{"id":255,"date":"2020-11-10T14:56:35","date_gmt":"2020-11-10T20:56:35","guid":{"rendered":"https:\/\/idsinc.com\/?p=255"},"modified":"2021-11-30T14:18:46","modified_gmt":"2021-11-30T20:18:46","slug":"finamente-afinado-006-el-evento-principal","status":"publish","type":"post","link":"https:\/\/idsinc.com\/es\/finely-tuned-006-the-main-event\/","title":{"rendered":"Finamente ajustado: 006 El evento principal: los registros de eventos de Windows son herramientas para los investigadores"},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<p class=\"wp-block-paragraph\">Por Bobby R. Williams Jr. el 10\/11\/20 7:00 a. m.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Los investigadores no comienzan con las respuestas. Hacemos preguntas. Nuestra misi\u00f3n (si decidimos aceptarla) es determinar qu\u00e9 sucedi\u00f3 y cu\u00e1ndo. Puede haber una gema valiosa escondida en sus datos, pero no lo sabremos hasta que comencemos a investigar. En el universo digital en expansi\u00f3n, hay artefactos a nuestro alrededor. Saber qu\u00e9 son y c\u00f3mo analizarlos es clave para descubrir la narrativa dentro de los datos. Si necesita construir una l\u00ednea de tiempo de eventos, los registros de eventos en estaciones de trabajo y servidores de Windows son un excelente lugar para comenzar.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p class=\"wp-block-paragraph\">Los registros de eventos rastrean muchas acciones \u00fatiles. Eventos como inicios de sesi\u00f3n, cierres de sesi\u00f3n y encendido de la m\u00e1quina son solo algunos ejemplos. Si est\u00e1 respondiendo a un incidente, es probable que los registros de eventos sean una fuente vital de informaci\u00f3n. Para asegurarse de que la informaci\u00f3n est\u00e9 all\u00ed cuando la necesite, debe asegurarse de que los registros est\u00e9n archivados. Suena simple, \u00bfverdad?<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Hay ajustes de configuraci\u00f3n que usted controla que ayudan a determinar hasta d\u00f3nde pueden llegar sus registros. Si simplemente usa la configuraci\u00f3n predeterminada, el tama\u00f1o puede ser demasiado peque\u00f1o para guardar los registros de eventos clave. Tambi\u00e9n es \u00fatil saber qu\u00e9 registros rastrean qu\u00e9 eventos. Esto puede ayudarlo a decidir d\u00f3nde realizar cambios en su protocolo de archivado de registros.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-why-are-event-logs-significant\"><strong>\u00bfPor qu\u00e9 son importantes los registros de eventos?<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Al igual que los hijos del medio, los registros de eventos suelen ser una ocurrencia tard\u00eda. Las organizaciones se enfocan mucho en medidas de seguridad preventivas, como puntos de acceso, autenticaci\u00f3n y encriptaci\u00f3n. Esto es importante. Quieres ser proactivo. En las investigaciones forenses digitales y de seguridad cibern\u00e9tica, debe reconstruir lo que sucedi\u00f3. \u00bfQui\u00e9n ten\u00eda acceso? \u00bfCu\u00e1ndo? Los registros de eventos pueden contener las respuestas, ya sea determinando las actividades de un empleado que se fue, respondiendo a un incidente o defendiendo una intrusi\u00f3n activa. Si no es intencional acerca de c\u00f3mo se administran los registros, es posible que deje que las respuestas a futuras preguntas se escapen de sus... discos duros.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>\u00bfCu\u00e1l es mi comida para llevar?<\/strong><\/h3>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Comprenda que es posible que no haya un solo evento principal en su investigaci\u00f3n. Las respuestas a menudo se encuentran en la correlaci\u00f3n de una serie de eventos. Un experto calificado puede ayudarlo a comprender las entradas del registro de eventos y acercarse a lo que sucedi\u00f3. Para hacer esto, debe asegurarse de que los registros de eventos se archiven con un protocolo intencional.<\/li><li>Ampliar el tama\u00f1o de los archivos de registro clave puede ayudarlo a retener m\u00e1s datos. Los eventos nuevos pueden eliminar los eventos antiguos una vez que alcanza el tama\u00f1o m\u00e1ximo de registro. Afortunadamente, el almacenamiento de la m\u00e1quina se ha vuelto relativamente econ\u00f3mico y la generaci\u00f3n de registros no acaparar\u00e1 sus recursos. Por lo tanto, aumente el tama\u00f1o de los registros de eventos importantes de 20 MB a unos pocos GB. Digo aumentar el tama\u00f1o de todos los registros siempre que sea posible. Si el tama\u00f1o y el espacio de almacenamiento siguen siendo una preocupaci\u00f3n, elija registros de claves para tama\u00f1o ampliado. Mi colega Jonathan Karchmer recomienda Security.evtx como un ejemplo de d\u00f3nde enfocarse.<\/li><li>Si su organizaci\u00f3n a\u00fan no lo est\u00e1 haciendo, considere usar la tecnolog\u00eda SIEM para agregar y examinar los registros de eventos. Como m\u00ednimo, comience por reenviar los registros de eventos de las estaciones de trabajo cr\u00edticas y haga una copia de seguridad de los registros de eventos de la m\u00e1quina y el servidor en otro repositorio. La redundancia ayuda a proteger contra la p\u00e9rdida de datos. Cuando los eventos vencen en sus computadoras y servidores, la ubicaci\u00f3n de la copia de seguridad podr\u00eda contener a\u00f1os de actividad que, de lo contrario, se habr\u00edan perdido. Para las organizaciones con posturas de seguridad m\u00e1s avanzadas, utilizar y ajustar SIEM ayudar\u00e1 en la &quot;caza&quot; proactiva de los malos. Un experto calificado puede comenzar la clasificaci\u00f3n simplemente recopilando una copia de sus registros de eventos archivados, lo que luego podr\u00eda ayudar a orientar una investigaci\u00f3n y ahorrarle dinero.<\/li><\/ol>\n\n\n\n<p class=\"wp-block-paragraph\">Estos sencillos pasos pueden ayudar a que su organizaci\u00f3n est\u00e9 m\u00e1s cerca de estar lista para el evento principal.<\/p>","protected":false},"excerpt":{"rendered":"<p>By Bobby R. Williams Jr. on 11\/10\/20 7:00 AM Investigators don\u2019t start with answers. We ask questions. Our mission (should we choose to accept it) is to determine what happened and when. There may be a valuable gem hidden in your data, but we won\u2019t know until we start digging. In the expanding digital universe, [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":2398,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-255","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Finely Tuned \u2013 006 The Main Event - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"To ensure that data is there when needed, keep log archives. Windows Event logs tracks actions like logons, log offs and machine power.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/es\/finamente-afinado-006-el-evento-principal\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Finely Tuned \u2013 006 The Main Event: Windows Event Logs are Tools for Investigators\" \/>\n<meta property=\"og:description\" content=\"To ensure that data is there when needed, keep log archives. Windows Event logs tracks actions like logons, log offs and machine power.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/es\/finamente-afinado-006-el-evento-principal\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-10T20:56:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-30T20:18:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202018.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bobby R. Williams, Jr.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bobby R. Williams, Jr.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/\"},\"author\":{\"name\":\"Bobby R. Williams, Jr.\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/51826f1058472210a83b02aaabace2ca\"},\"headline\":\"Finely Tuned \u2013 006 The Main Event: Windows Event Logs are Tools for Investigators\",\"datePublished\":\"2020-11-10T20:56:35+00:00\",\"dateModified\":\"2021-11-30T20:18:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/\"},\"wordCount\":623,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/iDS-NewLogoBlogImages-202018.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/\",\"name\":\"Finely Tuned \u2013 006 The Main Event - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/iDS-NewLogoBlogImages-202018.jpg\",\"datePublished\":\"2020-11-10T20:56:35+00:00\",\"dateModified\":\"2021-11-30T20:18:46+00:00\",\"description\":\"To ensure that data is there when needed, keep log archives. Windows Event logs tracks actions like logons, log offs and machine power.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/iDS-NewLogoBlogImages-202018.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/iDS-NewLogoBlogImages-202018.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"To ensure that data is there when needed, keep log archives. Windows Event logs tracks actions like logons, log offs and machine power.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Finely Tuned \u2013 006 The Main Event: Windows Event Logs are Tools for Investigators\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/51826f1058472210a83b02aaabace2ca\",\"name\":\"Bobby R. Williams, Jr.\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g\",\"caption\":\"Bobby R. Williams, Jr.\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/es\\\/author\\\/bobby\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Finamente sintonizado \u2013 006 El evento principal - iDiscovery Solutions","description":"Para garantizar que los datos est\u00e9n ah\u00ed cuando sean necesarios, mantenga archivos de registro. Los registros de eventos de Windows rastrean acciones como inicios de sesi\u00f3n, cierres de sesi\u00f3n y encendido de la m\u00e1quina.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/es\/finamente-afinado-006-el-evento-principal\/","og_locale":"es_ES","og_type":"article","og_title":"Finely Tuned \u2013 006 The Main Event: Windows Event Logs are Tools for Investigators","og_description":"To ensure that data is there when needed, keep log archives. Windows Event logs tracks actions like logons, log offs and machine power.","og_url":"https:\/\/idsinc.com\/es\/finamente-afinado-006-el-evento-principal\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2020-11-10T20:56:35+00:00","article_modified_time":"2021-11-30T20:18:46+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202018.jpg","type":"image\/jpeg"}],"author":"Bobby R. Williams, Jr.","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Bobby R. Williams, Jr.","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/"},"author":{"name":"Bobby R. Williams, Jr.","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/51826f1058472210a83b02aaabace2ca"},"headline":"Finely Tuned \u2013 006 The Main Event: Windows Event Logs are Tools for Investigators","datePublished":"2020-11-10T20:56:35+00:00","dateModified":"2021-11-30T20:18:46+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/"},"wordCount":623,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202018.jpg","articleSection":["Blog"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/","url":"https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/","name":"Finamente sintonizado \u2013 006 El evento principal - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202018.jpg","datePublished":"2020-11-10T20:56:35+00:00","dateModified":"2021-11-30T20:18:46+00:00","description":"Para garantizar que los datos est\u00e9n ah\u00ed cuando sean necesarios, mantenga archivos de registro. Los registros de eventos de Windows rastrean acciones como inicios de sesi\u00f3n, cierres de sesi\u00f3n y encendido de la m\u00e1quina.","breadcrumb":{"@id":"https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202018.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202018.jpg","width":2500,"height":1250,"caption":"To ensure that data is there when needed, keep log archives. Windows Event logs tracks actions like logons, log offs and machine power."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Finely Tuned \u2013 006 The Main Event: Windows Event Logs are Tools for Investigators"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Soluciones iDiscovery","description":"Utilice los datos a su favor en la sala del tribunal","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Soluciones iDiscovery","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS ofrece soluciones de datos consultivas a corporaciones y bufetes de abogados de todo el mundo, lo que les otorga una ventaja decisiva, tanto dentro como fuera de los tribunales. Los expertos en la materia y los estrategas de datos de iDS se especializan en encontrar soluciones a problemas de datos complejos, garantizando que los datos puedan aprovecharse como un activo, no como un pasivo.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/51826f1058472210a83b02aaabace2ca","name":"bobby r. williams, jr.","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g","caption":"Bobby R. Williams, Jr."},"url":"https:\/\/idsinc.com\/es\/author\/bobby\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/255","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/comments?post=255"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/255\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media\/2398"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media?parent=255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/categories?post=255"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/tags?post=255"}],"curies":[{"name":"gracias","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}