{"version":"1.0","provider_name":"Fortinet","provider_url":"https:\/\/directortic.es\/fortinet","author_name":"Manuel","author_url":"https:\/\/directortic.es\/fortinet\/author\/manu\/","title":"Una estrategia de Acceso de Confianza Cero - Fortinet","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"RBYFg6DsLT\"><a href=\"https:\/\/directortic.es\/fortinet\/2021\/01\/11\/una-estrategia-de-acceso-de-confianza-cero\/\">Una estrategia de Acceso de Confianza Cero<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/directortic.es\/fortinet\/2021\/01\/11\/una-estrategia-de-acceso-de-confianza-cero\/embed\/#?secret=RBYFg6DsLT\" width=\"600\" height=\"338\" title=\"\u00abUna estrategia de Acceso de Confianza Cero\u00bb \u2014 Fortinet\" data-secret=\"RBYFg6DsLT\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/directortic.es\/fortinet\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/01\/estrategia-confianza-cero-banner-fortinet.jpg","thumbnail_width":800,"thumbnail_height":580,"description":"Los modelos de seguridad con los que hasta ahora hemos trabajado se basan en el supuesto de que todo lo que se encuentra en la red de las organizaciones es seguro. Pero nada m\u00e1s lejos de la realidad. Hoy en d\u00eda con todos los dispositivos que tenemos a nuestra disposici\u00f3n para interactuar con la red [&hellip;]"}