{"id":500,"date":"2023-10-26T12:51:25","date_gmt":"2023-10-26T17:51:25","guid":{"rendered":"https:\/\/bgsolutions.tech\/?post_type=portfolio&#038;p=500"},"modified":"2023-11-07T19:34:03","modified_gmt":"2023-11-08T00:34:03","slug":"diseno-arquitectura-e-implementacion-de-infraestructura-de-comunicaciones-y-controles-de-seguridad-para-votacion-electronica-automatizada","status":"publish","type":"portfolio","link":"https:\/\/bgsolutions.tech\/en\/portfolio\/diseno-arquitectura-e-implementacion-de-infraestructura-de-comunicaciones-y-controles-de-seguridad-para-votacion-electronica-automatizada\/","title":{"rendered":"Design, architecture, and implementation of technology infrastructure and security controls."},"content":{"rendered":"<h3 class=\"wp-block-heading\" style=\"font-size:1rem\">Description<\/h3>\n\n\n\n<p>Design, architecture, and implementation of technology infrastructure and security controls.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-ast-global-color-8-color has-alpha-channel-opacity has-ast-global-color-8-background-color has-background is-style-wide\" style=\"margin-top:0;margin-bottom:0\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"padding-top:20px;font-size:1rem\"><strong>Challenge<\/strong><\/h3>\n\n\n\n<p>To provide the necessary information technology infrastructure for the deployment of an automated electronic voting solution, taking into account all security measures to ensure the uninterrupted availability of all technology components, the integrity of processed data, and the confidentiality of critical information, in addition to active monitoring and security incident response on premise.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-ast-global-color-8-color has-alpha-channel-opacity has-ast-global-color-8-background-color has-background is-style-wide\" style=\"margin-top:0;margin-bottom:0\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"padding-top:20px;font-size:1rem\"><strong>Solution <\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Network architecture design, including service segmentation and microsegmentation.<\/li>\n\n\n\n<li>Physical installation of servers at the data center provided by the client, as well as the installation and configuration of operating systems.<\/li>\n\n\n\n<li>Installation and configuration of network components (CISCO routers and switches) from the Core and distribution devices to the L2 access switches.<\/li>\n\n\n\n<li>Design and implementation of a security strategy tailored to the client's needs, including policies, procedures, and documentation related to all infrastructure assets.<\/li>\n\n\n\n<li>Implementation of various security controls such as Firewalls (FortiGate), IDS\/IPS (Suricata), IPSec VPN, and SIEM (AlienVault).<\/li>\n\n\n\n<li>Implementation of a high availability model for all the main components of the infrastructure.<\/li>\n\n\n\n<li>Development and successful testing of a Business Continuity Plan (BCP).<\/li>\n\n\n\n<li>Operating system hardening on all Linux servers and network devices.<\/li>\n\n\n\n<li>Provision of active security monitoring service before, during, and after the event.&nbsp;<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-ast-global-color-8-color has-alpha-channel-opacity has-ast-global-color-8-background-color has-background is-style-wide\" style=\"margin-top:0;margin-bottom:0\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"padding-top:20px;font-size:1rem\"><strong>Sector<\/strong><\/h3>\n\n\n\n<p>Private<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-ast-global-color-8-color has-alpha-channel-opacity has-ast-global-color-8-background-color has-background is-style-wide\" style=\"margin-top:0;margin-bottom:0\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"padding-top:20px;font-size:1rem\"><strong>Service<\/strong><\/h3>\n\n\n\n<p>Implementation of IT and Cybersecurity Solutions<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-ast-global-color-8-color has-alpha-channel-opacity has-ast-global-color-8-background-color has-background is-style-wide\" style=\"margin-top:0;margin-bottom:0\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"padding-top:20px;font-size:1rem\"><strong>Client<\/strong><\/h3>\n\n\n\n<p>Electoral Technology Provider<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-ast-global-color-8-color has-alpha-channel-opacity has-ast-global-color-8-background-color has-background is-style-wide\" style=\"margin-top:0;margin-bottom:0\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"padding-top:20px;font-size:1rem\"><strong>Location <\/strong><\/h3>\n\n\n\n<p>Buenos Aires, Argentina<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-ast-global-color-8-color has-alpha-channel-opacity has-ast-global-color-8-background-color has-background is-style-wide\" style=\"margin-top:0;margin-bottom:0\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"padding-top:20px;font-size:1rem\"><strong>Audience <\/strong><\/h3>\n\n\n\n<p>B2B<\/p>","protected":false},"excerpt":{"rendered":"<p>Descripci\u00f3n Dise\u00f1o, arquitectura e implementaci\u00f3n de infraestructura de tecnolog\u00eda y controles de seguridad. Desaf\u00edo Proporcionar la infraestructura de tecnolog\u00eda de informaci\u00f3n necesaria, para el despliegue de soluci\u00f3n de votaci\u00f3n electr\u00f3nica automatizada, tomando en cuenta todas las medidas de seguridad, que permitiera garantizar la disponibilidad ininterrumpida de todos los componentes tecnol\u00f3gicos, integridad de los datos procesados [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":528,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_mo_disable_npp":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_vp_format_video_url":"","_vp_image_focal_point":[],"footnotes":""},"portfolio_category":[18],"portfolio_tag":[],"class_list":["post-500","portfolio","type-portfolio","status-publish","format-standard","has-post-thumbnail","hentry","portfolio_category-ciberseguridad"],"acf":[],"_links":{"self":[{"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/portfolio\/500","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/portfolio"}],"about":[{"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/types\/portfolio"}],"author":[{"embeddable":true,"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/comments?post=500"}],"version-history":[{"count":3,"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/portfolio\/500\/revisions"}],"predecessor-version":[{"id":530,"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/portfolio\/500\/revisions\/530"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/media\/528"}],"wp:attachment":[{"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/media?parent=500"}],"wp:term":[{"taxonomy":"portfolio_category","embeddable":true,"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/portfolio_category?post=500"},{"taxonomy":"portfolio_tag","embeddable":true,"href":"https:\/\/bgsolutions.tech\/en\/wp-json\/wp\/v2\/portfolio_tag?post=500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}