{"id":359,"date":"2021-07-06T13:48:42","date_gmt":"2021-07-06T13:48:42","guid":{"rendered":"https:\/\/directortic.es\/fortinet\/?p=359"},"modified":"2023-01-30T16:43:02","modified_gmt":"2023-01-30T16:43:02","slug":"como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust","status":"publish","type":"post","link":"https:\/\/directortic.es\/fortinet\/2021\/07\/06\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\/","title":{"rendered":"\u00bfC\u00f3mo proteger a una organizaci\u00f3n con una estrategia de Zero Trust?"},"content":{"rendered":"<p>El mundo de la ciberseguridad ha dado un paso al frente ante la oleada de ataques crecientes en los \u00faltimos a\u00f1os. Ante los cambios producidos por el trabajo en el mundo laboral. Ante la desaparici\u00f3n del per\u00edmetro de red tradicional en las oficinas. Hoy ya nada es como ayer y hay que mirarlo con otros ojos. Con los cinco sentidos. Y la seguridad m\u00e1s, si cabe.<\/p>\n<p>Ante un mundo cada d\u00eda m\u00e1s inseguro naci\u00f3 un nuevo concepto: el de Zero Trust, es decir: confianza cero en un momento en el que cuantas m\u00e1s personas y dispositivos se conectan a una red, menos seguridad ofrecen.<\/p>\n<p>\u00bfQu\u00e9 implica Zero Trust? Incorporar controles de acceso rigurosos que abarquen la red distribuida para proteger tanto dispositivos como usuarios, la nube, el punto final, el software como servicio y la infraestructura. Sin embargo, tan solo el 15 % de organizaciones han entendido este mensaje, completando una transici\u00f3n hacia este modelo de ciberseguridad.<\/p>\n<p>Desde Fortinet advierten a los CISO de la necesidad de asumir que todos los dispositivos dentro y fuera de la red pueden infectar la misma. Y que cualquier usuario puede comprometer recursos cr\u00edticos, tanto de manera intencionada como por desconocimiento.<\/p>\n<p><strong>\u00bfC\u00f3mo establecer una pol\u00edtica de Zero Trust con Fortinet?<\/strong><\/p>\n<p>Partiendo de la base de que no se debe otorgar ning\u00fan permiso sin antes verificar qu\u00e9 usuarios y dispositivos est\u00e1n autorizados para tener acceso, desde Fortinet recuerdan que al implementar un modelo de Zero Trust hay que conocer todos los dispositivos que est\u00e1n en la red, a los usuarios que acceden a la misma y proteger los activos tanto dentro como fuera de ella.<\/p>\n<p>Fortinet ofrece soluciones de seguridad que ayudan a las organizaciones a identificar y clasificar a todos los usuarios y dispositivos que quieren acceder a la red y a las aplicaciones: desde el control de acceso a terminales, en los que el endpoint es uno de los grandes protagonistas ante el alto n\u00famero de malware instalado en los mismos, pasando por la gesti\u00f3n de acceso a la identidad, estableciendo la identidad a trav\u00e9s de inicio de sesi\u00f3n, autenticaci\u00f3n multifactor y certificados, por poner algunos ejemplos.<\/p>\n<p>En definitiva, Fortinet ofrece un control completo y continuo sobre qui\u00e9n accede a las aplicaciones, quien est\u00e1 en la red y qu\u00e9 hay en la misma.<\/p>\n<div  class=\"jeg_postblock_5 jeg_postblock jeg_module_hook jeg_pagination_disable jeg_col_3o3 jnews_module__0_69def54c85778   \" data-unique=\"jnews_module__0_69def54c85778\">\n\t\t\t\t\t<div class=\"jeg_block_heading jeg_block_heading_6 jeg_subcat_right\">\n                     <h3 class=\"jeg_block_title\"><span>DOCUMENTO RELACIONADO<\/span><\/h3>\n                     \n                 <\/div>\n\t\t\t\t\t<div class=\"jeg_block_container\">\n                    \n                    <div class=\"jeg_posts jeg_load_more_flag\"><article class=\"jeg_post jeg_pl_lg_2 format-standard\">\n                    <div class=\"jeg_thumb\">\n                        \n                        <a href=\"https:\/\/directortic.es\/fortinet\/2021\/07\/06\/estrategia-zta-de-fortinet-claves-y-beneficios\/\" aria-label=\"Read article: Estrategia ZTA de Fortinet: claves y beneficios\"><div class=\"thumbnail-container animate-lazy  size-715 \"><img loading=\"lazy\" decoding=\"async\" width=\"350\" height=\"250\" src=\"https:\/\/directortic.es\/fortinet\/wp-content\/themes\/jnews\/assets\/img\/jeg-empty.png\" class=\"attachment-jnews-350x250 size-jnews-350x250 lazyload wp-post-image\" alt=\"Estrategia ZTA de Fortinet: claves y beneficios\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" data-src=\"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/07\/FORTINET-LEADMAGNET-JULIO-750X375--350x250.png\" data-srcset=\"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/07\/FORTINET-LEADMAGNET-JULIO-750X375--350x250.png 350w, https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/07\/FORTINET-LEADMAGNET-JULIO-750X375--120x86.png 120w\" data-sizes=\"auto\" data-expand=\"700\" \/><\/div><\/a>\n                        <div class=\"jeg_post_category\">\n                            <span><a href=\"https:\/\/directortic.es\/fortinet\/category\/destacado\/\" class=\"category-destacado\">Destacado<\/a><\/span>\n                        <\/div>\n                    <\/div>\n                    <div class=\"jeg_postblock_content\">\n                        <h3 class=\"jeg_post_title\">\n                            <a href=\"https:\/\/directortic.es\/fortinet\/2021\/07\/06\/estrategia-zta-de-fortinet-claves-y-beneficios\/\">Estrategia ZTA de Fortinet: claves y beneficios<\/a>\n                        <\/h3>\n                        \n                        <div class=\"jeg_post_excerpt\">\n                            <p>La implantaci\u00f3n del teletrabajo, que ha provocado la desaparici\u00f3n del per\u00edmetro tradicional y la descentralizaci\u00f3n de usuarios y datos, sumado...<\/p>\n                            <a href=\"https:\/\/directortic.es\/fortinet\/2021\/07\/06\/estrategia-zta-de-fortinet-claves-y-beneficios\/\" class=\"jeg_readmore\">Leer m\u00e1s<span class=\"screen-reader-text\">Details<\/span><\/a>\n                        <\/div>\n                    <\/div>\n                <\/article><\/div>\n                    <div class='module-overlay'>\n\t\t\t\t    <div class='preloader_type preloader_dot'>\n\t\t\t\t        <div class=\"module-preloader jeg_preloader dot\">\n\t\t\t\t            <span><\/span><span><\/span><span><\/span>\n\t\t\t\t        <\/div>\n\t\t\t\t        <div class=\"module-preloader jeg_preloader circle\">\n\t\t\t\t            <div class=\"jnews_preloader_circle_outer\">\n\t\t\t\t                <div class=\"jnews_preloader_circle_inner\"><\/div>\n\t\t\t\t            <\/div>\n\t\t\t\t        <\/div>\n\t\t\t\t        <div class=\"module-preloader jeg_preloader square\">\n\t\t\t\t            <div class=\"jeg_square\">\n\t\t\t\t                <div class=\"jeg_square_inner\"><\/div>\n\t\t\t\t            <\/div>\n\t\t\t\t        <\/div>\n\t\t\t\t    <\/div>\n\t\t\t\t<\/div>\n                <\/div>\n                <div class=\"jeg_block_navigation\">\n                    <div class='navigation_overlay'><div class='module-preloader jeg_preloader'><span><\/span><span><\/span><span><\/span><\/div><\/div>\n                    \n                    \n                <\/div>\n\t\t\t\t\t\n\t\t\t\t\t<script>var jnews_module__0_69def54c85778 = {\"header_icon\":\"\",\"first_title\":\"DOCUMENTO RELACIONADO\",\"second_title\":\"\",\"url\":\"\",\"header_type\":\"heading_6\",\"header_background\":\"\",\"header_secondary_background\":\"\",\"header_text_color\":\"\",\"header_line_color\":\"\",\"header_accent_color\":\"\",\"header_filter_category\":\"\",\"header_filter_author\":\"\",\"header_filter_tag\":\"\",\"header_filter_text\":\"All\",\"sticky_post\":false,\"sticky_post_filter\":false,\"post_type\":\"post\",\"content_type\":\"all\",\"sponsor\":false,\"number_post\":\"1\",\"post_offset\":0,\"unique_content\":\"disable\",\"include_post\":\"355\",\"included_only\":false,\"exclude_post\":\"\",\"include_category\":\"\",\"exclude_category\":\"\",\"include_author\":\"\",\"include_tag\":\"\",\"exclude_tag\":\"\",\"exclude_visited_post\":false,\"sort_by\":\"latest\",\"date_format\":\"default\",\"date_format_custom\":\"Y\\\/m\\\/d\",\"excerpt_length\":20,\"excerpt_ellipsis\":\"...\",\"force_normal_image_load\":\"\",\"main_custom_image_size\":\"default\",\"pagination_mode\":\"disable\",\"pagination_nextprev_showtext\":\"\",\"pagination_number_post\":4,\"pagination_scroll_limit\":0,\"ads_type\":\"disable\",\"ads_position\":1,\"ads_random\":\"\",\"ads_image\":\"\",\"ads_image_tablet\":\"\",\"ads_image_phone\":\"\",\"ads_image_link\":\"\",\"ads_image_alt\":\"\",\"ads_image_new_tab\":\"\",\"google_publisher_id\":\"\",\"google_slot_id\":\"\",\"google_desktop\":\"auto\",\"google_tab\":\"auto\",\"google_phone\":\"auto\",\"content\":\"\",\"ads_bottom_text\":\"\",\"boxed\":\"\",\"boxed_shadow\":\"\",\"el_id\":\"\",\"el_class\":\"\",\"scheme\":\"\",\"column_width\":\"auto\",\"title_color\":\"\",\"accent_color\":\"\",\"alt_color\":\"\",\"excerpt_color\":\"\",\"css\":\"\",\"paged\":1,\"column_class\":\"jeg_col_3o3\",\"class\":\"jnews_block_5\"};<\/script>\n\t\t\t\t<\/div>\n","protected":false},"excerpt":{"rendered":"<p>El mundo de la ciberseguridad ha dado un paso al frente ante la oleada de ataques crecientes en los \u00faltimos a\u00f1os. Ante los cambios producidos por el trabajo en el mundo laboral. Ante la desaparici\u00f3n del per\u00edmetro de red tradicional en las oficinas. Hoy ya nada es como ayer y hay que mirarlo con otros [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":360,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jnews-multi-image_gallery":[],"jnews_single_post":{"source_name":"","source_url":"","via_name":"","via_url":"","override_template":"0","override":[{"template":"1","single_blog_custom":"","parallax":"1","fullscreen":"0","layout":"right-sidebar","sidebar":"default-sidebar","second_sidebar":"default-sidebar","sticky_sidebar":"1","share_position":"top","share_float_style":"share-monocrhome","show_share_counter":"1","show_view_counter":"1","show_featured":"1","show_post_meta":"1","show_post_author":"1","show_post_author_image":"1","show_post_date":"1","post_date_format":"default","post_date_format_custom":"Y\/m\/d","show_post_category":"1","show_post_reading_time":"0","post_reading_time_wpm":"300","show_zoom_button":"0","zoom_button_out_step":"2","zoom_button_in_step":"3","show_post_tag":"1","show_prev_next_post":"1","show_popup_post":"1","number_popup_post":"1","show_author_box":"0","show_post_related":"0","show_inline_post_related":"0"}],"override_image_size":"0","image_override":[{"single_post_thumbnail_size":"crop-500","single_post_gallery_size":"crop-500"}],"trending_post":"0","trending_post_position":"meta","trending_post_label":"Trending","sponsored_post":"0","sponsored_post_label":"Sponsored by","sponsored_post_name":"","sponsored_post_url":"","sponsored_post_logo_enable":"0","sponsored_post_logo":"","sponsored_post_desc":""},"jnews_primary_category":{"id":""},"jnews_social_meta":{"fb_title":"","fb_description":"","fb_image":"","twitter_title":"","twitter_description":"","twitter_image":""},"jnews_override_counter":{"override_view_counter":"0","view_counter_number":"0","override_share_counter":"0","share_counter_number":"0","override_like_counter":"0","like_counter_number":"0","override_dislike_counter":"0","dislike_counter_number":"0"},"footnotes":""},"categories":[4],"tags":[],"class_list":["post-359","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articulos"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u00bfC\u00f3mo proteger a una organizaci\u00f3n con una estrategia de Zero Trust? - Fortinet<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/directortic.es\/fortinet\/2021\/07\/06\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfC\u00f3mo proteger a una organizaci\u00f3n con una estrategia de Zero Trust? - Fortinet\" \/>\n<meta property=\"og:description\" content=\"El mundo de la ciberseguridad ha dado un paso al frente ante la oleada de ataques crecientes en los \u00faltimos a\u00f1os. Ante los cambios producidos por el trabajo en el mundo laboral. Ante la desaparici\u00f3n del per\u00edmetro de red tradicional en las oficinas. Hoy ya nada es como ayer y hay que mirarlo con otros [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/directortic.es\/fortinet\/2021\/07\/06\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"Fortinet\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-06T13:48:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-30T16:43:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/07\/dreamstime_s_220489578.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Manuel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Manuel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/07\\\/06\\\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/07\\\/06\\\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\\\/\"},\"author\":{\"name\":\"Manuel\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\"},\"headline\":\"\u00bfC\u00f3mo proteger a una organizaci\u00f3n con una estrategia de Zero Trust?\",\"datePublished\":\"2021-07-06T13:48:42+00:00\",\"dateModified\":\"2023-01-30T16:43:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/07\\\/06\\\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\\\/\"},\"wordCount\":421,\"image\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/07\\\/06\\\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/07\\\/dreamstime_s_220489578.jpg\",\"articleSection\":[\"Art\u00edculos\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/07\\\/06\\\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\\\/\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/07\\\/06\\\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\\\/\",\"name\":\"\u00bfC\u00f3mo proteger a una organizaci\u00f3n con una estrategia de Zero Trust? - Fortinet\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/07\\\/06\\\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/07\\\/06\\\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/07\\\/dreamstime_s_220489578.jpg\",\"datePublished\":\"2021-07-06T13:48:42+00:00\",\"dateModified\":\"2023-01-30T16:43:02+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/07\\\/06\\\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/07\\\/06\\\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/07\\\/06\\\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/07\\\/dreamstime_s_220489578.jpg\",\"contentUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/07\\\/dreamstime_s_220489578.jpg\",\"width\":800,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/07\\\/06\\\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfC\u00f3mo proteger a una organizaci\u00f3n con una estrategia de Zero Trust?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#website\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/\",\"name\":\"Fortinet\",\"description\":\"Dise\u00f1ado para Redes basadas en la Seguridad\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\",\"name\":\"Manuel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"caption\":\"Manuel\"},\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/author\\\/manu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfC\u00f3mo proteger a una organizaci\u00f3n con una estrategia de Zero Trust? - Fortinet","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/directortic.es\/fortinet\/2021\/07\/06\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\/","og_locale":"es_ES","og_type":"article","og_title":"\u00bfC\u00f3mo proteger a una organizaci\u00f3n con una estrategia de Zero Trust? - Fortinet","og_description":"El mundo de la ciberseguridad ha dado un paso al frente ante la oleada de ataques crecientes en los \u00faltimos a\u00f1os. Ante los cambios producidos por el trabajo en el mundo laboral. Ante la desaparici\u00f3n del per\u00edmetro de red tradicional en las oficinas. Hoy ya nada es como ayer y hay que mirarlo con otros [&hellip;]","og_url":"https:\/\/directortic.es\/fortinet\/2021\/07\/06\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\/","og_site_name":"Fortinet","article_published_time":"2021-07-06T13:48:42+00:00","article_modified_time":"2023-01-30T16:43:02+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/07\/dreamstime_s_220489578.jpg","type":"image\/jpeg"}],"author":"Manuel","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Manuel","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/directortic.es\/fortinet\/2021\/07\/06\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\/#article","isPartOf":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/07\/06\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\/"},"author":{"name":"Manuel","@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8"},"headline":"\u00bfC\u00f3mo proteger a una organizaci\u00f3n con una estrategia de Zero Trust?","datePublished":"2021-07-06T13:48:42+00:00","dateModified":"2023-01-30T16:43:02+00:00","mainEntityOfPage":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/07\/06\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\/"},"wordCount":421,"image":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/07\/06\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/07\/dreamstime_s_220489578.jpg","articleSection":["Art\u00edculos"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/directortic.es\/fortinet\/2021\/07\/06\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\/","url":"https:\/\/directortic.es\/fortinet\/2021\/07\/06\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\/","name":"\u00bfC\u00f3mo proteger a una organizaci\u00f3n con una estrategia de Zero Trust? - Fortinet","isPartOf":{"@id":"https:\/\/directortic.es\/fortinet\/#website"},"primaryImageOfPage":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/07\/06\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/07\/06\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/07\/dreamstime_s_220489578.jpg","datePublished":"2021-07-06T13:48:42+00:00","dateModified":"2023-01-30T16:43:02+00:00","author":{"@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8"},"breadcrumb":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/07\/06\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/directortic.es\/fortinet\/2021\/07\/06\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/directortic.es\/fortinet\/2021\/07\/06\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\/#primaryimage","url":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/07\/dreamstime_s_220489578.jpg","contentUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/07\/dreamstime_s_220489578.jpg","width":800,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/directortic.es\/fortinet\/2021\/07\/06\/como-proteger-a-una-organizacion-con-una-estrategia-de-zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/directortic.es\/fortinet\/"},{"@type":"ListItem","position":2,"name":"\u00bfC\u00f3mo proteger a una organizaci\u00f3n con una estrategia de Zero Trust?"}]},{"@type":"WebSite","@id":"https:\/\/directortic.es\/fortinet\/#website","url":"https:\/\/directortic.es\/fortinet\/","name":"Fortinet","description":"Dise\u00f1ado para Redes basadas en la Seguridad","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/directortic.es\/fortinet\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8","name":"Manuel","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","caption":"Manuel"},"url":"https:\/\/directortic.es\/fortinet\/author\/manu\/"}]}},"_links":{"self":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/359","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/comments?post=359"}],"version-history":[{"count":1,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/359\/revisions"}],"predecessor-version":[{"id":361,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/359\/revisions\/361"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/media\/360"}],"wp:attachment":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/media?parent=359"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/categories?post=359"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/tags?post=359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}