{"version":"1.0","provider_name":"VMWare","provider_url":"https:\/\/directortic.es\/vmware","author_name":"Manuel","author_url":"https:\/\/directortic.es\/vmware\/author\/manu\/","title":"VMware: la seguridad hasta el \u00faltimo rinc\u00f3n - VMWare","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ohJQfmpeAl\"><a href=\"https:\/\/directortic.es\/vmware\/2022\/04\/20\/vmware-la-seguridad-hasta-el-ultimo-rincon\/\">VMware: la seguridad hasta el \u00faltimo rinc\u00f3n<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/directortic.es\/vmware\/2022\/04\/20\/vmware-la-seguridad-hasta-el-ultimo-rincon\/embed\/#?secret=ohJQfmpeAl\" width=\"600\" height=\"338\" title=\"\u00abVMware: la seguridad hasta el \u00faltimo rinc\u00f3n\u00bb \u2014 VMWare\" data-secret=\"ohJQfmpeAl\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/directortic.es\/vmware\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/directortic.es\/vmware\/wp-content\/uploads\/sites\/4\/2022\/05\/seguridad-directortic-vmware-arrow-ignacio-arrieta.jpg","thumbnail_width":1400,"thumbnail_height":788,"description":"Seguridad intr\u00ednseca. Bajo este t\u00e9rmino se \u201cesconde\u201d la estrategia de seguridad que despliega VMware. Una protecci\u00f3n engarzada en el dise\u00f1o. En un mercado en el que la tecnolog\u00eda ha extendido sus dominios hasta los \u00faltimos rincones, la seguridad debe alcanzarlos tambi\u00e9n. Roto definitivamente el per\u00edmetro, los sistemas de protecci\u00f3n se han acoplado a un entorno [&hellip;]"}