{"id":6840,"date":"2019-05-02T11:26:00","date_gmt":"2019-05-02T11:26:00","guid":{"rendered":"https:\/\/testing.xplaye.com\/ikusi2\/wasp-how-does-it-protect-critical-infrastructure\/"},"modified":"2023-08-23T17:50:28","modified_gmt":"2023-08-23T17:50:28","slug":"wasp-how-does-it-protect-critical-infrastructure","status":"publish","type":"post","link":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/wasp-how-does-it-protect-critical-infrastructure\/","title":{"rendered":"Wasp: how does it protect critical infrastructure?"},"content":{"rendered":"\n<p>The path towards digital transformation of companies has put on the table new risk vectors which may \u201copen the door\u201d to different types of cyberattack, in case they are not properly protected.<\/p>\n\n\n\n<p>Protecting the end user, including during Internet browsing and his\/her email are one of the most important steps to continue transforming each company without putting at risk critical infrastructure of each organization or their clients\u2019 ones.<\/p>\n\n\n\n<p><p><strong><a href=\"https:\/\/testing.xplaye.com\/ikusi2\/services\/on-demand-services\/cybersecurity\/\" target=\"_blank\" rel=\"noopener\">wasp<\/a><\/strong> (now <strong>threat protect<\/strong>) provides protection in a easy way through agents and with the support of our technology to evolve, such as <em>Ikusi Once<\/em> and <em>Ikusi Intelligence<\/em>. Learn more about how each protection layer of this strategic cybersecurity solution is integrated.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-9733 aligncenter\" src=\"https:\/\/cms.ikusi.com\/uploads\/2019\/05\/infografia_wasp_en-1-480x1193.jpg\" alt=\"wasp\" width=\"480\" height=\"1193\"><\/p><\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>wasp provides protection in a easy way through agents and with the support of our technology to evolve, such as Ikusi Once and Ikusi Intelligence.<\/p>\n","protected":false},"author":2,"featured_media":12744,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2],"tags":[],"temas":[39],"class_list":["post-6840","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","temas-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Wasp: how does it protect critical infrastructure? - Ikusi EN<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/wasp-how-does-it-protect-critical-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wasp: how does it protect critical infrastructure? - Ikusi EN\" \/>\n<meta property=\"og:description\" content=\"wasp provides protection in a easy way through agents and with the support of our technology to evolve, such as Ikusi Once and Ikusi Intelligence.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/wasp-how-does-it-protect-critical-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"Ikusi EN\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-02T11:26:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-23T17:50:28+00:00\" \/>\n<meta name=\"author\" content=\"Ikusi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ikusi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/wasp-how-does-it-protect-critical-infrastructure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/wasp-how-does-it-protect-critical-infrastructure\\\/\"},\"author\":{\"name\":\"Ikusi\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/#\\\/schema\\\/person\\\/bcd06b0e7689b90689815d0b78a2bc2d\"},\"headline\":\"Wasp: how does it protect critical infrastructure?\",\"datePublished\":\"2019-05-02T11:26:00+00:00\",\"dateModified\":\"2023-08-23T17:50:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/wasp-how-does-it-protect-critical-infrastructure\\\/\"},\"wordCount\":118,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/wasp-how-does-it-protect-critical-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/05\\\/wasp-como-protege-la-infraestructura-2.jpeg\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/wasp-how-does-it-protect-critical-infrastructure\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/wasp-how-does-it-protect-critical-infrastructure\\\/\",\"url\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/wasp-how-does-it-protect-critical-infrastructure\\\/\",\"name\":\"Wasp: how does it protect critical infrastructure? - Ikusi EN\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/wasp-how-does-it-protect-critical-infrastructure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/wasp-how-does-it-protect-critical-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/05\\\/wasp-como-protege-la-infraestructura-2.jpeg\",\"datePublished\":\"2019-05-02T11:26:00+00:00\",\"dateModified\":\"2023-08-23T17:50:28+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/#\\\/schema\\\/person\\\/bcd06b0e7689b90689815d0b78a2bc2d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/wasp-how-does-it-protect-critical-infrastructure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/wasp-how-does-it-protect-critical-infrastructure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/wasp-how-does-it-protect-critical-infrastructure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/05\\\/wasp-como-protege-la-infraestructura-2.jpeg\",\"contentUrl\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/05\\\/wasp-como-protege-la-infraestructura-2.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/wasp-how-does-it-protect-critical-infrastructure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wasp: how does it protect critical infrastructure?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/\",\"name\":\"Ikusi EN\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/#\\\/schema\\\/person\\\/bcd06b0e7689b90689815d0b78a2bc2d\",\"name\":\"Ikusi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/962736704ad33e8f2d1fd7afc591ab0f78027bd65a33c2312c6d1ef90a4b2e77?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/962736704ad33e8f2d1fd7afc591ab0f78027bd65a33c2312c6d1ef90a4b2e77?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/962736704ad33e8f2d1fd7afc591ab0f78027bd65a33c2312c6d1ef90a4b2e77?s=96&d=mm&r=g\",\"caption\":\"Ikusi\"},\"url\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/author\\\/ikusi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wasp: how does it protect critical infrastructure? - Ikusi EN","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/wasp-how-does-it-protect-critical-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"Wasp: how does it protect critical infrastructure? - Ikusi EN","og_description":"wasp provides protection in a easy way through agents and with the support of our technology to evolve, such as Ikusi Once and Ikusi Intelligence.","og_url":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/wasp-how-does-it-protect-critical-infrastructure\/","og_site_name":"Ikusi EN","article_published_time":"2019-05-02T11:26:00+00:00","article_modified_time":"2023-08-23T17:50:28+00:00","author":"Ikusi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ikusi","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/wasp-how-does-it-protect-critical-infrastructure\/#article","isPartOf":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/wasp-how-does-it-protect-critical-infrastructure\/"},"author":{"name":"Ikusi","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/#\/schema\/person\/bcd06b0e7689b90689815d0b78a2bc2d"},"headline":"Wasp: how does it protect critical infrastructure?","datePublished":"2019-05-02T11:26:00+00:00","dateModified":"2023-08-23T17:50:28+00:00","mainEntityOfPage":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/wasp-how-does-it-protect-critical-infrastructure\/"},"wordCount":118,"commentCount":0,"image":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/wasp-how-does-it-protect-critical-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-content\/uploads\/sites\/2\/2023\/05\/wasp-como-protege-la-infraestructura-2.jpeg","articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/wasp-how-does-it-protect-critical-infrastructure\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/wasp-how-does-it-protect-critical-infrastructure\/","url":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/wasp-how-does-it-protect-critical-infrastructure\/","name":"Wasp: how does it protect critical infrastructure? - Ikusi EN","isPartOf":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/wasp-how-does-it-protect-critical-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/wasp-how-does-it-protect-critical-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-content\/uploads\/sites\/2\/2023\/05\/wasp-como-protege-la-infraestructura-2.jpeg","datePublished":"2019-05-02T11:26:00+00:00","dateModified":"2023-08-23T17:50:28+00:00","author":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/#\/schema\/person\/bcd06b0e7689b90689815d0b78a2bc2d"},"breadcrumb":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/wasp-how-does-it-protect-critical-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/wasp-how-does-it-protect-critical-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/wasp-how-does-it-protect-critical-infrastructure\/#primaryimage","url":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-content\/uploads\/sites\/2\/2023\/05\/wasp-como-protege-la-infraestructura-2.jpeg","contentUrl":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-content\/uploads\/sites\/2\/2023\/05\/wasp-como-protege-la-infraestructura-2.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/wasp-how-does-it-protect-critical-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/testing.xplaye.com\/ikusi2\/en\/"},{"@type":"ListItem","position":2,"name":"Wasp: how does it protect critical infrastructure?"}]},{"@type":"WebSite","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/#website","url":"https:\/\/testing.xplaye.com\/ikusi2\/en\/","name":"Ikusi EN","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/testing.xplaye.com\/ikusi2\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/#\/schema\/person\/bcd06b0e7689b90689815d0b78a2bc2d","name":"Ikusi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/962736704ad33e8f2d1fd7afc591ab0f78027bd65a33c2312c6d1ef90a4b2e77?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/962736704ad33e8f2d1fd7afc591ab0f78027bd65a33c2312c6d1ef90a4b2e77?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/962736704ad33e8f2d1fd7afc591ab0f78027bd65a33c2312c6d1ef90a4b2e77?s=96&d=mm&r=g","caption":"Ikusi"},"url":"https:\/\/testing.xplaye.com\/ikusi2\/en\/author\/ikusi\/"}]}},"_links":{"self":[{"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/posts\/6840","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/comments?post=6840"}],"version-history":[{"count":1,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/posts\/6840\/revisions"}],"predecessor-version":[{"id":10321,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/posts\/6840\/revisions\/10321"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/media?parent=6840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/categories?post=6840"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/tags?post=6840"},{"taxonomy":"temas","embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/temas?post=6840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}