{"id":185,"date":"2021-02-15T11:12:14","date_gmt":"2021-02-15T11:12:14","guid":{"rendered":"https:\/\/directortic.es\/fortinet\/?p=185"},"modified":"2023-01-30T16:43:20","modified_gmt":"2023-01-30T16:43:20","slug":"como-proteger-los-entornos-industriales-y-servicios-esenciales","status":"publish","type":"post","link":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-proteger-los-entornos-industriales-y-servicios-esenciales\/","title":{"rendered":"\u00bfC\u00f3mo proteger los entornos industriales y servicios esenciales?"},"content":{"rendered":"<p>2020 se caracteriz\u00f3 por un aumento en el n\u00famero de ciberataques al segmento empresarial. Los entornos industriales y los servicios esenciales no se libraron de ellos.<\/p>\n<p>La presencia de dispositivos IoT en el entorno industrial como aquellos que controlan el alumbrado o los contadores digitales de luz y agua, por poner algunos ejemplos, necesitan una protecci\u00f3n contra los ciberataques, con herramientas que eviten la modificaci\u00f3n de su firmware y la intercepci\u00f3n de la red que los controla. Dispositivos que, en caso de ataque, afectar\u00edan gravemente al funcionamiento de las industrias y de los servicios que ofrecen, con graves p\u00e9rdidas econ\u00f3micas y de reputaci\u00f3n.<\/p>\n<p>Un ataque de ransomware podr\u00eda conllevar paradas de producci\u00f3n y de denegaci\u00f3n de servicio, algo que ya ha ocurrido en empresas del sector el\u00e9ctrico y del agua, por lo que integridad y confidencialidad deben protegerse.<\/p>\n<p>Las previsiones apuntan a que en 2021 el sector industrial puede sufrir un incremento de las amenazas, por lo que deber\u00e1 adaptar sus estrategias para afrontar el nuevo modus operandi de los ciberdelincuentes.<\/p>\n<p>Entre los retos que estas empresas deben acometer figuran la incorporaci\u00f3n de la ciberseguridad en la cadena de suministro o en el dise\u00f1o de los proyectos de digitalizaci\u00f3n industrial, entre otros.<\/p>\n<p>La Directiva NIS, a nivel europeo, intenta frenar la preocupaci\u00f3n por las posibles consecuencias de los ciberataques en los servicios esenciales. Y reducir el peligro que supone para la seguridad p\u00fablica y la seguridad nacional, as\u00ed como la obligaci\u00f3n de, en caso de incumplimiento, del establecimiento de un r\u00e9gimen sancionador por parte de los Estados Miembros.<\/p>\n<p>En Espa\u00f1a los operadores de servicios esenciales tendr\u00e1n que notificar a la autoridad competente los incidentes que puedan conllevar efectos importantes en esos servicios.<\/p>\n<p><strong>Seguridad para entornos OT<\/strong><\/p>\n<p>Los responsables de redes en entornos de tecnolog\u00eda operacional tienen que hacer frente a ciberamenazas avanzadas y necesitan arquitecturas de seguridad que proporcionen una defensa en profundidad. Fortinet Security Fabric satisface esta necesidad con soluciones amplias, integradas y automatizadas que abarcan los entornos de OT e IT.<\/p>\n<p>Estas soluciones permiten la detecci\u00f3n y mitigaci\u00f3n de amenazas avanzadas, an\u00e1lisis e informes eficaces, y una gesti\u00f3n y visibilidad \u00fanicas.<\/p>\n<div  class=\"jeg_postblock_5 jeg_postblock jeg_module_hook jeg_pagination_disable jeg_col_3o3 jnews_module__0_69def42427019   \" data-unique=\"jnews_module__0_69def42427019\">\n\t\t\t\t\t<div class=\"jeg_block_heading jeg_block_heading_6 jeg_subcat_right\">\n                     <h3 class=\"jeg_block_title\"><span>DOCUMENTO RELACIONADO<\/span><\/h3>\n                     \n                 <\/div>\n\t\t\t\t\t<div class=\"jeg_block_container\">\n                    \n                    <div class=\"jeg_posts jeg_load_more_flag\"><article class=\"jeg_post jeg_pl_lg_2 format-standard\">\n                    <div class=\"jeg_thumb\">\n                        \n                        <a href=\"https:\/\/directortic.es\/fortinet\/2021\/02\/16\/sabes-como-disenar-la-seguridad-para-los-entornos-de-red-ot\/\" aria-label=\"Read article: \u00bfSabes c\u00f3mo dise\u00f1ar la seguridad para los entornos de red OT?\"><div class=\"thumbnail-container animate-lazy  size-715 \"><img loading=\"lazy\" decoding=\"async\" width=\"350\" height=\"250\" src=\"https:\/\/directortic.es\/fortinet\/wp-content\/themes\/jnews\/assets\/img\/jeg-empty.png\" class=\"attachment-jnews-350x250 size-jnews-350x250 lazyload wp-post-image\" alt=\"\u00bfSabes c\u00f3mo dise\u00f1ar la seguridad para los entornos de red OT?\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" data-src=\"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/02\/disen\u0303ar-la-seguridad-para-entornos-OT-fortinet-banner-350x250.jpg\" data-srcset=\"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/02\/disen\u0303ar-la-seguridad-para-entornos-OT-fortinet-banner-350x250.jpg 350w, https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/02\/disen\u0303ar-la-seguridad-para-entornos-OT-fortinet-banner-800x570.jpg 800w, https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/02\/disen\u0303ar-la-seguridad-para-entornos-OT-fortinet-banner-120x86.jpg 120w, https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/02\/disen\u0303ar-la-seguridad-para-entornos-OT-fortinet-banner-750x536.jpg 750w\" data-sizes=\"auto\" data-expand=\"700\" \/><\/div><\/a>\n                        <div class=\"jeg_post_category\">\n                            <span><a href=\"https:\/\/directortic.es\/fortinet\/category\/documentos\/\" class=\"category-documentos\">Documentos<\/a><\/span>\n                        <\/div>\n                    <\/div>\n                    <div class=\"jeg_postblock_content\">\n                        <h3 class=\"jeg_post_title\">\n                            <a href=\"https:\/\/directortic.es\/fortinet\/2021\/02\/16\/sabes-como-disenar-la-seguridad-para-los-entornos-de-red-ot\/\">\u00bfSabes c\u00f3mo dise\u00f1ar la seguridad para los entornos de red OT?<\/a>\n                        <\/h3>\n                        \n                        <div class=\"jeg_post_excerpt\">\n                            <p>Si tenemos en cuenta que casi tres cuartas partes de las organizaciones industriales tienen conexiones entre sus redes de tecnolog\u00eda...<\/p>\n                            <a href=\"https:\/\/directortic.es\/fortinet\/2021\/02\/16\/sabes-como-disenar-la-seguridad-para-los-entornos-de-red-ot\/\" class=\"jeg_readmore\">Leer m\u00e1s<span class=\"screen-reader-text\">Details<\/span><\/a>\n                        <\/div>\n                    <\/div>\n                <\/article><\/div>\n                    <div class='module-overlay'>\n\t\t\t\t    <div class='preloader_type preloader_dot'>\n\t\t\t\t        <div class=\"module-preloader jeg_preloader dot\">\n\t\t\t\t            <span><\/span><span><\/span><span><\/span>\n\t\t\t\t        <\/div>\n\t\t\t\t        <div class=\"module-preloader jeg_preloader circle\">\n\t\t\t\t            <div class=\"jnews_preloader_circle_outer\">\n\t\t\t\t                <div class=\"jnews_preloader_circle_inner\"><\/div>\n\t\t\t\t            <\/div>\n\t\t\t\t        <\/div>\n\t\t\t\t        <div class=\"module-preloader jeg_preloader square\">\n\t\t\t\t            <div class=\"jeg_square\">\n\t\t\t\t                <div class=\"jeg_square_inner\"><\/div>\n\t\t\t\t            <\/div>\n\t\t\t\t        <\/div>\n\t\t\t\t    <\/div>\n\t\t\t\t<\/div>\n                <\/div>\n                <div class=\"jeg_block_navigation\">\n                    <div class='navigation_overlay'><div class='module-preloader jeg_preloader'><span><\/span><span><\/span><span><\/span><\/div><\/div>\n                    \n                    \n                <\/div>\n\t\t\t\t\t\n\t\t\t\t\t<script>var jnews_module__0_69def42427019 = {\"header_icon\":\"\",\"first_title\":\"DOCUMENTO RELACIONADO\",\"second_title\":\"\",\"url\":\"\",\"header_type\":\"heading_6\",\"header_background\":\"\",\"header_secondary_background\":\"\",\"header_text_color\":\"\",\"header_line_color\":\"\",\"header_accent_color\":\"\",\"header_filter_category\":\"\",\"header_filter_author\":\"\",\"header_filter_tag\":\"\",\"header_filter_text\":\"All\",\"sticky_post\":false,\"sticky_post_filter\":false,\"post_type\":\"post\",\"content_type\":\"all\",\"sponsor\":false,\"number_post\":\"1\",\"post_offset\":0,\"unique_content\":\"disable\",\"include_post\":\"208\",\"included_only\":false,\"exclude_post\":\"\",\"include_category\":\"\",\"exclude_category\":\"\",\"include_author\":\"\",\"include_tag\":\"\",\"exclude_tag\":\"\",\"exclude_visited_post\":false,\"sort_by\":\"latest\",\"date_format\":\"default\",\"date_format_custom\":\"Y\\\/m\\\/d\",\"excerpt_length\":20,\"excerpt_ellipsis\":\"...\",\"force_normal_image_load\":\"\",\"main_custom_image_size\":\"default\",\"pagination_mode\":\"disable\",\"pagination_nextprev_showtext\":\"\",\"pagination_number_post\":4,\"pagination_scroll_limit\":0,\"ads_type\":\"disable\",\"ads_position\":1,\"ads_random\":\"\",\"ads_image\":\"\",\"ads_image_tablet\":\"\",\"ads_image_phone\":\"\",\"ads_image_link\":\"\",\"ads_image_alt\":\"\",\"ads_image_new_tab\":\"\",\"google_publisher_id\":\"\",\"google_slot_id\":\"\",\"google_desktop\":\"auto\",\"google_tab\":\"auto\",\"google_phone\":\"auto\",\"content\":\"\",\"ads_bottom_text\":\"\",\"boxed\":\"\",\"boxed_shadow\":\"\",\"el_id\":\"\",\"el_class\":\"\",\"scheme\":\"\",\"column_width\":\"auto\",\"title_color\":\"\",\"accent_color\":\"\",\"alt_color\":\"\",\"excerpt_color\":\"\",\"css\":\"\",\"paged\":1,\"column_class\":\"jeg_col_3o3\",\"class\":\"jnews_block_5\"};<\/script>\n\t\t\t\t<\/div>\n","protected":false},"excerpt":{"rendered":"<p>2020 se caracteriz\u00f3 por un aumento en el n\u00famero de ciberataques al segmento empresarial. Los entornos industriales y los servicios esenciales no se libraron de ellos. La presencia de dispositivos IoT en el entorno industrial como aquellos que controlan el alumbrado o los contadores digitales de luz y agua, por poner algunos ejemplos, necesitan una [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":186,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jnews-multi-image_gallery":[],"jnews_single_post":{"source_name":"","source_url":"","via_name":"","via_url":"","override_template":"0","override":[{"template":"1","single_blog_custom":"","parallax":"1","fullscreen":"0","layout":"right-sidebar","sidebar":"default-sidebar","second_sidebar":"default-sidebar","sticky_sidebar":"1","share_position":"top","share_float_style":"share-monocrhome","show_share_counter":"1","show_view_counter":"1","show_featured":"1","show_post_meta":"1","show_post_author":"1","show_post_author_image":"1","show_post_date":"1","post_date_format":"default","post_date_format_custom":"Y\/m\/d","show_post_category":"1","show_post_reading_time":"0","post_reading_time_wpm":"300","show_zoom_button":"0","zoom_button_out_step":"2","zoom_button_in_step":"3","show_post_tag":"1","show_prev_next_post":"1","show_popup_post":"1","number_popup_post":"1","show_author_box":"0","show_post_related":"0","show_inline_post_related":"0"}],"override_image_size":"0","image_override":[{"single_post_thumbnail_size":"crop-500","single_post_gallery_size":"crop-500"}],"trending_post":"0","trending_post_position":"meta","trending_post_label":"Trending","sponsored_post":"0","sponsored_post_label":"Sponsored by","sponsored_post_name":"","sponsored_post_url":"","sponsored_post_logo_enable":"0","sponsored_post_logo":"","sponsored_post_desc":""},"jnews_primary_category":{"id":""},"jnews_social_meta":{"fb_title":"","fb_description":"","fb_image":"","twitter_title":"","twitter_description":"","twitter_image":""},"jnews_override_counter":{"override_view_counter":"0","view_counter_number":"0","override_share_counter":"0","share_counter_number":"0","override_like_counter":"0","like_counter_number":"0","override_dislike_counter":"0","dislike_counter_number":"0"},"footnotes":""},"categories":[4],"tags":[],"class_list":["post-185","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articulos"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u00bfC\u00f3mo proteger los entornos industriales y servicios esenciales? - Fortinet<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-proteger-los-entornos-industriales-y-servicios-esenciales\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfC\u00f3mo proteger los entornos industriales y servicios esenciales? - Fortinet\" \/>\n<meta property=\"og:description\" content=\"2020 se caracteriz\u00f3 por un aumento en el n\u00famero de ciberataques al segmento empresarial. Los entornos industriales y los servicios esenciales no se libraron de ellos. La presencia de dispositivos IoT en el entorno industrial como aquellos que controlan el alumbrado o los contadores digitales de luz y agua, por poner algunos ejemplos, necesitan una [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-proteger-los-entornos-industriales-y-servicios-esenciales\/\" \/>\n<meta property=\"og:site_name\" content=\"Fortinet\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-15T11:12:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-30T16:43:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/02\/dreamstime_s_111874656.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"555\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Manuel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Manuel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-proteger-los-entornos-industriales-y-servicios-esenciales\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-proteger-los-entornos-industriales-y-servicios-esenciales\\\/\"},\"author\":{\"name\":\"Manuel\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\"},\"headline\":\"\u00bfC\u00f3mo proteger los entornos industriales y servicios esenciales?\",\"datePublished\":\"2021-02-15T11:12:14+00:00\",\"dateModified\":\"2023-01-30T16:43:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-proteger-los-entornos-industriales-y-servicios-esenciales\\\/\"},\"wordCount\":396,\"image\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-proteger-los-entornos-industriales-y-servicios-esenciales\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/02\\\/dreamstime_s_111874656.jpg\",\"articleSection\":[\"Art\u00edculos\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-proteger-los-entornos-industriales-y-servicios-esenciales\\\/\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-proteger-los-entornos-industriales-y-servicios-esenciales\\\/\",\"name\":\"\u00bfC\u00f3mo proteger los entornos industriales y servicios esenciales? - Fortinet\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-proteger-los-entornos-industriales-y-servicios-esenciales\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-proteger-los-entornos-industriales-y-servicios-esenciales\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/02\\\/dreamstime_s_111874656.jpg\",\"datePublished\":\"2021-02-15T11:12:14+00:00\",\"dateModified\":\"2023-01-30T16:43:20+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-proteger-los-entornos-industriales-y-servicios-esenciales\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-proteger-los-entornos-industriales-y-servicios-esenciales\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-proteger-los-entornos-industriales-y-servicios-esenciales\\\/#primaryimage\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/02\\\/dreamstime_s_111874656.jpg\",\"contentUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/02\\\/dreamstime_s_111874656.jpg\",\"width\":800,\"height\":555},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-proteger-los-entornos-industriales-y-servicios-esenciales\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfC\u00f3mo proteger los entornos industriales y servicios esenciales?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#website\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/\",\"name\":\"Fortinet\",\"description\":\"Dise\u00f1ado para Redes basadas en la Seguridad\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\",\"name\":\"Manuel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"caption\":\"Manuel\"},\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/author\\\/manu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfC\u00f3mo proteger los entornos industriales y servicios esenciales? - Fortinet","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-proteger-los-entornos-industriales-y-servicios-esenciales\/","og_locale":"es_ES","og_type":"article","og_title":"\u00bfC\u00f3mo proteger los entornos industriales y servicios esenciales? - Fortinet","og_description":"2020 se caracteriz\u00f3 por un aumento en el n\u00famero de ciberataques al segmento empresarial. Los entornos industriales y los servicios esenciales no se libraron de ellos. La presencia de dispositivos IoT en el entorno industrial como aquellos que controlan el alumbrado o los contadores digitales de luz y agua, por poner algunos ejemplos, necesitan una [&hellip;]","og_url":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-proteger-los-entornos-industriales-y-servicios-esenciales\/","og_site_name":"Fortinet","article_published_time":"2021-02-15T11:12:14+00:00","article_modified_time":"2023-01-30T16:43:20+00:00","og_image":[{"width":800,"height":555,"url":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/02\/dreamstime_s_111874656.jpg","type":"image\/jpeg"}],"author":"Manuel","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Manuel","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-proteger-los-entornos-industriales-y-servicios-esenciales\/#article","isPartOf":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-proteger-los-entornos-industriales-y-servicios-esenciales\/"},"author":{"name":"Manuel","@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8"},"headline":"\u00bfC\u00f3mo proteger los entornos industriales y servicios esenciales?","datePublished":"2021-02-15T11:12:14+00:00","dateModified":"2023-01-30T16:43:20+00:00","mainEntityOfPage":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-proteger-los-entornos-industriales-y-servicios-esenciales\/"},"wordCount":396,"image":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-proteger-los-entornos-industriales-y-servicios-esenciales\/#primaryimage"},"thumbnailUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/02\/dreamstime_s_111874656.jpg","articleSection":["Art\u00edculos"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-proteger-los-entornos-industriales-y-servicios-esenciales\/","url":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-proteger-los-entornos-industriales-y-servicios-esenciales\/","name":"\u00bfC\u00f3mo proteger los entornos industriales y servicios esenciales? - Fortinet","isPartOf":{"@id":"https:\/\/directortic.es\/fortinet\/#website"},"primaryImageOfPage":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-proteger-los-entornos-industriales-y-servicios-esenciales\/#primaryimage"},"image":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-proteger-los-entornos-industriales-y-servicios-esenciales\/#primaryimage"},"thumbnailUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/02\/dreamstime_s_111874656.jpg","datePublished":"2021-02-15T11:12:14+00:00","dateModified":"2023-01-30T16:43:20+00:00","author":{"@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8"},"breadcrumb":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-proteger-los-entornos-industriales-y-servicios-esenciales\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-proteger-los-entornos-industriales-y-servicios-esenciales\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-proteger-los-entornos-industriales-y-servicios-esenciales\/#primaryimage","url":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/02\/dreamstime_s_111874656.jpg","contentUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/02\/dreamstime_s_111874656.jpg","width":800,"height":555},{"@type":"BreadcrumbList","@id":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-proteger-los-entornos-industriales-y-servicios-esenciales\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/directortic.es\/fortinet\/"},{"@type":"ListItem","position":2,"name":"\u00bfC\u00f3mo proteger los entornos industriales y servicios esenciales?"}]},{"@type":"WebSite","@id":"https:\/\/directortic.es\/fortinet\/#website","url":"https:\/\/directortic.es\/fortinet\/","name":"Fortinet","description":"Dise\u00f1ado para Redes basadas en la Seguridad","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/directortic.es\/fortinet\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8","name":"Manuel","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","caption":"Manuel"},"url":"https:\/\/directortic.es\/fortinet\/author\/manu\/"}]}},"_links":{"self":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/comments?post=185"}],"version-history":[{"count":3,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/185\/revisions"}],"predecessor-version":[{"id":211,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/185\/revisions\/211"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/media\/186"}],"wp:attachment":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/media?parent=185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/categories?post=185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/tags?post=185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}