{"id":61399,"date":"2015-11-03T10:27:26","date_gmt":"2015-11-03T09:27:26","guid":{"rendered":"http:\/\/e3mag.com\/?p=61399"},"modified":"2019-07-24T10:29:52","modified_gmt":"2019-07-24T08:29:52","slug":"ciberseguridad-y-gestion-de-vulnerabilidades","status":"publish","type":"post","link":"https:\/\/e3mag.com\/es\/cyber-security-und-vulnerability-management\/","title":{"rendered":"Ciberseguridad y gesti\u00f3n de vulnerabilidades"},"content":{"rendered":"<p>Al combinar esto con el software de optimizaci\u00f3n de licencias y las soluciones de preparaci\u00f3n de aplicaciones de Flexera, las empresas deber\u00edan poder protegerse mejor contra los ciberataques y mejorar la gesti\u00f3n de activos.<\/p>\n<p><em>\"El n\u00famero de ataques a la ciberseguridad aumenta constantemente. Por tanto, en el futuro, las empresas no solo tendr\u00e1n que gestionar estos riesgos de forma proactiva, sino tambi\u00e9n integrar el software de gesti\u00f3n de vulnerabilidades como componente central de los procesos de gesti\u00f3n del software\"<\/em><\/p>\n<p>explica Mark Bishof, Director General de Flexera Software.<\/p>\n<p><em>\"Con Secunia, ahora podemos ofrecer soluciones de software de gesti\u00f3n de vulnerabilidades que las empresas necesitan urgentemente. Al mismo tiempo, complementa de forma ideal nuestra cartera de software de optimizaci\u00f3n de licencias y preparaci\u00f3n de aplicaciones.\"<\/em><\/p>\n<p>Los ciberdelincuentes aprovechan regularmente las vulnerabilidades de seguridad del software para penetrar en la infraestructura inform\u00e1tica de una empresa. Utilizan conjuntos de herramientas populares no autorizadas para infectar m\u00e1quinas y llevar a cabo acciones maliciosas.<\/p>\n<p>Una violaci\u00f3n probada de la ciberseguridad suele costar a las empresas entre 2,5 y cinco millones de d\u00f3lares estadounidenses.<\/p>","protected":false},"excerpt":{"rendered":"<p>Flexera Software ha adquirido Secunia, proveedor l\u00edder de soluciones de software de gesti\u00f3n de vulnerabilidades.<\/p>","protected":false},"author":38,"featured_media":61274,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[6,1583],"tags":[8477],"coauthors":[19920],"class_list":["post-61399","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-wirtschaft","category-1583","tag-cyberkriminelle","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",1000,387,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",400,155,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-768x297.jpg",768,297,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",1000,387,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-100x39.jpg",100,39,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-480x186.jpg",480,186,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-640x248.jpg",640,248,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-720x279.jpg",720,279,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-960x372.jpg",960,372,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",1000,387,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",1000,387,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",1000,387,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",1000,387,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",1000,387,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",18,7,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",1000,387,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",1000,387,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",1000,387,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",600,232,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015.jpg",600,232,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2015-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Flexera Software hat Secunia, einen f\u00fchrenden Anbieter von Vulnerability-Management-Software-L\u00f6sungen, \u00fcbernommen.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/es\/category\/wirtschaft\/\" rel=\"category tag\">Wirtschaft<\/a>, <a href=\"https:\/\/e3mag.com\/es\/category\/1511\/\" rel=\"category tag\">MAG 15-11<\/a>","author_info_v2":{"name":"Revista E-3","url":"https:\/\/e3mag.com\/es\/author\/e-3-magazin\/"},"comments_num_v2":"0 comentarios","_links":{"self":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/61399","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/comments?post=61399"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/61399\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/media\/61274"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/media?parent=61399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/categories?post=61399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/tags?post=61399"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/coauthors?post=61399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}