{"id":1256,"date":"2018-09-05T12:04:05","date_gmt":"2018-09-05T17:04:05","guid":{"rendered":"http:\/\/intelisis.com\/blog\/?p=1256"},"modified":"2018-09-05T12:04:05","modified_gmt":"2018-09-05T17:04:05","slug":"casb_seguridad-en-la-nube","status":"publish","type":"post","link":"https:\/\/www.intelisis.com\/blog\/casb_seguridad-en-la-nube\/","title":{"rendered":"CASB; soluciones de seguridad en la nube"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1257 size-full\" src=\"http:\/\/intelisis.com\/blog\/wp-content\/uploads\/2018\/09\/casb.jpg\" alt=\"CASB ciberseguridad\" width=\"1024\" height=\"512\" srcset=\"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2018\/09\/casb.jpg 1024w, https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2018\/09\/casb-500x250.jpg 500w, https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2018\/09\/casb-700x350.jpg 700w, https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2018\/09\/casb-300x150.jpg 300w, https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2018\/09\/casb-768x384.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p align=\"justify\">El modelo de servicio de la nube se refiere al uso de softwares que almacenan y gestionan en servidores de terceros su informaci\u00f3n y bases de datos, es por esta raz\u00f3n por la que los proveedores de CASB suelen enfocarse en brindar medidas de protecci\u00f3n ante los ciberataques a los que se pueden enfrentar y estas herramientas pueden ser manejadas desde la misma organizaci\u00f3n.<\/p>\n<p align=\"justify\">Los Agentes de Seguridad para el Acceso a la Nube (CASB por sus siglas en ingl\u00e9s), son herramientas de software que otorgan seguridad a los servidores que se encuentran albergados en la nube, protegi\u00e9ndolos de los ataques hacia sus infraestructuras y los datos albergados en las mismas.<\/p>\n<p align=\"justify\">Los CASB son los intermediarios entre la nube y sus usuarios, para poder promover la visibilidad y seguridad de la informaci\u00f3n que es almacenada, esto con el objetivo de prevenir cualquier fuga, cifrado, entre otras cosas, y as\u00ed tener un control \u00f3ptimo sobre el acceso a los datos.<\/p>\n<p align=\"justify\">Estos softwares cuentan con mecanismos proxy sobre los que es construida la herramienta, y es por medio de estos que se puede inspeccionar el tr\u00e1fico generado hacia la nube, permitiendo detectar las actividades anormales y brindando a los usuarios la oportunidad de utilizar los servicios de manera sencilla y segura.<\/p>\n<p align=\"justify\">Estas herramientas no s\u00f3lo consideran la protecci\u00f3n respecto al acceso a la nube y a la informaci\u00f3n que esta alberga, sino considera su aplicaci\u00f3n desde el momento en el que la base de datos es creada, es decir, desde el momento en el que el usuario accede y transfiere la informaci\u00f3n a la nube.<\/p>\n<p align=\"justify\">Su implementaci\u00f3n suele tener un impacto directo en los procesos internos de cualquier empresa, y estas soluciones deben ser adaptadas a las necesidades y particularidades de cada organizaci\u00f3n que contrate los servicios, es por esto que en la actualidad este sector se encuentra en crecimiento y en la constante b\u00fasqueda en la mejora de la experiencia de los usuarios que tienen contacto con esta tecnolog\u00eda.<\/p>\n\n\n<div class=\"kk-star-ratings kksr-auto kksr-align-center kksr-valign-bottom\"\n    data-payload='{&quot;align&quot;:&quot;center&quot;,&quot;id&quot;:&quot;1256&quot;,&quot;slug&quot;:&quot;default&quot;,&quot;valign&quot;:&quot;bottom&quot;,&quot;ignore&quot;:&quot;&quot;,&quot;reference&quot;:&quot;auto&quot;,&quot;class&quot;:&quot;&quot;,&quot;count&quot;:&quot;0&quot;,&quot;legendonly&quot;:&quot;&quot;,&quot;readonly&quot;:&quot;&quot;,&quot;score&quot;:&quot;0&quot;,&quot;starsonly&quot;:&quot;&quot;,&quot;best&quot;:&quot;5&quot;,&quot;gap&quot;:&quot;5&quot;,&quot;greet&quot;:&quot;Califica post&quot;,&quot;legend&quot;:&quot;0\\\/5 - (0 votes)&quot;,&quot;size&quot;:&quot;15&quot;,&quot;title&quot;:&quot;CASB; soluciones de seguridad en la nube&quot;,&quot;width&quot;:&quot;0&quot;,&quot;_legend&quot;:&quot;{score}\\\/{best} - ({count} {votes})&quot;,&quot;font_factor&quot;:&quot;1.25&quot;}'>\n            \n<div class=\"kksr-stars\">\n    \n<div class=\"kksr-stars-inactive\">\n            <div class=\"kksr-star\" data-star=\"1\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"2\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"3\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"4\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"5\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n    <\/div>\n    \n<div class=\"kksr-stars-active\" style=\"width: 0px;\">\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n    <\/div>\n<\/div>\n                \n\n<div class=\"kksr-legend\" style=\"font-size: 12px;\">\n            <span class=\"kksr-muted\">Califica post<\/span>\n    <\/div>\n    <\/div>\n","protected":false},"excerpt":{"rendered":"<p>El modelo de servicio de la nube se refiere al uso de softwares que almacenan y gestionan en servidores de terceros su informaci\u00f3n y bases de datos, es por esta raz\u00f3n por la que los proveedores de CASB suelen enfocarse en brindar medidas de protecci\u00f3n ante los ciberataques a los que se pueden enfrentar y [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":1257,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[260,13,14,246],"class_list":["post-1256","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industrias","tag-casb","tag-erp","tag-intelisis","tag-seguridad-cibernetica"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CASB; soluciones de seguridad en la nube - Intelisis Blog<\/title>\n<meta name=\"description\" content=\"CASB son softwares que brindan protecci\u00f3n ante los ciberataques a los que se puede enfrentar una empresa y pueden ser manejadas dentro de la misma.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intelisis.com\/blog\/casb_seguridad-en-la-nube\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CASB; soluciones de seguridad en la nube\" \/>\n<meta property=\"og:description\" content=\"CASB son softwares que brindan protecci\u00f3n ante los ciberataques a los que se puede enfrentar una empresa y pueden ser manejadas dentro de la misma.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intelisis.com\/blog\/casb_seguridad-en-la-nube\/\" \/>\n<meta property=\"og:site_name\" content=\"Intelisis Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Intelisis\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-05T17:04:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2018\/09\/casb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"IntelisisMx\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@IntelisisCorp\" \/>\n<meta name=\"twitter:site\" content=\"@IntelisisCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"IntelisisMx\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/casb_seguridad-en-la-nube\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/casb_seguridad-en-la-nube\\\/\"},\"author\":{\"name\":\"IntelisisMx\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#\\\/schema\\\/person\\\/f6b0fe69076f2e97113f967cfc2f385f\"},\"headline\":\"CASB; soluciones de seguridad en la nube\",\"datePublished\":\"2018-09-05T17:04:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/casb_seguridad-en-la-nube\\\/\"},\"wordCount\":352,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/casb_seguridad-en-la-nube\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/casb.jpg\",\"keywords\":[\"CASB\",\"ERP\",\"Intelisis\",\"Seguridad cibern\u00e9tica\"],\"articleSection\":[\"Industrias\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/casb_seguridad-en-la-nube\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/casb_seguridad-en-la-nube\\\/\",\"url\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/casb_seguridad-en-la-nube\\\/\",\"name\":\"CASB; soluciones de seguridad en la nube - Intelisis Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/casb_seguridad-en-la-nube\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/casb_seguridad-en-la-nube\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/casb.jpg\",\"datePublished\":\"2018-09-05T17:04:05+00:00\",\"description\":\"CASB son softwares que brindan protecci\u00f3n ante los ciberataques a los que se puede enfrentar una empresa y pueden ser manejadas dentro de la misma.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/casb_seguridad-en-la-nube\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/casb_seguridad-en-la-nube\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/casb_seguridad-en-la-nube\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/casb.jpg\",\"contentUrl\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/casb.jpg\",\"width\":1024,\"height\":512,\"caption\":\"CASB ciberseguridad\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/casb_seguridad-en-la-nube\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CASB; soluciones de seguridad en la nube\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/\",\"name\":\"Blog Intelisis Software\",\"description\":\"Informaci&oacute;n de valor sobre ERP y tendencias tecnol&oacute;gicas\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#organization\",\"name\":\"Intelisis Software\",\"url\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/logo_intelisis_.png\",\"contentUrl\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/logo_intelisis_.png\",\"width\":1133,\"height\":326,\"caption\":\"Intelisis Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Intelisis\\\/\",\"https:\\\/\\\/x.com\\\/IntelisisCorp\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/intelisis-sa-de-cv\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRFKIq10T-foPWN4hN2Jhrg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#\\\/schema\\\/person\\\/f6b0fe69076f2e97113f967cfc2f385f\",\"name\":\"IntelisisMx\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3a62493c8f0a6cbeb44a5e9891b59832a8bb99768ef172a0b427705b1b2c0fb4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3a62493c8f0a6cbeb44a5e9891b59832a8bb99768ef172a0b427705b1b2c0fb4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3a62493c8f0a6cbeb44a5e9891b59832a8bb99768ef172a0b427705b1b2c0fb4?s=96&d=mm&r=g\",\"caption\":\"IntelisisMx\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CASB; soluciones de seguridad en la nube - Intelisis Blog","description":"CASB son softwares que brindan protecci\u00f3n ante los ciberataques a los que se puede enfrentar una empresa y pueden ser manejadas dentro de la misma.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intelisis.com\/blog\/casb_seguridad-en-la-nube\/","og_locale":"es_MX","og_type":"article","og_title":"CASB; soluciones de seguridad en la nube","og_description":"CASB son softwares que brindan protecci\u00f3n ante los ciberataques a los que se puede enfrentar una empresa y pueden ser manejadas dentro de la misma.","og_url":"https:\/\/www.intelisis.com\/blog\/casb_seguridad-en-la-nube\/","og_site_name":"Intelisis Blog","article_publisher":"https:\/\/www.facebook.com\/Intelisis\/","article_published_time":"2018-09-05T17:04:05+00:00","og_image":[{"width":1024,"height":512,"url":"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2018\/09\/casb.jpg","type":"image\/jpeg"}],"author":"IntelisisMx","twitter_card":"summary_large_image","twitter_creator":"@IntelisisCorp","twitter_site":"@IntelisisCorp","twitter_misc":{"Escrito por":"IntelisisMx","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intelisis.com\/blog\/casb_seguridad-en-la-nube\/#article","isPartOf":{"@id":"https:\/\/www.intelisis.com\/blog\/casb_seguridad-en-la-nube\/"},"author":{"name":"IntelisisMx","@id":"https:\/\/www.intelisis.com\/blog\/#\/schema\/person\/f6b0fe69076f2e97113f967cfc2f385f"},"headline":"CASB; soluciones de seguridad en la nube","datePublished":"2018-09-05T17:04:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intelisis.com\/blog\/casb_seguridad-en-la-nube\/"},"wordCount":352,"commentCount":0,"publisher":{"@id":"https:\/\/www.intelisis.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.intelisis.com\/blog\/casb_seguridad-en-la-nube\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2018\/09\/casb.jpg","keywords":["CASB","ERP","Intelisis","Seguridad cibern\u00e9tica"],"articleSection":["Industrias"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intelisis.com\/blog\/casb_seguridad-en-la-nube\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.intelisis.com\/blog\/casb_seguridad-en-la-nube\/","url":"https:\/\/www.intelisis.com\/blog\/casb_seguridad-en-la-nube\/","name":"CASB; soluciones de seguridad en la nube - Intelisis Blog","isPartOf":{"@id":"https:\/\/www.intelisis.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intelisis.com\/blog\/casb_seguridad-en-la-nube\/#primaryimage"},"image":{"@id":"https:\/\/www.intelisis.com\/blog\/casb_seguridad-en-la-nube\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2018\/09\/casb.jpg","datePublished":"2018-09-05T17:04:05+00:00","description":"CASB son softwares que brindan protecci\u00f3n ante los ciberataques a los que se puede enfrentar una empresa y pueden ser manejadas dentro de la misma.","breadcrumb":{"@id":"https:\/\/www.intelisis.com\/blog\/casb_seguridad-en-la-nube\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intelisis.com\/blog\/casb_seguridad-en-la-nube\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.intelisis.com\/blog\/casb_seguridad-en-la-nube\/#primaryimage","url":"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2018\/09\/casb.jpg","contentUrl":"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2018\/09\/casb.jpg","width":1024,"height":512,"caption":"CASB ciberseguridad"},{"@type":"BreadcrumbList","@id":"https:\/\/www.intelisis.com\/blog\/casb_seguridad-en-la-nube\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/www.intelisis.com\/blog\/"},{"@type":"ListItem","position":2,"name":"CASB; soluciones de seguridad en la nube"}]},{"@type":"WebSite","@id":"https:\/\/www.intelisis.com\/blog\/#website","url":"https:\/\/www.intelisis.com\/blog\/","name":"Blog Intelisis Software","description":"Informaci&oacute;n de valor sobre ERP y tendencias tecnol&oacute;gicas","publisher":{"@id":"https:\/\/www.intelisis.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intelisis.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.intelisis.com\/blog\/#organization","name":"Intelisis Software","url":"https:\/\/www.intelisis.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.intelisis.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2023\/08\/logo_intelisis_.png","contentUrl":"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2023\/08\/logo_intelisis_.png","width":1133,"height":326,"caption":"Intelisis Software"},"image":{"@id":"https:\/\/www.intelisis.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Intelisis\/","https:\/\/x.com\/IntelisisCorp","https:\/\/www.linkedin.com\/company\/intelisis-sa-de-cv\/","https:\/\/www.youtube.com\/channel\/UCRFKIq10T-foPWN4hN2Jhrg"]},{"@type":"Person","@id":"https:\/\/www.intelisis.com\/blog\/#\/schema\/person\/f6b0fe69076f2e97113f967cfc2f385f","name":"IntelisisMx","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/3a62493c8f0a6cbeb44a5e9891b59832a8bb99768ef172a0b427705b1b2c0fb4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3a62493c8f0a6cbeb44a5e9891b59832a8bb99768ef172a0b427705b1b2c0fb4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3a62493c8f0a6cbeb44a5e9891b59832a8bb99768ef172a0b427705b1b2c0fb4?s=96&d=mm&r=g","caption":"IntelisisMx"}}]}},"amp_enabled":true,"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/posts\/1256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/comments?post=1256"}],"version-history":[{"count":1,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/posts\/1256\/revisions"}],"predecessor-version":[{"id":1258,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/posts\/1256\/revisions\/1258"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/media\/1257"}],"wp:attachment":[{"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/media?parent=1256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/categories?post=1256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/tags?post=1256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}