{"id":293,"date":"2021-04-20T10:03:32","date_gmt":"2021-04-20T10:03:32","guid":{"rendered":"https:\/\/directortic.es\/fortinet\/?p=293"},"modified":"2023-01-30T16:43:03","modified_gmt":"2023-01-30T16:43:03","slug":"como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa","status":"publish","type":"post","link":"https:\/\/directortic.es\/fortinet\/2021\/04\/20\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\/","title":{"rendered":"\u00bfC\u00f3mo proteger los endpoints y mejorar la eficiencia operativa?"},"content":{"rendered":"<p>La explosi\u00f3n del n\u00famero de dispositivos de usuario final ha derivado en la expansi\u00f3n de la superficie de ataque de los endpoints, dot\u00e1ndolos de mayor atractivo para los hackers. No en vano es uno de sus objetivos favoritos ya que, atacando un port\u00e1til, un smartphone o un dispositivo IoT los ciberdelincuentes pueden infectar otros endpoints de la compa\u00f1\u00eda y acceder a los activos cr\u00edticos de la misma.<\/p>\n<p>Esta facilidad de acceso hace que el \u00e9xito de los ciberataques a los endpoints sea frecuente y cada vez mayor. Para evitar las intrusiones, las cuales debilitan la seguridad y provocan paradas de producci\u00f3n y actividad, las organizaciones acuden a los responsables de IT en busca de soluciones integradas de red y seguridad. Gracias a estas herramientas se consigue proteger los endpoints y minimizar el impacto operativo asociado a la expansi\u00f3n de la superficie de ataque.<\/p>\n<p>El problema es que los enfoques tradicionales de la seguridad de la red y de los endpoints, los cuales no permiten la comunicaci\u00f3n al encontrarse en silos independientes, no integran los m\u00faltiples componentes implicados en la seguridad. Como consecuencia, los responsables de IT tienen que romper esta estructura de silos para adoptar una plataforma de seguridad inteligente que disponga de una manera integrada de los elementos de red y seguridad.<\/p>\n<p>Pero, <strong>\u00bfc\u00f3mo pueden los departamentos de IT llevar a cabo esta transformaci\u00f3n?<\/strong> Desde Fortinet se indican cuatros mejoras esenciales que las organizaciones deben realizar para abordar este proceso con \u00e9xito. El primer requisito es <strong>mejorar la visibilidad de los riesgos<\/strong>, para ello los profesionales de IT deben seleccionar soluciones de seguridad de endopoints capaces de compartir los datos en tiempo real con otras herramientas de seguridad.<\/p>\n<p>Una vez realizada esta implementaci\u00f3n es el momento de <strong>actualizar los controles de acceso<\/strong>. Los responsables de IT demandan un control de acceso a la red m\u00e1s din\u00e1mico y granular. Por ello la seguridad de los endpoints tiene que cumplir las pol\u00edticas y controles en todos los dispositivos.<\/p>\n<p>El tercer requisito de esta transformaci\u00f3n es el <strong>intercambio de inteligencia de amenazas<\/strong>. Porque gracias a este intercambio en tiempo real el departamento de IT puede obtener una imagen completa y precisa de la seguridad de la red. Por \u00faltimo, es imprescindible <strong>automatizar los flujos de trabajo de seguridad<\/strong> para garantizar una seguridad eficaz de los endpoints y reducir la presi\u00f3n de los equipos de IT. Esta automatizaci\u00f3n proporciona numerosas ventajas a la seguridad de las organizaciones gracias a la gesti\u00f3n de vulnerabilidades, la automatizaci\u00f3n de la respuesta a incidentes y el cumplimiento normativo de los endpoints.<\/p>\n<div  class=\"jeg_postblock_5 jeg_postblock jeg_module_hook jeg_pagination_disable jeg_col_3o3 jnews_module__0_69def54d9db27   \" data-unique=\"jnews_module__0_69def54d9db27\">\n\t\t\t\t\t<div class=\"jeg_block_heading jeg_block_heading_6 jeg_subcat_right\">\n                     <h3 class=\"jeg_block_title\"><span>DOCUMENTO RELACIONADO<\/span><\/h3>\n                     \n                 <\/div>\n\t\t\t\t\t<div class=\"jeg_block_container\">\n                    \n                    <div class=\"jeg_posts jeg_load_more_flag\"><article class=\"jeg_post jeg_pl_lg_2 format-standard\">\n                    <div class=\"jeg_thumb\">\n                        \n                        <a href=\"https:\/\/directortic.es\/fortinet\/2021\/04\/20\/fortinet-te-ayuda-a-mejorar-la-seguridad-de-los-endpoints\/\" aria-label=\"Read article: Fortinet te ayuda a mejorar la seguridad de los endpoints\"><div class=\"thumbnail-container animate-lazy  size-715 \"><img loading=\"lazy\" decoding=\"async\" width=\"350\" height=\"250\" src=\"https:\/\/directortic.es\/fortinet\/wp-content\/themes\/jnews\/assets\/img\/jeg-empty.png\" class=\"attachment-jnews-350x250 size-jnews-350x250 lazyload wp-post-image\" alt=\"Fortinet te ayuda a mejorar la seguridad de los endpoints\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" data-src=\"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/04\/Captura-de-pantalla-2021-04-20-a-las-11.22.19-350x250.png\" data-srcset=\"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/04\/Captura-de-pantalla-2021-04-20-a-las-11.22.19-350x250.png 350w, https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/04\/Captura-de-pantalla-2021-04-20-a-las-11.22.19-300x214.png 300w, https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/04\/Captura-de-pantalla-2021-04-20-a-las-11.22.19-1024x731.png 1024w, https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/04\/Captura-de-pantalla-2021-04-20-a-las-11.22.19-768x549.png 768w, https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/04\/Captura-de-pantalla-2021-04-20-a-las-11.22.19-1536x1097.png 1536w, https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/04\/Captura-de-pantalla-2021-04-20-a-las-11.22.19-120x86.png 120w, https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/04\/Captura-de-pantalla-2021-04-20-a-las-11.22.19-750x535.png 750w, https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/04\/Captura-de-pantalla-2021-04-20-a-las-11.22.19-1140x814.png 1140w, https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/04\/Captura-de-pantalla-2021-04-20-a-las-11.22.19.png 1750w\" data-sizes=\"auto\" data-expand=\"700\" \/><\/div><\/a>\n                        <div class=\"jeg_post_category\">\n                            <span><a href=\"https:\/\/directortic.es\/fortinet\/category\/destacado\/\" class=\"category-destacado\">Destacado<\/a><\/span>\n                        <\/div>\n                    <\/div>\n                    <div class=\"jeg_postblock_content\">\n                        <h3 class=\"jeg_post_title\">\n                            <a href=\"https:\/\/directortic.es\/fortinet\/2021\/04\/20\/fortinet-te-ayuda-a-mejorar-la-seguridad-de-los-endpoints\/\">Fortinet te ayuda a mejorar la seguridad de los endpoints<\/a>\n                        <\/h3>\n                        \n                        <div class=\"jeg_post_excerpt\">\n                            <p>Los endpoints son uno de los objetivos favoritos de los ciberdelincuentes por varias razones. Por un lado, la superficie de...<\/p>\n                            <a href=\"https:\/\/directortic.es\/fortinet\/2021\/04\/20\/fortinet-te-ayuda-a-mejorar-la-seguridad-de-los-endpoints\/\" class=\"jeg_readmore\">Leer m\u00e1s<span class=\"screen-reader-text\">Details<\/span><\/a>\n                        <\/div>\n                    <\/div>\n                <\/article><\/div>\n                    <div class='module-overlay'>\n\t\t\t\t    <div class='preloader_type preloader_dot'>\n\t\t\t\t        <div class=\"module-preloader jeg_preloader dot\">\n\t\t\t\t            <span><\/span><span><\/span><span><\/span>\n\t\t\t\t        <\/div>\n\t\t\t\t        <div class=\"module-preloader jeg_preloader circle\">\n\t\t\t\t            <div class=\"jnews_preloader_circle_outer\">\n\t\t\t\t                <div class=\"jnews_preloader_circle_inner\"><\/div>\n\t\t\t\t            <\/div>\n\t\t\t\t        <\/div>\n\t\t\t\t        <div class=\"module-preloader jeg_preloader square\">\n\t\t\t\t            <div class=\"jeg_square\">\n\t\t\t\t                <div class=\"jeg_square_inner\"><\/div>\n\t\t\t\t            <\/div>\n\t\t\t\t        <\/div>\n\t\t\t\t    <\/div>\n\t\t\t\t<\/div>\n                <\/div>\n                <div class=\"jeg_block_navigation\">\n                    <div class='navigation_overlay'><div class='module-preloader jeg_preloader'><span><\/span><span><\/span><span><\/span><\/div><\/div>\n                    \n                    \n                <\/div>\n\t\t\t\t\t\n\t\t\t\t\t<script>var jnews_module__0_69def54d9db27 = {\"header_icon\":\"\",\"first_title\":\"DOCUMENTO RELACIONADO\",\"second_title\":\"\",\"url\":\"\",\"header_type\":\"heading_6\",\"header_background\":\"\",\"header_secondary_background\":\"\",\"header_text_color\":\"\",\"header_line_color\":\"\",\"header_accent_color\":\"\",\"header_filter_category\":\"\",\"header_filter_author\":\"\",\"header_filter_tag\":\"\",\"header_filter_text\":\"All\",\"sticky_post\":false,\"sticky_post_filter\":false,\"post_type\":\"post\",\"content_type\":\"all\",\"sponsor\":false,\"number_post\":\"1\",\"post_offset\":0,\"unique_content\":\"disable\",\"include_post\":\"289\",\"included_only\":false,\"exclude_post\":\"\",\"include_category\":\"\",\"exclude_category\":\"\",\"include_author\":\"\",\"include_tag\":\"\",\"exclude_tag\":\"\",\"exclude_visited_post\":false,\"sort_by\":\"latest\",\"date_format\":\"default\",\"date_format_custom\":\"Y\\\/m\\\/d\",\"excerpt_length\":20,\"excerpt_ellipsis\":\"...\",\"force_normal_image_load\":\"\",\"main_custom_image_size\":\"default\",\"pagination_mode\":\"disable\",\"pagination_nextprev_showtext\":\"\",\"pagination_number_post\":4,\"pagination_scroll_limit\":0,\"ads_type\":\"disable\",\"ads_position\":1,\"ads_random\":\"\",\"ads_image\":\"\",\"ads_image_tablet\":\"\",\"ads_image_phone\":\"\",\"ads_image_link\":\"\",\"ads_image_alt\":\"\",\"ads_image_new_tab\":\"\",\"google_publisher_id\":\"\",\"google_slot_id\":\"\",\"google_desktop\":\"auto\",\"google_tab\":\"auto\",\"google_phone\":\"auto\",\"content\":\"\",\"ads_bottom_text\":\"\",\"boxed\":\"\",\"boxed_shadow\":\"\",\"el_id\":\"\",\"el_class\":\"\",\"scheme\":\"\",\"column_width\":\"auto\",\"title_color\":\"\",\"accent_color\":\"\",\"alt_color\":\"\",\"excerpt_color\":\"\",\"css\":\"\",\"paged\":1,\"column_class\":\"jeg_col_3o3\",\"class\":\"jnews_block_5\"};<\/script>\n\t\t\t\t<\/div>\n","protected":false},"excerpt":{"rendered":"<p>La explosi\u00f3n del n\u00famero de dispositivos de usuario final ha derivado en la expansi\u00f3n de la superficie de ataque de los endpoints, dot\u00e1ndolos de mayor atractivo para los hackers. No en vano es uno de sus objetivos favoritos ya que, atacando un port\u00e1til, un smartphone o un dispositivo IoT los ciberdelincuentes pueden infectar otros endpoints [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":294,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jnews-multi-image_gallery":[],"jnews_single_post":{"source_name":"","source_url":"","via_name":"","via_url":"","override_template":"0","override":[{"template":"1","single_blog_custom":"","parallax":"1","fullscreen":"0","layout":"right-sidebar","sidebar":"default-sidebar","second_sidebar":"default-sidebar","sticky_sidebar":"1","share_position":"top","share_float_style":"share-monocrhome","show_share_counter":"1","show_view_counter":"1","show_featured":"1","show_post_meta":"1","show_post_author":"1","show_post_author_image":"1","show_post_date":"1","post_date_format":"default","post_date_format_custom":"Y\/m\/d","show_post_category":"1","show_post_reading_time":"0","post_reading_time_wpm":"300","show_zoom_button":"0","zoom_button_out_step":"2","zoom_button_in_step":"3","show_post_tag":"1","show_prev_next_post":"1","show_popup_post":"1","number_popup_post":"1","show_author_box":"0","show_post_related":"0","show_inline_post_related":"0"}],"override_image_size":"0","image_override":[{"single_post_thumbnail_size":"crop-500","single_post_gallery_size":"crop-500"}],"trending_post":"0","trending_post_position":"meta","trending_post_label":"Trending","sponsored_post":"0","sponsored_post_label":"Sponsored by","sponsored_post_name":"","sponsored_post_url":"","sponsored_post_logo_enable":"0","sponsored_post_logo":"","sponsored_post_desc":""},"jnews_primary_category":{"id":""},"jnews_social_meta":{"fb_title":"","fb_description":"","fb_image":"","twitter_title":"","twitter_description":"","twitter_image":""},"jnews_override_counter":{"override_view_counter":"0","view_counter_number":"0","override_share_counter":"0","share_counter_number":"0","override_like_counter":"0","like_counter_number":"0","override_dislike_counter":"0","dislike_counter_number":"0"},"footnotes":""},"categories":[4],"tags":[],"class_list":["post-293","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articulos"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u00bfC\u00f3mo proteger los endpoints y mejorar la eficiencia operativa? - Fortinet<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/directortic.es\/fortinet\/2021\/04\/20\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfC\u00f3mo proteger los endpoints y mejorar la eficiencia operativa? - Fortinet\" \/>\n<meta property=\"og:description\" content=\"La explosi\u00f3n del n\u00famero de dispositivos de usuario final ha derivado en la expansi\u00f3n de la superficie de ataque de los endpoints, dot\u00e1ndolos de mayor atractivo para los hackers. No en vano es uno de sus objetivos favoritos ya que, atacando un port\u00e1til, un smartphone o un dispositivo IoT los ciberdelincuentes pueden infectar otros endpoints [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/directortic.es\/fortinet\/2021\/04\/20\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\/\" \/>\n<meta property=\"og:site_name\" content=\"Fortinet\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-20T10:03:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-30T16:43:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/04\/Post-endpoints.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"577\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Manuel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Manuel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/20\\\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/20\\\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\\\/\"},\"author\":{\"name\":\"Manuel\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\"},\"headline\":\"\u00bfC\u00f3mo proteger los endpoints y mejorar la eficiencia operativa?\",\"datePublished\":\"2021-04-20T10:03:32+00:00\",\"dateModified\":\"2023-01-30T16:43:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/20\\\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\\\/\"},\"wordCount\":466,\"image\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/20\\\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/04\\\/Post-endpoints.jpg\",\"articleSection\":[\"Art\u00edculos\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/20\\\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\\\/\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/20\\\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\\\/\",\"name\":\"\u00bfC\u00f3mo proteger los endpoints y mejorar la eficiencia operativa? - Fortinet\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/20\\\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/20\\\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/04\\\/Post-endpoints.jpg\",\"datePublished\":\"2021-04-20T10:03:32+00:00\",\"dateModified\":\"2023-01-30T16:43:03+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/20\\\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/20\\\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/20\\\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\\\/#primaryimage\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/04\\\/Post-endpoints.jpg\",\"contentUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/04\\\/Post-endpoints.jpg\",\"width\":800,\"height\":577},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/04\\\/20\\\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfC\u00f3mo proteger los endpoints y mejorar la eficiencia operativa?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#website\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/\",\"name\":\"Fortinet\",\"description\":\"Dise\u00f1ado para Redes basadas en la Seguridad\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\",\"name\":\"Manuel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"caption\":\"Manuel\"},\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/author\\\/manu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfC\u00f3mo proteger los endpoints y mejorar la eficiencia operativa? - Fortinet","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/directortic.es\/fortinet\/2021\/04\/20\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\/","og_locale":"es_ES","og_type":"article","og_title":"\u00bfC\u00f3mo proteger los endpoints y mejorar la eficiencia operativa? - Fortinet","og_description":"La explosi\u00f3n del n\u00famero de dispositivos de usuario final ha derivado en la expansi\u00f3n de la superficie de ataque de los endpoints, dot\u00e1ndolos de mayor atractivo para los hackers. No en vano es uno de sus objetivos favoritos ya que, atacando un port\u00e1til, un smartphone o un dispositivo IoT los ciberdelincuentes pueden infectar otros endpoints [&hellip;]","og_url":"https:\/\/directortic.es\/fortinet\/2021\/04\/20\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\/","og_site_name":"Fortinet","article_published_time":"2021-04-20T10:03:32+00:00","article_modified_time":"2023-01-30T16:43:03+00:00","og_image":[{"width":800,"height":577,"url":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/04\/Post-endpoints.jpg","type":"image\/jpeg"}],"author":"Manuel","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Manuel","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/directortic.es\/fortinet\/2021\/04\/20\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\/#article","isPartOf":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/04\/20\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\/"},"author":{"name":"Manuel","@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8"},"headline":"\u00bfC\u00f3mo proteger los endpoints y mejorar la eficiencia operativa?","datePublished":"2021-04-20T10:03:32+00:00","dateModified":"2023-01-30T16:43:03+00:00","mainEntityOfPage":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/04\/20\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\/"},"wordCount":466,"image":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/04\/20\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\/#primaryimage"},"thumbnailUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/04\/Post-endpoints.jpg","articleSection":["Art\u00edculos"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/directortic.es\/fortinet\/2021\/04\/20\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\/","url":"https:\/\/directortic.es\/fortinet\/2021\/04\/20\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\/","name":"\u00bfC\u00f3mo proteger los endpoints y mejorar la eficiencia operativa? - Fortinet","isPartOf":{"@id":"https:\/\/directortic.es\/fortinet\/#website"},"primaryImageOfPage":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/04\/20\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\/#primaryimage"},"image":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/04\/20\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\/#primaryimage"},"thumbnailUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/04\/Post-endpoints.jpg","datePublished":"2021-04-20T10:03:32+00:00","dateModified":"2023-01-30T16:43:03+00:00","author":{"@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8"},"breadcrumb":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/04\/20\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/directortic.es\/fortinet\/2021\/04\/20\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/directortic.es\/fortinet\/2021\/04\/20\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\/#primaryimage","url":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/04\/Post-endpoints.jpg","contentUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/04\/Post-endpoints.jpg","width":800,"height":577},{"@type":"BreadcrumbList","@id":"https:\/\/directortic.es\/fortinet\/2021\/04\/20\/como-proteger-los-endpoints-y-mejorar-la-eficiencia-operativa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/directortic.es\/fortinet\/"},{"@type":"ListItem","position":2,"name":"\u00bfC\u00f3mo proteger los endpoints y mejorar la eficiencia operativa?"}]},{"@type":"WebSite","@id":"https:\/\/directortic.es\/fortinet\/#website","url":"https:\/\/directortic.es\/fortinet\/","name":"Fortinet","description":"Dise\u00f1ado para Redes basadas en la Seguridad","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/directortic.es\/fortinet\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8","name":"Manuel","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","caption":"Manuel"},"url":"https:\/\/directortic.es\/fortinet\/author\/manu\/"}]}},"_links":{"self":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/comments?post=293"}],"version-history":[{"count":1,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/293\/revisions"}],"predecessor-version":[{"id":295,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/293\/revisions\/295"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/media\/294"}],"wp:attachment":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/media?parent=293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/categories?post=293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/tags?post=293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}