{"id":85113,"date":"2025-02-14T14:08:39","date_gmt":"2025-02-14T13:08:39","guid":{"rendered":"https:\/\/www.wallix.com\/what-is-zero-trust\/"},"modified":"2026-03-09T11:00:35","modified_gmt":"2026-03-09T10:00:35","slug":"que-es-zero-trust","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-zero-trust\/","title":{"rendered":"\u00bfQu\u00e9 es Zero Trust?"},"content":{"rendered":"<div id='full_slider_1'  class='avia-fullwidth-slider main_color avia-shadow   avia-builder-el-0  el_before_av_two_third  avia-builder-el-first   container_wrap fullsize'  ><div  class='avia-slideshow av-m74sfebt-340d89b8ca486ebe16b669129b206a5b avia-slideshow-featured av_slideshow_full avia-slide-slider av-slideshow-ui av-control-default av-slideshow-manual av-loop-once av-loop-manual-endless av-default-height-applied   avia-slideshow-1' data-slideshow-options=\"{&quot;animation&quot;:&quot;slide&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;bg_slider&quot;:false,&quot;keep_padding&quot;:false,&quot;hoverpause&quot;:false,&quot;show_slide_delay&quot;:0}\"  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><ul class='avia-slideshow-inner ' style='padding-bottom: 28.666666666667%;'><li  class='avia-slideshow-slide av-m74sfebt-340d89b8ca486ebe16b669129b206a5b__0  av-single-slide slide-1 slide-odd'><div data-rel='slideshow-1' class='avia-slide-wrap '  title='Illustrative graphic representing the Zero Trust cybersecurity model on a WALLIX page, highlighting key principles of identity\u2011centric access control and continuous verification to protect critical systems and data.' ><img decoding=\"async\" fetchpriority=\"high\" class=\"wp-image-33542 avia-img-lazy-loading-not-33542\"  src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/11\/zerotrust-1500x430.jpeg\" width=\"1500\" height=\"430\" title='ZERO TRUST' alt='Illustrative graphic representing the Zero Trust cybersecurity model on a WALLIX page, highlighting key principles of identity\u2011centric access control and continuous verification to protect critical systems and data.'  itemprop=\"thumbnailUrl\"   \/><\/div><\/li><\/ul><\/div><\/div><div id='after_full_slider_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-85113'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-m0s4hx-65bf1e688a77837281e11db9c4104aba sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m0s4hx-65bf1e688a77837281e11db9c4104aba\">\n#top .flex_column_table.av-equal-height-column-flextable.av-m0s4hx-65bf1e688a77837281e11db9c4104aba{\nmargin-top:-150px;\nmargin-bottom:0;\n}\n.flex_column.av-m0s4hx-65bf1e688a77837281e11db9c4104aba{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n<\/style>\n<div  class='flex_column av-m0s4hx-65bf1e688a77837281e11db9c4104aba av_two_third  avia-builder-el-1  el_after_av_slideshow_full  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><section  class='av_textblock_section av-m6uyddcu-121a26e01459be3f2d505da29555d35e '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h1><span data-olk-copy-source=\"MessageBody\">\u00bfQu\u00e9 es Zero Trust? <\/span><\/h1>\n<\/div><\/section><br \/>\n<div  class='av-post-metadata-container av-av_post_metadata-36bcf33e90f22125c019c70beb35c7b9 av-metadata-container-align-left  avia-builder-el-3  el_after_av_textblock  el_before_av_hr  av-metadata-container-1'><div class='av-post-metadata-container-inner'><span class=\"av-post-metadata-content av-post-metadata-meta-content\"><span class=\"av-post-metadata-content av-post-metadata-author\"  itemprop=\"author\" ><span class=\"av-metadata-before av-metadata-before-author\">by<\/span><span class=\"av-post-metadata-author-link\" ><a href=\"https:\/\/www.wallix.com\/es\/author\/yoann-delomier\/\"  rel=\"author\">Yoann Delomier<\/a><\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-modified\"><span class=\"av-post-metadata-modified-date\" >9 de marzo de 2026<\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-category\"><span class=\"av-metadata-before av-metadata-before-categories\">in<\/span><span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/es\/category\/blogpost\/\" >BLOGPOST<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/es\/category\/blogpost\/zero-trust-blogpost-es\/\" >ZERO TRUST<\/a><\/span><\/span><\/span><\/div><\/div><br \/>\n<div  class='hr av-pht5j9-50105161666301efbc4c50149b6d5ee5 hr-default  avia-builder-el-4  el_after_av_post_metadata  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m6uyd6wb-9129752dea9c044a4675865701ef7caa\">\n#top .av_textblock_section.av-m6uyd6wb-9129752dea9c044a4675865701ef7caa .avia_textblock{\nfont-size:14px;\n}\n<\/style>\n<section  class='av_textblock_section av-m6uyd6wb-9129752dea9c044a4675865701ef7caa '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h2 aria-level=\"2\"><span data-contrast=\"none\">Comprender la seguridad Zero Trust<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Zero Trust es un modelo moderno de ciberseguridad basado en una idea sencilla: \u201cnunca conf\u00edes, verifica siempre\u201d.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A diferencia de los modelos de seguridad tradicionales (que asumen que todo lo que est\u00e1 dentro del per\u00edmetro de red es seguro) Zero Trust verifica continuamente a usuarios, dispositivos y aplicaciones antes de conceder acceso, est\u00e9n dentro o fuera de la red corporativa.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Aunque su adopci\u00f3n se ha acelerado en los \u00faltimos a\u00f1os, el concepto no es nuevo. Fue introducido por Stephen Paul Marsh en 1994, pero no empez\u00f3 a popularizarse hasta que John Kindervag, de Forrester Research, lo formaliz\u00f3 en 2010. Desde entonces, su adopci\u00f3n se ha visto impulsada por avances clave como:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">BeyondCorp de Google (2009)<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">El modelo Zero Trust del NIST (2018)<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">La adopci\u00f3n por parte del gobierno de EE.UU. en 2021<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Hoy en d\u00eda, Zero Trust se considera el est\u00e1ndar de referencia para proteger entornos de trabajo h\u00edbridos, recursos cloud y datos sensibles, adem\u00e1s de ofrecer una defensa activa frente a amenazas actuales como phishing, ransomware o robo de credenciales.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"1\"><span data-contrast=\"none\">Diferencia entre Zero Trust Architecture (ZTA) y Zero Trust Network Access (ZTNA)<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:322,&quot;335559739&quot;:322}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Mientras que <\/span><b><span data-contrast=\"auto\">Zero Trust Architecture (ZTA)<\/span><\/b><span data-contrast=\"auto\"> act\u00faa como un <\/span><b><span data-contrast=\"auto\">marco completo de seguridad<\/span><\/b><span data-contrast=\"auto\">, aplicando los principios de Zero Trust a toda la infraestructura de IT de una organizaci\u00f3n, <\/span><b><span data-contrast=\"auto\">Zero Trust Network Access (ZTNA)<\/span><\/b><span data-contrast=\"auto\"> es una <\/span><b><span data-contrast=\"auto\">implementaci\u00f3n concreta<\/span><\/b><span data-contrast=\"auto\"> centrada en proporcionar acceso seguro a aplicaciones y servicios sin exponer a los usuarios a toda la red corporativa.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">ZTA garan<\/span><span data-contrast=\"auto\">tiza verificaci\u00f3n de identidad, acceso con privilegios m\u00ednimos y segmentaci\u00f3n de red en todos los sistemas.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">ZTNA, por su parte, aplica estos principios espec\u00edficamente al acceso remoto y a entornos cloud.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">En otras palabras:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">ZTA<\/span><\/b><span data-contrast=\"auto\"> es la estrategia global<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">ZTNA<\/span><\/b><span data-contrast=\"auto\"> es una soluci\u00f3n t\u00e1ctica dentro de esa estrategia, especialmente dise\u00f1ada para proteger el acceso externo y remoto.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2 aria-level=\"1\"><span data-contrast=\"none\">Por qu\u00e9 las defensas perimetrales tradicionales ya no son suficientes<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:322,&quot;335559739&quot;:322,&quot;335559740&quot;:279}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Hoy las organizaciones depen<\/span><span data-contrast=\"auto\">den de aplicaciones cloud, empleados en remoto y entornos h\u00edbridos que van mucho m\u00e1s all\u00e1 del per\u00edmetro de red tradicional.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Los modelos de seguridad basados en firewalls y VPN part\u00edan de una premisa que hoy ya no es v\u00e1lida: todo lo que est\u00e1 dentro de la red es de confianza<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"1\"><span data-contrast=\"none\">Limitaciones de la seguridad perimetral<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:322,&quot;335559739&quot;:322,&quot;335559740&quot;:279}\">\u00a0<\/span><\/h2>\n<p><b><span data-contrast=\"auto\">Amenazas internas y movimiento lateral<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Una vez <\/span><span data-contrast=\"auto\">que un atacante consigue atravesar el per\u00edmetro (normalmente mediante phishing o robo de credenciales) puede moverse lateralmente por la red con relativa facilidad.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Un per\u00edmetro cada vez m\u00e1s difuso<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">La computaci\u00f3n en la nube, los dispositivos m\u00f3viles y el trabajo remoto hacen que definir y proteger un per\u00edmetro de red tradicional sea cada vez m\u00e1s dif\u00edcil.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">T\u00e9cnicas para saltarse el per\u00edmetro<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Los atacantes utilizan t\u00faneles, endpoints comprometidos y t\u00e9cnicas de ingenier\u00eda social para evitar las defensas tradicionales sin ser detectados.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Mantenimiento costoso<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Mantener las defensas perimetrales actualizadas es <\/span><b><span data-contrast=\"auto\">costoso y complejo<\/span><\/b><span data-contrast=\"auto\">, ya que exige monitorizaci\u00f3n continua, an\u00e1lisis constante y actualizaciones frecuentes para seguir el ritmo de nuevas amenazas.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Falta de controles de acceso granulares<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Los modelos tradicionales suelen carecer d<\/span><span data-contrast=\"auto\">e controles de acceso a nivel de recurso, lo que permite que usuarios con acceso inicial puedan moverse libremente por la red.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"1\"><span data-contrast=\"none\">Zero Trust Network Access (ZTNA) vs VPN<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:322,&quot;335559739&quot;:322,&quot;335559740&quot;:279}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">La<\/span><span data-contrast=\"auto\">s VPN tradicionales se dise\u00f1aron para permitir a los usuarios remotos acceder de forma segura a redes internas. Sin embargo, se basan en una suposici\u00f3n antigua: una vez autenticado el usuario, se le concede acceso amplio a la red.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Desde el punto de vista de la seguridad, esto es especialmente peligroso si las credenciales se ven comprometidas.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Zero Trust Network Access (ZTNA) fun<\/span><span data-contrast=\"auto\">ciona de forma diferente.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Cada solicitud de acceso se autentica, se verifica el estado del dispositivo y el usuario <\/span><b><span data-contrast=\"auto\">solo accede a los recursos concretos que necesita, nada m\u00e1s<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A diferencia de las VPN (que proporcionan acceso a toda la red) ZTNA ap<\/span><span data-contrast=\"auto\">lica el principio del menor privilegio, lo que evita el movimiento lateral en caso de que una cuenta se vea comprometida.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">ZTNA tambi\u00e9n se adapta mejor a entornos cloud, ya que ofrece:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">mayor escalabilidad<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">mejor rendimiento<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">monitorizaci\u00f3n en tiempo real para detectar amenazas<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Adem\u00e1s, in<\/span><span data-contrast=\"auto\">cluye verificaciones de seguridad del dispositivo, garantizando que solo los equipos seguros y conformes con las pol\u00edticas corporativas puedan acceder a recursos empresariales.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A medida que las organizaciones adoptan modelos de trabajo h\u00edbridos y aplicaciones cloud, las limitaciones de las VPN se hacen cada vez m\u00e1s evide<\/span><span data-contrast=\"auto\">ntes.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"1\"><span data-contrast=\"none\">Los pilares del modelo Zero Trust<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:322,&quot;335559739&quot;:322,&quot;335559740&quot;:279}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">La seguridad Zero Trust se<\/span><span data-contrast=\"auto\"> basa en cinco pilares principales, d<\/span><span data-contrast=\"auto\">efinidos en el <\/span><b><span data-contrast=\"auto\">Zero Trust Maturity Model de CISA<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Estos pilares trabajan juntos par<\/span><span data-contrast=\"auto\">a eliminar la confianza impl\u00edcita y garantizar que todos los accesos se verifiquen continuamente.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p aria-level=\"1\"><span data-contrast=\"none\">Seguridad de identidad<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:322,&quot;335559739&quot;:322,&quot;335559740&quot;:279}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Valida la identidad <\/span><span data-contrast=\"auto\">de usuarios, dispositivos y aplicaciones antes de conceder acceso.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Incluye mecanismos como:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Multi-Factor Authentication (MFA)<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">autenticaci\u00f3n sin contrase\u00f1a<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">an\u00e1lisis de comportamiento para detectar anomal\u00edas<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">El objetivo es prevenir ataques basados en credenciales.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"1\"><span data-contrast=\"none\">Seguridad de dispositivos<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:322,&quot;335559739&quot;:322,&quot;335559740&quot;:279}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Garantiza que todos los dispositivos que intentan conectarse a la red:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">est\u00e1n configurados correctamente<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">cumplen las pol\u00edticas de seguridad<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">son dispositivos de confianza<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Para ello es necesario mantener<\/span><span data-contrast=\"auto\"> un inventario completo de dispositivos, desplegar controles de seguridad en endpoints y monitorizar continuamente su estado.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"1\"><span data-contrast=\"none\">Seguridad de red<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:322,&quot;335559739&quot;:322,&quot;335559740&quot;:279}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Impone <\/span><b><span data-contrast=\"auto\">segmentaci\u00f3n de red<\/span><\/b><span data-contrast=\"auto\"> para limitar el movimiento lateral de los atacantes.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Consiste en dividir la red en zonas independie<\/span><span data-contrast=\"auto\">ntes para garantizar que usuarios y sistemas solo accedan a los recursos para los que tienen permiso, re<\/span><span data-contrast=\"auto\">duciendo el impacto de una posible intrusi\u00f3n.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"1\"><span data-contrast=\"none\">Seguridad de aplicaciones<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:322,&quot;335559739&quot;:322,&quot;335559740&quot;:279}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Garantiza que las aplicaciones funcionen bajo el <\/span><b><span data-contrast=\"auto\">principio del menor privilegio<\/span><\/b><span data-contrast=\"auto\">, es decir, que solo dispongan de los permisos necesarios para operar.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Las pr\u00e1cticas clave incluyen:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">parcheado de seguridad<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">auditor\u00edas<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">escaneos de vulnerabilidades<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<h3 aria-level=\"1\"><span data-contrast=\"none\">Seguridad de datos<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:322,&quot;335559739&quot;:322,&quot;335559740&quot;:279}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Se centra<\/span><span data-contrast=\"auto\"> en clasificar y proteger los datos seg\u00fan su nivel de sensibilidad.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Las medidas incluyen:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">cifrado en tr\u00e1nsito<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">cifrado en reposo<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">pol\u00edticas estrictas de acceso<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">monitorizaci\u00f3n continua<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">El objetivo es garantizar que solo los usuarios autorizados puedan acceder a informaci\u00f3n sensible.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"1\"><span data-contrast=\"none\">Zero Trust para la seguridad OT: barreras y desaf\u00edos<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:322,&quot;335559739&quot;:322}\">\u00a0<\/span><\/h2>\n<h3 aria-level=\"1\"><span data-contrast=\"none\">Casos de uso reales de Zero Trust<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:322,&quot;335559739&quot;:322}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Zero Trust es m\u00e1s que un c<\/span><span data-contrast=\"auto\">oncepto: es una estrategia probada que ayuda a las organizaciones a proteger usuarios, aplicaciones cloud, accesos de terceros e infraestructuras cr\u00edticas frente a amenazas.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p aria-level=\"2\"><span data-contrast=\"auto\">Principales casos de uso de Zero Trust:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Trabajo remoto seguro<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> Garantizar el acceso seguro a aplicaciones corporativas desde cualquier ubicaci\u00f3n.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Protecci\u00f3n de aplicaciones cloud<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> Aplicar pol\u00edticas de seguridad coherentes en todas las plataformas cloud.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Mitigaci\u00f3n de amenazas internas<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> Monitorizar el comportamiento de los usuarios para detectar y detener actividades sospechosas.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Acceso de terceros<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> Restringir el acceso de usuarios externos \u00fanicamente a los recursos necesarios.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Seguridad para IoT y dispositivos no gestionados<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> Evitar que dispositivos comprometidos se conviertan en vectores de ataque.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Cumplimiento normativo<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> Ayu<\/span><span data-contrast=\"auto\">dar a las organizaciones a cumplir normativas como GDPR, HIPAA o NIST.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Implementando Zero Trust, las empresas pueden reducir riesgos, mejorar el cumplimiento y proteger datos sensibles frente a amenazas en constante evoluci\u00f3n.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"1\"><span data-contrast=\"none\">C\u00f3mo funciona Zero Trust<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:322,&quot;335559739&quot;:322}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Zero Trust se implementa combinando:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">seguridad de identidad<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">protecci\u00f3n de endpoints<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">segmentaci\u00f3n de red<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">monitorizaci\u00f3n continua<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Siguiendo el <\/span><b><span data-contrast=\"auto\">Zero Trust Maturity Model de CISA<\/span><\/b><span data-contrast=\"auto\">, las organizaciones pueden evolucionar progresivamente desde modelos tradicionales hacia una arquitectura Zero Trust m\u00e1s avanzada.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"1\"><span data-contrast=\"none\">El modelo de madurez Zero Trust (ZTMM)<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:322,&quot;335559739&quot;:322,&quot;335559740&quot;:279}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">El <\/span><b><span data-contrast=\"auto\">Zero Trust Maturity Model (ZTMM)<\/span><\/b><span data-contrast=\"auto\"> es un marco dise\u00f1ado para ayudar a las organizaciones a mejorar progresivamente su postura de seguridad aplicando principios Zero Trust.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Aspectos cl<\/span><span data-contrast=\"auto\">ave del modelo:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Act\u00faa como una hoja de ruta para la transici\u00f3n hacia una arquitectura Zero Trust<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Se basa en verificaci\u00f3n continua y controles estrictos de acceso para reducir riesgos<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">La Cybersecurity and Infrastructure Security Agency (CISA) public\u00f3 la primera versi\u00f3n en agosto de 2021, seguida de una versi\u00f3n actualizada ZTMM 2.0 en marzo de 2022.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"1\"><span data-contrast=\"none\">Beneficios de empezar Zero Trust por la seguridad de identidad<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:322,&quot;335559739&quot;:322}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Empezar una estrategia Zero Trust por la<\/span><span data-contrast=\"auto\"> seguridad de identidad garantiza que cada intento de acceso se verifique.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Esto reduce el riesgo de:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">accesos no autorizados<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">filtraciones de datos<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">movimiento lateral dentro de la red<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Gracias a la monitorizaci\u00f3n continua y la visibilidad en tiempo real, las organizaciones pueden detectar y responder a amenazas con mayor rapidez.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Adem\u00e1s, un enfoque centrado en identidad facilita el cumplimiento normativo y las auditor\u00edas.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"1\"><span data-contrast=\"none\">C\u00f3mo empezar<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:322,&quot;335559739&quot;:322}\">\u00a0<\/span><\/h3>\n<p aria-level=\"2\"><span data-contrast=\"none\">Eval\u00faa tu entorno actual de IAM<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Una estrategia Zero Trust eficaz empieza con un an\u00e1lisis completo de tu infraestructura de <\/span><b><span data-contrast=\"auto\">Gesti\u00f3n de identidades y accesos<\/span><\/b> <b><span data-contrast=\"auto\">(IAM)<\/span><\/b><span data-contrast=\"auto\"> para detectar:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"11\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">vulnerabilidades<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"11\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">protocolos obsoletos<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"11\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">brechas de seguridad<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Involucrar<\/span><span data-contrast=\"auto\"> a los equipos de IT y a los responsables de negocio ayuda a alinear la estrategia con los objetivos de la organizaci\u00f3n y los requisitos regulatorios.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p aria-level=\"2\"><span data-contrast=\"none\">Adopta soluciones clave de seguridad de identidad<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299,&quot;335559740&quot;:279}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Para aplicar autenticaci\u00f3n fuerte, menor privilegio y verificaci\u00f3n continua, las organizaciones deben desplegar soluciones clave de seguridad de identidad:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Gesti\u00f3n de Accesos Privilegiados (PAM)<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> Control y monitorizaci\u00f3n centralizada de accesos privilegiados a activos cr\u00edticos.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Gesti\u00f3n de elevaci\u00f3n y delegaci\u00f3n de privilegios (PEDM)<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> Elimina cuentas de administrador permanentes y concede privilegios solo cuando son necesarios.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Acceso remoto seguro<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> Control y gobierno del acceso remoto a los sistemas corporativos.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Identidad como servicio (IDaaS)<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> Simplifica la gesti\u00f3n de identidades y mejora la seguridad del acceso.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Autenticaci\u00f3n multifactor (MFA)<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> Refuerza la verificaci\u00f3n de usuarios y previene ataques basados en credenciales.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Inicio de sesi\u00f3n \u00fanico (SSO)<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> Permite acceder a m\u00faltiples aplicaciones con una \u00fanica autenticaci\u00f3n segura.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Gobernanza de identidades y accesos (IAG)<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> Permite aplicar pol\u00edticas de seguridad para gestionar los derechos de acceso de empleados y colaboradores.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Ten en cuenta que <\/span><b><span data-contrast=\"auto\">Zero Trust no es un proyecto puntual<\/span><\/b><span data-contrast=\"auto\">. Requiere<\/span><span data-contrast=\"auto\"> monitorizaci\u00f3n continua, ajustes constantes y adaptaci\u00f3n a nuevas amenazas.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"1\"><span data-contrast=\"none\">Conclusi\u00f3n<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:322,&quot;335559739&quot;:322}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Zero Trust se ha conv<\/span><span data-contrast=\"auto\">ertido en una necesidad en el panorama actual de amenazas.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Las defensas perimetrales tradicionales ya no son suficientes para proteger entornos con usuarios distribuidos, aplicaciones cloud y accesos remotos.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Adoptar un modelo de seguridad centrado en la identidad permite pasar de la confianza impl\u00edcita a la verificaci\u00f3n continua y el acceso con privilegios m\u00ednimos, reduciendo el impacto de amenazas como:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"12\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">ransomware<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"12\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">phishing<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"12\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">amenazas internas<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"12\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:&#091;8226&#093;,&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">robo de credenciales<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Empezar por la seguridad de identidad permite reducir riesgos de forma inmediata, simplificar el cumplimiento normativo y mejorar la experiencia de usuario.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A medida que las organizaciones ampl\u00edan sus entornos h\u00edbridos y cloud, Zero Trust ofrece un modelo de defensa escalable que equilibra seguridad y eficiencia operativa.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">La transici\u00f3n a Zero Trust no consiste solo en mejorar la seguridad: consiste en preparar a tu organizaci\u00f3n para un panorama de amenazas que no deja de evolucionar.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4kzsh6t-5b05c27702225898cdae5ac8673fc08a\">\n#top .flex_column_table.av-equal-height-column-flextable.av-4kzsh6t-5b05c27702225898cdae5ac8673fc08a{\nmargin-top:-150px;\nmargin-bottom:0;\n}\n.flex_column.av-4kzsh6t-5b05c27702225898cdae5ac8673fc08a{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n<\/style>\n<div  class='flex_column av-4kzsh6t-5b05c27702225898cdae5ac8673fc08a av_one_third  avia-builder-el-6  el_after_av_two_third  avia-builder-el-last  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-3ycwhid-794c8a293de84503bd629782f9a7924d av-social-sharing-box-default  avia-builder-el-7  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Compartir<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Compartir en X\" href='https:\/\/twitter.com\/share?text=%C2%BFQu%C3%A9%20es%20Zero%20Trust%3F&#038;url=https:\/\/www.wallix.com\/es\/?p=85113' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Compartir en X'><span class='avia_hidden_link_text'>Compartir en X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Compartir en LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=%C2%BFQu%C3%A9%20es%20Zero%20Trust%3F&#038;url=https:\/\/www.wallix.com\/es\/blogpost\/que-es-zero-trust\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Compartir en LinkedIn'><span class='avia_hidden_link_text'>Compartir en LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Compartir por correo\" href='mailto:?subject=%C2%BFQu%C3%A9%20es%20Zero%20Trust%3F&#038;body=https:\/\/www.wallix.com\/es\/blogpost\/que-es-zero-trust\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Compartir por correo'><span class='avia_hidden_link_text'>Compartir por correo<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3cn8hdx-30815c99a52c9cf3bf106260e7ff0c3f\">\n#top .hr.hr-invisible.av-3cn8hdx-30815c99a52c9cf3bf106260e7ff0c3f{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-3cn8hdx-30815c99a52c9cf3bf106260e7ff0c3f hr-invisible  avia-builder-el-8  el_after_av_social_share  el_before_av_heading '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2tjr95x-2fb525c9617649e7f68f6f4cc330c803\">\n#top .av-special-heading.av-2tjr95x-2fb525c9617649e7f68f6f4cc330c803{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-2tjr95x-2fb525c9617649e7f68f6f4cc330c803 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-2tjr95x-2fb525c9617649e7f68f6f4cc330c803 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-2tjr95x-2fb525c9617649e7f68f6f4cc330c803 av-special-heading-h3 blockquote modern-quote  avia-builder-el-9  el_after_av_hr  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Contenido relacionado<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2nlu7id-9e6e3d2b2c69654e4fa92e223eecf917\">\n#top .hr.hr-invisible.av-2nlu7id-9e6e3d2b2c69654e4fa92e223eecf917{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-2nlu7id-9e6e3d2b2c69654e4fa92e223eecf917 hr-invisible  avia-builder-el-10  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-1\"  class='av-magazine av-6vrxc5-373ef9e9a8e6a625f69973a1d6a98d38  avia-builder-el-11  el_after_av_hr  el_before_av_heading   avia-builder-el-11  el_after_av_hr  el_before_av_heading ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-86679 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: La parte m\u00e1s peligrosa del ataque ya llevaba meses en marcha\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-30T10:24:20+01:00\" >30 de marzo de 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/blogpost\/la-parte-mas-peligrosa-del-ataque-ya-llevaba-meses-en-marcha\/' title='Enlace a: La parte m\u00e1s peligrosa del ataque ya llevaba meses en marcha'>La parte m\u00e1s peligrosa del ataque ya llevaba meses en marcha<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-76574 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Identify, Authenticate, Authorize: The Three Key Steps in Access Security\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-08-18T16:34:56+01:00\" >18 de agosto de 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/blogpost\/identify-authenticate-authorize-the-three-key-steps-in-access-security\/' title='Enlace a: Identify, Authenticate, Authorize: The Three Key Steps in Access Security'>Identify, Authenticate, Authorize: The Three Key Steps in Access Security<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-72246 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Las barreras y desaf\u00edos para implementar Zero Trust en entornos OT\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-04-17T13:57:02+01:00\" >17 de abril de 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/ot-blogpost-es\/las-barreras-y-desafios-para-implementar-zero-trust-en-entornos-ot\/' title='Enlace a: Las barreras y desaf\u00edos para implementar Zero Trust en entornos OT'>Las barreras y desaf\u00edos para implementar Zero Trust en entornos OT<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-85113 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: \u00bfQu\u00e9 es Zero Trust?\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-14T14:08:39+01:00\" >14 de febrero de 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/blogpost\/que-es-zero-trust\/' title='Enlace a: \u00bfQu\u00e9 es Zero Trust?'>\u00bfQu\u00e9 es Zero Trust?<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1jn8ihx-faa6b4b0edf012be67c58917a9cc9fc5\">\n#top .av-special-heading.av-1jn8ihx-faa6b4b0edf012be67c58917a9cc9fc5{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-1jn8ihx-faa6b4b0edf012be67c58917a9cc9fc5 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-1jn8ihx-faa6b4b0edf012be67c58917a9cc9fc5 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-1jn8ihx-faa6b4b0edf012be67c58917a9cc9fc5 av-special-heading-h3 blockquote modern-quote  avia-builder-el-12  el_after_av_magazine  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Recursos relacionados<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-18cpqn9-78765682899ed7b7cd9314ffc702ed0d\">\n#top .hr.hr-invisible.av-18cpqn9-78765682899ed7b7cd9314ffc702ed0d{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-18cpqn9-78765682899ed7b7cd9314ffc702ed0d hr-invisible  avia-builder-el-13  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-2\"  class='av-magazine av-n1vfhh-47256102e24125dc748087e20a658ad9  avia-builder-el-14  el_after_av_hr  avia-builder-el-last   avia-builder-el-14  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-46343 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Ciberseguridad Zero Trust\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-02-06T15:23:10+01:00\" >6 de febrero de 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/recursos\/whitepaper-es\/ciberseguridad-zero-trust\/' title='Enlace a: Ciberseguridad Zero Trust'>Ciberseguridad Zero Trust<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":43,"featured_media":33542,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1643,1835],"tags":[],"class_list":["post-85113","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","category-zero-trust-blogpost-es"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u00bfQu\u00e9 es Zero Trust? - WALLIX<\/title>\n<meta name=\"description\" content=\"Zero Trust es un modelo moderno de ciberseguridad basado en una idea sencilla: \u201cnunca conf\u00edes, verifica siempre\u201d.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/es\/blogpost\/que-es-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfQu\u00e9 es Zero Trust? - WALLIX\" \/>\n<meta property=\"og:description\" content=\"Zero Trust es un modelo moderno de ciberseguridad basado en una idea sencilla: \u201cnunca conf\u00edes, verifica siempre\u201d.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/es\/blogpost\/que-es-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-14T13:08:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T10:00:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/11\/zerotrust-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Yoann Delomier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Yoann Delomier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/que-es-zero-trust\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/que-es-zero-trust\\\/\"},\"author\":{\"name\":\"Yoann Delomier\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#\\\/schema\\\/person\\\/00f947e8a49ff986a84cbafaea5f531f\"},\"headline\":\"\u00bfQu\u00e9 es Zero Trust?\",\"datePublished\":\"2025-02-14T13:08:39+00:00\",\"dateModified\":\"2026-03-09T10:00:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/que-es-zero-trust\\\/\"},\"wordCount\":3604,\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/que-es-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/zerotrust-scaled.jpeg\",\"articleSection\":[\"BLOGPOST\",\"ZERO TRUST\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/que-es-zero-trust\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/que-es-zero-trust\\\/\",\"name\":\"\u00bfQu\u00e9 es Zero Trust? - WALLIX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/que-es-zero-trust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/que-es-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/zerotrust-scaled.jpeg\",\"datePublished\":\"2025-02-14T13:08:39+00:00\",\"dateModified\":\"2026-03-09T10:00:35+00:00\",\"description\":\"Zero Trust es un modelo moderno de ciberseguridad basado en una idea sencilla: \u201cnunca conf\u00edes, verifica siempre\u201d.\u00a0\",\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/que-es-zero-trust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/que-es-zero-trust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/zerotrust-scaled.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/zerotrust-scaled.jpeg\",\"width\":2560,\"height\":1440,\"caption\":\"Illustrative graphic representing the Zero Trust cybersecurity model on a WALLIX page, highlighting key principles of identity\u2011centric access control and continuous verification to protect critical systems and data.\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/wallixcom\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wallix\\\/\",\"https:\\\/\\\/www.youtube.com\\\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#\\\/schema\\\/person\\\/00f947e8a49ff986a84cbafaea5f531f\",\"name\":\"Yoann Delomier\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4fbe885678b0cb1d2d09aa7acc8b27399cc9e6519ebffee66cb1845041f1a323?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4fbe885678b0cb1d2d09aa7acc8b27399cc9e6519ebffee66cb1845041f1a323?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4fbe885678b0cb1d2d09aa7acc8b27399cc9e6519ebffee66cb1845041f1a323?s=96&d=mm&r=g\",\"caption\":\"Yoann Delomier\"},\"description\":\"Yoann Delomier is a seasoned expert in OT cybersecurity and industrial systems protection. As Business Strategy Leader for Operational Technology at WALLIX, he focuses on securing critical infrastructures such as manufacturing, energy, and transport systems. His expertise spans ICS\\\/SCADA environments, compliance with industry-specific regulations, and Zero Trust adoption in OT.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/yoann-delomier\\\/\"],\"url\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/author\\\/yoann-delomier\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfQu\u00e9 es Zero Trust? - WALLIX","description":"Zero Trust es un modelo moderno de ciberseguridad basado en una idea sencilla: \u201cnunca conf\u00edes, verifica siempre\u201d.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-zero-trust\/","og_locale":"es_ES","og_type":"article","og_title":"\u00bfQu\u00e9 es Zero Trust? - WALLIX","og_description":"Zero Trust es un modelo moderno de ciberseguridad basado en una idea sencilla: \u201cnunca conf\u00edes, verifica siempre\u201d.\u00a0","og_url":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-zero-trust\/","og_site_name":"WALLIX","article_published_time":"2025-02-14T13:08:39+00:00","article_modified_time":"2026-03-09T10:00:35+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/11\/zerotrust-scaled.jpeg","type":"image\/jpeg"}],"author":"Yoann Delomier","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"Escrito por":"Yoann Delomier","Tiempo de lectura":"9 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-zero-trust\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-zero-trust\/"},"author":{"name":"Yoann Delomier","@id":"https:\/\/www.wallix.com\/es\/#\/schema\/person\/00f947e8a49ff986a84cbafaea5f531f"},"headline":"\u00bfQu\u00e9 es Zero Trust?","datePublished":"2025-02-14T13:08:39+00:00","dateModified":"2026-03-09T10:00:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-zero-trust\/"},"wordCount":3604,"publisher":{"@id":"https:\/\/www.wallix.com\/es\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/11\/zerotrust-scaled.jpeg","articleSection":["BLOGPOST","ZERO TRUST"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-zero-trust\/","url":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-zero-trust\/","name":"\u00bfQu\u00e9 es Zero Trust? - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/11\/zerotrust-scaled.jpeg","datePublished":"2025-02-14T13:08:39+00:00","dateModified":"2026-03-09T10:00:35+00:00","description":"Zero Trust es un modelo moderno de ciberseguridad basado en una idea sencilla: \u201cnunca conf\u00edes, verifica siempre\u201d.\u00a0","inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/es\/blogpost\/que-es-zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-zero-trust\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/11\/zerotrust-scaled.jpeg","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/11\/zerotrust-scaled.jpeg","width":2560,"height":1440,"caption":"Illustrative graphic representing the Zero Trust cybersecurity model on a WALLIX page, highlighting key principles of identity\u2011centric access control and continuous verification to protect critical systems and data."},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/es\/#website","url":"https:\/\/www.wallix.com\/es\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/es\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.wallix.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/es\/#\/schema\/person\/00f947e8a49ff986a84cbafaea5f531f","name":"Yoann Delomier","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/4fbe885678b0cb1d2d09aa7acc8b27399cc9e6519ebffee66cb1845041f1a323?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4fbe885678b0cb1d2d09aa7acc8b27399cc9e6519ebffee66cb1845041f1a323?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4fbe885678b0cb1d2d09aa7acc8b27399cc9e6519ebffee66cb1845041f1a323?s=96&d=mm&r=g","caption":"Yoann Delomier"},"description":"Yoann Delomier is a seasoned expert in OT cybersecurity and industrial systems protection. As Business Strategy Leader for Operational Technology at WALLIX, he focuses on securing critical infrastructures such as manufacturing, energy, and transport systems. His expertise spans ICS\/SCADA environments, compliance with industry-specific regulations, and Zero Trust adoption in OT.","sameAs":["https:\/\/www.linkedin.com\/in\/yoann-delomier\/"],"url":"https:\/\/www.wallix.com\/es\/author\/yoann-delomier\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts\/85113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/comments?post=85113"}],"version-history":[{"count":3,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts\/85113\/revisions"}],"predecessor-version":[{"id":85116,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts\/85113\/revisions\/85116"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/media\/33542"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/media?parent=85113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/categories?post=85113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/tags?post=85113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}