{"id":46343,"date":"2024-02-06T15:23:10","date_gmt":"2024-02-06T14:23:10","guid":{"rendered":"https:\/\/www.wallix.com\/ciberseguridad-de-confianza-cero\/"},"modified":"2024-06-03T11:03:15","modified_gmt":"2024-06-03T10:03:15","slug":"ciberseguridad-zero-trust","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/ciberseguridad-zero-trust\/","title":{"rendered":"Ciberseguridad Zero Trust"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-llqctweu-60b56b84d5493221301081cf13e345cc\">\n.avia-section.av-llqctweu-60b56b84d5493221301081cf13e345cc{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/09\/AdobeStock_486797951-1500x630.jpeg);\nbackground-position:50% 50%;\nbackground-attachment:fixed;\n}\n<\/style>\n<div id='av_section_1'  class='avia-section av-llqctweu-60b56b84d5493221301081cf13e345cc main_color avia-section-default avia-no-border-styling  avia-builder-el-0  el_before_av_one_half  avia-builder-el-first  avia-full-stretch avia-bg-style-fixed av-minimum-height av-minimum-height-25 av-height-25  container_wrap fullsize'  data-section-bg-repeat='stretch' data-av_minimum_height_pc='25' data-av_min_height_opt='25'><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-46343'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-llqctcbk-595efad608307840b60805fb64ac2b85\">\n#top .av-special-heading.av-llqctcbk-595efad608307840b60805fb64ac2b85{\npadding-bottom:10px;\ncolor:#ffffff;\n}\nbody .av-special-heading.av-llqctcbk-595efad608307840b60805fb64ac2b85 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-llqctcbk-595efad608307840b60805fb64ac2b85 .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-llqctcbk-595efad608307840b60805fb64ac2b85 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-llqctcbk-595efad608307840b60805fb64ac2b85 av-special-heading-h2 custom-color-heading blockquote modern-quote  avia-builder-el-1  avia-builder-el-no-sibling '><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Ciberseguridad Zero Trust<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><div id='after_section_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-46343'><div class='entry-content-wrapper clearfix'>\n<div  class='flex_column av-6l3d0du-c9e09d324dd94def9a40d3433276b16e av_one_half  avia-builder-el-2  el_after_av_section  el_before_av_one_half  avia-builder-el-first  first flex_column_div  '     ><section  class='av_textblock_section av-llqcw9co-ad2d3c7e28254e7ac05091f56adf7214 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Igualdad de oportunidades Verificaci\u00f3n de credenciales, identidades y permisos<\/h3>\n<p>En materia de ciberseguridad, las organizaciones no deben confiar a nadie, ya sea interno o externo, el acceso no verificado a activos inform\u00e1ticos sensibles. Esto no quiere decir, por supuesto, que ning\u00fan actor deba <i>tener<\/i> acceso privilegiado a los recursos de la red, lo que obviamente ser\u00eda inviable. M\u00e1s bien, requiere un esquema de seguridad que pida a los usuarios no s\u00f3lo demostrar que tienen <i><b>credenciales de acceso<\/b><\/i> sino tambi\u00e9n que demuestren <i><b>son quienes dicen ser<\/b><\/i> y tienen la <i><b>autorizaci\u00f3n<\/b><\/i> para acceder a dicho recurso antes de que se conceda la entrada.<\/p>\n<p>Toda organizaci\u00f3n, de cualquier tama\u00f1o o forma, est\u00e1 sometida a una amenaza constante de ataque, cuyas consecuencias pueden ser devastadoras. La confianza cero garantiza que s\u00f3lo puedan acceder a los activos cr\u00edticos quienes ofrezcan pruebas fehacientes de que poseen las credenciales, la identidad y la necesidad de acceder a ellos.<\/p>\n<p><strong><span style=\"color: #f37324;\">Rellene el formulario para descargar el libro blanco y obtener m\u00e1s informaci\u00f3n sobre la ciberseguridad de confianza cero.<\/span><\/strong><\/p>\n<\/div><\/section><br \/>\n<div  class='av-social-sharing-box av-679bwuq-0e7850d2afd524f34d1f9d4c24cd64ff av-social-sharing-box-default  avia-builder-el-4  el_after_av_textblock  avia-builder-el-last  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Comparta este informe<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Compartir en X\" href='https:\/\/twitter.com\/share?text=Ciberseguridad%20Zero%20Trust&#038;url=https:\/\/www.wallix.com\/es\/?p=46343' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Compartir en X'><span class='avia_hidden_link_text'>Compartir en X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Compartir en LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Ciberseguridad%20Zero%20Trust&#038;url=https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/ciberseguridad-zero-trust\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Compartir en LinkedIn'><span class='avia_hidden_link_text'>Compartir en LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Compartir por correo\" href='mailto:?subject=Ciberseguridad%20Zero%20Trust&#038;body=https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/ciberseguridad-zero-trust\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Compartir por correo'><span class='avia_hidden_link_text'>Compartir por correo<\/span><\/a><\/li><\/ul><\/div><\/div><\/p><\/div><div  class='flex_column av-5xf552q-bd49bb41eb0e629155c2f43552f19b9c av_one_half  avia-builder-el-5  el_after_av_one_half  el_before_av_one_half  flex_column_div  '     ><section  class='av_textblock_section av-5goqr76-d5789288ad55cd991be707f269c8ae38 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3><strong>Descargar este libro blanco<br \/>\n<\/strong><\/h3>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4qw0onm-d225c7c719b2549f1772fc3bfe6b74d9\">\n#top .hr.hr-invisible.av-4qw0onm-d225c7c719b2549f1772fc3bfe6b74d9{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-4qw0onm-d225c7c719b2549f1772fc3bfe6b74d9 hr-invisible  avia-builder-el-7  el_after_av_textblock  el_before_av_codeblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4j63jgy-fdb2c9eab89e25e2e7b4bfda21b7c3f3\">\n#top .hr.hr-invisible.av-4j63jgy-fdb2c9eab89e25e2e7b4bfda21b7c3f3{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-4j63jgy-fdb2c9eab89e25e2e7b4bfda21b7c3f3 hr-invisible  avia-builder-el-9  el_after_av_codeblock  avia-builder-el-last '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p><\/div><\/p>\n<div  class='flex_column av-3vfm82a-065a42f69776725b8bfe99d66280113f av_one_half  avia-builder-el-10  el_after_av_one_half  el_before_av_one_half  first flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-cak4s2-7ed09806753e2170e1671ba5fe861b01\">\n#top .av-special-heading.av-cak4s2-7ed09806753e2170e1671ba5fe861b01{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-cak4s2-7ed09806753e2170e1671ba5fe861b01 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-cak4s2-7ed09806753e2170e1671ba5fe861b01 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-cak4s2-7ed09806753e2170e1671ba5fe861b01 av-special-heading-h2 blockquote modern-quote  avia-builder-el-11  el_before_av_hr  avia-builder-el-first '><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Contenidos relacionados<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2udx3ua-dc7592a78e82f35cdffbf505f6fc0f8a\">\n#top .hr.hr-invisible.av-2udx3ua-dc7592a78e82f35cdffbf505f6fc0f8a{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-2udx3ua-dc7592a78e82f35cdffbf505f6fc0f8a hr-invisible  avia-builder-el-12  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-1\"  class='av-magazine av-2iruiuq-8bb0586737c9bad8b89646d00e899cf0  avia-builder-el-13  el_after_av_hr  avia-builder-el-last   avia-builder-el-13  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-76574 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/es\/blogpost\/identify-authenticate-authorize-the-three-key-steps-in-access-security\/' title='Enlace a: Identify, Authenticate, Authorize: The Three Key Steps in Access Security' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/02\/cloud-talon-achille-cyber-industrie-manufacturiere-InCyber-80x80.jpg\" class=\"wp-image-51652 avia-img-lazy-loading-not-51652 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"cloud computing technology concept transfer database to cloud. There is a large cloud icon that stands out in the center of the abstract world above the polygon with a dark blue background.\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/02\/cloud-talon-achille-cyber-industrie-manufacturiere-InCyber-80x80.jpg 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/02\/cloud-talon-achille-cyber-industrie-manufacturiere-InCyber-36x36.jpg 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/02\/cloud-talon-achille-cyber-industrie-manufacturiere-InCyber-180x180.jpg 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Identify, Authenticate, Authorize: The Three Key Steps in Access Security\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-08-18T16:34:56+01:00\" >18 de agosto de 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/blogpost\/identify-authenticate-authorize-the-three-key-steps-in-access-security\/' title='Enlace a: Identify, Authenticate, Authorize: The Three Key Steps in Access Security'>Identify, Authenticate, Authorize: The Three Key Steps in Access Security<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-68292 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/es\/blogpost\/justo-a-tiempo-una-estrategia-clave-para-la-seguridad-de-acceso\/' title='Enlace a: \u00abJusto a tiempo\u00bb, una estrategia clave para la seguridad de acceso' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2021\/10\/Just-in-Time-Security-JIT-Access-150x150.jpeg\" class=\"wp-image-18019 avia-img-lazy-loading-not-18019 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"Just in Time Security - JIT Access\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: &quot;Justo a tiempo&quot;, una estrategia clave para la seguridad de acceso\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-12T13:37:08+01:00\" >12 de febrero de 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/blogpost\/justo-a-tiempo-una-estrategia-clave-para-la-seguridad-de-acceso\/' title='Enlace a: \u00abJusto a tiempo\u00bb, una estrategia clave para la seguridad de acceso'>\u00abJusto a tiempo\u00bb, una estrategia clave para la seguridad de acceso<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div>\n<div  class='flex_column av-24j1viq-f03b072861dbcaab64475dc467d6c3e3 av_one_half  avia-builder-el-14  el_after_av_one_half  avia-builder-el-last  flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1igac36-9ad7f4416190b7a66ecf67266ed42fad\">\n#top .av-special-heading.av-1igac36-9ad7f4416190b7a66ecf67266ed42fad{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-1igac36-9ad7f4416190b7a66ecf67266ed42fad .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-1igac36-9ad7f4416190b7a66ecf67266ed42fad .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-1igac36-9ad7f4416190b7a66ecf67266ed42fad av-special-heading-h2 blockquote modern-quote  avia-builder-el-15  el_before_av_hr  avia-builder-el-first '><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Recursos relacionados<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1adzdiq-86251f5c0b4b67c8d342c721473385c2\">\n#top .hr.hr-invisible.av-1adzdiq-86251f5c0b4b67c8d342c721473385c2{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-1adzdiq-86251f5c0b4b67c8d342c721473385c2 hr-invisible  avia-builder-el-16  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-2\"  class='av-magazine av-wre71u-bf907a4ba0dc24d7ed827b0518090b12  avia-builder-el-17  el_after_av_hr  avia-builder-el-last   avia-builder-el-17  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-87162 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/resiliencia-en-seguridad-ot-antes-durante-y-despues-del-incidente\/' title='Enlace a: Resiliencia en seguridad OT: Antes, durante y despu\u00e9s del incidente' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/04\/ot-security-resiliencervb-80x80.jpg\" class=\"wp-image-87163 avia-img-lazy-loading-not-87163 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/04\/ot-security-resiliencervb-80x80.jpg 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/04\/ot-security-resiliencervb-36x36.jpg 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/04\/ot-security-resiliencervb-180x180.jpg 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Resiliencia en seguridad OT: Antes, durante y despu\u00e9s del incidente\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-04-15T13:30:12+01:00\" >15 de abril de 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/resiliencia-en-seguridad-ot-antes-durante-y-despues-del-incidente\/' title='Enlace a: Resiliencia en seguridad OT: Antes, durante y despu\u00e9s del incidente'>Resiliencia en seguridad OT: Antes, durante y despu\u00e9s del incidente<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-85166 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/el-coste-real-de-una-solucion-pam-parte-ii-convertir-el-analisis-en-accion\/' title='Enlace a: El coste real de una soluci\u00f3n PAM Parte II: convertir el an\u00e1lisis en acci\u00f3n' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/01\/AdobeStock_1075718939-80x80.jpeg\" class=\"wp-image-85164 avia-img-lazy-loading-not-85164 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/01\/AdobeStock_1075718939-80x80.jpeg 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/01\/AdobeStock_1075718939-36x36.jpeg 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/01\/AdobeStock_1075718939-180x180.jpeg 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: El coste real de una soluci\u00f3n PAM Parte II: convertir el an\u00e1lisis en acci\u00f3n\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-09T12:11:36+01:00\" >9 de marzo de 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/el-coste-real-de-una-solucion-pam-parte-ii-convertir-el-analisis-en-accion\/' title='Enlace a: El coste real de una soluci\u00f3n PAM Parte II: convertir el an\u00e1lisis en acci\u00f3n'>El coste real de una soluci\u00f3n PAM Parte II: convertir el an\u00e1lisis en acci\u00f3n<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-85144 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/el-coste-real-de-una-solucion-pam-on-premise-vs-saas\/' title='Enlace a: El coste real de una soluci\u00f3n PAM On-Premise vs SaaS' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/onprem_saas-80x80.jpg\" class=\"wp-image-86891 avia-img-lazy-loading-not-86891 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/onprem_saas-80x80.jpg 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/onprem_saas-36x36.jpg 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/onprem_saas-180x180.jpg 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: El coste real de una soluci\u00f3n PAM On-Premise vs SaaS\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-09T11:59:10+01:00\" >9 de marzo de 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/el-coste-real-de-una-solucion-pam-on-premise-vs-saas\/' title='Enlace a: El coste real de una soluci\u00f3n PAM On-Premise vs SaaS'>El coste real de una soluci\u00f3n PAM On-Premise vs SaaS<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-67436 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/tres-estrategias-mejores-la-seguridad-los-accesos-remotos-entorno-industrial\/' title='Enlace a: Tres estrategias para que mejores la seguridad de los accesos remotos en tu entorno industrial' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/04\/WALLIX-INSIDE-BACKGROUND-80x80.jpeg\" class=\"wp-image-54112 avia-img-lazy-loading-not-54112 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"Gas storage sphere tanks in petrochemical industry or oil and gas refinery plant at evening, Manufacturing of petroleum industrial plant with gas column and smoke stacks on sunset sky background\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/04\/WALLIX-INSIDE-BACKGROUND-80x80.jpeg 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/04\/WALLIX-INSIDE-BACKGROUND-36x36.jpeg 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/04\/WALLIX-INSIDE-BACKGROUND-180x180.jpeg 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Tres estrategias para que mejores la seguridad de los accesos remotos en tu entorno industrial\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-12-30T11:55:34+01:00\" >30 de diciembre de 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/tres-estrategias-mejores-la-seguridad-los-accesos-remotos-entorno-industrial\/' title='Enlace a: Tres estrategias para que mejores la seguridad de los accesos remotos en tu entorno industrial'>Tres estrategias para que mejores la seguridad de los accesos remotos en tu entorno industrial<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-65446 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/guia-practica-para-la-seguridad-de-contrasenas-con-wallix-one-enterprise-vault\/' title='Enlace a: Gu\u00eda Pr\u00e1ctica para la Seguridad de Contrase\u00f1as con WALLIX One Enterprise Vault' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/11\/AdobeStock_876633532-2-80x80.jpeg\" class=\"wp-image-65458 avia-img-lazy-loading-not-65458 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/11\/AdobeStock_876633532-2-80x80.jpeg 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/11\/AdobeStock_876633532-2-36x36.jpeg 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/11\/AdobeStock_876633532-2-180x180.jpeg 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Gu\u00eda Pr\u00e1ctica para la Seguridad de Contrase\u00f1as con WALLIX One Enterprise Vault\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-11-07T15:32:50+01:00\" >7 de noviembre de 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/guia-practica-para-la-seguridad-de-contrasenas-con-wallix-one-enterprise-vault\/' title='Enlace a: Gu\u00eda Pr\u00e1ctica para la Seguridad de Contrase\u00f1as con WALLIX One Enterprise Vault'>Gu\u00eda Pr\u00e1ctica para la Seguridad de Contrase\u00f1as con WALLIX One Enterprise Vault<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":34041,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1775,1740,1793,1656,1831],"tags":[],"class_list":["post-46343","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eficiencia-informatico-es","category-whitepaper-iag-es","category-whitepaper-privilege-access-management-es","category-whitepaper-es","category-zero-trust-es"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ciberseguridad Zero Trust - WALLIX<\/title>\n<meta name=\"description\" content=\"En materia de ciberseguridad, las organizaciones no deben confiar a nadie, ya sea interno o externo, el acceso no verificado a activos inform\u00e1ticos sensibles.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/ciberseguridad-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberseguridad Zero Trust - WALLIX\" \/>\n<meta property=\"og:description\" content=\"En materia de ciberseguridad, las organizaciones no deben confiar a nadie, ya sea interno o externo, el acceso no verificado a activos inform\u00e1ticos sensibles.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/ciberseguridad-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-06T14:23:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-03T10:03:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/09\/ZERO-TRUST-COUV.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"WALLIX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"WALLIX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/recursos\\\/whitepaper-es\\\/ciberseguridad-zero-trust\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/recursos\\\/whitepaper-es\\\/ciberseguridad-zero-trust\\\/\"},\"author\":{\"name\":\"WALLIX\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\"},\"headline\":\"Ciberseguridad Zero Trust\",\"datePublished\":\"2024-02-06T14:23:10+00:00\",\"dateModified\":\"2024-06-03T10:03:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/recursos\\\/whitepaper-es\\\/ciberseguridad-zero-trust\\\/\"},\"wordCount\":2486,\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/recursos\\\/whitepaper-es\\\/ciberseguridad-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/ZERO-TRUST-COUV.png\",\"articleSection\":[\"EFICIENCIA INFORM\u00c1TICO\",\"IDENTITY AND ACCESS GOVERNANCE\",\"PRIVILEGE ACCESS MANAGEMENT\",\"WHITEPAPER\",\"ZERO TRUST\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/recursos\\\/whitepaper-es\\\/ciberseguridad-zero-trust\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/recursos\\\/whitepaper-es\\\/ciberseguridad-zero-trust\\\/\",\"name\":\"Ciberseguridad Zero Trust - WALLIX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/recursos\\\/whitepaper-es\\\/ciberseguridad-zero-trust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/recursos\\\/whitepaper-es\\\/ciberseguridad-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/ZERO-TRUST-COUV.png\",\"datePublished\":\"2024-02-06T14:23:10+00:00\",\"dateModified\":\"2024-06-03T10:03:15+00:00\",\"description\":\"En materia de ciberseguridad, las organizaciones no deben confiar a nadie, ya sea interno o externo, el acceso no verificado a activos inform\u00e1ticos sensibles.\",\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wallix.com\\\/es\\\/recursos\\\/whitepaper-es\\\/ciberseguridad-zero-trust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/recursos\\\/whitepaper-es\\\/ciberseguridad-zero-trust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/ZERO-TRUST-COUV.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/ZERO-TRUST-COUV.png\",\"width\":1200,\"height\":627,\"caption\":\"Cover image for WALLIX Zero Trust cybersecurity content, illustrating the Zero Trust security approach and reinforcing WALLIX\u2019s guidance on implementing identity\u2011centric access controls for stronger protection.\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/wallixcom\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wallix\\\/\",\"https:\\\/\\\/www.youtube.com\\\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\",\"name\":\"WALLIX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"caption\":\"WALLIX\"},\"url\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/author\\\/alex\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ciberseguridad Zero Trust - WALLIX","description":"En materia de ciberseguridad, las organizaciones no deben confiar a nadie, ya sea interno o externo, el acceso no verificado a activos inform\u00e1ticos sensibles.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/ciberseguridad-zero-trust\/","og_locale":"es_ES","og_type":"article","og_title":"Ciberseguridad Zero Trust - WALLIX","og_description":"En materia de ciberseguridad, las organizaciones no deben confiar a nadie, ya sea interno o externo, el acceso no verificado a activos inform\u00e1ticos sensibles.","og_url":"https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/ciberseguridad-zero-trust\/","og_site_name":"WALLIX","article_published_time":"2024-02-06T14:23:10+00:00","article_modified_time":"2024-06-03T10:03:15+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/09\/ZERO-TRUST-COUV.png","type":"image\/png"}],"author":"WALLIX","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"Escrito por":"WALLIX","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/ciberseguridad-zero-trust\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/ciberseguridad-zero-trust\/"},"author":{"name":"WALLIX","@id":"https:\/\/www.wallix.com\/es\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd"},"headline":"Ciberseguridad Zero Trust","datePublished":"2024-02-06T14:23:10+00:00","dateModified":"2024-06-03T10:03:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/ciberseguridad-zero-trust\/"},"wordCount":2486,"publisher":{"@id":"https:\/\/www.wallix.com\/es\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/ciberseguridad-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/09\/ZERO-TRUST-COUV.png","articleSection":["EFICIENCIA INFORM\u00c1TICO","IDENTITY AND ACCESS GOVERNANCE","PRIVILEGE ACCESS MANAGEMENT","WHITEPAPER","ZERO TRUST"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/ciberseguridad-zero-trust\/","url":"https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/ciberseguridad-zero-trust\/","name":"Ciberseguridad Zero Trust - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/ciberseguridad-zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/ciberseguridad-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/09\/ZERO-TRUST-COUV.png","datePublished":"2024-02-06T14:23:10+00:00","dateModified":"2024-06-03T10:03:15+00:00","description":"En materia de ciberseguridad, las organizaciones no deben confiar a nadie, ya sea interno o externo, el acceso no verificado a activos inform\u00e1ticos sensibles.","inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/ciberseguridad-zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/ciberseguridad-zero-trust\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/09\/ZERO-TRUST-COUV.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/09\/ZERO-TRUST-COUV.png","width":1200,"height":627,"caption":"Cover image for WALLIX Zero Trust cybersecurity content, illustrating the Zero Trust security approach and reinforcing WALLIX\u2019s guidance on implementing identity\u2011centric access controls for stronger protection."},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/es\/#website","url":"https:\/\/www.wallix.com\/es\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/es\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.wallix.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/es\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd","name":"WALLIX","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","caption":"WALLIX"},"url":"https:\/\/www.wallix.com\/es\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts\/46343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/comments?post=46343"}],"version-history":[{"count":12,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts\/46343\/revisions"}],"predecessor-version":[{"id":58751,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts\/46343\/revisions\/58751"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/media\/34041"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/media?parent=46343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/categories?post=46343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/tags?post=46343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}