{"version":"1.0","provider_name":"OSTEC | Seguran\u00e7a digital de resultados","provider_url":"https:\/\/ostec.blog\/es\/","author_name":"Alejandra Villanueva","author_url":"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/","title":"Firewall UTM, todo lo que debe saber - OSTEC | Seguran\u00e7a digital de resultados","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Yo7iLz5OXA\"><a href=\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/firewall-utm-todo-lo-que-debe-saber\/\">Firewall UTM, todo lo que debe saber<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/firewall-utm-todo-lo-que-debe-saber\/embed\/#?secret=Yo7iLz5OXA\" width=\"600\" height=\"338\" title=\"\u00abFirewall UTM, todo lo que debe saber\u00bb \u2014 OSTEC | Seguran\u00e7a digital de resultados\" data-secret=\"Yo7iLz5OXA\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/04\/Appliance-OSTEC.jpg","thumbnail_width":928,"thumbnail_height":534,"description":"El concepto de Firewall es bien antiguo, surgi\u00f3 al final de los a\u00f1os 80, cuando el Internet era una tecnolog\u00eda relativamente nueva. Con la popularizaci\u00f3n del internet, principalmente despu\u00e9s de la mitad de la d\u00e9cada de los 90, surgieron nuevos desaf\u00edos de seguridad digital. Eso exigi\u00f3 que la tecnolog\u00eda detr\u00e1s de las soluciones de firewall [&hellip;]"}