{"id":167,"date":"2022-04-29T16:22:32","date_gmt":"2022-04-29T16:22:32","guid":{"rendered":"https:\/\/revistapymes.es\/fondos-next-generation\/?p=167"},"modified":"2022-04-29T16:27:12","modified_gmt":"2022-04-29T16:27:12","slug":"las-3-claves-de-la-estrategia-zero-trust-de-watchguard","status":"publish","type":"post","link":"https:\/\/revistapymes.es\/fondos-next-generation\/2022\/04\/29\/las-3-claves-de-la-estrategia-zero-trust-de-watchguard\/","title":{"rendered":"Las 3 claves de la estrategia zero trust de WatchGuard"},"content":{"rendered":"<p>El concepto zero trust o confianza cero no es nuevo. Este enfoque de seguridad lleva existiendo desde hace tiempo, concretamente m\u00e1s de una d\u00e9cada. Sin embargo, es ahora cuando esta estrategia de seguridad basada en el mantra \u201cnunca confiar, siempre verificar\u201d est\u00e1 cobrando protagonismo. Pero, \u00bfpor qu\u00e9 ahora?<\/p>\n<p>La respuesta se puede encontrar en dos aspectos, por un lado, el avance de la digitalizaci\u00f3n y, por otro lado, la complejidad que han adquirido las estructuras de las empresas. Estos dos condicionantes est\u00e1n estrechamente relacionados con la evoluci\u00f3n en la manera de trabajar. Y es que el teletrabajo primero y el modelo h\u00edbrido despu\u00e9s han transformado por completo el escenario laboral de las organizaciones.<\/p>\n<p>Este nuevo panorama laboral se caracteriza por la flexibilidad, pero tambi\u00e9n por una superficie de ataque mucho m\u00e1s amplia ya que poco, o nada, queda del tradicional per\u00edmetro de oficina que hab\u00eda que proteger. Hoy en d\u00eda esa fortaleza se ha desvanecido provocando la descentralizaci\u00f3n de usuarios y datos. Por ello adoptar una la estrategia de seguridad zero trust es una prioridad para las organizaciones.<\/p>\n<p>El modelo zero trust sostiene que no se puede confiar en ning\u00fan usuario ni dispositivo. Gracias a su amplio enfoque de seguridad las empresas aplican restricciones m\u00e1s fuertes. Entre los beneficios de esta estrategia destacan la reducci\u00f3n de costes de gesti\u00f3n, la mejora de la visibilidad de la red y la r\u00e1pida adopci\u00f3n del cloud, as\u00ed como de la seguridad de los usuarios.<\/p>\n<p>Para ayudar a las empresas a desplegar sus estrategias de confianza cero WatchGuard cuenta con un enfoque claro que se materializa en su plataforma de seguridad unificada. Las claves de la <a href=\"https:\/\/www.watchguard.com\/es\/wgrd-solutions\/security-topics\/zero-trust\"><strong>estrategia zero trust<\/strong><\/a> de la compa\u00f1\u00eda son:<\/p>\n<ol>\n<li><strong>Seguridad de red<\/strong>. WatchGuard garantiza la protecci\u00f3n de los dispositivos, los usuarios y los datos en toda la red mediante su plataforma unificada.<\/li>\n<li><strong>AuthPoint<\/strong>. La compa\u00f1\u00eda es capaz de eliminar las brechas de datos relacionadas con las credenciales gracias a la protecci\u00f3n de la identidad de los usuarios.<\/li>\n<li><strong>Seguridad de endpoints<\/strong> gracias a la aplicaci\u00f3n de tecnolog\u00edas avanzadas para la prevenci\u00f3n, detecci\u00f3n y respuesta de amenazas.<\/li>\n<\/ol>\n<div  class=\"jeg_postblock_5 jeg_postblock jeg_module_hook jeg_pagination_disable jeg_col_3o3 jnews_module__0_69efd5ed2b945   \" data-unique=\"jnews_module__0_69efd5ed2b945\">\n\t\t\t\t\t<div class=\"jeg_block_heading jeg_block_heading_6 jeg_subcat_right\">\n                     <h3 class=\"jeg_block_title\"><span>DOCUMENTO RELACIONADO<\/span><\/h3>\n                     \n                 <\/div>\n\t\t\t\t\t<div class=\"jeg_block_container\">\n                    \n                    <div class=\"jeg_posts jeg_load_more_flag\"><article class=\"jeg_post jeg_pl_lg_2 format-standard\">\n                    <div class=\"jeg_thumb\">\n                        \n                        <a href=\"https:\/\/revistapymes.es\/fondos-next-generation\/2022\/04\/29\/watchguard-y-su-estrategia-zero-trust\/\" aria-label=\"Read article: WatchGuard y su estrategia zero trust\"><div class=\"thumbnail-container animate-lazy  size-715 \"><img loading=\"lazy\" decoding=\"async\" width=\"350\" height=\"250\" src=\"https:\/\/revistapymes.es\/fondos-next-generation\/wp-content\/themes\/jnews\/assets\/img\/jeg-empty.png\" class=\"attachment-jnews-350x250 size-jnews-350x250 lazyload wp-post-image\" alt=\"WatchGuard y su estrategia zero trust\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" data-src=\"https:\/\/revistapymes.es\/fondos-next-generation\/wp-content\/uploads\/sites\/2\/2022\/04\/eBook_Deploying_Zero-Trust_Networks_End_User_ESLA-1-350x250.jpg\" data-srcset=\"https:\/\/revistapymes.es\/fondos-next-generation\/wp-content\/uploads\/sites\/2\/2022\/04\/eBook_Deploying_Zero-Trust_Networks_End_User_ESLA-1-350x250.jpg 350w, https:\/\/revistapymes.es\/fondos-next-generation\/wp-content\/uploads\/sites\/2\/2022\/04\/eBook_Deploying_Zero-Trust_Networks_End_User_ESLA-1-120x86.jpg 120w, https:\/\/revistapymes.es\/fondos-next-generation\/wp-content\/uploads\/sites\/2\/2022\/04\/eBook_Deploying_Zero-Trust_Networks_End_User_ESLA-1-750x536.jpg 750w\" data-sizes=\"auto\" data-expand=\"700\" \/><\/div><\/a>\n                        <div class=\"jeg_post_category\">\n                            <span><a href=\"https:\/\/revistapymes.es\/fondos-next-generation\/category\/documentos\/\" class=\"category-documentos\">Documentos<\/a><\/span>\n                        <\/div>\n                    <\/div>\n                    <div class=\"jeg_postblock_content\">\n                        <h3 class=\"jeg_post_title\">\n                            <a href=\"https:\/\/revistapymes.es\/fondos-next-generation\/2022\/04\/29\/watchguard-y-su-estrategia-zero-trust\/\">WatchGuard y su estrategia zero trust<\/a>\n                        <\/h3>\n                        <div class=\"jeg_post_meta\"><\/div>\n                        <div class=\"jeg_post_excerpt\">\n                            <p>El modelo de seguridad zero trust o confianza cero se ha convertido en una prioridad para las organizaciones. Gracias a...<\/p>\n                            <a href=\"https:\/\/revistapymes.es\/fondos-next-generation\/2022\/04\/29\/watchguard-y-su-estrategia-zero-trust\/\" class=\"jeg_readmore\">Leer m\u00e1s<span class=\"screen-reader-text\">Details<\/span><\/a>\n                        <\/div>\n                    <\/div>\n                <\/article><\/div>\n                    <div class='module-overlay'>\n\t\t\t\t    <div class='preloader_type preloader_dot'>\n\t\t\t\t        <div class=\"module-preloader jeg_preloader dot\">\n\t\t\t\t            <span><\/span><span><\/span><span><\/span>\n\t\t\t\t        <\/div>\n\t\t\t\t        <div class=\"module-preloader jeg_preloader circle\">\n\t\t\t\t            <div class=\"jnews_preloader_circle_outer\">\n\t\t\t\t                <div class=\"jnews_preloader_circle_inner\"><\/div>\n\t\t\t\t            <\/div>\n\t\t\t\t        <\/div>\n\t\t\t\t        <div class=\"module-preloader jeg_preloader square\">\n\t\t\t\t            <div class=\"jeg_square\">\n\t\t\t\t                <div class=\"jeg_square_inner\"><\/div>\n\t\t\t\t            <\/div>\n\t\t\t\t        <\/div>\n\t\t\t\t    <\/div>\n\t\t\t\t<\/div>\n                <\/div>\n                <div class=\"jeg_block_navigation\">\n                    <div class='navigation_overlay'><div class='module-preloader jeg_preloader'><span><\/span><span><\/span><span><\/span><\/div><\/div>\n                    \n                    \n                <\/div>\n\t\t\t\t\t\n\t\t\t\t\t<script>var jnews_module__0_69efd5ed2b945 = {\"compatible_column_notice\":\"info\",\"header_icon\":\"\",\"first_title\":\"DOCUMENTO RELACIONADO\",\"second_title\":\"\",\"url\":\"\",\"header_type\":\"heading_6\",\"header_background\":\"\",\"header_secondary_background\":\"\",\"header_text_color\":\"\",\"header_line_color\":\"\",\"header_accent_color\":\"\",\"header_filter_category\":\"\",\"header_filter_author\":\"\",\"header_filter_tag\":\"\",\"header_filter_text\":\"All\",\"sticky_post\":false,\"sticky_post_filter\":false,\"post_type\":\"post\",\"content_type\":\"all\",\"sponsor\":false,\"number_post\":\"1\",\"post_offset\":0,\"unique_content\":\"disable\",\"include_post\":\"170\",\"included_only\":false,\"exclude_post\":\"\",\"include_category\":\"\",\"exclude_category\":\"\",\"include_author\":\"\",\"include_tag\":\"\",\"exclude_tag\":\"\",\"exclude_visited_post\":false,\"sort_by\":\"latest\",\"date_format\":\"default\",\"date_format_custom\":\"Y\\\/m\\\/d\",\"excerpt_length\":20,\"excerpt_ellipsis\":\"...\",\"force_normal_image_load\":\"\",\"main_custom_image_size\":\"default\",\"pagination_mode\":\"disable\",\"pagination_nextprev_showtext\":\"\",\"pagination_number_post\":4,\"pagination_scroll_limit\":0,\"ads_type\":\"disable\",\"ads_position\":1,\"ads_random\":\"\",\"ads_image\":\"\",\"ads_image_tablet\":\"\",\"ads_image_phone\":\"\",\"ads_image_link\":\"\",\"ads_image_alt\":\"\",\"ads_image_new_tab\":\"\",\"google_publisher_id\":\"\",\"google_slot_id\":\"\",\"google_desktop\":\"auto\",\"google_tab\":\"auto\",\"google_phone\":\"auto\",\"content\":\"\",\"ads_bottom_text\":\"\",\"boxed\":\"\",\"boxed_shadow\":\"\",\"el_id\":\"\",\"el_class\":\"\",\"scheme\":\"\",\"column_width\":\"auto\",\"title_color\":\"\",\"accent_color\":\"\",\"alt_color\":\"\",\"excerpt_color\":\"\",\"css\":\"\",\"paged\":1,\"column_class\":\"jeg_col_3o3\",\"class\":\"jnews_block_5\"};<\/script>\n\t\t\t\t<\/div>\n","protected":false},"excerpt":{"rendered":"<p>El concepto zero trust o confianza cero no es nuevo. Este enfoque de seguridad lleva existiendo desde hace tiempo, concretamente m\u00e1s de una d\u00e9cada. Sin embargo, es ahora cuando esta estrategia de seguridad basada en el mantra \u201cnunca confiar, siempre verificar\u201d est\u00e1 cobrando protagonismo. Pero, \u00bfpor qu\u00e9 ahora? La respuesta se puede encontrar en dos [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":168,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jnews-multi-image_gallery":[],"jnews_single_post":{"source_name":"","source_url":"","via_name":"","via_url":"","override_template":"0","override":[{"template":"1","single_blog_custom":"","parallax":"1","fullscreen":"1","layout":"right-sidebar","sidebar":"default-sidebar","second_sidebar":"default-sidebar","sticky_sidebar":"1","share_position":"top","share_float_style":"share-monocrhome","show_share_counter":"1","show_view_counter":"1","show_featured":"1","show_post_meta":"1","show_post_author":"1","show_post_author_image":"1","show_post_date":"1","post_date_format":"default","post_date_format_custom":"Y\/m\/d","show_post_category":"1","show_post_reading_time":"0","post_reading_time_wpm":"300","show_zoom_button":"0","zoom_button_out_step":"2","zoom_button_in_step":"3","show_post_tag":"1","show_prev_next_post":"1","show_popup_post":"1","number_popup_post":"1","show_author_box":"0","show_post_related":"0","show_inline_post_related":"0"}],"override_image_size":"0","image_override":[{"single_post_thumbnail_size":"crop-500","single_post_gallery_size":"crop-500"}],"trending_post":"0","trending_post_position":"meta","trending_post_label":"Trending","sponsored_post":"0","sponsored_post_label":"Sponsored by","sponsored_post_name":"","sponsored_post_url":"","sponsored_post_logo_enable":"0","sponsored_post_logo":"","sponsored_post_desc":"","disable_ad":"0"},"jnews_primary_category":{"id":""},"jnews_social_meta":{"fb_title":"","fb_description":"","fb_image":"","twitter_title":"","twitter_description":"","twitter_image":""},"jnews_override_counter":{"override_view_counter":"0","view_counter_number":"0","override_share_counter":"0","share_counter_number":"0","override_like_counter":"0","like_counter_number":"0","override_dislike_counter":"0","dislike_counter_number":"0"},"footnotes":""},"categories":[2],"tags":[9],"class_list":["post-167","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articulos","tag-watchguard"],"_links":{"self":[{"href":"https:\/\/revistapymes.es\/fondos-next-generation\/wp-json\/wp\/v2\/posts\/167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/revistapymes.es\/fondos-next-generation\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/revistapymes.es\/fondos-next-generation\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/revistapymes.es\/fondos-next-generation\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/revistapymes.es\/fondos-next-generation\/wp-json\/wp\/v2\/comments?post=167"}],"version-history":[{"count":3,"href":"https:\/\/revistapymes.es\/fondos-next-generation\/wp-json\/wp\/v2\/posts\/167\/revisions"}],"predecessor-version":[{"id":175,"href":"https:\/\/revistapymes.es\/fondos-next-generation\/wp-json\/wp\/v2\/posts\/167\/revisions\/175"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/revistapymes.es\/fondos-next-generation\/wp-json\/wp\/v2\/media\/168"}],"wp:attachment":[{"href":"https:\/\/revistapymes.es\/fondos-next-generation\/wp-json\/wp\/v2\/media?parent=167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/revistapymes.es\/fondos-next-generation\/wp-json\/wp\/v2\/categories?post=167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/revistapymes.es\/fondos-next-generation\/wp-json\/wp\/v2\/tags?post=167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}