{"id":264,"date":"2021-04-07T11:48:18","date_gmt":"2021-04-07T11:48:18","guid":{"rendered":"https:\/\/directortic.es\/fortinet\/?p=264"},"modified":"2023-01-30T16:43:03","modified_gmt":"2023-01-30T16:43:03","slug":"security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet","status":"publish","type":"post","link":"https:\/\/directortic.es\/fortinet\/2021\/04\/07\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\/","title":{"rendered":"Security Fabric, la seguridad de extremo a extremo de Fortinet"},"content":{"rendered":"<p>La propuesta de seguridad de Fortinet se asienta en su arquitectura Security Fabric. Una plataforma que integra el amplio abanico de soluciones de seguridad de la compa\u00f1\u00eda. Tal y como explica Jos\u00e9 Luis Laguna, Director Systems Engineering de Fortinet, en este v\u00eddeo la idea es que las organizaciones tengan que desplegar una \u00fanica soluci\u00f3n capaz de proteger todas las capas de la seguridad, desde el acceso a la red o al cloud hasta la protecci\u00f3n de servidores y aplicaciones.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La propuesta de seguridad de Fortinet se asienta en su arquitectura Security Fabric. Una plataforma que integra el amplio abanico de soluciones de seguridad de la compa\u00f1\u00eda. Tal y como explica Jos\u00e9 Luis Laguna, Director Systems Engineering de Fortinet, en este v\u00eddeo la idea es que las organizaciones tengan que desplegar una \u00fanica soluci\u00f3n capaz [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":267,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"video","meta":{"jnews-multi-image_gallery":[],"jnews_single_post":{"source_name":"","source_url":"","via_name":"","via_url":"","override_template":"0","override":[{"template":"1","single_blog_custom":"","parallax":"1","fullscreen":"0","layout":"right-sidebar","sidebar":"default-sidebar","second_sidebar":"default-sidebar","sticky_sidebar":"1","share_position":"top","share_float_style":"share-monocrhome","show_share_counter":"1","show_view_counter":"1","show_featured":"1","show_post_meta":"1","show_post_author":"1","show_post_author_image":"1","show_post_date":"1","post_date_format":"default","post_date_format_custom":"Y\/m\/d","show_post_category":"1","show_post_reading_time":"0","post_reading_time_wpm":"300","show_zoom_button":"0","zoom_button_out_step":"2","zoom_button_in_step":"3","show_post_tag":"1","show_prev_next_post":"1","show_popup_post":"1","number_popup_post":"1","show_author_box":"0","show_post_related":"0","show_inline_post_related":"0"}],"override_image_size":"0","image_override":[{"single_post_thumbnail_size":"crop-500","single_post_gallery_size":"crop-500"}],"trending_post":"0","trending_post_position":"meta","trending_post_label":"Trending","sponsored_post":"0","sponsored_post_label":"Sponsored by","sponsored_post_name":"","sponsored_post_url":"","sponsored_post_logo_enable":"0","sponsored_post_logo":"","sponsored_post_desc":""},"jnews_primary_category":{"id":""},"jnews_social_meta":{"fb_title":"","fb_description":"","fb_image":"","twitter_title":"","twitter_description":"","twitter_image":""},"jnews_override_counter":{"override_view_counter":"0","view_counter_number":"0","override_share_counter":"0","share_counter_number":"0","override_like_counter":"0","like_counter_number":"0","override_dislike_counter":"0","dislike_counter_number":"0"},"footnotes":""},"categories":[9],"tags":[],"class_list":["post-264","post","type-post","status-publish","format-video","has-post-thumbnail","hentry","category-videos","post_format-post-format-video"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Fabric, la seguridad de extremo a extremo de Fortinet - Fortinet<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/directortic.es\/fortinet\/2021\/04\/07\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Fabric, la seguridad de extremo a extremo de Fortinet - Fortinet\" \/>\n<meta property=\"og:description\" content=\"La propuesta de seguridad de Fortinet se asienta en su arquitectura Security Fabric. Una plataforma que integra el amplio abanico de soluciones de seguridad de la compa\u00f1\u00eda. Tal y como explica Jos\u00e9 Luis Laguna, Director Systems Engineering de Fortinet, en este v\u00eddeo la idea es que las organizaciones tengan que desplegar una \u00fanica soluci\u00f3n capaz [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/directortic.es\/fortinet\/2021\/04\/07\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\/\" \/>\n<meta property=\"og:site_name\" content=\"Fortinet\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-07T11:48:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-30T16:43:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/04\/Security-Fabric-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1536\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Manuel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Manuel\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/07\\\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/07\\\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\\\/\"},\"author\":{\"name\":\"Manuel\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\"},\"headline\":\"Security Fabric, la seguridad de extremo a extremo de Fortinet\",\"datePublished\":\"2021-04-07T11:48:18+00:00\",\"dateModified\":\"2023-01-30T16:43:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/07\\\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\\\/\"},\"wordCount\":93,\"image\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/07\\\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/04\\\/Security-Fabric-scaled.jpg\",\"articleSection\":[\"V\u00eddeos\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/07\\\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\\\/\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/07\\\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\\\/\",\"name\":\"Security Fabric, la seguridad de extremo a extremo de Fortinet - Fortinet\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/07\\\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/07\\\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/04\\\/Security-Fabric-scaled.jpg\",\"datePublished\":\"2021-04-07T11:48:18+00:00\",\"dateModified\":\"2023-01-30T16:43:03+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/07\\\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/07\\\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/07\\\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\\\/#primaryimage\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/04\\\/Security-Fabric-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/04\\\/Security-Fabric-scaled.jpg\",\"width\":2560,\"height\":1536},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/07\\\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Fabric, la seguridad de extremo a extremo de Fortinet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#website\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/\",\"name\":\"Fortinet\",\"description\":\"Dise\u00f1ado para Redes basadas en la Seguridad\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\",\"name\":\"Manuel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"caption\":\"Manuel\"},\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/author\\\/manu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Fabric, la seguridad de extremo a extremo de Fortinet - Fortinet","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/directortic.es\/fortinet\/2021\/04\/07\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\/","og_locale":"es_ES","og_type":"article","og_title":"Security Fabric, la seguridad de extremo a extremo de Fortinet - Fortinet","og_description":"La propuesta de seguridad de Fortinet se asienta en su arquitectura Security Fabric. Una plataforma que integra el amplio abanico de soluciones de seguridad de la compa\u00f1\u00eda. Tal y como explica Jos\u00e9 Luis Laguna, Director Systems Engineering de Fortinet, en este v\u00eddeo la idea es que las organizaciones tengan que desplegar una \u00fanica soluci\u00f3n capaz [&hellip;]","og_url":"https:\/\/directortic.es\/fortinet\/2021\/04\/07\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\/","og_site_name":"Fortinet","article_published_time":"2021-04-07T11:48:18+00:00","article_modified_time":"2023-01-30T16:43:03+00:00","og_image":[{"width":2560,"height":1536,"url":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/04\/Security-Fabric-scaled.jpg","type":"image\/jpeg"}],"author":"Manuel","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Manuel"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/directortic.es\/fortinet\/2021\/04\/07\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\/#article","isPartOf":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/04\/07\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\/"},"author":{"name":"Manuel","@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8"},"headline":"Security Fabric, la seguridad de extremo a extremo de Fortinet","datePublished":"2021-04-07T11:48:18+00:00","dateModified":"2023-01-30T16:43:03+00:00","mainEntityOfPage":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/04\/07\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\/"},"wordCount":93,"image":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/04\/07\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\/#primaryimage"},"thumbnailUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/04\/Security-Fabric-scaled.jpg","articleSection":["V\u00eddeos"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/directortic.es\/fortinet\/2021\/04\/07\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\/","url":"https:\/\/directortic.es\/fortinet\/2021\/04\/07\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\/","name":"Security Fabric, la seguridad de extremo a extremo de Fortinet - Fortinet","isPartOf":{"@id":"https:\/\/directortic.es\/fortinet\/#website"},"primaryImageOfPage":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/04\/07\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\/#primaryimage"},"image":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/04\/07\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\/#primaryimage"},"thumbnailUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/04\/Security-Fabric-scaled.jpg","datePublished":"2021-04-07T11:48:18+00:00","dateModified":"2023-01-30T16:43:03+00:00","author":{"@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8"},"breadcrumb":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/04\/07\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/directortic.es\/fortinet\/2021\/04\/07\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/directortic.es\/fortinet\/2021\/04\/07\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\/#primaryimage","url":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/04\/Security-Fabric-scaled.jpg","contentUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/04\/Security-Fabric-scaled.jpg","width":2560,"height":1536},{"@type":"BreadcrumbList","@id":"https:\/\/directortic.es\/fortinet\/2021\/04\/07\/security-fabric-la-seguridad-de-extremo-a-extremo-de-fortinet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/directortic.es\/fortinet\/"},{"@type":"ListItem","position":2,"name":"Security Fabric, la seguridad de extremo a extremo de Fortinet"}]},{"@type":"WebSite","@id":"https:\/\/directortic.es\/fortinet\/#website","url":"https:\/\/directortic.es\/fortinet\/","name":"Fortinet","description":"Dise\u00f1ado para Redes basadas en la Seguridad","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/directortic.es\/fortinet\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8","name":"Manuel","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","caption":"Manuel"},"url":"https:\/\/directortic.es\/fortinet\/author\/manu\/"}]}},"_links":{"self":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/264","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/comments?post=264"}],"version-history":[{"count":1,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/264\/revisions"}],"predecessor-version":[{"id":266,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/264\/revisions\/266"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/media\/267"}],"wp:attachment":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/media?parent=264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/categories?post=264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/tags?post=264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}