• ACADEMIA WALLIX
  • Prueba Gratuita
    • IAG
    • IDAAS
    • PAM
  • Español
    • English (Inglés)
    • Deutsch (Alemán)
    • Français (Francés)
    • Italiano
  • SOLUCIONES
    • POR CASO DE USO
      • Transformación digital
      • Auditoría y conformidad
      • Devops
      • Zero Trust
      • Seguridad OT
      • Ciberseguros
      • Amenazas internas
      • Fraude
      • Eficiencia operativa
      • Acceso de terceros
    • POR INDUSTRIA
      • Sector Financiero
      • Sanidad
      • Infraestructuras críticas
      • Educación
      • Telecomunicaciones
      • Gobierno
      • Proveedores de servicios gestionados
      • Empresas medianas
    • POR REGLAMENTO
      • DORA
      • CEI 62443
      • NIS2
      • CCB cybersecurity controls
  • PRODUCTOS
    • PRIVILEGED ACCESS MANAGEMENT
      Control de cuentas privilegiadas
      • WALLIX PAM
      • WALLIX Remote Access
      • WALLIX Web Session Manager
    • IDENTITY AND ACCESS MANAGEMENT
      Asegurar todo el acceso sin problemas
      • WALLIX IDaaS
      • WALLIX Enterprise Vault
    • IDENTITY AND ACCESS GOVERNANCE
      Revisiones de acceso y control de derechos
      • WALLIX IAG
    • SECURITY AS A SERVICE
      Plataforma centrada en la identidad Zero Trust bajo demanda
      • WALLIX ONE
      • WALLIX One PAM Core
  • SERVICIOS Y ASISTENCIA
      • Consultoría
      • Servicios profesionales
      • Atención al cliente
      • Alertas y avisos
      • ACADEMIA WALLIX
  • RECURSOS
    • Todos los recursos
      • Investigaciones e informes
      • Blog post
      • Casos de éxito
      • Fichas técnicas
      • Webinars
      • Vidéos
      • Demos
  • PARTNERS
    • ENCONTRAR SOCIOS
      • Buscador de partners
      • Ecosistema de partners tecnológicos
    • CONVERTIRSE EN SOCIO
      • Partners comerciales
      • Conviértete en partner tecnológico
    • RECURSOS
      • Portal de Socios
  • EMPRESA
    • ACERCA
      • Certificaciones
      • Acerca de WALLIX
      • Equipo directivo
      • WALLIX Inversores
      • Reconocimiento y Calidad
    • NEWS
      • Redacción
      • Eventos
    • HR & CSR
      • Carreras profesionales
      • Ofertas de empleo
      • RSE
    • CONTACTO
      • Contactanos
  • Click to open the search input field Click to open the search input field Buscar
  • Menú Menú
  • Link to LinkedIn
  • Link to Youtube
  • Todos los recursos

    Noticias y tendencias en ciberseguridad

    Close up hands of businesswoman typing on laptop keyboard to working and searching business data.
Categories
UNCHECK ALL
ACCESO REMOTO
AUDIT & COMPLIANCE
CRITICAL INFRASTRUCTURE
EDUCACIÓN
ENDPOINT PRIVILEGE MANAGEMENT
FINANZAS Y SEGUROS
IDENTITY AND ACCESS GOVERNANCE
INDUSTRIA
PRIVILEGED ACCESS MANAGEMENT
PROTOCOLOS INDUSTRIALES
SANIDAD
  • Businessman using laptop computer password cyber security identity theft and cloud network system application information privacy internet online protection.
    READ MORE
    Identificación, autenticación, autorización: Los tres pasos clave en la Seguridad...
    BLOGPOST PRIVILEGED ACCESS MANAGEMENT
  • Top 10 Ways to Reduce the Attack Surface
    READ MORE
    Top 10 consejos para reducir su superficie de ataque
    BLOGPOST PRIVILEGED ACCESS MANAGEMENT
  • NIS2
    READ MORE
    Cumple con la Directiva de Seguridad NIS de la mano...
    AUDIT & COMPLIANCE BLOGPOST
  • READ MORE
    7 elementos de todo buen plan de ciberseguridad
    BLOGPOST
  • healthcare
    READ MORE
    Ciberseguridad en el sector sanitario: "El reto no solo reside...
    BLOGPOST SANIDAD
  • Graphic highlighting cybersecurity risks facing academic institutions and how WALLIX’s solutions help protect sensitive data and secure access to critical educational systems.
    READ MORE
    Instituciones académicas en alerta: una guía para mantener las aulas...
    BLOGPOST EDUCACIÓN PRIVILEGED ACCESS MANAGEMENT
  • 5G wireless network, high speed internet, cloud computing or connect diagram technology, Data storage, service, synchronize, online, financial, Connectivity global, smart city, Gen by AI
    READ MORE
    La protección de las entidades financieras gracias a las soluciones...
    BLOGPOST FINANZAS Y SEGUROS PRIVILEGED ACCESS MANAGEMENT
  • READ MORE
    El Internet de las Cosas Médicas: la protección de los...
    BLOGPOST iNFRAESTRUCTURAS INTELIGENTES SANIDAD
  • READ MORE
    Integración PAM-ITSM: ¿cuáles son las buenas prácticas que deben aplicarse?
    BLOGPOST IDaaS PRIVILEGED ACCESS MANAGEMENT
  • Cover image illustrating the NIS2 cybersecurity directive on a WALLIX page, highlighting strengthened EU digital security requirements and WALLIX’s guidance on achieving compliance through robust identity and access management solutions.
    READ MORE
    Gestión del acceso privilegiado: Clave para el cumplimiento de las...
    AUDIT & COMPLIANCE RECURSO DESTACADO WHITEPAPER
  • READ MORE
    Garantizar la identidad y el acceso a la educación
    EDUCACIÓN IDENTITY AND ACCESS GOVERNANCE IDENTITY AND ACCESS GOVERNANCE WHITEPAPER
  • Cover image for the WALLIX beginner’s guide to cybersecurity, illustrating essential concepts in identity and access management to help newcomers understand secure practices and protection strategies.
    READ MORE
    Guía para principiantes sobre seguridad de acceso
    ACCESO REMOTO IDaaS WHITEPAPER
  • Cover image for WALLIX Zero Trust cybersecurity content, illustrating the Zero Trust security approach and reinforcing WALLIX’s guidance on implementing identity‑centric access controls for stronger protection.
    READ MORE
    Ciberseguridad Zero Trust
    EFICIENCIA INFORMÁTICO IDENTITY AND ACCESS GOVERNANCE PRIVILEGE ACCESS MANAGEMENT WHITEPAPER ZERO TRUST
  • READ MORE
    La guía sobre los principales Vectores de Ataque
    PRIVILEGE ACCESS MANAGEMENT WHITEPAPER
  • Cover image for WALLIX CISO content, illustrating leadership in cybersecurity strategy and reinforcing guidance on identity and access management best practices for security executives.
    READ MORE
    La Guía del CISO para el cumplimiento normativo
    AUDIT & COMPLIANCE RECURSO DESTACADO WHITEPAPER
  • Promotional image for a WALLIX webinar, highlighting an online session focused on cybersecurity solutions and insights. The visual emphasizes knowledge sharing, expert guidance, and interactive learning opportunities.
    READ MORE
    5 pasos para proteger tu entorno OT
    INDUSTRIA WEBINARS
  • Promotional image for a WALLIX webinar, highlighting an online session focused on cybersecurity solutions and insights. The visual emphasizes knowledge sharing, expert guidance, and interactive learning opportunities.
    READ MORE
    Propósitos de Ciberseguridad para 2022: Cómo Hacer Frente a los...
    WEBINARS
  • Promotional image for a WALLIX webinar, highlighting an online session focused on cybersecurity solutions and insights. The visual emphasizes knowledge sharing, expert guidance, and interactive learning opportunities.
    READ MORE
    Frente a las ‘IDaaS y venidas’ de los ciberataques, proteja...
    WEBINARS
  • Promotional image for a WALLIX webinar, highlighting an online session focused on cybersecurity solutions and insights. The visual emphasizes knowledge sharing, expert guidance, and interactive learning opportunities.
    READ MORE
    Acceso privilegiado Just-in-Time: No vaya a contrarreloj
    WEBINARS
  • Promotional image for a WALLIX webinar, highlighting an online session focused on cybersecurity solutions and insights. The visual emphasizes knowledge sharing, expert guidance, and interactive learning opportunities.
    READ MORE
    Cómo WALLIX securiza el OT en infraestructuras críticas
    INDUSTRIA WEBINARS
  • Promotional image for a WALLIX webinar, highlighting an online session focused on cybersecurity solutions and insights. The visual emphasizes knowledge sharing, expert guidance, and interactive learning opportunities.
    READ MORE
    Endpoint Privilege Management: El antídoto contra sus infecciones de malware
    INDUSTRIA WEBINARS
  • Cover image illustrating the NIS2 cybersecurity directive on a WALLIX page, highlighting strengthened EU digital security requirements and WALLIX’s guidance on achieving compliance through robust identity and access management solutions.
    READ MORE
    Comprender la importancia de invertir en ciberseguros
    CYBER INSURANCE WHITEPAPER
  • Cover image illustrating the NIS2 cybersecurity directive on a WALLIX page, highlighting strengthened EU digital security requirements and WALLIX’s guidance on achieving compliance through robust identity and access management solutions.
    READ MORE
    7 aspectos clave a tener en cuenta antes de elegir...
    IDENTITY AND ACCESS GOVERNANCE WHITEPAPER
  • Cover image illustrating the NIS2 cybersecurity directive on a WALLIX page, highlighting strengthened EU digital security requirements and WALLIX’s guidance on achieving compliance through robust identity and access management solutions.
    READ MORE
    Desentrañando la Directiva NIS2 y su Impacto para las Empresas...
    AUDIT & COMPLIANCE BLOGPOST
  • Cover image illustrating the NIS2 cybersecurity directive on a WALLIX page, highlighting strengthened EU digital security requirements and WALLIX’s guidance on achieving compliance through robust identity and access management solutions.
    READ MORE
    NIS2: Obligaciones, Multas y Costes para las Empresas de la...
    AUDIT & COMPLIANCE BLOGPOST
  • document, data, customer, satisfaction, quality, information, network, check, business, service, assurance, guarantee, working, standardization, industry, certified, process, file, control, certification, compliance, transaction, cloud, connection, folder, system, internet, access, concept, storage, computer, hand, tablet, app, contract, device, smart, electronic, mobile, online, screen, businessman, icon, security, man, digital, paperless, technology, corporate
    READ MORE
    Directivas NIS/NIS2
    AUDIT & COMPLIANCE COMPLIANCE OT WHITEPAPER
  • A cover image for a whitepaper on the NIS2 Directive, featuring digital security elements and European Union icons. This image reflects WALLIX’s focus on helping organizations navigate the NIS2 Directive by providing secure access management and compliance solutions for critical infrastructure.
    READ MORE
    La Directiva NIS2 al detalle
    AUDIT & COMPLIANCE WHITEPAPER
  • Cover image illustrating the NIS2 cybersecurity directive on a WALLIX page, highlighting strengthened EU digital security requirements and WALLIX’s guidance on achieving compliance through robust identity and access management solutions.
    READ MORE
    El pilar fundamental: La IEC-62443 y la protección de los...
    AUDIT & COMPLIANCE INDUSTRIA RECURSO DESTACADO WHITEPAPER
  • Confident Male Data Scientist Works on Personal Computer in Big Infrastructure Control and Monitoring Room with Neural Network. Young Engineer in an Office Room with Colleagues.
    READ MORE
    Proveedores de servicios gestionados
    PRIVILEGE ACCESS MANAGEMENT WHITEPAPER
  • Stock image illustrating cybersecurity concepts, emphasizing the importance of securing digital infrastructures and protecting sensitive data, in line with Wallix’s identity and access management solutions.
    READ MORE
    Proteger la sanidad: Cómo proteger hospitales y pacientes frente al...
    AUDIT & COMPLIANCE SANIDAD WHITEPAPER
  • Active world trade, world market. Global electronics market.
    READ MORE
    5 obstáculos a evitar en la gestión de riesgos de...
    BLOGPOST IDENTITY AND ACCESS GOVERNANCE
  • Image showing Operational Technology (OT) systems being monitored by a cybersecurity professional. The visual emphasizes the protection of critical industrial infrastructure and the importance of securing OT environments against cyber threats.
    READ MORE
    Modernizar la Gobernanza de Identidades y Accesos (IAG) para el...
    BLOGPOST IDENTITY AND ACCESS GOVERNANCE PRIVILEGED ACCESS MANAGEMENT
  • Active world trade, world market. Global electronics market.
    READ MORE
    Cómo Aplicar el Principio de Menor Privilegio (PoLP) en la...
    AMENAZAS INTERNAS BLOGPOST IDENTITY AND ACCESS GOVERNANCE
  • Le RGPD : Un atout stratégique pour les entreprises européennes
    READ MORE
    Las vulnerabilidades más contagiosas en el sector sanitario
    BLOGPOST SANIDAD
  • Two human hands shaking as if making a buying deal, with blue and orange digital cyber overlay, black background. Collaboration of robotics and AI with human society
    READ MORE
    Cómo reducir tus costes de IT con SaaS: Optimiza tus...
    BLOGPOST PRIVILEGED ACCESS MANAGEMENT
  • Two human hands shaking as if making a buying deal, with blue and orange digital cyber overlay, black background. Collaboration of robotics and AI with human society
    READ MORE
    Cómo la migración a una solución PAM basada en SaaS...
    BLOGPOST PRIVILEGED ACCESS MANAGEMENT
  • Visual supporting Wallix content on cybersecurity and identity access management, illustrating key concepts and strategies for protecting digital infrastructures
    READ MORE
    ¿Por qué migrar a una solución PAM basada en SaaS...
    BLOGPOST PRIVILEGED ACCESS MANAGEMENT
  • Stock image illustrating cybersecurity concepts, emphasizing the importance of securing digital infrastructures and protecting sensitive data, in line with Wallix’s identity and access management solutions.
    READ MORE
    ¡Protege tus instalaciones sanitarias con el programa CaRE!
    AUDIT & COMPLIANCE SANIDAD WHITEPAPER
  • Cover image illustrating the NIS2 cybersecurity directive on a WALLIX page, highlighting strengthened EU digital security requirements and WALLIX’s guidance on achieving compliance through robust identity and access management solutions.
    READ MORE
    Las 10 razones por las que PAM como Servicio es...
    PRIVILEGE ACCESS MANAGEMENT WHITEPAPER
  • READ MORE
    Guía Práctica para la Seguridad de Contraseñas con WALLIX One...
    IDENTITY AND ACCESS GOVERNANCE PRIVILEGE ACCESS MANAGEMENT WHITEPAPER
  • READ MORE
    Últimas novedades en WALLIX
    IAG PRIVILEGED ACCESS MANAGEMENT WEBINARS
  • READ MORE
    Webinar | Cómo proteger la cadena de suministro industrial: Estrategias...
    PRIVILEGED ACCESS MANAGEMENT WEBINARS
  • CISO Guide Regulation Compliance
    READ MORE
    Guía del CISO para cumplir los requisitos de seguridad (con...
    AUDIT & COMPLIANCE BLOG DESTACADO BLOGPOST PRIVILEGED ACCESS MANAGEMENT
  • Gas storage sphere tanks in petrochemical industry or oil and gas refinery plant at evening, Manufacturing of petroleum industrial plant with gas column and smoke stacks on sunset sky background
    READ MORE
    Tres estrategias para que mejores la seguridad de los accesos...
    ACCESO REMOTO INDUSTRIA INFRAESTRUCTURA CRÍTICA PRIVILEGE ACCESS MANAGEMENT PROTOCOLOS INDUSTRIALES
  • Phone lock code. Smartphone protection with 2fa (two factor authentication). Smartphone protection and security with pin number. Encrypted data. Personal online privacy. Cyber hacker threat.
    READ MORE
    Software de gestión de contraseñas para empresas: WALLIX Bastion Password...
    BLOGPOST PRIVILEGED ACCESS MANAGEMENT
  • IGA and PAM
    READ MORE
    IGA y PAM: Cómo se conecta la Administración del Gobierno...
    BLOGPOST IDENTITY AND ACCESS GOVERNANCE PRIVILEGED ACCESS MANAGEMENT
  • Just in Time Security - JIT Access
    READ MORE
    "Justo a tiempo", una estrategia clave para la seguridad de...
    BLOGPOST ENDPOINT PRIVILEGE MANAGEMENT PRIVILEGED ACCESS MANAGEMENT
  • IEC ISA 62243 Compliance with PAM
    READ MORE
    The Vital Link: IEC-62443 Standards in Protecting Industrial Cyber Ecosystems
    AUDIT & COMPLIANCE BLOG DESTACADO BLOGPOST INDUSTRIA
  • Industrial Sovereignty
    READ MORE
    Industria 4.0 en jaque: Un futuro conectado, pero inseguro
    BLOGPOST CRITICAL INFRASTRUCTURE INDUSTRIA iNFRAESTRUCTURAS INTELIGENTES
  • READ MORE
    Gestor de Sesiones: Qué es y por qué lo necesitas
    BLOGPOST PRIVILEGED ACCESS MANAGEMENT
  • Engineer Inspecting Tunnel at Hydropower Plant. Female engineer in orange safety gear inspecting a tunnel at a hydroelectric power plant, highlighting the critical infrastructure.
    READ MORE
    Túnel Universal: Conexiones OT seguras y sencillas
    ACCESO REMOTO BLOGPOST INDUSTRIA PRIVILEGED ACCESS MANAGEMENT
  • IEC ISA 62243 Compliance with PAM
    READ MORE
    Cómo PAM facilita la implementación de IEC 62443
    AUDIT & COMPLIANCE BLOG DESTACADO BLOGPOST INDUSTRIA PRIVILEGED ACCESS MANAGEMENT
  • WALLIX PEDM (Privilege Elevation and Delegation Management) diagram: illustrates fine‑grained, just‑in‑time privilege elevation at the process level to enforce least‑privilege security
    READ MORE
    Qué es la Gestión de elevación y delegación de privilegios...
    BLOGPOST PRIVILEGED ACCESS MANAGEMENT
  • OT zerotrust
    READ MORE
    Las barreras y desafíos para implementar Zero Trust en entornos...
    BLOGPOST INDUSTRIA OT OT BLOGPOST PROTOCOLOS INDUSTRIALES
  • Non human identities
    READ MORE
    Identidades No Humanas: Los riesgos ocultos del acceso automatizado
    BLOGPOST
  • Cybersecurity concept showing a digital padlock with binary code and glowing network connections, symbolizing secure data protection, encrypted communication, and IT network security.
    READ MORE
    Acceso seguro de terceros
    ACCESO REMOTO BLOGPOST
  • cloud computing technology concept transfer database to cloud. There is a large cloud icon that stands out in the center of the abstract world above the polygon with a dark blue background.
    READ MORE
    Identify, Authenticate, Authorize: The Three Key Steps in Access Security
    BLOGPOST ENDPOINT PRIVILEGE MANAGEMENT IDENTITY AND ACCESS GOVERNANCE PRIVILEGED ACCESS MANAGEMENT ZERO TRUST
  • READ MORE
    Privileged Access Management Best Practices
    BLOGPOST PRIVILEGED ACCESS MANAGEMENT
  • es directions informatiques et la gestion des comptes à privilèges
    READ MORE
    Proteger cada acceso: el reto pendiente de las empresas
    BLOGPOST DEVOPS
  • healthcare cybersecurity
    READ MORE
    Seguridad sanitaria de extremo a extremo: IAM, PAM y MFA
    BLOGPOST PRIVILEGED ACCESS MANAGEMENT SANIDAD
  • pasm
    READ MORE
    ¿Qué es la gestión de cuentas y sesiones privilegiadas (PASM)?
    BLOGPOST PRIVILEGED ACCESS MANAGEMENT
  • Pam para PYME
    READ MORE
    Gestión de Acceso Privilegiado para PYMES y PYMES: Una perspectiva...
    BLOGPOST PRIVILEGED ACCESS MANAGEMENT
  • healthcare-it-equipment-cybersecurity
    READ MORE
    Por qué el control de accesos privilegiados debe ser una...
    BLOGPOST PRIVILEGED ACCESS MANAGEMENT SANIDAD

PRODUCTOS

  • WALLIX PAM
  • WALLIX Acceso Remoto
  • WALLIX IDaaS
  • WALLIX Entreprise Vault
  • WALLIX IAG
  • WALLIX ONE

RECURSOS

  • Investigaciones e informes
  • Entradas de blog
  • Casos de éxito
  • Fichas técnicas
  • Demos
  • Videos

ASISTENCIA

  • Atención al cliente
  • Servicios profesionales
  • WALLIX ACADEMY
  • Alertas y avisos

ACERCA DE

  • Acerca de WALLIX
  • Equipo directivo
  • WALLIX Investors
  • RSE
  • Ofertas de empleo
  • Redacción
Wallix logo in clean white design, symbolizing trust and expertise in cybersecurity solutions for modern enterprises.

WALLIX diseña soluciones de ciberseguridad para proporcionar un servicio de acceso identificado, sencillo y seguro, para proteger los entornos digitales e industriales. La calidad y la seguridad son, por tanto, nuestras principales preocupaciones.

Leer más

SÍGUENOS

Copyright WALLIX 2025
  • Link to LinkedIn
  • Link to Youtube
  • Aviso legal
  • Política de privacidad
Desplazarse hacia arriba Desplazarse hacia arriba Desplazarse hacia arriba
Usamos cookies en nuestro sitio web para brindarte la experiencia más relevante de acuerdo con tus preferencias y visitas previas. Al hacer clic en "Aceptar", aceptas el uso de TODAS las cookies.
.
Configuración de cookiesACEPTAR
Gestionar consentimiento

Resumen de privacidad

Este sitio web utiliza cookies para mejorar su experiencia mientras navega por el sitio web. De estas, las cookies que se clasifican como necesarias se almacenan en su navegador, ya que son esenciales para el funcionamiento de las funcionalidades básicas del sitio web. También utilizamos cookies de terceros que nos ayudan a analizar y comprender cómo utiliza este sitio web. Estas cookies se almacenarán en su navegador solo con su consentimiento. También tiene la opción de optar por no recibir estas cookies. Pero la exclusión voluntaria de algunas de estas cookies puede afectar su experiencia de navegación.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
CookieDuraciónDescripción
IDE1 year 24 daysUsed by Google DoubleClick and stores information about how the user uses the website and any other advertisement before visiting the website. This is used to present users with ads that are relevant to them according to the user profile.
test_cookie15 minutesThis cookie is set by doubleclick.net. The purpose of the cookie is to determine if the user's browser supports cookies.
VISITOR_INFO1_LIVE5 months 27 daysThis cookie is set by Youtube. Used to track the information of the embedded YouTube videos on a website.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
CookieDuraciónDescripción
__hstc1 year 24 daysThis cookie is set by Hubspot and is used for tracking visitors. It contains the domain, utk, initial timestamp (first visit), last timestamp (last visit), current timestamp (this visit), and session number (increments for each subsequent session).
_ga2 yearsThis cookie is installed by Google Analytics. The cookie is used to calculate visitor, session, campaign data and keep track of site usage for the site's analytics report. The cookies store information anonymously and assign a randomly generated number to identify unique visitors.
_gid1 dayThis cookie is installed by Google Analytics. The cookie is used to store information of how visitors use a website and helps in creating an analytics report of how the wbsite is doing. The data collected including the number visitors, the source where they have come from, and the pages viisted in an anonymous form.
hubspotutk1 year 24 daysThis cookie is used by HubSpot to keep track of the visitors to the website. This cookie is passed to Hubspot on form submission and used when deduplicating contacts.
trackalyzer1 yearThis cookie is used by Leadlander. The cookie is used to analyse the website visitors and monitor traffic patterns.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
CookieDuraciónDescripción
__hssc30 minutesThis cookie is set by HubSpot. The purpose of the cookie is to keep track of sessions. This is used to determine if HubSpot should increment the session number and timestamps in the __hstc cookie. It contains the domain, viewCount (increments each pageView in a session), and session start timestamp.
bcookie2 yearsThis cookie is set by linkedIn. The purpose of the cookie is to enable LinkedIn functionalities on the page.
langsessionThis cookie is used to store the language preferences of a user to serve up content in that stored language the next time user visit the website.
lidc1 dayThis cookie is set by LinkedIn and used for routing.
messagesUtk1 year 24 daysThis cookie is set by hubspot. This cookie is used to recognize the user who have chatted using the messages tool. This cookies is stored if the user leaves before they are added as a contact. If the returning user visits again with this cookie on the browser, the chat history with the user will be loaded.
Necessary
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDuraciónDescripción
__cfduid1 monthThe cookie is used by cdn services like CloudFare to identify individual clients behind a shared IP address and apply security settings on a per-client basis. It does not correspond to any user ID in the web application and does not store any personally identifiable information.
__hssrcsessionThis cookie is set by Hubspot. According to their documentation, whenever HubSpot changes the session cookie, this cookie is also set to determine if the visitor has restarted their browser. If this cookie does not exist when HubSpot manages cookies, it is considered a new session.
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
JSESSIONIDsessionUsed by sites written in JSP. General purpose platform session cookies that are used to maintain users' state across page requests.
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
CookieDuraciónDescripción
_gat_UA-12183334-11 minuteNo description
AnalyticsSyncHistory1 monthNo description
CONSENT16 years 9 months 23 days 12 hours 13 minutesNo description
UserMatchHistory1 monthLinkedin - Used to track visitors on multiple websites, in order to present relevant advertisement based on the visitor's preferences.
wp-wpml_current_language1 dayNo description
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
CookieDuraciónDescripción
YSCsessionThis cookies is set by Youtube and is used to track the views of embedded videos.
GUARDAR Y ACEPTAR
Funciona con CookieYes Logo