{"id":66412,"date":"2024-12-02T15:57:20","date_gmt":"2024-12-02T14:57:20","guid":{"rendered":"https:\/\/www.wallix.com\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\/"},"modified":"2025-11-17T16:14:50","modified_gmt":"2025-11-17T15:14:50","slug":"guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/es\/blogpost\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\/","title":{"rendered":"Gu\u00eda del CISO para cumplir los requisitos de seguridad (con una soluci\u00f3n PAM)"},"content":{"rendered":"<div id='full_slider_1'  class='avia-fullwidth-slider main_color avia-shadow   avia-builder-el-0  el_before_av_two_third  avia-builder-el-first   container_wrap fullsize'  ><div  class='avia-slideshow av-m474yeni-e62c992e3814641aaf44c91f1d04cb86 avia-slideshow-featured av_slideshow_full avia-slide-slider av-slideshow-ui av-control-default av-slideshow-manual av-loop-once av-loop-manual-endless av-default-height-applied   avia-slideshow-1' data-slideshow-options=\"{&quot;animation&quot;:&quot;slide&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;bg_slider&quot;:false,&quot;keep_padding&quot;:false,&quot;hoverpause&quot;:false,&quot;show_slide_delay&quot;:0}\"  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><ul class='avia-slideshow-inner ' style='padding-bottom: 52.24787363305%;'><li  class='avia-slideshow-slide av-m474yeni-e62c992e3814641aaf44c91f1d04cb86__0  av-single-slide slide-1 slide-odd'><div data-rel='slideshow-1' class='avia-slide-wrap '   ><img decoding=\"async\" fetchpriority=\"high\" class=\"wp-image-3331 avia-img-lazy-loading-not-3331\"  src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/05\/ciso-guide-compliance-regulations-pam.png\" width=\"823\" height=\"430\" title='ciso-guide-compliance-regulations-pam' alt='CISO Guide Regulation Compliance'  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/05\/ciso-guide-compliance-regulations-pam.png 1200w, https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/05\/ciso-guide-compliance-regulations-pam-300x157.png 300w, https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/05\/ciso-guide-compliance-regulations-pam-1024x535.png 1024w, https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/05\/ciso-guide-compliance-regulations-pam-768x401.png 768w, https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/05\/ciso-guide-compliance-regulations-pam-380x199.png 380w, https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/05\/ciso-guide-compliance-regulations-pam-760x397.png 760w, https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/05\/ciso-guide-compliance-regulations-pam-320x167.png 320w, https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/05\/ciso-guide-compliance-regulations-pam-640x334.png 640w, https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/05\/ciso-guide-compliance-regulations-pam-480x251.png 480w, https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/05\/ciso-guide-compliance-regulations-pam-960x502.png 960w\" sizes=\"(max-width: 823px) 100vw, 823px\" \/><\/div><\/li><\/ul><\/div><\/div><div id='after_full_slider_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-66412'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-m403ri4o-0497e7513d37005e02d858469320e1c2 sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m403ri4o-0497e7513d37005e02d858469320e1c2\">\n#top .flex_column_table.av-equal-height-column-flextable.av-m403ri4o-0497e7513d37005e02d858469320e1c2{\nmargin-top:-600px;\nmargin-bottom:0;\n}\n.flex_column.av-m403ri4o-0497e7513d37005e02d858469320e1c2{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-m403ri4o-0497e7513d37005e02d858469320e1c2{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-m403ri4o-0497e7513d37005e02d858469320e1c2 av_two_third  avia-builder-el-1  el_after_av_slideshow_full  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lqmcqghb-07bbba7fa8a99dc912f341ccf1f6a46b\">\n#top .av-special-heading.av-lqmcqghb-07bbba7fa8a99dc912f341ccf1f6a46b{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lqmcqghb-07bbba7fa8a99dc912f341ccf1f6a46b .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lqmcqghb-07bbba7fa8a99dc912f341ccf1f6a46b .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lqmcqghb-07bbba7fa8a99dc912f341ccf1f6a46b av-special-heading-h1 blockquote modern-quote  avia-builder-el-2  el_before_av_textblock  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Gu\u00eda del CISO para cumplir los requisitos de seguridad (con una soluci\u00f3n PAM)<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-lqmct64o-2bcf7c74e1ea599e8277954533583212 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>La prensa est\u00e1 llena de historias sobre importantes violaciones de datos, y con las normativas de seguridad a punto de entrar en vigor y lo mucho que est\u00e1 en juego (el RGPD y la Directiva NIS, de eso estoy hablando), los CISO de todo el mundo tienen mucho trabajo por delante. El panorama normativo se ampl\u00eda, con requisitos y normas estrictos para la pol\u00edtica, el tratamiento y la gesti\u00f3n de datos. Para alegr\u00eda de los ejecutivos de seguridad inform\u00e1tica, el sistema de Gesti\u00f3n de Accesos Privilegiados (PAM) aborda muchos aspectos del cumplimiento normativo y pertenece a multitud de normas.<\/p>\n<h2>Los directivos preocupados por la ciberseguridad<\/h2>\n<ul>\n<li>El 62% de los directores generales afirman que las amenazas inform\u00e1ticas son una <a href=\"https:\/\/pwc.blogs.com\/resilience\/2017\/03\/for-ceos-cybersecurity-is-both-rising-concern-and-significant-opportunity.html\" target=\"_blank\" rel=\"nofollow noopener\">preocupaci\u00f3n creciente para<\/a> el desarrollo de su empresa.<\/li>\n<li>Las amenazas inform\u00e1ticas figuran entre las cinco principales amenazas que preocupan a los directores generales (junto con la escasez de personal cualificado, los costes energ\u00e9ticos, etc.).<\/li>\n<li>Las violaciones de la confidencialidad y la \u00e9tica de los datos, as\u00ed como las aver\u00edas y el mal funcionamiento de las TI, figuran entre las principales amenazas citadas por los altos ejecutivos.<\/li>\n<li>El RGPD, que entra en vigor el 25 de mayo de 2018, afecta a todas las empresas que gestionan datos de ciudadanos europeos.<\/li>\n<\/ul>\n<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">En un momento en que la creciente amenaza de los ciberataques <em>y<\/em> la lista cada vez mayor de normativas a las que est\u00e1n sujetas las empresas est\u00e1n m\u00e1s presentes que nunca, la eficacia se ha convertido en un factor vital en la aplicaci\u00f3n de las pol\u00edticas de seguridad. Los CISO necesitan perfeccionar sus herramientas y procesos de seguridad lo antes posible. <\/span><\/p>\n<h2>La gesti\u00f3n de accesos privilegiados agiliza el cumplimiento<\/h2>\n<p>Los directores de seguridad inform\u00e1tica (ISSM) suelen ser responsables de supervisar el cumplimiento de la normativa inform\u00e1tica de sus empresas. Los controles normativos afectan a muchos aspectos de la empresa, pero los m\u00e1s afectados son, casi con toda seguridad, la ciberseguridad y la gesti\u00f3n de accesos. La soluci\u00f3n de Gesti\u00f3n de Accesos Privilegiados (PAM) es una de las herramientas de seguridad m\u00e1s importantes para garantizar el cumplimiento de las exigentes normativas lo antes posible. PAM es ciberseguridad simplificada. Es esencial para los CISO, que tienen mucho entre manos y poco tiempo que perder en tecnolog\u00edas ultracomplejas.<\/p>\n<blockquote>\n<div style=\"text-align: right;\"><span style=\"color: #f4813a;\"><strong><em>El PMA es ciberseguridad simplificada.<\/em><\/strong><\/span><\/div>\n<\/blockquote>\n<h3>Garantizar r\u00e1pidamente el cumplimiento de los requisitos de seguridad, gracias a PAM<\/h3>\n<p>La mayor\u00eda de las normas y reglamentos de seguridad est\u00e1n relacionados con la ciberseguridad y el control de acceso. Supervisar y limitar los usuarios que pueden acceder a los recursos inform\u00e1ticos en cualquier momento es un requisito constante de las normas gubernamentales e industriales, como <a href=\"https:\/\/contact.wallix.com\/pam-et-conformite-rgpd\" target=\"_blank\" rel=\"noopener\">RGPD<\/a> e <a href=\"https:\/\/contact.wallix.com\/iso-27001-conformite-pam\" target=\"_blank\" rel=\"noopener\">ISO 27001<\/a>, NIS, HIPAA, PCI-DSS y SOX, entre otras. Por definici\u00f3n, la Gesti\u00f3n de Acceso Privilegiado es una soluci\u00f3n que controla el acceso. Por eso, una soluci\u00f3n PAM de alto rendimiento garantiza eficazmente tanto la seguridad <em>como el<\/em> cumplimiento de una amplia gama de normativas. La soluci\u00f3n PAM de WALLIX proporciona un control administrativo completo, supervisi\u00f3n de la actividad y capacidades de auditor\u00eda para garantizar la prueba del cumplimiento cuando los reguladores llamen a la puerta.<\/p>\n<blockquote>\n<p style=\"text-align: right;\"><span style=\"color: #f4813a;\"><strong><em>Una soluci\u00f3n PAM de alto rendimiento garantiza tanto la seguridad como el cumplimiento de una amplia gama de normativas.<\/em><\/strong><\/span><\/p>\n<\/blockquote>\n<h2>WALLIX Bastion promueve el cumplimiento, r\u00e1pidamente<\/h2>\n<p>La soluci\u00f3n WALLIX PAM es flexible y f\u00e1cil de integrar en cualquier infraestructura inform\u00e1tica. Permite implantar procesos de ciberseguridad de forma m\u00e1s r\u00e1pida y eficaz, y as\u00ed lograr el pleno cumplimiento m\u00e1s r\u00e1pidamente. La soluci\u00f3n PAM aborda una serie de factores clave de cumplimiento:<\/p>\n<ul>\n<li>El RGPD exige <strong>que se respete la confidencialidad de los datos, por su propia naturaleza<\/strong>. El PMA controla a los usuarios autorizados a tratar datos confidenciales y puede detener acciones inadecuadas.<\/li>\n<li>El RGPD exige la generaci\u00f3n de informes y pruebas de cumplimiento. WALLIX ofrece una <strong>pista de auditor\u00eda inalterable<\/strong> de acciones, usuarios privilegiados y cuentas.<\/li>\n<li>La ISO 27001 exige un <strong>sistema de gesti\u00f3n de contrase\u00f1as<\/strong>. La herramienta de archivo de contrase\u00f1as de Bastion permite crear contrase\u00f1as seguras y eliminar el uso compartido de inicios de sesi\u00f3n.<\/li>\n<li>La ISO 27001 exige <strong>que se restrinjan los derechos de acceso privilegiado<\/strong>. PAM proporciona un punto \u00fanico para controlar el acceso de los usuarios, permitiendo conceder o revocar privilegios en cualquier momento.<\/li>\n<\/ul>\n<p>Sea cual sea su sector de actividad (servicios p\u00fablicos, hospitales, gigantes minoristas o empresas de seguros), los CISO se enfrentan a esta creciente amenaza, tanto dentro como fuera de la empresa. Los reguladores gubernamentales e industriales est\u00e1n respondiendo con normativas a\u00fan m\u00e1s estrictas. La soluci\u00f3n WALLIX de Gesti\u00f3n de Accesos Privilegiados agiliza el cumplimiento y la seguridad de datos y servidores con un sistema todo en uno, ligero y f\u00e1cil de integrar.<\/p>\n<p><strong>Obt\u00e9n m\u00e1s informaci\u00f3n descargando nuestra <a href=\"https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/la-guia-del-ciso-para-el-cumplimiento-normativo\/\" target=\"_blank\" rel=\"noopener\">Gu\u00eda del CISO para un mejor cumplimiento de la normativa.<\/a><\/strong><\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-39lx9fw-b81e609d9800bbb4e3923c44dc7f5fec\">\n#top .flex_column_table.av-equal-height-column-flextable.av-39lx9fw-b81e609d9800bbb4e3923c44dc7f5fec{\nmargin-top:-600px;\nmargin-bottom:0;\n}\n.flex_column.av-39lx9fw-b81e609d9800bbb4e3923c44dc7f5fec{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-39lx9fw-b81e609d9800bbb4e3923c44dc7f5fec{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-39lx9fw-b81e609d9800bbb4e3923c44dc7f5fec av_one_third  avia-builder-el-4  el_after_av_two_third  avia-builder-el-last  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-32xzkng-51edd9e8855b4a16eac23a7d3defd98c av-social-sharing-box-default  avia-builder-el-5  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Comparte este art\u00edculo<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Compartir en X\" href='https:\/\/twitter.com\/share?text=Gu%C3%ADa%20del%20CISO%20para%20cumplir%20los%20requisitos%20de%20seguridad%20%28con%20una%20soluci%C3%B3n%20PAM%29&#038;url=https:\/\/www.wallix.com\/es\/?p=66412' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Compartir en X'><span class='avia_hidden_link_text'>Compartir en X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Compartir en LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Gu%C3%ADa%20del%20CISO%20para%20cumplir%20los%20requisitos%20de%20seguridad%20%28con%20una%20soluci%C3%B3n%20PAM%29&#038;url=https:\/\/www.wallix.com\/es\/blogpost\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Compartir en LinkedIn'><span class='avia_hidden_link_text'>Compartir en LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Compartir por correo\" href='mailto:?subject=Gu%C3%ADa%20del%20CISO%20para%20cumplir%20los%20requisitos%20de%20seguridad%20%28con%20una%20soluci%C3%B3n%20PAM%29&#038;body=https:\/\/www.wallix.com\/es\/blogpost\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Compartir por correo'><span class='avia_hidden_link_text'>Compartir por correo<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2cmv7ik-1abaf626c4aa2848e1489cda0cc96cfb\">\n#top .hr.hr-invisible.av-2cmv7ik-1abaf626c4aa2848e1489cda0cc96cfb{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-2cmv7ik-1abaf626c4aa2848e1489cda0cc96cfb hr-invisible  avia-builder-el-6  el_after_av_social_share  el_before_av_heading '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2325898-1ee42cb91582506f23d03ae233a2ee9e\">\n#top .av-special-heading.av-2325898-1ee42cb91582506f23d03ae233a2ee9e{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-2325898-1ee42cb91582506f23d03ae233a2ee9e .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-2325898-1ee42cb91582506f23d03ae233a2ee9e .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-2325898-1ee42cb91582506f23d03ae233a2ee9e av-special-heading-h3 blockquote modern-quote  avia-builder-el-7  el_after_av_hr  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >contenido relacionado<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1j6kca4-b22becd282a0e68eb41a4f3709a6fe13\">\n#top .hr.hr-invisible.av-1j6kca4-b22becd282a0e68eb41a4f3709a6fe13{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-1j6kca4-b22becd282a0e68eb41a4f3709a6fe13 hr-invisible  avia-builder-el-8  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-1\"  class='av-magazine av-lqmcs8ju-8e6b7dc5a5f7f86e1fa0a653011d5c8d  avia-builder-el-9  el_after_av_hr  el_before_av_heading   avia-builder-el-9  el_after_av_hr  el_before_av_heading ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-86679 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: La parte m\u00e1s peligrosa del ataque ya llevaba meses en marcha\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-30T10:24:20+01:00\" >30 de marzo de 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/blogpost\/la-parte-mas-peligrosa-del-ataque-ya-llevaba-meses-en-marcha\/' title='Enlace a: La parte m\u00e1s peligrosa del ataque ya llevaba meses en marcha'>La parte m\u00e1s peligrosa del ataque ya llevaba meses en marcha<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-78247 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Por qu\u00e9 el control de accesos privilegiados debe ser una prioridad para las organizaciones sanitarias\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-09-17T10:45:18+01:00\" >17 de septiembre de 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/blogpost\/por-que-el-control-de-accesos-privilegiados-debe-ser-una-prioridad-para-las-organizaciones-sanitarias\/' title='Enlace a: Por qu\u00e9 el control de accesos privilegiados debe ser una prioridad para las organizaciones sanitarias'>Por qu\u00e9 el control de accesos privilegiados debe ser una prioridad para las organizaciones sanitarias<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-79422 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Gesti\u00f3n de Acceso Privilegiado para PYMES y PYMES: Una perspectiva t\u00e9cnica sobre una soluci\u00f3n moderna basada en la nube\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-09-09T15:05:35+01:00\" >9 de septiembre de 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/blogpost\/pam-para-pymes-una-vision-tecnica-sobre-las-soluciones-modernas-en-la-nube\/' title='Enlace a: Gesti\u00f3n de Acceso Privilegiado para PYMES y PYMES: Una perspectiva t\u00e9cnica sobre una soluci\u00f3n moderna basada en la nube'>Gesti\u00f3n de Acceso Privilegiado para PYMES y PYMES: Una perspectiva t\u00e9cnica sobre una soluci\u00f3n moderna basada en la nube<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-77742 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: \u00bfQu\u00e9 es la gesti\u00f3n de cuentas y sesiones privilegiadas (PASM)?\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-09-05T10:17:43+01:00\" >5 de septiembre de 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/' title='Enlace a: \u00bfQu\u00e9 es la gesti\u00f3n de cuentas y sesiones privilegiadas (PASM)?'>\u00bfQu\u00e9 es la gesti\u00f3n de cuentas y sesiones privilegiadas (PASM)?<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-77593 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Seguridad sanitaria de extremo a extremo: IAM, PAM y MFA\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-09-04T10:44:37+01:00\" >4 de septiembre de 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/blogpost\/seguridad-sanitaria-de-extremo-a-extremo-iam-pam-y-mfa\/' title='Enlace a: Seguridad sanitaria de extremo a extremo: IAM, PAM y MFA'>Seguridad sanitaria de extremo a extremo: IAM, PAM y MFA<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1abqpu4-fa31bdca4960a813db6faf87771cbcc5\">\n#top .av-special-heading.av-1abqpu4-fa31bdca4960a813db6faf87771cbcc5{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-1abqpu4-fa31bdca4960a813db6faf87771cbcc5 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-1abqpu4-fa31bdca4960a813db6faf87771cbcc5 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-1abqpu4-fa31bdca4960a813db6faf87771cbcc5 av-special-heading-h3 blockquote modern-quote  avia-builder-el-10  el_after_av_magazine  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >recursos relacionados <\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ne2s3w-a9cfd4f96891292d09f8b51d12d62db4\">\n#top .hr.hr-invisible.av-ne2s3w-a9cfd4f96891292d09f8b51d12d62db4{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-ne2s3w-a9cfd4f96891292d09f8b51d12d62db4 hr-invisible  avia-builder-el-11  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-2\"  class='av-magazine av-lqmcsj06-98a6c164e2ce9455f6625c353d695f3d  avia-builder-el-12  el_after_av_hr  avia-builder-el-last   avia-builder-el-12  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-57011 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Directivas NIS\/NIS2\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-04-17T15:04:30+01:00\" >17 de abril de 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/ot-es\/ot-whitepaper-es\/directivas-nis-nis2\/' title='Enlace a: Directivas NIS\/NIS2'>Directivas NIS\/NIS2<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":3331,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1647,2558,1643,1795],"tags":[],"class_list":["post-66412","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-audit-compliance-es","category-blog-destacado","category-blogpost","category-privileged-access-management-es"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gu\u00eda del CISO para cumplir los requisitos de seguridad (con una soluci\u00f3n PAM) - WALLIX<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/es\/blogpost\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gu\u00eda del CISO para cumplir los requisitos de seguridad (con una soluci\u00f3n PAM) - WALLIX\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/es\/blogpost\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-02T14:57:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-17T15:14:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/05\/ciso-guide-compliance-regulations-pam.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"WALLIX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"WALLIX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\\\/\"},\"author\":{\"name\":\"WALLIX\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\"},\"headline\":\"Gu\u00eda del CISO para cumplir los requisitos de seguridad (con una soluci\u00f3n PAM)\",\"datePublished\":\"2024-12-02T14:57:20+00:00\",\"dateModified\":\"2025-11-17T15:14:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\\\/\"},\"wordCount\":2546,\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/ciso-guide-compliance-regulations-pam.png\",\"articleSection\":[\"AUDIT &amp; COMPLIANCE\",\"BLOG DESTACADO\",\"BLOGPOST\",\"PRIVILEGED ACCESS MANAGEMENT\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\\\/\",\"name\":\"Gu\u00eda del CISO para cumplir los requisitos de seguridad (con una soluci\u00f3n PAM) - WALLIX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/ciso-guide-compliance-regulations-pam.png\",\"datePublished\":\"2024-12-02T14:57:20+00:00\",\"dateModified\":\"2025-11-17T15:14:50+00:00\",\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/ciso-guide-compliance-regulations-pam.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/ciso-guide-compliance-regulations-pam.png\",\"width\":1200,\"height\":627,\"caption\":\"CISO Guide Regulation Compliance\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/wallixcom\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wallix\\\/\",\"https:\\\/\\\/www.youtube.com\\\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\",\"name\":\"WALLIX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"caption\":\"WALLIX\"},\"url\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/author\\\/alex\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gu\u00eda del CISO para cumplir los requisitos de seguridad (con una soluci\u00f3n PAM) - WALLIX","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/es\/blogpost\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\/","og_locale":"es_ES","og_type":"article","og_title":"Gu\u00eda del CISO para cumplir los requisitos de seguridad (con una soluci\u00f3n PAM) - WALLIX","og_url":"https:\/\/www.wallix.com\/es\/blogpost\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\/","og_site_name":"WALLIX","article_published_time":"2024-12-02T14:57:20+00:00","article_modified_time":"2025-11-17T15:14:50+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/05\/ciso-guide-compliance-regulations-pam.png","type":"image\/png"}],"author":"WALLIX","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"Escrito por":"WALLIX","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/es\/blogpost\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\/"},"author":{"name":"WALLIX","@id":"https:\/\/www.wallix.com\/es\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd"},"headline":"Gu\u00eda del CISO para cumplir los requisitos de seguridad (con una soluci\u00f3n PAM)","datePublished":"2024-12-02T14:57:20+00:00","dateModified":"2025-11-17T15:14:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\/"},"wordCount":2546,"publisher":{"@id":"https:\/\/www.wallix.com\/es\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/05\/ciso-guide-compliance-regulations-pam.png","articleSection":["AUDIT &amp; COMPLIANCE","BLOG DESTACADO","BLOGPOST","PRIVILEGED ACCESS MANAGEMENT"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/es\/blogpost\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\/","url":"https:\/\/www.wallix.com\/es\/blogpost\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\/","name":"Gu\u00eda del CISO para cumplir los requisitos de seguridad (con una soluci\u00f3n PAM) - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/05\/ciso-guide-compliance-regulations-pam.png","datePublished":"2024-12-02T14:57:20+00:00","dateModified":"2025-11-17T15:14:50+00:00","inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/es\/blogpost\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.wallix.com\/es\/blogpost\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/05\/ciso-guide-compliance-regulations-pam.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/05\/ciso-guide-compliance-regulations-pam.png","width":1200,"height":627,"caption":"CISO Guide Regulation Compliance"},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/es\/#website","url":"https:\/\/www.wallix.com\/es\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/es\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.wallix.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/es\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd","name":"WALLIX","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","caption":"WALLIX"},"url":"https:\/\/www.wallix.com\/es\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts\/66412","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/comments?post=66412"}],"version-history":[{"count":9,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts\/66412\/revisions"}],"predecessor-version":[{"id":76435,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts\/66412\/revisions\/76435"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/media\/3331"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/media?parent=66412"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/categories?post=66412"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/tags?post=66412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}