{"version":"1.0","provider_name":"Fortinet","provider_url":"https:\/\/directortic.es\/fortinet","author_name":"Manuel","author_url":"https:\/\/directortic.es\/fortinet\/author\/manu\/","title":"\u00bfC\u00f3mo proteger las redes m\u00f3viles privadas 5G? - Fortinet","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"snM20hV4Ax\"><a href=\"https:\/\/directortic.es\/fortinet\/2021\/04\/14\/como-proteger-las-redes-moviles-privadas-5g\/\">\u00bfC\u00f3mo proteger las redes m\u00f3viles privadas 5G?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/directortic.es\/fortinet\/2021\/04\/14\/como-proteger-las-redes-moviles-privadas-5g\/embed\/#?secret=snM20hV4Ax\" width=\"600\" height=\"338\" title=\"\u00ab\u00bfC\u00f3mo proteger las redes m\u00f3viles privadas 5G?\u00bb \u2014 Fortinet\" data-secret=\"snM20hV4Ax\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/directortic.es\/fortinet\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/04\/Captura-de-pantalla-2021-04-14-a-las-17.00.02.png","thumbnail_width":2028,"thumbnail_height":1278,"description":"La llegada del 5G hace que las empresas recurran a sus servicios como un factor clave de innovaci\u00f3n, al tiempo que cogen fuerza las redes m\u00f3viles no p\u00fablicas, que se encuentran entre los casos de uso cr\u00edticos del 5G. La seguridad debe de ser una prioridad para las mismas. \u00bfQu\u00e9 hay que tener en cuenta [&hellip;]"}