{"version":"1.0","provider_name":"OSTEC | Seguran\u00e7a digital de resultados","provider_url":"https:\/\/ostec.blog\/es\/","author_name":"Alejandra Villanueva","author_url":"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/","title":"Principales recursos ofrecidos por el Firewall UTM - OSTEC | Seguran\u00e7a digital de resultados","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"u3kcUfWRuQ\"><a href=\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/principales-recursos-ofrecidos-por-el-firewall-utm\/\">Principales recursos ofrecidos por el Firewall UTM<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/principales-recursos-ofrecidos-por-el-firewall-utm\/embed\/#?secret=u3kcUfWRuQ\" width=\"600\" height=\"338\" title=\"\u00abPrincipales recursos ofrecidos por el Firewall UTM\u00bb \u2014 OSTEC | Seguran\u00e7a digital de resultados\" data-secret=\"u3kcUfWRuQ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/03\/cabos-conectados.jpg","thumbnail_width":928,"thumbnail_height":534,"description":"A trav\u00e9s de la aplicaci\u00f3n de recursos modernos de seguridad, el Firewall UTM permite que profesionales logren visualizar sobre los datos que trafican en la red corporativa, reduciendo la incidencia de acciones reactivas frente a siniestros de seguridad, incluyendo p\u00e9rdida o fuga de informaci\u00f3n y continuidad de los negocios. Adem\u00e1s, ofrece un costo bajo de [&hellip;]"}