{"id":1399,"date":"2019-01-30T10:22:27","date_gmt":"2019-01-30T16:22:27","guid":{"rendered":"http:\/\/intelisis.com\/blog\/?p=1399"},"modified":"2022-08-11T15:30:16","modified_gmt":"2022-08-11T20:30:16","slug":"que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno","status":"publish","type":"post","link":"https:\/\/www.intelisis.com\/blog\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\/","title":{"rendered":"\u00bfQu\u00e9 es un per\u00edmetro definido por software  y por qu\u00e9 necesito uno?"},"content":{"rendered":"\n<p>\u00bfAcaso tu compa\u00f1\u00eda est\u00e1 protegida? \u00bfPuedes asegurar que tu computadora no es el objetivo de un ataque cibern\u00e9tico? Si no es as\u00ed, es momento de considerar un per\u00edmetro definido por software (SDP). Este software hace que los usuarios y dispositivos sean invisibles e inaccesibles a los ataques externos. <\/p>\n\n\n\n<p>Existe como alternativa a la tecnolog\u00eda VPN, el SDP puede implementarse en centros de datos, sucursales, rampas de acceso a internet y centros de alojamiento para proporcionar una cobertura de seguridad integral. El per\u00edmetro definido por software permite el aislamiento del servicio que no expone directamente a los usuarios, dispositivos y aplicaciones a internet.<\/p>\n\n\n\n<p>El objetivo del per\u00edmetro definido por software es eliminar los dispositivos y aplicaciones conectados a internet de la visibilidad p\u00fablica y reducir el \u00e1rea de superficie para el ataque. SDP usa una autenticaci\u00f3n y autorizaci\u00f3n previa para crear redes que son invisibles para los atacantes externos. Los usuarios solo tienen acceso a las aplicaciones autorizadas para reducir las amenazas de dispositivos comprometidos.<\/p>\n\n\n\n<p>Las arquitecturas tradicionales de seguridad de red con\nper\u00edmetros endurecidos y sin acceso directo a internet (zonas desmilitarizadas)\nse han vuelto obsoletas. Las VPNs proporcionan solo una protecci\u00f3n de seguridad\nlimitada. Como la mayor\u00eda de los ataques se originan en el internet p\u00fablico y\nlos atacantes se enfocar\u00e1n en cualquier superficie expuesta, los equipos de TI\ny de seguridad deben implementar nuevos modelos de seguridad basados \u200b\u200ben la\noscuridad. El per\u00edmetro definido por software proporciona la capacidad de crear\nredes privadas de superposici\u00f3n virtual que est\u00e1n ocultas del internet\nsubyacente.<\/p>\n\n\n\n<p>Y ustedes \u00bfya tienen protegida su red? De no ser as\u00ed, les recomendamos a compa\u00f1\u00edas que les pueden ayudar con su seguridad, como Citrix, Cradlepoint, Pulse Secure, Vidder y Zscaler, entre otros.<\/p>\n\n\n<div class=\"kk-star-ratings kksr-auto kksr-align-center kksr-valign-bottom\"\n    data-payload='{&quot;align&quot;:&quot;center&quot;,&quot;id&quot;:&quot;1399&quot;,&quot;slug&quot;:&quot;default&quot;,&quot;valign&quot;:&quot;bottom&quot;,&quot;ignore&quot;:&quot;&quot;,&quot;reference&quot;:&quot;auto&quot;,&quot;class&quot;:&quot;&quot;,&quot;count&quot;:&quot;0&quot;,&quot;legendonly&quot;:&quot;&quot;,&quot;readonly&quot;:&quot;&quot;,&quot;score&quot;:&quot;0&quot;,&quot;starsonly&quot;:&quot;&quot;,&quot;best&quot;:&quot;5&quot;,&quot;gap&quot;:&quot;5&quot;,&quot;greet&quot;:&quot;Califica post&quot;,&quot;legend&quot;:&quot;0\\\/5 - (0 votes)&quot;,&quot;size&quot;:&quot;15&quot;,&quot;title&quot;:&quot;\u00bfQu\u00e9 es un per\u00edmetro definido por software  y por qu\u00e9 necesito uno?&quot;,&quot;width&quot;:&quot;0&quot;,&quot;_legend&quot;:&quot;{score}\\\/{best} - ({count} {votes})&quot;,&quot;font_factor&quot;:&quot;1.25&quot;}'>\n            \n<div class=\"kksr-stars\">\n    \n<div class=\"kksr-stars-inactive\">\n            <div class=\"kksr-star\" data-star=\"1\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"2\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"3\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"4\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"5\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n    <\/div>\n    \n<div class=\"kksr-stars-active\" style=\"width: 0px;\">\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n    <\/div>\n<\/div>\n                \n\n<div class=\"kksr-legend\" style=\"font-size: 12px;\">\n            <span class=\"kksr-muted\">Califica post<\/span>\n    <\/div>\n    <\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u00bfAcaso tu compa\u00f1\u00eda est\u00e1 protegida? \u00bfPuedes asegurar que tu computadora no es el objetivo de un ataque cibern\u00e9tico? Si no es as\u00ed, es momento de considerar un per\u00edmetro definido por software (SDP). Este software hace que los usuarios y dispositivos sean invisibles e inaccesibles a los ataques externos. <\/p>\n","protected":false},"author":19,"featured_media":2866,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1399","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tecnologia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\u00bfQu\u00e9 es un per\u00edmetro definido por software y por qu\u00e9 necesito uno? - Intelisis Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intelisis.com\/blog\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfQu\u00e9 es un per\u00edmetro definido por software y por qu\u00e9 necesito uno?\" \/>\n<meta property=\"og:description\" content=\"\u00bfAcaso tu compa\u00f1\u00eda est\u00e1 protegida? \u00bfPuedes asegurar que tu computadora no es el objetivo de un ataque cibern\u00e9tico? Si no es as\u00ed, es momento de considerar un per\u00edmetro definido por software (SDP). Este software hace que los usuarios y dispositivos sean invisibles e inaccesibles a los ataques externos.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intelisis.com\/blog\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\/\" \/>\n<meta property=\"og:site_name\" content=\"Intelisis Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Intelisis\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-30T16:22:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-11T20:30:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2019\/01\/AdobeStock_92323963-compressor-1024x662-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"662\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Intelisis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@IntelisisCorp\" \/>\n<meta name=\"twitter:site\" content=\"@IntelisisCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Intelisis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\\\/\"},\"author\":{\"name\":\"Intelisis\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#\\\/schema\\\/person\\\/00d44b0c56ac865a77583094112e890b\"},\"headline\":\"\u00bfQu\u00e9 es un per\u00edmetro definido por software y por qu\u00e9 necesito uno?\",\"datePublished\":\"2019-01-30T16:22:27+00:00\",\"dateModified\":\"2022-08-11T20:30:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\\\/\"},\"wordCount\":317,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/AdobeStock_92323963-compressor-1024x662-1.jpeg\",\"articleSection\":[\"Tecnolog\u00eda\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\\\/\",\"url\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\\\/\",\"name\":\"\u00bfQu\u00e9 es un per\u00edmetro definido por software y por qu\u00e9 necesito uno? - Intelisis Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/AdobeStock_92323963-compressor-1024x662-1.jpeg\",\"datePublished\":\"2019-01-30T16:22:27+00:00\",\"dateModified\":\"2022-08-11T20:30:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/AdobeStock_92323963-compressor-1024x662-1.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/AdobeStock_92323963-compressor-1024x662-1.jpeg\",\"width\":1024,\"height\":662,\"caption\":\"Software\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfQu\u00e9 es un per\u00edmetro definido por software y por qu\u00e9 necesito uno?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/\",\"name\":\"Blog Intelisis Software\",\"description\":\"Informaci&oacute;n de valor sobre ERP y tendencias tecnol&oacute;gicas\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#organization\",\"name\":\"Intelisis Software\",\"url\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/logo_intelisis_.png\",\"contentUrl\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/logo_intelisis_.png\",\"width\":1133,\"height\":326,\"caption\":\"Intelisis Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Intelisis\\\/\",\"https:\\\/\\\/x.com\\\/IntelisisCorp\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/intelisis-sa-de-cv\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRFKIq10T-foPWN4hN2Jhrg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#\\\/schema\\\/person\\\/00d44b0c56ac865a77583094112e890b\",\"name\":\"Intelisis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9b992b67a8defa2dc50cc9be029a3f9d992af431fb4fa84bdec8767de82fe367?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9b992b67a8defa2dc50cc9be029a3f9d992af431fb4fa84bdec8767de82fe367?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9b992b67a8defa2dc50cc9be029a3f9d992af431fb4fa84bdec8767de82fe367?s=96&d=mm&r=g\",\"caption\":\"Intelisis\"},\"sameAs\":[\"https:\\\/\\\/www.intelisis.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u00bfQu\u00e9 es un per\u00edmetro definido por software y por qu\u00e9 necesito uno? - Intelisis Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intelisis.com\/blog\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\/","og_locale":"es_MX","og_type":"article","og_title":"\u00bfQu\u00e9 es un per\u00edmetro definido por software y por qu\u00e9 necesito uno?","og_description":"\u00bfAcaso tu compa\u00f1\u00eda est\u00e1 protegida? \u00bfPuedes asegurar que tu computadora no es el objetivo de un ataque cibern\u00e9tico? Si no es as\u00ed, es momento de considerar un per\u00edmetro definido por software (SDP). Este software hace que los usuarios y dispositivos sean invisibles e inaccesibles a los ataques externos.","og_url":"https:\/\/www.intelisis.com\/blog\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\/","og_site_name":"Intelisis Blog","article_publisher":"https:\/\/www.facebook.com\/Intelisis\/","article_published_time":"2019-01-30T16:22:27+00:00","article_modified_time":"2022-08-11T20:30:16+00:00","og_image":[{"width":1024,"height":662,"url":"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2019\/01\/AdobeStock_92323963-compressor-1024x662-1.jpeg","type":"image\/jpeg"}],"author":"Intelisis","twitter_card":"summary_large_image","twitter_creator":"@IntelisisCorp","twitter_site":"@IntelisisCorp","twitter_misc":{"Escrito por":"Intelisis","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intelisis.com\/blog\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\/#article","isPartOf":{"@id":"https:\/\/www.intelisis.com\/blog\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\/"},"author":{"name":"Intelisis","@id":"https:\/\/www.intelisis.com\/blog\/#\/schema\/person\/00d44b0c56ac865a77583094112e890b"},"headline":"\u00bfQu\u00e9 es un per\u00edmetro definido por software y por qu\u00e9 necesito uno?","datePublished":"2019-01-30T16:22:27+00:00","dateModified":"2022-08-11T20:30:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intelisis.com\/blog\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\/"},"wordCount":317,"commentCount":0,"publisher":{"@id":"https:\/\/www.intelisis.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.intelisis.com\/blog\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2019\/01\/AdobeStock_92323963-compressor-1024x662-1.jpeg","articleSection":["Tecnolog\u00eda"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intelisis.com\/blog\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.intelisis.com\/blog\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\/","url":"https:\/\/www.intelisis.com\/blog\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\/","name":"\u00bfQu\u00e9 es un per\u00edmetro definido por software y por qu\u00e9 necesito uno? - Intelisis Blog","isPartOf":{"@id":"https:\/\/www.intelisis.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intelisis.com\/blog\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\/#primaryimage"},"image":{"@id":"https:\/\/www.intelisis.com\/blog\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2019\/01\/AdobeStock_92323963-compressor-1024x662-1.jpeg","datePublished":"2019-01-30T16:22:27+00:00","dateModified":"2022-08-11T20:30:16+00:00","breadcrumb":{"@id":"https:\/\/www.intelisis.com\/blog\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intelisis.com\/blog\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.intelisis.com\/blog\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\/#primaryimage","url":"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2019\/01\/AdobeStock_92323963-compressor-1024x662-1.jpeg","contentUrl":"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2019\/01\/AdobeStock_92323963-compressor-1024x662-1.jpeg","width":1024,"height":662,"caption":"Software"},{"@type":"BreadcrumbList","@id":"https:\/\/www.intelisis.com\/blog\/que-es-un-perimetro-definido-por-software-y-por-que-necesito-uno\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/www.intelisis.com\/blog\/"},{"@type":"ListItem","position":2,"name":"\u00bfQu\u00e9 es un per\u00edmetro definido por software y por qu\u00e9 necesito uno?"}]},{"@type":"WebSite","@id":"https:\/\/www.intelisis.com\/blog\/#website","url":"https:\/\/www.intelisis.com\/blog\/","name":"Blog Intelisis Software","description":"Informaci&oacute;n de valor sobre ERP y tendencias tecnol&oacute;gicas","publisher":{"@id":"https:\/\/www.intelisis.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intelisis.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.intelisis.com\/blog\/#organization","name":"Intelisis Software","url":"https:\/\/www.intelisis.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.intelisis.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2023\/08\/logo_intelisis_.png","contentUrl":"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2023\/08\/logo_intelisis_.png","width":1133,"height":326,"caption":"Intelisis Software"},"image":{"@id":"https:\/\/www.intelisis.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Intelisis\/","https:\/\/x.com\/IntelisisCorp","https:\/\/www.linkedin.com\/company\/intelisis-sa-de-cv\/","https:\/\/www.youtube.com\/channel\/UCRFKIq10T-foPWN4hN2Jhrg"]},{"@type":"Person","@id":"https:\/\/www.intelisis.com\/blog\/#\/schema\/person\/00d44b0c56ac865a77583094112e890b","name":"Intelisis","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/9b992b67a8defa2dc50cc9be029a3f9d992af431fb4fa84bdec8767de82fe367?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9b992b67a8defa2dc50cc9be029a3f9d992af431fb4fa84bdec8767de82fe367?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9b992b67a8defa2dc50cc9be029a3f9d992af431fb4fa84bdec8767de82fe367?s=96&d=mm&r=g","caption":"Intelisis"},"sameAs":["https:\/\/www.intelisis.com"]}]}},"amp_enabled":true,"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/posts\/1399","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/comments?post=1399"}],"version-history":[{"count":2,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/posts\/1399\/revisions"}],"predecessor-version":[{"id":2868,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/posts\/1399\/revisions\/2868"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/media\/2866"}],"wp:attachment":[{"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/media?parent=1399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/categories?post=1399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/tags?post=1399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}