IT\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.tranquil.it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#organization\",\"name\":\"Tranquil IT\",\"url\":\"https:\\\/\\\/www.tranquil.it\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.tranquil.it\\\/wp-content\\\/uploads\\\/logo-Tranquil-IT-couleurs-RVB.png\",\"contentUrl\":\"https:\\\/\\\/www.tranquil.it\\\/wp-content\\\/uploads\\\/logo-Tranquil-IT-couleurs-RVB.png\",\"width\":600,\"height\":180,\"caption\":\"Tranquil IT\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/TRANQUIL_IT\",\"http:\\\/\\\/linkedin.com\\\/company\\\/tranquil-it\",\"http:\\\/\\\/www.youtube.com\\\/c\\\/TranquilITSystems\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.tranquil.it\\\/#\\\/schema\\\/person\\\/ca2d8c4fc6339e7946b5d62845bb0d70\",\"name\":\"admin-site\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tranquil IT y Cyberwatch","description":"Tranquil IT y Cyberwatch: C\u00f3mo detectar y corregir vulnerabilidades en Linux, Windows y MacOS.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tranquil.it\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\/","og_locale":"es_ES","og_type":"article","og_title":"Tranquil IT y Cyberwatch","og_description":"Tranquil IT y Cyberwatch: C\u00f3mo detectar y corregir vulnerabilidades en Linux, Windows y MacOS.","og_url":"https:\/\/www.tranquil.it\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\/","og_site_name":"Tranquil IT","article_published_time":"2022-10-27T09:32:50+00:00","article_modified_time":"2025-07-21T14:46:41+00:00","og_image":[{"width":705,"height":429,"url":"https:\/\/www.tranquil.it\/wp-content\/uploads\/4-5.png","type":"image\/png"}],"author":"admin-site","twitter_card":"summary_large_image","twitter_creator":"@TRANQUIL_IT","twitter_site":"@TRANQUIL_IT","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tranquil.it\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\/#article","isPartOf":{"@id":"https:\/\/www.tranquil.it\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\/"},"author":{"name":"admin-site","@id":"https:\/\/www.tranquil.it\/#\/schema\/person\/ca2d8c4fc6339e7946b5d62845bb0d70"},"headline":"Interfaz Tranquil IT y Cyberwatch para detectar y corregir vulnerabilidades en entornos Linux, Windows y MacOS.","datePublished":"2022-10-27T09:32:50+00:00","dateModified":"2025-07-21T14:46:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tranquil.it\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\/"},"wordCount":1961,"publisher":{"@id":"https:\/\/www.tranquil.it\/#organization"},"image":{"@id":"https:\/\/www.tranquil.it\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tranquil.it\/wp-content\/uploads\/4-5.png","articleSection":["Actualit\u00e9s","Actualit\u00e9s"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.tranquil.it\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\/","url":"https:\/\/www.tranquil.it\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\/","name":"Tranquil IT y Cyberwatch","isPartOf":{"@id":"https:\/\/www.tranquil.it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tranquil.it\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\/#primaryimage"},"image":{"@id":"https:\/\/www.tranquil.it\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tranquil.it\/wp-content\/uploads\/4-5.png","datePublished":"2022-10-27T09:32:50+00:00","dateModified":"2025-07-21T14:46:41+00:00","description":"Tranquil IT y Cyberwatch: C\u00f3mo detectar y corregir vulnerabilidades en Linux, Windows y MacOS.","breadcrumb":{"@id":"https:\/\/www.tranquil.it\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tranquil.it\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.tranquil.it\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\/#primaryimage","url":"https:\/\/www.tranquil.it\/wp-content\/uploads\/4-5.png","contentUrl":"https:\/\/www.tranquil.it\/wp-content\/uploads\/4-5.png","width":705,"height":429},{"@type":"BreadcrumbList","@id":"https:\/\/www.tranquil.it\/tranquil-it-et-cyberwatch-sinterfacent-pour-corriger-vulnerabilites\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.tranquil.it\/es\/"},{"@type":"ListItem","position":2,"name":"Interfaz Tranquil IT y Cyberwatch para detectar y corregir vulnerabilidades en entornos Linux, Windows y MacOS."}]},{"@type":"WebSite","@id":"https:\/\/www.tranquil.it\/#website","url":"https:\/\/www.tranquil.it\/","name":"Tranquil IT","description":"","publisher":{"@id":"https:\/\/www.tranquil.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tranquil.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.tranquil.it\/#organization","name":"Tranquil IT","url":"https:\/\/www.tranquil.it\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.tranquil.it\/#\/schema\/logo\/image\/","url":"https:\/\/www.tranquil.it\/wp-content\/uploads\/logo-Tranquil-IT-couleurs-RVB.png","contentUrl":"https:\/\/www.tranquil.it\/wp-content\/uploads\/logo-Tranquil-IT-couleurs-RVB.png","width":600,"height":180,"caption":"Tranquil IT"},"image":{"@id":"https:\/\/www.tranquil.it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/TRANQUIL_IT","http:\/\/linkedin.com\/company\/tranquil-it","http:\/\/www.youtube.com\/c\/TranquilITSystems"]},{"@type":"Person","@id":"https:\/\/www.tranquil.it\/#\/schema\/person\/ca2d8c4fc6339e7946b5d62845bb0d70","name":"admin-site"}]}},"_links":{"self":[{"href":"https:\/\/www.tranquil.it\/es\/wp-json\/wp\/v2\/posts\/34948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tranquil.it\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tranquil.it\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tranquil.it\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tranquil.it\/es\/wp-json\/wp\/v2\/comments?post=34948"}],"version-history":[{"count":3,"href":"https:\/\/www.tranquil.it\/es\/wp-json\/wp\/v2\/posts\/34948\/revisions"}],"predecessor-version":[{"id":39742,"href":"https:\/\/www.tranquil.it\/es\/wp-json\/wp\/v2\/posts\/34948\/revisions\/39742"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tranquil.it\/es\/wp-json\/wp\/v2\/media\/37980"}],"wp:attachment":[{"href":"https:\/\/www.tranquil.it\/es\/wp-json\/wp\/v2\/media?parent=34948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tranquil.it\/es\/wp-json\/wp\/v2\/categories?post=34948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tranquil.it\/es\/wp-json\/wp\/v2\/tags?post=34948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}