{"id":47289,"date":"2014-09-25T00:00:00","date_gmt":"2014-09-24T23:00:00","guid":{"rendered":"https:\/\/www.colt.net\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/"},"modified":"2014-09-25T00:00:00","modified_gmt":"2014-09-24T23:00:00","slug":"seguridad-y-cloud-un-binomio-imprescindible","status":"publish","type":"post","link":"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/","title":{"rendered":"Seguridad y cloud: un binomio imprescindible"},"content":{"rendered":"<p>Las \u00faltimas noticias sobre la publicaci\u00f3n en Twitter de fotos privadas de actrices de Hollywood, que en las redes empieza a ser conocido como Celebgate -juego de palabras a partir de celebrity y Watergate- ha puesto en primera plana de medio mundo el debate sobre la seguridad de la nube. El fallo de seguridad en iCloud, es un ejemplo m\u00e1s de los riesgos a los que se expone cualquier informaci\u00f3n almacenada en la nube, tanto personal como corporativa, porque desde luego las empresas son menos ajenas que nadie a los retos de seguridad que supone la nube.<\/p>\n<p>Los datos demuestran esta creciente preocupaci\u00f3n, seg\u00fan Gartner, el gasto en seguridad de la informaci\u00f3n en 2014 alcanzar\u00e1 los 71.100 millones de d\u00f3lares, un 7,9% m\u00e1s que el pasado 2013, y este crecimiento ser\u00e1 incluso mayor en 2015, cuando dicha inversi\u00f3n superar\u00e1 los 76.900 millones, con un incremento del 8,2%.<\/p>\n<p>Seg\u00fan la propia Gartner, esto es debido a la creciente preocupaci\u00f3n de las empresas por la seguridad en los entornos de movilidad y redes sociales pero sobre todo a la r\u00e1pida adopci\u00f3n de servicios y soluciones en la nube.<\/p>\n<p>La nube, despu\u00e9s de a\u00f1os de hablar sobre su potencial desarrollo y crecimiento, es ya una realidad en muchas organizaciones de todo el mundo. Pero los retos de seguridad, especialmente de la nube p\u00fablica, siguen estando presentes. Por eso seg\u00fan la consultora, la nube es la principal tendencia para entender el futuro de la seguridad TI; en un doble sentido, por un lado, la creciente adopci\u00f3n de servicios en la nube crea nuevas necesidades de seguridad por otro muchas de las soluciones de seguridad en el futuro se prestar\u00e1n desde la nube. En ese sentido, m\u00e1s del 10% de las soluciones de seguridad TI se prestar\u00e1n desde la nube el pr\u00f3ximo a\u00f1o y m\u00e1s del 30% de las herramientas de seguridad para peque\u00f1as o medianas empresas desplegadas en 2015 estar\u00e1n tambi\u00e9n basadas en la nube.<\/p>\n<p>Las empresas deben ser conscientes de que tener un problema de seguridad puede costarles miles de euros en p\u00e9rdida de negocio y productividad y puede incluso llevar a la quiebra a su negocio . Sin embargo, siempre que se tomen las medidas de seguridad apropiadas, la nube puede compensarles desde los puntos de vista del ahorro y la flexibilidad. Despu\u00e9s de todo, incluso si tiene una infraestructura propia es probable que necesite ser accesible desde Internet de modo que la seguridad ya deber\u00eda de ser una cuesti\u00f3n prioritaria para su negocio.<\/p>\n<p>De esta forma el binomio nube-seguridad ser\u00e1 fundamental para entender la tecnolog\u00eda corporativa de los pr\u00f3ximos a\u00f1os, en Colt tambi\u00e9n lo entendemos as\u00ed y por eso ofrecemos una amplia gama de servicios de seguridad que permitir\u00e1n a su organizaci\u00f3n una administraci\u00f3n m\u00e1s sencilla, gesti\u00f3n unificada de las distintas herramientas, actualizaciones autom\u00e1ticas y optimizaci\u00f3n de las distintas capas de seguridad. Si quiere saber m\u00e1s sobre nuestros servicios en el \u00e1rea de seguridad puede seguir leyendo <a title=\"Seguridad\" href=\"https:\/\/legacy.colt.net\/es\/es\/products-services\/security-services\/\" target=\"_blank\" rel=\"noopener noreferrer\">aqu\u00ed.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Las \u00faltimas noticias sobre la publicaci\u00f3n en Twitter de fotos privadas de actrices de Hollywood, que en las redes empieza a ser conocido como Celebgate -juego de palabras a partir de celebrity y Watergate- ha puesto en primera plana de medio mundo el debate sobre la seguridad de la nube. El fallo de seguridad en&#8230;<\/p>\n","protected":false},"author":112,"featured_media":47290,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"colt_type":[],"colt_ind":[],"colt_products":[],"colt_solutions":[],"class_list":["post-47289","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Seguridad y cloud: un binomio imprescindible - Colt Technology Services<\/title>\n<meta name=\"description\" content=\"Seguridad y cloud: un binomio imprescindible Colt Technology Services\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seguridad y cloud: un binomio imprescindible - Colt Technology Services\" \/>\n<meta property=\"og:description\" content=\"Seguridad y cloud: un binomio imprescindible Colt Technology Services\" \/>\n<meta property=\"og:url\" content=\"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/\" \/>\n<meta property=\"og:site_name\" content=\"Colt Technology Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ColtTechnologyServices\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-24T23:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/CO_003_Cables.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"541\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Make Do\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/CO_003_Cables.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@colt_technology\" \/>\n<meta name=\"twitter:site\" content=\"@colt_technology\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Make Do\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/\"},\"author\":{\"name\":\"Make Do\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/person\/71cb803a99c6757c1c6940a6f0683e57\"},\"headline\":\"Seguridad y cloud: un binomio imprescindible\",\"datePublished\":\"2014-09-24T23:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/\"},\"wordCount\":525,\"publisher\":{\"@id\":\"https:\/\/legacy.colt.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/CO_003_Cables.jpg\",\"articleSection\":[\"Seguridad\"],\"inLanguage\":\"es-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/\",\"url\":\"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/\",\"name\":\"Seguridad y cloud: un binomio imprescindible - Colt Technology Services\",\"isPartOf\":{\"@id\":\"https:\/\/legacy.colt.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/CO_003_Cables.jpg\",\"datePublished\":\"2014-09-24T23:00:00+00:00\",\"description\":\"Seguridad y cloud: un binomio imprescindible Colt Technology Services\",\"breadcrumb\":{\"@id\":\"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/#primaryimage\",\"url\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/CO_003_Cables.jpg\",\"contentUrl\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/CO_003_Cables.jpg\",\"width\":541,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/legacy.colt.net\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguridad y cloud: un binomio imprescindible\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/legacy.colt.net\/#website\",\"url\":\"https:\/\/legacy.colt.net\/\",\"name\":\"Colt\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30b5\u30fc\u30d3\u30b9\u682a\u5f0f\u4f1a\u793e\",\"description\":\"Managed Network &amp; Voice Services Provider\",\"publisher\":{\"@id\":\"https:\/\/legacy.colt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/legacy.colt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/legacy.colt.net\/#organization\",\"name\":\"Colt Technology Services\",\"url\":\"https:\/\/legacy.colt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png\",\"contentUrl\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png\",\"width\":195,\"height\":77,\"caption\":\"Colt Technology Services\"},\"image\":{\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ColtTechnologyServices\/\",\"https:\/\/x.com\/colt_technology\",\"https:\/\/www.instagram.com\/colttechnologyservices\/\",\"https:\/\/www.linkedin.com\/company\/colt-technology-services\",\"https:\/\/www.youtube.com\/user\/ColtTechnology\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/person\/71cb803a99c6757c1c6940a6f0683e57\",\"name\":\"Make Do\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fe73597d3286e48e5f95eb7e1bd97ea091a03336686cad88ca44eadaa6287761?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fe73597d3286e48e5f95eb7e1bd97ea091a03336686cad88ca44eadaa6287761?s=96&d=mm&r=g\",\"caption\":\"Make Do\"},\"sameAs\":[\"https:\/\/makedo.net\"],\"url\":\"https:\/\/legacy.colt.net\/es\/resources\/author\/makedo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Seguridad y cloud: un binomio imprescindible - Colt Technology Services","description":"Seguridad y cloud: un binomio imprescindible Colt Technology Services","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"Seguridad y cloud: un binomio imprescindible - Colt Technology Services","og_description":"Seguridad y cloud: un binomio imprescindible Colt Technology Services","og_url":"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/","og_site_name":"Colt Technology Services","article_publisher":"https:\/\/www.facebook.com\/ColtTechnologyServices\/","article_published_time":"2014-09-24T23:00:00+00:00","og_image":[{"width":541,"height":360,"url":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/CO_003_Cables.jpg","type":"image\/jpeg"}],"author":"Make Do","twitter_card":"summary_large_image","twitter_image":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/CO_003_Cables.jpg","twitter_creator":"@colt_technology","twitter_site":"@colt_technology","twitter_misc":{"Written by":"Make Do","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/#article","isPartOf":{"@id":"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/"},"author":{"name":"Make Do","@id":"https:\/\/legacy.colt.net\/#\/schema\/person\/71cb803a99c6757c1c6940a6f0683e57"},"headline":"Seguridad y cloud: un binomio imprescindible","datePublished":"2014-09-24T23:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/"},"wordCount":525,"publisher":{"@id":"https:\/\/legacy.colt.net\/#organization"},"image":{"@id":"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/#primaryimage"},"thumbnailUrl":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/CO_003_Cables.jpg","articleSection":["Seguridad"],"inLanguage":"es-ES"},{"@type":"WebPage","@id":"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/","url":"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/","name":"Seguridad y cloud: un binomio imprescindible - Colt Technology Services","isPartOf":{"@id":"https:\/\/legacy.colt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/#primaryimage"},"image":{"@id":"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/#primaryimage"},"thumbnailUrl":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/CO_003_Cables.jpg","datePublished":"2014-09-24T23:00:00+00:00","description":"Seguridad y cloud: un binomio imprescindible Colt Technology Services","breadcrumb":{"@id":"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/#primaryimage","url":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/CO_003_Cables.jpg","contentUrl":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/03\/CO_003_Cables.jpg","width":541,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/legacy.colt.net\/es\/resources\/seguridad-y-cloud-un-binomio-imprescindible\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/legacy.colt.net\/es\/"},{"@type":"ListItem","position":2,"name":"Seguridad y cloud: un binomio imprescindible"}]},{"@type":"WebSite","@id":"https:\/\/legacy.colt.net\/#website","url":"https:\/\/legacy.colt.net\/","name":"Colt\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30b5\u30fc\u30d3\u30b9\u682a\u5f0f\u4f1a\u793e","description":"Managed Network &amp; Voice Services Provider","publisher":{"@id":"https:\/\/legacy.colt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/legacy.colt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/legacy.colt.net\/#organization","name":"Colt Technology Services","url":"https:\/\/legacy.colt.net\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/","url":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png","contentUrl":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png","width":195,"height":77,"caption":"Colt Technology Services"},"image":{"@id":"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ColtTechnologyServices\/","https:\/\/x.com\/colt_technology","https:\/\/www.instagram.com\/colttechnologyservices\/","https:\/\/www.linkedin.com\/company\/colt-technology-services","https:\/\/www.youtube.com\/user\/ColtTechnology"]},{"@type":"Person","@id":"https:\/\/legacy.colt.net\/#\/schema\/person\/71cb803a99c6757c1c6940a6f0683e57","name":"Make Do","image":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/legacy.colt.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fe73597d3286e48e5f95eb7e1bd97ea091a03336686cad88ca44eadaa6287761?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fe73597d3286e48e5f95eb7e1bd97ea091a03336686cad88ca44eadaa6287761?s=96&d=mm&r=g","caption":"Make Do"},"sameAs":["https:\/\/makedo.net"],"url":"https:\/\/legacy.colt.net\/es\/resources\/author\/makedo\/"}]}},"_links":{"self":[{"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/posts\/47289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/comments?post=47289"}],"version-history":[{"count":0,"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/posts\/47289\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/media\/47290"}],"wp:attachment":[{"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/media?parent=47289"}],"wp:term":[{"taxonomy":"colt_type","embeddable":true,"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/colt_type?post=47289"},{"taxonomy":"colt_ind","embeddable":true,"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/colt_ind?post=47289"},{"taxonomy":"colt_products","embeddable":true,"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/colt_products?post=47289"},{"taxonomy":"colt_solutions","embeddable":true,"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/colt_solutions?post=47289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}