{"id":103672,"date":"2022-01-25T01:27:10","date_gmt":"2022-01-25T01:27:10","guid":{"rendered":"https:\/\/feedzai.com\/account-takeover\/"},"modified":"2024-04-24T09:14:24","modified_gmt":"2024-04-24T09:14:24","slug":"prevencion-de-apropiacion-de-cuentas-ato","status":"publish","type":"page","link":"https:\/\/feedzai.com\/es\/soluciones\/prevencion-de-apropiacion-de-cuentas-ato\/","title":{"rendered":"Prevenci\u00f3n de apropiaci\u00f3n de cuentas (ATO)"},"content":{"rendered":"

[vc_row row_height_percent=”0″ override_padding=”yes” h_padding=”2″ top_padding=”0″ bottom_padding=”3″ back_color=”color-178680″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ uncode_shortcode_id=”203194″ back_color_type=”uncode-palette”][vc_column column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”0″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/1″ uncode_shortcode_id=”185313″][vc_row_inner limit_content=””][vc_column_inner column_width_percent=”100″ position_vertical=”middle” gutter_size=”0″ style=”dark” overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”4\/12″ uncode_shortcode_id=”129140″][vc_custom_heading text_color=”color-142326″ heading_semantic=”h1″ text_size=”h6″ text_weight=”600″ css_animation=”curtain-words” uncode_shortcode_id=”143085″ text_color_type=”uncode-palette”]Apropiaci\u00f3n de Cuentas (ATO)[\/vc_custom_heading][vc_empty_space empty_h=”0″][vc_custom_heading text_color=”accent” text_font=”font-340491″ text_size=”h1″ text_weight=”700″ text_height=”fontheight-238206″ css_animation=”curtain-words” animation_delay=”200″ uncode_shortcode_id=”137235″ text_color_type=”uncode-palette”]Preventiva.
\nSilenciosa.
\nContinua.[\/vc_custom_heading][vc_empty_space empty_h=”0″][vc_column_text text_lead=”yes” css_animation=”bottom-t-top” animation_delay=”400″ uncode_shortcode_id=”184687″]Proteja a los clientes en todas las interacciones mediante la detecci\u00f3n y prevenci\u00f3n silenciosa del fraude antes que suceda.[\/vc_column_text][vc_empty_space empty_h=”1″][vc_button button_color=”color-142326″ size=”btn-sm” radius=”btn-circle” border_width=”0″ css_animation=”bottom-t-top” animation_delay=”600″ link=”url:%2Fes%2Fcontacto-con-nosotros%2Fsolicite-una-demostracion%2F|title:Solicite%20una%20demostraci%C3%B3n” button_color_type=”uncode-palette” uncode_shortcode_id=”952709″]Solicite una demostraci\u00f3n[\/vc_button][\/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”8\/12″ uncode_shortcode_id=”128027″][vc_single_image media=”102258″ media_width_percent=”90″ alignment=”right” css_animation=”bottom-t-top” uncode_shortcode_id=”116393″][\/vc_column_inner][\/vc_row_inner][vc_empty_space empty_h=”2″][vc_custom_heading text_color=”color-xsdn” text_size=”h6″ text_weight=”600″ css_animation=”bottom-t-top” uncode_shortcode_id=”203633″ text_color_type=”uncode-palette”]Marcas que Conf\u00edan en Feedzai[\/vc_custom_heading][vc_empty_space empty_h=”2″][vc_row_inner limit_content=””][vc_column_inner column_width_percent=”100″ position_vertical=”middle” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/1″ uncode_shortcode_id=”124613″][vc_raw_html]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[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_empty_space empty_h=”2″][\/vc_column][\/vc_row][vc_row row_height_percent=”0″ override_padding=”yes” h_padding=”2″ top_padding=”3″ bottom_padding=”4″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ uncode_shortcode_id=”197061″][vc_column column_width_percent=”100″ gutter_size=”4″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/1″ uncode_shortcode_id=”715499″][vc_empty_space empty_h=”2″][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ uncode_shortcode_id=”213927″ limit_content=””][vc_column_inner width=”1\/12″][\/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”0″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”10\/12″ css=”.vc_custom_1642436523892{padding-right: 30px !important;padding-left: 30px !important;}” uncode_shortcode_id=”149354″][vc_custom_heading text_color=”color-142326″ text_size=”h6″ text_weight=”600″ css_animation=”bottom-t-top” uncode_shortcode_id=”214156″ text_color_type=”uncode-palette”]\u00bfPor qu\u00e9 elegir Feedzai?[\/vc_custom_heading][vc_empty_space empty_h=”1″][vc_custom_heading text_color=”color-853579″ heading_semantic=”h3″ text_weight=”700″ text_height=”fontheight-678824″ css_animation=”bottom-t-top” uncode_shortcode_id=”837663″ text_color_type=”uncode-palette”]Prevenga la Apropiaci\u00f3n de Cuentas, la Suplantaci\u00f3n y los Ataques de Manipulaci\u00f3n[\/vc_custom_heading][\/vc_column_inner][vc_column_inner width=”1\/12″][\/vc_column_inner][\/vc_row_inner][vc_row_inner limit_content=””][vc_column_inner column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”0″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/3″ uncode_shortcode_id=”157042″][vc_single_image media=”101716″ media_width_use_pixel=”yes” alignment=”center” css_animation=”bottom-t-top” media_width_pixel=”120″ uncode_shortcode_id=”252052″][vc_empty_space empty_h=”0″][vc_custom_heading text_color=”color-178680″ heading_semantic=”h4″ text_size=”h5″ text_weight=”700″ text_height=”fontheight-357766″ css_animation=”bottom-t-top” uncode_shortcode_id=”857311″ text_color_type=”uncode-palette”]Detenga los Ataques de Robo de Credenciales[\/vc_custom_heading][vc_column_text css_animation=”bottom-t-top” uncode_shortcode_id=”659058″]La defensa activa de Feedzai previene que los ataques de malware o phishing roben las credenciales de los clientes, protegi\u00e9ndolos silenciosamente mientras alerta a los equipos antifraude.[\/vc_column_text][vc_empty_space empty_h=”0″][\/vc_column_inner][vc_column_inner column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”0″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/3″ uncode_shortcode_id=”160311″][vc_single_image media=”101717″ media_width_use_pixel=”yes” alignment=”center” css_animation=”bottom-t-top” animation_delay=”200″ media_width_pixel=”120″ uncode_shortcode_id=”121772″][vc_empty_space empty_h=”0″][vc_custom_heading text_color=”color-178680″ heading_semantic=”h4″ text_size=”h5″ text_weight=”700″ text_height=”fontheight-357766″ css_animation=”bottom-t-top” animation_delay=”200″ uncode_shortcode_id=”149097″ text_color_type=”uncode-palette”]Prevenga los Ataques de Manipulaci\u00f3n[\/vc_custom_heading][vc_empty_space empty_h=”0″][vc_column_text css_animation=”bottom-t-top” animation_delay=”200″ uncode_shortcode_id=”151943″]Conocer a los usuarios (KYU) de Feedzai continuamente autentica a los clientes en todas las interacciones y fortalece su propia identidad digital \u00fanica.[\/vc_column_text][\/vc_column_inner][vc_column_inner column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”0″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/3″ uncode_shortcode_id=”171594″][vc_single_image media=”101718″ media_width_use_pixel=”yes” alignment=”center” css_animation=”bottom-t-top” animation_delay=”400″ uncode_shortcode_id=”178126″ media_width_pixel=”120″][vc_empty_space empty_h=”0″][vc_custom_heading text_color=”color-178680″ heading_semantic=”h4″ text_size=”h5″ text_weight=”700″ text_height=”fontheight-357766″ css_animation=”bottom-t-top” animation_delay=”400″ uncode_shortcode_id=”155284″ text_color_type=”uncode-palette”]Evite los Ataques de Suplantaci\u00f3n[\/vc_custom_heading][vc_empty_space empty_h=”0″][vc_column_text css_animation=”bottom-t-top” animation_delay=”400″ uncode_shortcode_id=”872750″]Prevenga activamente los ataques de troyano de acceso remoto (RAT) al verificar continuamente las identificaciones digitales compuestas de los usuarios para detectar las anomal\u00edas generadas por los atacantes.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space empty_h=”2″][\/vc_column][\/vc_row][vc_row row_height_percent=”0″ override_padding=”yes” h_padding=”2″ top_padding=”4″ bottom_padding=”4″ back_color=”color-116710″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ uncode_shortcode_id=”163518″ back_color_type=”uncode-palette”][vc_column column_width_percent=”100″ gutter_size=”4″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/1″ uncode_shortcode_id=”715499″][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ uncode_shortcode_id=”213927″ limit_content=””][vc_column_inner width=”1\/12″][\/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”0″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”10\/12″ css=”.vc_custom_1642436523892{padding-right: 30px !important;padding-left: 30px !important;}” uncode_shortcode_id=”149354″][vc_custom_heading text_color=”color-142326″ text_size=”h6″ text_weight=”600″ css_animation=”bottom-t-top” uncode_shortcode_id=”195825″ text_color_type=”uncode-palette”]Feedzai en cifras[\/vc_custom_heading][vc_empty_space empty_h=”1″][vc_custom_heading text_color=”color-853579″ heading_semantic=”h3″ text_weight=”700″ text_height=”fontheight-591601″ css_animation=”bottom-t-top” uncode_shortcode_id=”182052″ text_color_type=”uncode-palette”]Las Soluciones de Apropiaci\u00f3n de Cuentas Reactivas no Funcionan[\/vc_custom_heading][\/vc_column_inner][vc_column_inner width=”1\/12″][\/vc_column_inner][\/vc_row_inner][vc_row_inner limit_content=””][vc_column_inner column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”2″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”2\/12″][\/vc_column_inner][vc_column_inner column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”2″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”4\/12″ uncode_shortcode_id=”135764″][uncode_counter value=”56″ prefix=”$” counter_color=”color-142326″ size=”fontsize-824044″ weight=”700″ height=”fontheight-179065″ css_animation=”bottom-t-top” uncode_shortcode_id=”228866″ suffix=”B” counter_color_type=”uncode-palette”][vc_column_text css_animation=”bottom-t-top” uncode_shortcode_id=”929759″]Los robos de identidad est\u00e1n disparados: las soluciones de prevenci\u00f3n de apropiaci\u00f3n de cuentas no permanecen actualizadas.[\/vc_column_text][\/vc_column_inner][vc_column_inner column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”2″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”4\/12″ uncode_shortcode_id=”201794″][uncode_counter value=”57″ counter_color=”color-142326″ size=”fontsize-824044″ weight=”700″ height=”fontheight-179065″ css_animation=”bottom-t-top” animation_delay=”200″ uncode_shortcode_id=”101741″ suffix=”%” counter_color_type=”uncode-palette”][vc_column_text css_animation=”bottom-t-top” animation_delay=”200″ uncode_shortcode_id=”178687″]Los usuarios enga\u00f1ados no cambian sus contrase\u00f1as, aumentando las p\u00e9rdidas.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”2\/12″][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=”0″ override_padding=”yes” h_padding=”2″ top_padding=”4″ bottom_padding=”3″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ uncode_shortcode_id=”727467″][vc_column column_width_percent=”100″ gutter_size=”4″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/1″ uncode_shortcode_id=”484192″][vc_row_inner limit_content=””][vc_column_inner width=”1\/12″][\/vc_column_inner][vc_column_inner column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”0″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”10\/12″ uncode_shortcode_id=”161366″][vc_custom_heading text_color=”color-142326″ text_size=”h6″ text_weight=”600″ css_animation=”bottom-t-top” uncode_shortcode_id=”144412″ text_color_type=”uncode-palette”]Beneficios Clave[\/vc_custom_heading][vc_empty_space empty_h=”0″][vc_custom_heading text_color=”color-853579″ heading_semantic=”h3″ text_weight=”700″ text_height=”fontheight-678824″ css_animation=”bottom-t-top” uncode_shortcode_id=”424114″ text_color_type=”uncode-palette”]Construya la Confianza del Cliente[\/vc_custom_heading][vc_empty_space empty_h=”0″][vc_column_text text_lead=”yes” css_animation=”bottom-t-top” uncode_shortcode_id=”151234″]Detenga los Ataques Basados en ATO y Mejore la Experiencia de Usuario[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/12″][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ inverted_device_order=”yes” uncode_shortcode_id=”136741″ limit_content=””][vc_column_inner column_width_percent=”100″ position_vertical=”middle” gutter_size=”0″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/12″ uncode_shortcode_id=”984817″][\/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” gutter_size=”0″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”4\/12″ uncode_shortcode_id=”159374″][vc_custom_heading text_color=”color-853579″ heading_semantic=”h4″ text_size=”h3″ text_weight=”700″ text_height=”fontheight-189934″ css_animation=”bottom-t-top” uncode_shortcode_id=”133335″ text_color_type=”uncode-palette”]Construya la Confianza
\ndel Cliente[\/vc_custom_heading][vc_empty_space empty_h=”0″][vc_column_text css_animation=”bottom-t-top” uncode_shortcode_id=”191956″]Los ataques de manipulaci\u00f3n comienzan con el robo de credenciales. La defensa activa de Feedzai previene que los ataques de malware o phishing roben las credenciales, inmediata, autom\u00e1tica, y proactivamente para proteger las cuentas de los clientes.[\/vc_column_text][\/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”6\/12″ uncode_shortcode_id=”176831″][vc_single_image media=”102262″ media_width_percent=”100″ css_animation=”bottom-t-top” uncode_shortcode_id=”147618″][\/vc_column_inner][vc_column_inner width=”1\/12″][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ uncode_shortcode_id=”443447″ limit_content=””][vc_column_inner column_width_percent=”100″ position_vertical=”middle” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/12″ uncode_shortcode_id=”415130″][\/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” gutter_size=”0″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”6\/12″ uncode_shortcode_id=”186629″][vc_single_image media=”102266″ media_width_percent=”100″ css_animation=”bottom-t-top” uncode_shortcode_id=”937686″][\/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” gutter_size=”0″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”4\/12″ uncode_shortcode_id=”212891″][vc_custom_heading text_color=”color-853579″ heading_semantic=”h4″ text_size=”h3″ text_weight=”700″ text_height=”fontheight-189934″ css_animation=”bottom-t-top” uncode_shortcode_id=”342316″ text_color_type=”uncode-palette”]Implemente Defensa
\nPreventiva[\/vc_custom_heading][vc_empty_space empty_h=”0″][vc_column_text css_animation=”bottom-t-top” uncode_shortcode_id=”530891″]Evite que las amenazas activas, como malware y phishing, roben las credenciales o secuestren las sesiones, para proteger a los clientes y asegurarse de que los equipos operativos no est\u00e9n abrumados con alertas, de modo que se puedan centrar en las amenazas reales.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/12″][\/vc_column_inner][\/vc_row_inner][vc_empty_space empty_h=”2″][\/vc_column][\/vc_row][vc_row row_height_percent=”0″ override_padding=”yes” h_padding=”2″ top_padding=”4″ bottom_padding=”4″ back_color=”color-178680″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ uncode_shortcode_id=”830851″ back_color_type=”uncode-palette”][vc_column width=”1\/1″][vc_row_inner limit_content=””][vc_column_inner column_width_percent=”100″ position_vertical=”middle” gutter_size=”0″ style=”dark” overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/12″ uncode_shortcode_id=”960121″][\/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” gutter_size=”0″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”4\/12″ uncode_shortcode_id=”844784″][vc_custom_heading text_color=”color-142326″ text_size=”h6″ text_weight=”600″ text_height=”fontheight-678824″ css_animation=”bottom-t-top” uncode_shortcode_id=”480494″ text_color_type=”uncode-palette”]Digital Trust[\/vc_custom_heading][vc_empty_space empty_h=”0″][vc_custom_heading text_color=”color-853579″ heading_semantic=”h3″ text_size=”h3″ text_weight=”700″ text_height=”fontheight-189934″ css_animation=”bottom-t-top” uncode_shortcode_id=”497490″ text_color_type=”uncode-palette”]\u00bfBusca una Soluci\u00f3n de Prevenci\u00f3n del Fraude Completa y en L\u00ednea?[\/vc_custom_heading][vc_empty_space empty_h=”0″][vc_column_text text_color=”color-xsdn” css_animation=”bottom-t-top” uncode_shortcode_id=”181339″ text_color_type=”uncode-palette”]Detenga el fraude antes de que suceda. Autentique continuamente elementos invisibles detr\u00e1s de cada interacci\u00f3n con la exclusiva defensa proactiva 3 en 1 de Feedzai de dispositivos, malware y biometr\u00eda del comportamiento.[\/vc_column_text][vc_empty_space empty_h=”1″][vc_button button_color=”color-142326″ size=”btn-sm” radius=”btn-circle” border_width=”0″ css_animation=”bottom-t-top” link=”url:%2Fes%2Fla-plataforma-riskops%23digital-trust|title:Lear%20More” button_color_type=”uncode-palette” uncode_shortcode_id=”169037″ width=”90″]Conozca m\u00e1s[\/vc_button][\/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”6\/12″ uncode_shortcode_id=”684667″][vc_single_image media=”103023″ media_width_percent=”100″ uncode_shortcode_id=”676926″][\/vc_column_inner][vc_column_inner width=”1\/12″][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=”0″ override_padding=”yes” h_padding=”2″ top_padding=”4″ bottom_padding=”3″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ uncode_shortcode_id=”727467″][vc_column column_width_percent=”100″ gutter_size=”4″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/1″ uncode_shortcode_id=”484192″][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ inverted_device_order=”yes” uncode_shortcode_id=”191985″ limit_content=””][vc_column_inner column_width_percent=”100″ position_vertical=”middle” gutter_size=”0″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/12″ uncode_shortcode_id=”179573″][\/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” gutter_size=”0″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”4\/12″ uncode_shortcode_id=”118212″][vc_custom_heading text_color=”color-853579″ heading_semantic=”h4″ text_size=”h3″ text_weight=”700″ text_height=”fontheight-189934″ css_animation=”bottom-t-top” uncode_shortcode_id=”115734″ text_color_type=”uncode-palette”]Detenga los Ataques
\nde Manipulaci\u00f3n[\/vc_custom_heading][vc_empty_space empty_h=”0″][vc_column_text css_animation=”bottom-t-top” uncode_shortcode_id=”171901″]Los ataques de manipulaci\u00f3n logran el control de la sesi\u00f3n de banca de la v\u00edctima. La defensa activa de Feedzai detecta estos ataques autenticando continuamente a los usuarios y los detiene, solicitando una autenticaci\u00f3n por pasos o terminando la sesi\u00f3n.[\/vc_column_text][\/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”6\/12″ uncode_shortcode_id=”125191″][vc_single_image media=”102269″ media_width_percent=”100″ css_animation=”bottom-t-top” uncode_shortcode_id=”587937″][\/vc_column_inner][vc_column_inner width=”1\/12″][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ uncode_shortcode_id=”443447″ limit_content=””][vc_column_inner column_width_percent=”100″ position_vertical=”middle” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/12″ uncode_shortcode_id=”415130″][\/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” gutter_size=”0″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”6\/12″ uncode_shortcode_id=”170434″][vc_single_image media=”102273″ media_width_percent=”100″ css_animation=”bottom-t-top” uncode_shortcode_id=”174968″][\/vc_column_inner][vc_column_inner column_width_percent=”100″ position_vertical=”middle” gutter_size=”0″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”4\/12″ uncode_shortcode_id=”137147″][vc_custom_heading text_color=”color-853579″ heading_semantic=”h4″ text_size=”h3″ text_weight=”700″ text_height=”fontheight-189934″ css_animation=”bottom-t-top” uncode_shortcode_id=”174205″ text_color_type=”uncode-palette”]Mejore los Resultados de la Toma de Decisiones de Transacciones[\/vc_custom_heading][vc_empty_space empty_h=”0″][vc_column_text css_animation=”bottom-t-top” uncode_shortcode_id=”121927″]La integraci\u00f3n de los datos ATO de Feedzai ofrece una gama completa de datos y an\u00e1lisis de amenazas y transacciones de cada sesi\u00f3n de los clientes, incluidos biom\u00e9tricos, red y dispositivo, para enriquecer y mejorar la precisi\u00f3n de cada decisi\u00f3n.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/12″][\/vc_column_inner][\/vc_row_inner][vc_empty_space empty_h=”2″][\/vc_column][\/vc_row][vc_row row_height_percent=”0″ override_padding=”yes” h_padding=”2″ top_padding=”0″ bottom_padding=”3″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ desktop_visibility=”yes” medium_visibility=”yes” mobile_visibility=”yes” uncode_shortcode_id=”133257″][vc_column column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/1″ uncode_shortcode_id=”157228″][vc_separator sep_color=”color-gyho”][vc_empty_space empty_h=”2″][vc_custom_heading text_color=”color-853579″ heading_semantic=”h4″ text_size=”h3″ text_weight=”700″ css_animation=”bottom-t-top” uncode_shortcode_id=”587099″ text_color_type=”uncode-palette”]Recursos Relacionados[\/vc_custom_heading][vc_empty_space empty_h=”1″][uncode_index el_id=”index-977743″ isotope_mode=”fitRows” loop=”size:3|order_by:date|post_type:post,resource|by_id:97694,97699,97697|taxonomy_count:10″ gutter_size=”3″ post_items=”media|featured|onpost|original,category|nobg|relative|display-icon,extra,title” resource_items=”media|featured|onpost|original,text|excerpt,title” screen_lg=”1000″ screen_md=”600″ screen_sm=”480″ single_overlay_opacity=”50″ single_padding=”2″ single_title_semantic=”h4″ single_title_dimension=”h4″ single_title_weight=”700″ single_css_animation=”bottom-t-top” el_class=”resource-list” uncode_shortcode_id=”108817″][vc_empty_space empty_h=”2″][\/vc_column][\/vc_row][vc_row row_height_percent=”0″ override_padding=”yes” h_padding=”2″ top_padding=”4″ bottom_padding=”4″ back_color=”color-116710″ overlay_color=”color-wayh” overlay_alpha=”0″ gutter_size=”100″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ style=”inherited” uncode_shortcode_id=”290903″ back_color_type=”uncode-palette” overlay_color_type=”uncode-palette”][vc_column column_width_use_pixel=”yes” position_vertical=”middle” align_horizontal=”align_center” gutter_size=”2″ style=”dark” overlay_alpha=”100″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ zoom_width=”0″ zoom_height=”0″ width=”1\/1″ column_width_pixel=”900″][vc_custom_heading text_color=”color-142326″ heading_semantic=”h6″ text_size=”fontsize-211495″ text_weight=”600″ text_height=”fontheight-179065″ sub_lead=”yes” css_animation=”bottom-t-top” uncode_shortcode_id=”954329″ text_color_type=”uncode-palette”]Solicite una Demostraci\u00f3n[\/vc_custom_heading][vc_custom_heading text_color=”color-853579″ heading_semantic=”h6″ text_weight=”700″ text_height=”fontheight-179065″ sub_lead=”yes” css_animation=”bottom-t-top” uncode_shortcode_id=”283342″ text_color_type=”uncode-palette”]Vea nuestra Tecnolog\u00eda en Acci\u00f3n[\/vc_custom_heading][vc_button button_color=”color-142326″ size=”btn-sm” radius=”btn-circle” border_width=”0″ css_animation=”bottom-t-top” link=”url:%2Fes%2Fcontacto-con-nosotros%2Fsolicite-una-demostracion%2F|title:Solicite%20una%20Demostraci%C3%B3n” button_color_type=”uncode-palette” uncode_shortcode_id=”149890″]Solicite una Demostraci\u00f3n[\/vc_button][vc_empty_space empty_h=”0″][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"

[vc_row row_height_percent=”0″ override_padding=”yes” h_padding=”2″ top_padding=”0″ bottom_padding=”3″ back_color=”color-178680″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ uncode_shortcode_id=”203194″ back_color_type=”uncode-palette”][vc_column column_width_percent=”100″ align_horizontal=”align_center” gutter_size=”0″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ […]<\/p>\n","protected":false},"author":81,"featured_media":102892,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"acf":[],"yoast_head":"\nPrevenci\u00f3n de apropiaci\u00f3n de cuentas (ATO) | Feedzai<\/title>\n<meta name=\"description\" content=\"La soluci\u00f3n de apropiaci\u00f3n de cuentas (ATO) de Feedzai detecta silenciosamente y protege proactivamente a los clientes de la suplantaci\u00f3n ATO y los ataques de manipulaci\u00f3n.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/feedzai.com\/es\/soluciones\/prevencion-de-apropiacion-de-cuentas-ato\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Prevenci\u00f3n de apropiaci\u00f3n de cuentas (ATO) | Feedzai\" \/>\n<meta property=\"og:description\" content=\"La soluci\u00f3n de apropiaci\u00f3n de cuentas (ATO) de Feedzai detecta silenciosamente y protege proactivamente a los clientes de la suplantaci\u00f3n ATO y los ataques de manipulaci\u00f3n.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/feedzai.com\/es\/soluciones\/prevencion-de-apropiacion-de-cuentas-ato\/\" \/>\n<meta property=\"og:site_name\" content=\"Feedzai\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-24T09:14:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/feedzai.com\/aptopees\/2022\/03\/Solutions_ATO_linkedin-ES.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Prevenci\u00f3n de apropiaci\u00f3n de cuentas (ATO) | Feedzai\" \/>\n<meta name=\"twitter:description\" content=\"La soluci\u00f3n de apropiaci\u00f3n de cuentas (ATO) de Feedzai detecta silenciosamente y protege proactivamente a los clientes de la suplantaci\u00f3n ATO y los ataques de manipulaci\u00f3n.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/feedzai.com\/aptopees\/2022\/03\/Solutions_ATO_twiter-ES.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"18 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/feedzai.com\/es\/soluciones\/prevencion-de-apropiacion-de-cuentas-ato\/\",\"url\":\"https:\/\/feedzai.com\/es\/soluciones\/prevencion-de-apropiacion-de-cuentas-ato\/\",\"name\":\"Prevenci\u00f3n de apropiaci\u00f3n de cuentas (ATO) | Feedzai\",\"isPartOf\":{\"@id\":\"https:\/\/feedzai.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/feedzai.com\/es\/soluciones\/prevencion-de-apropiacion-de-cuentas-ato\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/feedzai.com\/es\/soluciones\/prevencion-de-apropiacion-de-cuentas-ato\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/feedzai.com\/aptopees\/2022\/02\/Feedzai_Prevent_Account_Takeover_thumb.png\",\"datePublished\":\"2022-01-25T01:27:10+00:00\",\"dateModified\":\"2024-04-24T09:14:24+00:00\",\"description\":\"La soluci\u00f3n de apropiaci\u00f3n de cuentas (ATO) de Feedzai detecta silenciosamente y protege proactivamente a los clientes de la suplantaci\u00f3n ATO y los ataques de manipulaci\u00f3n.\",\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/feedzai.com\/es\/soluciones\/prevencion-de-apropiacion-de-cuentas-ato\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/feedzai.com\/es\/soluciones\/prevencion-de-apropiacion-de-cuentas-ato\/#primaryimage\",\"url\":\"https:\/\/feedzai.com\/aptopees\/2022\/02\/Feedzai_Prevent_Account_Takeover_thumb.png\",\"contentUrl\":\"https:\/\/feedzai.com\/aptopees\/2022\/02\/Feedzai_Prevent_Account_Takeover_thumb.png\",\"width\":800,\"height\":420,\"caption\":\"Feedzai_Prevent_Account_Takeover_thumb\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/feedzai.com\/es\/#website\",\"url\":\"https:\/\/feedzai.com\/es\/\",\"name\":\"Feedzai\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/feedzai.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/feedzai.com\/es\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/feedzai.com\/es\/#organization\",\"name\":\"Feedzai\",\"url\":\"https:\/\/feedzai.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/feedzai.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/feedzai.com\/aptopees\/2020\/08\/feedzai_color.svg\",\"contentUrl\":\"https:\/\/feedzai.com\/aptopees\/2020\/08\/feedzai_color.svg\",\"width\":129,\"height\":41,\"caption\":\"Feedzai\"},\"image\":{\"@id\":\"https:\/\/feedzai.com\/es\/#\/schema\/logo\/image\/\"}}]}<\/script>\n","yoast_head_json":{"title":"Prevenci\u00f3n de apropiaci\u00f3n de cuentas (ATO) | Feedzai","description":"La soluci\u00f3n de apropiaci\u00f3n de cuentas (ATO) de Feedzai detecta silenciosamente y protege proactivamente a los clientes de la suplantaci\u00f3n ATO y los ataques de manipulaci\u00f3n.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/feedzai.com\/es\/soluciones\/prevencion-de-apropiacion-de-cuentas-ato\/","og_locale":"es_ES","og_type":"article","og_title":"Prevenci\u00f3n de apropiaci\u00f3n de cuentas (ATO) | Feedzai","og_description":"La soluci\u00f3n de apropiaci\u00f3n de cuentas (ATO) de Feedzai detecta silenciosamente y protege proactivamente a los clientes de la suplantaci\u00f3n ATO y los ataques de manipulaci\u00f3n.","og_url":"https:\/\/feedzai.com\/es\/soluciones\/prevencion-de-apropiacion-de-cuentas-ato\/","og_site_name":"Feedzai","article_modified_time":"2024-04-24T09:14:24+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/feedzai.com\/aptopees\/2022\/03\/Solutions_ATO_linkedin-ES.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Prevenci\u00f3n de apropiaci\u00f3n de cuentas (ATO) | Feedzai","twitter_description":"La soluci\u00f3n de apropiaci\u00f3n de cuentas (ATO) de Feedzai detecta silenciosamente y protege proactivamente a los clientes de la suplantaci\u00f3n ATO y los ataques de manipulaci\u00f3n.","twitter_image":"https:\/\/feedzai.com\/aptopees\/2022\/03\/Solutions_ATO_twiter-ES.jpg","twitter_misc":{"Tiempo de lectura":"18 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/feedzai.com\/es\/soluciones\/prevencion-de-apropiacion-de-cuentas-ato\/","url":"https:\/\/feedzai.com\/es\/soluciones\/prevencion-de-apropiacion-de-cuentas-ato\/","name":"Prevenci\u00f3n de apropiaci\u00f3n de cuentas (ATO) | Feedzai","isPartOf":{"@id":"https:\/\/feedzai.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/feedzai.com\/es\/soluciones\/prevencion-de-apropiacion-de-cuentas-ato\/#primaryimage"},"image":{"@id":"https:\/\/feedzai.com\/es\/soluciones\/prevencion-de-apropiacion-de-cuentas-ato\/#primaryimage"},"thumbnailUrl":"https:\/\/feedzai.com\/aptopees\/2022\/02\/Feedzai_Prevent_Account_Takeover_thumb.png","datePublished":"2022-01-25T01:27:10+00:00","dateModified":"2024-04-24T09:14:24+00:00","description":"La soluci\u00f3n de apropiaci\u00f3n de cuentas (ATO) de Feedzai detecta silenciosamente y protege proactivamente a los clientes de la suplantaci\u00f3n ATO y los ataques de manipulaci\u00f3n.","inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/feedzai.com\/es\/soluciones\/prevencion-de-apropiacion-de-cuentas-ato\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/feedzai.com\/es\/soluciones\/prevencion-de-apropiacion-de-cuentas-ato\/#primaryimage","url":"https:\/\/feedzai.com\/aptopees\/2022\/02\/Feedzai_Prevent_Account_Takeover_thumb.png","contentUrl":"https:\/\/feedzai.com\/aptopees\/2022\/02\/Feedzai_Prevent_Account_Takeover_thumb.png","width":800,"height":420,"caption":"Feedzai_Prevent_Account_Takeover_thumb"},{"@type":"WebSite","@id":"https:\/\/feedzai.com\/es\/#website","url":"https:\/\/feedzai.com\/es\/","name":"Feedzai","description":"","publisher":{"@id":"https:\/\/feedzai.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/feedzai.com\/es\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/feedzai.com\/es\/#organization","name":"Feedzai","url":"https:\/\/feedzai.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/feedzai.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/feedzai.com\/aptopees\/2020\/08\/feedzai_color.svg","contentUrl":"https:\/\/feedzai.com\/aptopees\/2020\/08\/feedzai_color.svg","width":129,"height":41,"caption":"Feedzai"},"image":{"@id":"https:\/\/feedzai.com\/es\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/feedzai.com\/es\/wp-json\/wp\/v2\/pages\/103672"}],"collection":[{"href":"https:\/\/feedzai.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/feedzai.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/feedzai.com\/es\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/feedzai.com\/es\/wp-json\/wp\/v2\/comments?post=103672"}],"version-history":[{"count":16,"href":"https:\/\/feedzai.com\/es\/wp-json\/wp\/v2\/pages\/103672\/revisions"}],"predecessor-version":[{"id":131857,"href":"https:\/\/feedzai.com\/es\/wp-json\/wp\/v2\/pages\/103672\/revisions\/131857"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/feedzai.com\/es\/wp-json\/wp\/v2\/media\/102892"}],"wp:attachment":[{"href":"https:\/\/feedzai.com\/es\/wp-json\/wp\/v2\/media?parent=103672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}