{"id":41,"date":"2025-08-22T13:04:04","date_gmt":"2025-08-22T11:04:04","guid":{"rendered":"https:\/\/ciber-seguridad.org\/?page_id=41"},"modified":"2025-09-20T18:02:58","modified_gmt":"2025-09-20T16:02:58","slug":"casos-de-exito","status":"publish","type":"page","link":"https:\/\/ciber-seguridad.org\/?page_id=41","title":{"rendered":"CASOS DE \u00c9XITO"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"716\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/WEB-UGT-BALEARES-1024x716.jpg\" alt=\"\" class=\"wp-image-306\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/WEB-UGT-BALEARES-1024x716.jpg 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/WEB-UGT-BALEARES-300x210.jpg 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/WEB-UGT-BALEARES-768x537.jpg 768w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/WEB-UGT-BALEARES-1536x1074.jpg 1536w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/WEB-UGT-BALEARES-2048x1431.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><strong>UGT BALEARES. PORTAL WEB Y PERI\u00d3DICO DIGITAL<\/strong><\/p>\n\n\n\n<p><strong>Portal y peri\u00f3dico digital<\/strong>, donde los afiliados de <strong>UGT Baleares<\/strong> disponen de toda la informaci\u00f3n sindical, siempre actualizada y accesible.<br>La plataforma fomenta adem\u00e1s la <strong>interacci\u00f3n directa de los afiliados<\/strong>, convirti\u00e9ndose en un espacio din\u00e1mico y participativo.<\/p>\n\n\n\n<p>Con un <strong>Back Office seguro y pr\u00e1ctico<\/strong> y un <strong>Front End \u00e1gil e intuitivo<\/strong>, el portal garantiza una experiencia fluida tanto para los gestores como para los usuarios.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"674\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/APB-BALEARES.jpg\" alt=\"\" class=\"wp-image-307\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/APB-BALEARES.jpg 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/APB-BALEARES-300x197.jpg 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/APB-BALEARES-768x506.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><strong>AUTORIDAD PORTUARIA DE BALEARES<\/strong><\/p>\n\n\n\n<p>Sistema de Control de Accesos a las Oficinas centrales de Autoridad Portuaria de Baleares.<\/p>\n\n\n\n<p>Sistema de control de Accesos de personas y veh\u00edculos a las Instalaciones Portuarias de Palma, Alc\u00fadia e Ibiza.<\/p>\n\n\n\n<p>Estudio de ingenier\u00eda inversa de las redes inform\u00e1ticas de Autoridad Portuaria.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/SFM.jpg\" alt=\"\" class=\"wp-image-309\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/SFM.jpg 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/SFM-300x300.jpg 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/SFM-150x150.jpg 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/SFM-768x768.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><strong>SERVICIOS FERROVIARIOS DE MALLORCA<\/strong><\/p>\n\n\n\n<p>Software y hardware de Venta de Billetes Ferroviarios y Autocares de Mallorca.<\/p>\n\n\n\n<p>Sistema de Transmisi\u00f3n por Fibra \u00d3ptica de Servicios Ferroviarios y Servicios de Operadores de Telecomunicaciones.<\/p>\n\n\n\n<p>Sistema de C\u00e1maras de Videovigilancia de las Estaciones de Tren de Mallorca.<\/p>\n\n\n\n<p>Sistema de Servidores, Terminales y Red Local.<\/p>\n\n\n\n<p>Sistema de Informaci\u00f3n al Viajero.<\/p>\n\n\n\n<p>Auditoria Infraestructura de Comunicaciones y Fibra \u00d3ptica Ferroviaria.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"477\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/Ministerior-de-defensa.jpg\" alt=\"\" class=\"wp-image-311\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/Ministerior-de-defensa.jpg 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/Ministerior-de-defensa-300x140.jpg 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/Ministerior-de-defensa-768x358.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><strong>SPORTMAN MILITAR<\/strong><\/p>\n\n\n\n<p>Sistema de Control de Accesos y Gesti\u00f3n Integral de instalaciones militares de la secci\u00f3n DIAPER del Ej\u00e9rcito de Tierra y del Aire. Implantado en m\u00e1s de 40 Instalaciones Militares.<\/p>\n\n\n\n<p><strong>CENTURI\u00d3N MILITAR<\/strong><\/p>\n\n\n\n<p>Sistema de Control de Accesos y Control de Rondas Militares Perimetrales en Acuartelamientos Militares<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>UGT BALEARES. PORTAL WEB Y PERI\u00d3DICO DIGITAL Portal y peri\u00f3dico digital, donde los afiliados de UGT Baleares disponen de toda [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-41","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/pages\/41","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=41"}],"version-history":[{"count":6,"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/pages\/41\/revisions"}],"predecessor-version":[{"id":313,"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/pages\/41\/revisions\/313"}],"wp:attachment":[{"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=41"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}