{"id":6258,"date":"2018-02-09T15:34:05","date_gmt":"2018-02-09T15:34:05","guid":{"rendered":"https:\/\/xelere.com\/?p=6258"},"modified":"2018-02-09T17:14:48","modified_gmt":"2018-02-09T17:14:48","slug":"endpoints-principales-desafios-soluciones","status":"publish","type":"post","link":"https:\/\/xelere.com\/en\/endpoints-principales-desafios-soluciones\/","title":{"rendered":"Endpoints: qu\u00e9 son, principales desaf\u00edos y soluciones"},"content":{"rendered":"<h5><strong>Por:<\/strong> Rolando Fern\u00e1ndez, <em>Consultor IT\u00a0<\/em><\/h5>\n<p><strong><u>El endpoint<\/u><\/strong><\/p>\n<p>\u00bfD\u00f3nde est\u00e1 el endpoint? \u00bfEn qu\u00e9 punto pueden fijarse los l\u00edmites del puesto de trabajo? \u00bfEst\u00e1 preparada la organizaci\u00f3n para tomar el control del nuevo entorno?<\/p>\n<p>Los endpoints son los equipos de escritorio, notebooks, smartphones, tablets, impresoras, cajeros autom\u00e1ticos (ATM) y equipos de punto de venta que forman parte de su Red de \u00c1rea Local, que pese a estar protegidos por las capas de seguridad de gateways y de red, requieren contar con funciones b\u00e1sicas de seguridad para bloquear posibles malwares que podr\u00eda infiltrarse en su empresa, evitar las p\u00e9rdidas de datos valiosos e inclusive que alg\u00fan empleado no cumpla con las normas de ciberseguridad establecidos por la Compa\u00f1\u00eda. Como asi tambi\u00e9n brindar acceso seguro al correo electr\u00f3nico y aplicaciones web. Por lo cual, los riesgos que una Compa\u00f1\u00eda enfrenta por la deficiente protecci\u00f3n de sus endpoints son muy importantes.<\/p>\n<p><a href=\"https:\/\/xelere.com\/wp-content\/uploads\/2017\/12\/477626-the-best-hosted-endpoint-protection-and-security-software.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-6260 aligncenter\" src=\"https:\/\/xelere.com\/wp-content\/uploads\/2017\/12\/477626-the-best-hosted-endpoint-protection-and-security-software-300x169.jpg\" alt=\"\" width=\"300\" height=\"169\" srcset=\"https:\/\/xelere.com\/wp-content\/uploads\/2017\/12\/477626-the-best-hosted-endpoint-protection-and-security-software-300x169.jpg 300w, https:\/\/xelere.com\/wp-content\/uploads\/2017\/12\/477626-the-best-hosted-endpoint-protection-and-security-software-768x432.jpg 768w, https:\/\/xelere.com\/wp-content\/uploads\/2017\/12\/477626-the-best-hosted-endpoint-protection-and-security-software.jpg 810w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Seg\u00fan un reciente estudio, los riesgos de los endpoint se incrementar\u00e1n a\u00f1o a a\u00f1o principalmente por equipos de uso personal o profesional de un empleado, conectado desde un lugar no seguro, como un hotel o una cafeter\u00eda, as\u00ed como el uso de aplicaciones comerciales en la nube. Las empresas han adoptado soluciones de colaboraci\u00f3n en la nube para beneficiarse de las ventajas que ofrecen las videoconferencias, un almacenamiento de datos m\u00e1s rentable y la posibilidad de conectarse con cualquiera en cualquier momento. La integraci\u00f3n de servicios y almacenamiento en la nube es generalizada en un entorno comercial global cada vez m\u00e1s conectado.<\/p>\n<p>Del resultado de este estudio, los costos por da\u00f1o cibern\u00e9tico alcanzar\u00e1n los 6 trillones de d\u00f3lares anuales para 2021 (Estudio realizado por CSO). Ya que, para los atacantes, es m\u00e1s sencillo atacar el endpoint que el data center de las empresas.<\/p>\n<p>La protecci\u00f3n de los datos plantea un importante desaf\u00edo a la nueva configuraci\u00f3n de los endpoint. Las empresas se encuentran con que, a medida que ganan en conectividad y libertad, se encuentran con las siguientes dificultades con respecto a los endpoints:<\/p>\n<ul>\n<li>Es m\u00e1s dif\u00edcil garantizar que la navegaci\u00f3n se lleva a cabo en condiciones de seguridad suficientes.<\/li>\n<li>Cuesta encontrar un sistema de autenticaci\u00f3n efectivo, sobre todo, si se trata de mantener las\u00a0estructuras tradicionales.<\/li>\n<li>La gesti\u00f3n de accesos se complica.<\/li>\n<li>El control de identidad parece no resultar tan confiable.<\/li>\n<li>Se desconoce el modo de brindar la protecci\u00f3n necesaria a la informaci\u00f3n compartida o sujeta a intercambio.<\/li>\n<\/ul>\n<p><strong>Soluciones efectivas<\/strong><\/p>\n<p>Existen en el mercado diferentes soluciones de seguridad para endpoint. Aunque, la efectividad de todas depender\u00e1 del trabajo de capacitaci\u00f3n que la empresa realice, de forma previa a su implementaci\u00f3n y del acompa\u00f1amiento que se lleve a cabo. As\u00ed, para que el endpoint no sea el eslab\u00f3n m\u00e1s vulnerable de la cadena de seguridad de la empresa, se recomienda realizar lo siguiente:<\/p>\n<ul>\n<li>En la actualidad, seg\u00fan un estudio de CSO, pasan entre 100 y 200 d\u00edas hasta que las empresas se dan cuenta de que est\u00e1n sufriendo un ataque. A medida que se consiga reducir este plazo, aumentar\u00e1n las probabilidades de resolver el problema con \u00e9xito y minimizar sus consecuencias.<\/li>\n<li>Olvidarse del antivirus como medio \u00fanico de protecci\u00f3n. Para estar seguros hay que complementar el alcance de estas soluciones con el de medidas antimalware, soluciones de autenticaci\u00f3n, software antifraude o controles de identidad y acceso, entre otros. S\u00f3lo as\u00ed se pueden detectar los nuevos ataques \u201czeroday\u201d.<\/li>\n<li>Implementar soluciones capaces de detectar ataques conocidos y desconocidos (que pueden descubrirse por medio de an\u00e1lisis de comportamiento). Existen software capaces de mitigar los ataques, restaurar la situaci\u00f3n al punto anterior de confianza y completar la respuesta con un an\u00e1lisis forense que permita esclarecer qu\u00e9 ha pasado y por qu\u00e9.<\/li>\n<\/ul>\n<p>Apostar por la formaci\u00f3n e informaci\u00f3n de los usuarios de negocio. La seguridad debe entenderse como una cuesti\u00f3n cultural en continua evoluci\u00f3n. La empresa debe mejorar, en forma constante, su preparaci\u00f3n para saber c\u00f3mo proteger sus datos en cualquier entorno y de qu\u00e9 modo pueden sacar el mejor partido de las herramientas a su disposici\u00f3n.<\/p>\n<h4><\/h4>\n<h4><strong>Si le interesa conocer m\u00e1s sobre como mejorar la protecci\u00f3n de sus endpoints cont\u00e1ctenos:<\/strong><\/h4>\n<div class=\"wpforms-container wpforms-container-full\" id=\"wpforms-6321\"><form id=\"wpforms-form-6321\" class=\"wpforms-validate wpforms-form\" data-formid=\"6321\" method=\"post\" enctype=\"multipart\/form-data\" action=\"\/en\/wp-json\/wp\/v2\/posts\/6258\" data-token=\"f30569a92b1955c9887cd62bac8c93f7\" data-token-time=\"1776617617\"><noscript class=\"wpforms-error-noscript\">Please enable JavaScript in your browser to complete this form.<\/noscript><div class=\"wpforms-field-container\"><div id=\"wpforms-6321-field_1-container\" class=\"wpforms-field wpforms-field-name\" data-field-id=\"1\"><label class=\"wpforms-field-label wpforms-label-hide\" for=\"wpforms-6321-field_1\">Name <span class=\"wpforms-required-label\">*<\/span><\/label><div class=\"wpforms-field-row wpforms-field-medium\"><div class=\"wpforms-field-row-block wpforms-first wpforms-one-half\"><input type=\"text\" id=\"wpforms-6321-field_1\" class=\"wpforms-field-name-first wpforms-field-required\" name=\"wpforms[fields][1][first]\" placeholder=\"Nombre\" required><label for=\"wpforms-6321-field_1\" class=\"wpforms-field-sublabel after wpforms-sublabel-hide\">First<\/label><\/div><div class=\"wpforms-field-row-block wpforms-one-half\"><input type=\"text\" id=\"wpforms-6321-field_1-last\" class=\"wpforms-field-name-last wpforms-field-required\" name=\"wpforms[fields][1][last]\" placeholder=\"Apellido\" required><label for=\"wpforms-6321-field_1-last\" class=\"wpforms-field-sublabel after wpforms-sublabel-hide\">Last<\/label><\/div><\/div><\/div><div id=\"wpforms-6321-field_3-container\" class=\"wpforms-field wpforms-field-email\" data-field-id=\"3\"><label class=\"wpforms-field-label wpforms-label-hide\" for=\"wpforms-6321-field_3\">Email <span class=\"wpforms-required-label\">*<\/span><\/label><input type=\"email\" id=\"wpforms-6321-field_3\" class=\"wpforms-field-medium wpforms-field-required\" name=\"wpforms[fields][3]\" placeholder=\"Email\" spellcheck=\"false\" required><\/div><div id=\"wpforms-6321-field_6-container\" class=\"wpforms-field wpforms-field-number\" data-field-id=\"6\"><label class=\"wpforms-field-label wpforms-label-hide\" for=\"wpforms-6321-field_6\">Telefono  <span class=\"wpforms-required-label\">*<\/span><\/label><input type=\"number\" id=\"wpforms-6321-field_6\" class=\"wpforms-field-medium wpforms-field-required\" name=\"wpforms[fields][6]\" placeholder=\"Tel\u00e9fono\" step=\"any\" required><\/div><div id=\"wpforms-6321-field_7-container\" class=\"wpforms-field wpforms-field-text\" data-field-id=\"7\"><label class=\"wpforms-field-label wpforms-label-hide\" for=\"wpforms-6321-field_7\">Cargo <span class=\"wpforms-required-label\">*<\/span><\/label><input type=\"text\" id=\"wpforms-6321-field_7\" class=\"wpforms-field-medium wpforms-field-required\" name=\"wpforms[fields][7]\" placeholder=\"Cargo\" required><\/div><div id=\"wpforms-6321-field_8-container\" class=\"wpforms-field wpforms-field-text\" data-field-id=\"8\"><label class=\"wpforms-field-label wpforms-label-hide\" for=\"wpforms-6321-field_8\">Compa\u00f1ia  <span class=\"wpforms-required-label\">*<\/span><\/label><input type=\"text\" id=\"wpforms-6321-field_8\" class=\"wpforms-field-medium wpforms-field-required\" name=\"wpforms[fields][8]\" placeholder=\"Compa\u00f1\u00eda\" required><\/div><div id=\"wpforms-6321-field_10-container\" class=\"wpforms-field wpforms-field-radio\" data-field-id=\"10\"><label class=\"wpforms-field-label\">\u00bfEst\u00e1 evaluando en este momento un proyecto de Seguridad de Endpoints? <span class=\"wpforms-required-label\">*<\/span><\/label><ul id=\"wpforms-6321-field_10\" class=\"wpforms-field-required\"><li class=\"choice-1 depth-1\"><input type=\"radio\" id=\"wpforms-6321-field_10_1\" name=\"wpforms[fields][10]\" value=\"S\u00ed, en este momento\" required ><label class=\"wpforms-field-label-inline\" for=\"wpforms-6321-field_10_1\">S\u00ed, en este momento<\/label><\/li><li class=\"choice-2 depth-1\"><input type=\"radio\" id=\"wpforms-6321-field_10_2\" name=\"wpforms[fields][10]\" value=\"S\u00ed, pero a desarrollar en unos meses\" required ><label class=\"wpforms-field-label-inline\" for=\"wpforms-6321-field_10_2\">S\u00ed, pero a desarrollar en unos meses<\/label><\/li><li class=\"choice-3 depth-1\"><input type=\"radio\" id=\"wpforms-6321-field_10_3\" name=\"wpforms[fields][10]\" value=\"No, pero quiero conocer m\u00e1s\" required ><label class=\"wpforms-field-label-inline\" for=\"wpforms-6321-field_10_3\">No, pero quiero conocer m\u00e1s<\/label><\/li><\/ul><\/div><div id=\"wpforms-6321-field_9-container\" class=\"wpforms-field wpforms-field-radio background-color 00ff00\" data-field-id=\"9\"><label class=\"wpforms-field-label\">\u00bfCuenta con presupuesto asignado para este tipo de proyectos? <span class=\"wpforms-required-label\">*<\/span><\/label><ul id=\"wpforms-6321-field_9\" class=\"wpforms-field-required\"><li class=\"choice-1 depth-1\"><input type=\"radio\" id=\"wpforms-6321-field_9_1\" name=\"wpforms[fields][9]\" value=\"S\u00ed, ya disponible\" required ><label class=\"wpforms-field-label-inline\" for=\"wpforms-6321-field_9_1\">S\u00ed, ya disponible<\/label><\/li><li class=\"choice-2 depth-1\"><input type=\"radio\" id=\"wpforms-6321-field_9_2\" name=\"wpforms[fields][9]\" value=\"S\u00ed, a definir seg\u00fan el proyecto\" required ><label class=\"wpforms-field-label-inline\" for=\"wpforms-6321-field_9_2\">S\u00ed, a definir seg\u00fan el proyecto<\/label><\/li><li class=\"choice-3 depth-1\"><input type=\"radio\" id=\"wpforms-6321-field_9_3\" name=\"wpforms[fields][9]\" value=\"No cuento con presupuesto asignado\" required ><label class=\"wpforms-field-label-inline\" for=\"wpforms-6321-field_9_3\">No cuento con presupuesto asignado<\/label><\/li><\/ul><\/div><div id=\"wpforms-6321-field_11-container\" class=\"wpforms-field wpforms-field-radio color 00ff00\" data-field-id=\"11\"><label class=\"wpforms-field-label\">\u00bfCu\u00e1l es su rol en el proceso de toma de decisiones de su empresa? <span class=\"wpforms-required-label\">*<\/span><\/label><ul id=\"wpforms-6321-field_11\" class=\"wpforms-field-required\"><li class=\"choice-1 depth-1\"><input type=\"radio\" id=\"wpforms-6321-field_11_1\" name=\"wpforms[fields][11]\" value=\"Tomo la decisi\u00f3n\" required ><label class=\"wpforms-field-label-inline\" for=\"wpforms-6321-field_11_1\">Tomo la decisi\u00f3n<\/label><\/li><li class=\"choice-2 depth-1\"><input type=\"radio\" id=\"wpforms-6321-field_11_2\" name=\"wpforms[fields][11]\" value=\"Eval\u00fao el proyecto\/propuesta\" required ><label class=\"wpforms-field-label-inline\" for=\"wpforms-6321-field_11_2\">Eval\u00fao el proyecto\/propuesta<\/label><\/li><li class=\"choice-3 depth-1\"><input type=\"radio\" id=\"wpforms-6321-field_11_3\" name=\"wpforms[fields][11]\" value=\"Influyo en la toma de decisi\u00f3n\" required ><label class=\"wpforms-field-label-inline\" for=\"wpforms-6321-field_11_3\">Influyo en la toma de decisi\u00f3n<\/label><\/li><li class=\"choice-4 depth-1\"><input type=\"radio\" id=\"wpforms-6321-field_11_4\" name=\"wpforms[fields][11]\" value=\"Estoy involucrado pero no tomo la decisi\u00f3n\" required ><label class=\"wpforms-field-label-inline\" for=\"wpforms-6321-field_11_4\">Estoy involucrado pero no tomo la decisi\u00f3n<\/label><\/li><li class=\"choice-5 depth-1\"><input type=\"radio\" id=\"wpforms-6321-field_11_5\" name=\"wpforms[fields][11]\" value=\"Ninguna de las anteriores\" required ><label class=\"wpforms-field-label-inline\" for=\"wpforms-6321-field_11_5\">Ninguna de las anteriores<\/label><\/li><\/ul><\/div><\/div><!-- .wpforms-field-container --><div class=\"wpforms-field wpforms-field-hp\"><label for=\"wpforms-6321-field-hp\" class=\"wpforms-field-label\">Message<\/label><input type=\"text\" name=\"wpforms[hp]\" id=\"wpforms-6321-field-hp\" class=\"wpforms-field-medium\"><\/div><div class=\"wpforms-submit-container\" ><input type=\"hidden\" name=\"wpforms[id]\" value=\"6321\"><input type=\"hidden\" name=\"page_title\" value=\"\"><input type=\"hidden\" name=\"page_url\" value=\"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/posts\/6258\"><input type=\"hidden\" name=\"url_referer\" value=\"\"><button type=\"submit\" name=\"wpforms[submit]\" id=\"wpforms-submit-6321\" class=\"wpforms-submit\" data-alt-text=\"Enviando...\" data-submit-text=\"Enviar\" aria-live=\"assertive\" value=\"wpforms-submit\">Enviar<\/button><\/div><\/form><\/div>  <!-- .wpforms-container -->\n","protected":false},"excerpt":{"rendered":"<p>Por: Rolando Fern\u00e1ndez, Consultor IT\u00a0 El endpoint \u00bfD\u00f3nde est\u00e1 el endpoint? \u00bfEn qu\u00e9 punto pueden fijarse los l\u00edmites del puesto de trabajo? \u00bfEst\u00e1 preparada la organizaci\u00f3n para tomar el control del nuevo entorno? Los endpoints son los equipos de escritorio, notebooks, smartphones, tablets, impresoras, cajeros autom\u00e1ticos (ATM) y equipos de punto de venta que forman [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6257,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[78],"tags":[],"class_list":["post-6258","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Endpoints: Qu\u00e9 son, principales desaf\u00edos y soluciones<\/title>\n<meta name=\"description\" content=\"\u00bfD\u00f3nde est\u00e1 el endpoint? \u00bfEn qu\u00e9 punto pueden fijarse los l\u00edmites del puesto de trabajo? \u00bfEst\u00e1 preparada la organizaci\u00f3n para tomar el control del nuevo entorno?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xelere.com\/en\/endpoints-principales-desafios-soluciones\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Endpoints: Qu\u00e9 son, principales desaf\u00edos y soluciones\" \/>\n<meta property=\"og:description\" content=\"\u00bfD\u00f3nde est\u00e1 el endpoint? \u00bfEn qu\u00e9 punto pueden fijarse los l\u00edmites del puesto de trabajo? \u00bfEst\u00e1 preparada la organizaci\u00f3n para tomar el control del nuevo entorno?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xelere.com\/en\/endpoints-principales-desafios-soluciones\/\" \/>\n<meta property=\"og:site_name\" content=\"Xelere\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XelereSA\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-09T15:34:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-02-09T17:14:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xelere.com\/wp-content\/uploads\/2017\/12\/3528353_original-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1593\" \/>\n\t<meta property=\"og:image:height\" content=\"1193\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"xelere\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Xelere\" \/>\n<meta name=\"twitter:site\" content=\"@Xelere\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"xelere\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xelere.com\\\/endpoints-principales-desafios-soluciones\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/endpoints-principales-desafios-soluciones\\\/\"},\"author\":{\"name\":\"xelere\",\"@id\":\"https:\\\/\\\/xelere.com\\\/#\\\/schema\\\/person\\\/44f8c086c18d61177e921f90bf758f1d\"},\"headline\":\"Endpoints: qu\u00e9 son, principales desaf\u00edos y soluciones\",\"datePublished\":\"2018-02-09T15:34:05+00:00\",\"dateModified\":\"2018-02-09T17:14:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/endpoints-principales-desafios-soluciones\\\/\"},\"wordCount\":746,\"publisher\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/endpoints-principales-desafios-soluciones\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/3528353_original-2.jpg\",\"articleSection\":[\"Ciberseguridad\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xelere.com\\\/endpoints-principales-desafios-soluciones\\\/\",\"url\":\"https:\\\/\\\/xelere.com\\\/endpoints-principales-desafios-soluciones\\\/\",\"name\":\"Endpoints: Qu\u00e9 son, principales desaf\u00edos y soluciones\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/endpoints-principales-desafios-soluciones\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/endpoints-principales-desafios-soluciones\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/3528353_original-2.jpg\",\"datePublished\":\"2018-02-09T15:34:05+00:00\",\"dateModified\":\"2018-02-09T17:14:48+00:00\",\"description\":\"\u00bfD\u00f3nde est\u00e1 el endpoint? \u00bfEn qu\u00e9 punto pueden fijarse los l\u00edmites del puesto de trabajo? \u00bfEst\u00e1 preparada la organizaci\u00f3n para tomar el control del nuevo entorno?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/endpoints-principales-desafios-soluciones\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xelere.com\\\/endpoints-principales-desafios-soluciones\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/xelere.com\\\/endpoints-principales-desafios-soluciones\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/3528353_original-2.jpg\",\"contentUrl\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/3528353_original-2.jpg\",\"width\":1593,\"height\":1193},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xelere.com\\\/endpoints-principales-desafios-soluciones\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xelere.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Endpoints: qu\u00e9 son, principales desaf\u00edos y soluciones\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xelere.com\\\/#website\",\"url\":\"https:\\\/\\\/xelere.com\\\/\",\"name\":\"Xelere\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xelere.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xelere.com\\\/#organization\",\"name\":\"Xelere\",\"url\":\"https:\\\/\\\/xelere.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/xelere.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2015\\\/09\\\/Marca-Xelere-031.png\",\"contentUrl\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2015\\\/09\\\/Marca-Xelere-031.png\",\"width\":810,\"height\":283,\"caption\":\"Xelere\"},\"image\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XelereSA\\\/\",\"https:\\\/\\\/x.com\\\/Xelere\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/xelere\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCq796T-Uv9WHCogZPJ8uXaQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xelere.com\\\/#\\\/schema\\\/person\\\/44f8c086c18d61177e921f90bf758f1d\",\"name\":\"xelere\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g\",\"caption\":\"xelere\"},\"url\":\"https:\\\/\\\/xelere.com\\\/en\\\/author\\\/lalonso\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Endpoints: Qu\u00e9 son, principales desaf\u00edos y soluciones","description":"\u00bfD\u00f3nde est\u00e1 el endpoint? \u00bfEn qu\u00e9 punto pueden fijarse los l\u00edmites del puesto de trabajo? \u00bfEst\u00e1 preparada la organizaci\u00f3n para tomar el control del nuevo entorno?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xelere.com\/en\/endpoints-principales-desafios-soluciones\/","og_locale":"en_US","og_type":"article","og_title":"Endpoints: Qu\u00e9 son, principales desaf\u00edos y soluciones","og_description":"\u00bfD\u00f3nde est\u00e1 el endpoint? \u00bfEn qu\u00e9 punto pueden fijarse los l\u00edmites del puesto de trabajo? \u00bfEst\u00e1 preparada la organizaci\u00f3n para tomar el control del nuevo entorno?","og_url":"https:\/\/xelere.com\/en\/endpoints-principales-desafios-soluciones\/","og_site_name":"Xelere","article_publisher":"https:\/\/www.facebook.com\/XelereSA\/","article_published_time":"2018-02-09T15:34:05+00:00","article_modified_time":"2018-02-09T17:14:48+00:00","og_image":[{"width":1593,"height":1193,"url":"https:\/\/xelere.com\/wp-content\/uploads\/2017\/12\/3528353_original-2.jpg","type":"image\/jpeg"}],"author":"xelere","twitter_card":"summary_large_image","twitter_creator":"@Xelere","twitter_site":"@Xelere","twitter_misc":{"Written by":"xelere","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xelere.com\/endpoints-principales-desafios-soluciones\/#article","isPartOf":{"@id":"https:\/\/xelere.com\/endpoints-principales-desafios-soluciones\/"},"author":{"name":"xelere","@id":"https:\/\/xelere.com\/#\/schema\/person\/44f8c086c18d61177e921f90bf758f1d"},"headline":"Endpoints: qu\u00e9 son, principales desaf\u00edos y soluciones","datePublished":"2018-02-09T15:34:05+00:00","dateModified":"2018-02-09T17:14:48+00:00","mainEntityOfPage":{"@id":"https:\/\/xelere.com\/endpoints-principales-desafios-soluciones\/"},"wordCount":746,"publisher":{"@id":"https:\/\/xelere.com\/#organization"},"image":{"@id":"https:\/\/xelere.com\/endpoints-principales-desafios-soluciones\/#primaryimage"},"thumbnailUrl":"https:\/\/xelere.com\/wp-content\/uploads\/2017\/12\/3528353_original-2.jpg","articleSection":["Ciberseguridad"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/xelere.com\/endpoints-principales-desafios-soluciones\/","url":"https:\/\/xelere.com\/endpoints-principales-desafios-soluciones\/","name":"Endpoints: Qu\u00e9 son, principales desaf\u00edos y soluciones","isPartOf":{"@id":"https:\/\/xelere.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xelere.com\/endpoints-principales-desafios-soluciones\/#primaryimage"},"image":{"@id":"https:\/\/xelere.com\/endpoints-principales-desafios-soluciones\/#primaryimage"},"thumbnailUrl":"https:\/\/xelere.com\/wp-content\/uploads\/2017\/12\/3528353_original-2.jpg","datePublished":"2018-02-09T15:34:05+00:00","dateModified":"2018-02-09T17:14:48+00:00","description":"\u00bfD\u00f3nde est\u00e1 el endpoint? \u00bfEn qu\u00e9 punto pueden fijarse los l\u00edmites del puesto de trabajo? \u00bfEst\u00e1 preparada la organizaci\u00f3n para tomar el control del nuevo entorno?","breadcrumb":{"@id":"https:\/\/xelere.com\/endpoints-principales-desafios-soluciones\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xelere.com\/endpoints-principales-desafios-soluciones\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xelere.com\/endpoints-principales-desafios-soluciones\/#primaryimage","url":"https:\/\/xelere.com\/wp-content\/uploads\/2017\/12\/3528353_original-2.jpg","contentUrl":"https:\/\/xelere.com\/wp-content\/uploads\/2017\/12\/3528353_original-2.jpg","width":1593,"height":1193},{"@type":"BreadcrumbList","@id":"https:\/\/xelere.com\/endpoints-principales-desafios-soluciones\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xelere.com\/"},{"@type":"ListItem","position":2,"name":"Endpoints: qu\u00e9 son, principales desaf\u00edos y soluciones"}]},{"@type":"WebSite","@id":"https:\/\/xelere.com\/#website","url":"https:\/\/xelere.com\/","name":"Xelere","description":"","publisher":{"@id":"https:\/\/xelere.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xelere.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xelere.com\/#organization","name":"Xelere","url":"https:\/\/xelere.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xelere.com\/#\/schema\/logo\/image\/","url":"https:\/\/xelere.com\/wp-content\/uploads\/2015\/09\/Marca-Xelere-031.png","contentUrl":"https:\/\/xelere.com\/wp-content\/uploads\/2015\/09\/Marca-Xelere-031.png","width":810,"height":283,"caption":"Xelere"},"image":{"@id":"https:\/\/xelere.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XelereSA\/","https:\/\/x.com\/Xelere","https:\/\/www.linkedin.com\/company\/xelere","https:\/\/www.youtube.com\/channel\/UCq796T-Uv9WHCogZPJ8uXaQ"]},{"@type":"Person","@id":"https:\/\/xelere.com\/#\/schema\/person\/44f8c086c18d61177e921f90bf758f1d","name":"xelere","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g","caption":"xelere"},"url":"https:\/\/xelere.com\/en\/author\/lalonso\/"}]}},"_links":{"self":[{"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/posts\/6258","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/comments?post=6258"}],"version-history":[{"count":6,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/posts\/6258\/revisions"}],"predecessor-version":[{"id":6324,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/posts\/6258\/revisions\/6324"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/media\/6257"}],"wp:attachment":[{"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/media?parent=6258"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/categories?post=6258"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/tags?post=6258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}