{"id":564160,"date":"2024-11-18T10:29:21","date_gmt":"2024-11-18T09:29:21","guid":{"rendered":"https:\/\/www.capgemini.com\/es-es\/?post_type=research-and-insight&#038;p=564160"},"modified":"2025-03-12T07:50:12","modified_gmt":"2025-03-12T06:50:12","slug":"zero-trust-from-aspiration-to-rapid-implementation","status":"publish","type":"research-and-insight","link":"https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/","title":{"rendered":"Zero trust: de la aspiraci\u00f3n a la aplicaci\u00f3n"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-reusable header heroReusable  \"><div class=\"header-bgs\"><picture><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/09\/Zero-Trust-Security-web-banner-2024a.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/09\/Zero-Trust-Security-web-banner-2024a.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/09\/Zero-Trust-Security-web-banner-2024a.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/09\/Zero-Trust-Security-web-banner-2024a.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/09\/Zero-Trust-Security-web-banner-2024a.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/09\/Zero-Trust-Security-web-banner-2024a.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/09\/Zero-Trust-Security-web-banner-2024a.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/09\/Zero-Trust-Security-web-banner-2024a.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/09\/Zero-Trust-Security-web-banner-2024a.jpg\" class=\"header-img header-img-d\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"eager\"\/><\/picture><\/div><div class=\"heroPictureCardHeaderShape\"><\/div><div class=\"container\"><div class=\"row\"><div class=\"col-md-12\"><div class=\"box\"><div class=\"boxTagWrapper\"><div class=\"tagInfo\"><div><span class=\"box-tag\">Cybersecurity<\/span><\/div><\/div><\/div><div class=\"box-title\"><h1 data-maxlength=\"34\">Zero trust: de la aspiraci\u00f3n a la aplicaci\u00f3n<\/h1><\/div><div class=\"inner-row-insight download-btn\"><div class=\"col-md-4 downloadFiles addPadding\"><a class=\"button-download--small\" type=\"download\" href=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/09\/Zero-Trust-Security-POV-20240715a.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"abrir en una nueva ventana\"><span>Download PoV<\/span><span class=\"type\">3 MB  pdf<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/?post_type=research-and-insight&amp;p=1054053\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"abrir en una nueva ventana\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https:\/\/www.capgemini.com\/?post_type=research-and-insight&amp;p=1054053\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"abrir en una nueva ventana\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><div class=\"article-text article-quote-text\">\n<h3 class=\"wp-block-heading\" id=\"h-la-confianza-cero-es-la-necesidad-del-momento\"><strong>La confianza cero es la necesidad del momento<\/strong><\/h3>\n\n\n\n<p>La adopci\u00f3n generalizada de la nube, el trabajo remoto y el aumento de los ciberdelitos han hecho que los dispositivos sean cada vez m\u00e1s vulnerables a los ciberataques. Las organizaciones se han dado cuenta de que el modelo de seguridad tradicional ya no es suficiente. Las ciberdefensas deben ser m\u00e1s din\u00e1micas y contextualizadas para proteger sus activos. La confianza cero se ha convertido en una filosof\u00eda de ciberseguridad esencial.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-pasar-a-la-confianza-cero-tiene-ramificaciones-en-toda-la-organizacion\">Pasar a la confianza cero tiene ramificaciones en toda la organizaci\u00f3n<\/h4>\n\n\n\n<p>Adoptar un enfoque de seguridad de confianza cero requiere un modelo de gobernanza de la ciberseguridad que alimente los modelos y principios operativos, la arquitectura y el dise\u00f1o, los procesos y la tecnolog\u00eda. Esto exige un cambio en el comportamiento organizativo; muchas piezas m\u00f3viles deben trabajar juntas para garantizar que la implantaci\u00f3n de la tecnolog\u00eda se alinea con los objetivos empresariales. <\/p>\n\n\n\n<p>Una hoja de ruta clara es esencial para hacer realidad un plan de confianza cero. Si no existe una visi\u00f3n del objetivo final, es probable que aumenten los costes, con una gran posibilidad de que surjan problemas de compatibilidad. Adem\u00e1s, los sistemas heredados y los escenarios de fusiones y adquisiciones dificultan la implantaci\u00f3n de la confianza cero.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-hoja-de-ruta-para-implantar-la-confianza-cero\">Hoja de ruta para implantar la confianza cero<\/h4>\n\n\n\n<p>La metodolog\u00eda de Capgemini para la implantaci\u00f3n de la confianza cero ayuda a las organizaciones a implantar este modelo de forma que se alinee con los objetivos empresariales y los respalde.<\/p>\n\n\n\n<p>Recientemente hemos ayudado a un gran grupo farmac\u00e9utico con 50 sedes en todo el mundo y m\u00e1s de 20.000 usuarios a ofrecer confianza cero como parte de un redise\u00f1o m\u00e1s amplio de la infraestructura. Mediante un proceso integral, dise\u00f1amos la infraestructura t\u00e9cnica global para el acceso a aplicaciones internas, simplificando la gesti\u00f3n continua. Esta transformaci\u00f3n condujo a la optimizaci\u00f3n de los gastos operativos y de capital y a una experiencia de usuario sin fricciones.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h3 data-maxlength=\"34\">Conoce nuestro experto<\/h3><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/es-es\/wp-content\/uploads\/sites\/16\/2022\/11\/Andres-de-Benito-1.jpg\" alt=\"Andr\u00e9s de Benito\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Abrir en una nueva ventana\" href=\"https:\/\/www.linkedin.com\/in\/andresdebenito\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Andr\u00e9s de Benito<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Experto en Ciberseguridad<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Abrir en una nueva ventana\" href=\"https:\/\/www.linkedin.com\/in\/andresdebenito\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Anterior\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Siguiente\"><\/button><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":440,"featured_media":564161,"template":"","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"dc1ae4a5-505b-4eee-8549-843fd5e2f023\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":true,"cg_dt_link_disabled":false,"footnotes":"","related_resource_url":"","related_resource_id":0,"related_resource_size":"","related_resource_type":"","cg_author":0,"_yoast_wpseo_primary_theme":48,"primary_term":"Cybersecurity","featured_focal_points":""},"tags":[],"research-and-insight-type":[85],"theme":[48],"brand":[],"service":[47],"industry":[],"partners":[],"content-group":[],"class_list":["post-564160","research-and-insight","type-research-and-insight","status-publish","has-post-thumbnail","hentry","research-and-insight-type-point-of-view","theme-cybersecurity","service-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Zero trust: de la aspiraci\u00f3n a la aplicaci\u00f3n<\/title>\n<meta name=\"description\" content=\"Descubre por qu\u00e9 Zero Trust es crucial para proteger sus activos y c\u00f3mo nuestra metodolog\u00eda integral puede convertir esta visi\u00f3n en realidad.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero trust: de la aspiraci\u00f3n a la aplicaci\u00f3n\" \/>\n<meta property=\"og:description\" content=\"Descubre por qu\u00e9 Zero Trust es crucial para proteger sus activos y c\u00f3mo nuestra metodolog\u00eda integral puede convertir esta visi\u00f3n en realidad.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini Spain\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-12T06:50:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/es-es\/wp-content\/uploads\/sites\/16\/2025\/10\/New-Web-preview-global.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/\",\"url\":\"https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/\",\"name\":\"Zero trust: de la aspiraci\u00f3n a la aplicaci\u00f3n\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/es-es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/es-es\/wp-content\/uploads\/sites\/16\/2024\/11\/Zero-Trust-Security-web-banner-2024a.jpg\",\"datePublished\":\"2024-11-18T09:29:21+00:00\",\"dateModified\":\"2025-03-12T06:50:12+00:00\",\"description\":\"Descubre por qu\u00e9 Zero Trust es crucial para proteger sus activos y c\u00f3mo nuestra metodolog\u00eda integral puede convertir esta visi\u00f3n en realidad.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/es-es\/wp-content\/uploads\/sites\/16\/2024\/11\/Zero-Trust-Security-web-banner-2024a.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/es-es\/wp-content\/uploads\/sites\/16\/2024\/11\/Zero-Trust-Security-web-banner-2024a.jpg\",\"width\":2880,\"height\":1800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.capgemini.com\/es-es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research &amp; insights\",\"item\":\"https:\/\/www.capgemini.com\/es-es\/research-and-insight\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Zero trust: de la aspiraci\u00f3n a la aplicaci\u00f3n\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/es-es\/#website\",\"url\":\"https:\/\/www.capgemini.com\/es-es\/\",\"name\":\"Capgemini Espa\u00f1a\",\"description\":\"Capgemini\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/es-es\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es-ES\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Zero trust: de la aspiraci\u00f3n a la aplicaci\u00f3n","description":"Descubre por qu\u00e9 Zero Trust es crucial para proteger sus activos y c\u00f3mo nuestra metodolog\u00eda integral puede convertir esta visi\u00f3n en realidad.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/","og_locale":"es_ES","og_type":"article","og_title":"Zero trust: de la aspiraci\u00f3n a la aplicaci\u00f3n","og_description":"Descubre por qu\u00e9 Zero Trust es crucial para proteger sus activos y c\u00f3mo nuestra metodolog\u00eda integral puede convertir esta visi\u00f3n en realidad.","og_url":"https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/","og_site_name":"Capgemini Spain","article_modified_time":"2025-03-12T06:50:12+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.capgemini.com\/es-es\/wp-content\/uploads\/sites\/16\/2025\/10\/New-Web-preview-global.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/","url":"https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/","name":"Zero trust: de la aspiraci\u00f3n a la aplicaci\u00f3n","isPartOf":{"@id":"https:\/\/www.capgemini.com\/es-es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/es-es\/wp-content\/uploads\/sites\/16\/2024\/11\/Zero-Trust-Security-web-banner-2024a.jpg","datePublished":"2024-11-18T09:29:21+00:00","dateModified":"2025-03-12T06:50:12+00:00","description":"Descubre por qu\u00e9 Zero Trust es crucial para proteger sus activos y c\u00f3mo nuestra metodolog\u00eda integral puede convertir esta visi\u00f3n en realidad.","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/#primaryimage","url":"https:\/\/www.capgemini.com\/es-es\/wp-content\/uploads\/sites\/16\/2024\/11\/Zero-Trust-Security-web-banner-2024a.jpg","contentUrl":"https:\/\/www.capgemini.com\/es-es\/wp-content\/uploads\/sites\/16\/2024\/11\/Zero-Trust-Security-web-banner-2024a.jpg","width":2880,"height":1800},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.capgemini.com\/es-es\/"},{"@type":"ListItem","position":2,"name":"Research &amp; insights","item":"https:\/\/www.capgemini.com\/es-es\/research-and-insight\/"},{"@type":"ListItem","position":3,"name":"Zero trust: de la aspiraci\u00f3n a la aplicaci\u00f3n"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/es-es\/#website","url":"https:\/\/www.capgemini.com\/es-es\/","name":"Capgemini Espa\u00f1a","description":"Capgemini","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/es-es\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es-ES"}]}},"theme_term_info":[{"id":48,"name":"Cybersecurity"}],"industry_term_info":[],"services_term_info":[{"id":47,"name":"Cybersecurity"}],"partners_term_info":[],"brand_term_info":[],"brand_term":[],"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Zero trust: de la aspiraci\u00f3n a la aplicaci\u00f3n","url":"https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/es-es\/wp-content\/uploads\/sites\/16\/2024\/11\/Zero-Trust-Security-web-banner-2024a.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/es-es\/wp-content\/uploads\/sites\/16\/2024\/11\/Zero-Trust-Security-web-banner-2024a.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini Spain","logo":""},"keywords":[],"dateCreated":"2024-11-18T09:29:21Z","datePublished":"2024-11-18T09:29:21Z","dateModified":"2025-03-12T06:50:12Z"},"rendered":"<meta name=\"parsely-title\" content=\"Zero trust: de la aspiraci\u00f3n a la aplicaci\u00f3n\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/es-es\/investigacion\/biblioteca-de-investigacion\/zero-trust-from-aspiration-to-rapid-implementation\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/es-es\/wp-content\/uploads\/sites\/16\/2024\/11\/Zero-Trust-Security-web-banner-2024a.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2024-11-18T09:29:21Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/es-es\/wp-content\/uploads\/sites\/16\/2024\/11\/Zero-Trust-Security-web-banner-2024a.jpg","featured_image_alt":"","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini Spain","distributor_original_site_url":"https:\/\/www.capgemini.com\/es-es","push-errors":false,"tag_names":[],"featured_image_url":"https:\/\/www.capgemini.com\/es-es\/wp-content\/uploads\/sites\/16\/2024\/11\/Zero-Trust-Security-web-banner-2024a.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/es-es\/wp-json\/wp\/v2\/research-and-insight\/564160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/es-es\/wp-json\/wp\/v2\/research-and-insight"}],"about":[{"href":"https:\/\/www.capgemini.com\/es-es\/wp-json\/wp\/v2\/types\/research-and-insight"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/es-es\/wp-json\/wp\/v2\/users\/440"}],"version-history":[{"count":6,"href":"https:\/\/www.capgemini.com\/es-es\/wp-json\/wp\/v2\/research-and-insight\/564160\/revisions"}],"predecessor-version":[{"id":567799,"href":"https:\/\/www.capgemini.com\/es-es\/wp-json\/wp\/v2\/research-and-insight\/564160\/revisions\/567799"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/es-es\/wp-json\/wp\/v2\/media\/564161"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/es-es\/wp-json\/wp\/v2\/media?parent=564160"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/es-es\/wp-json\/wp\/v2\/tags?post=564160"},{"taxonomy":"research-and-insight-type","embeddable":true,"href":"https:\/\/www.capgemini.com\/es-es\/wp-json\/wp\/v2\/research-and-insight-type?post=564160"},{"taxonomy":"theme","embeddable":true,"href":"https:\/\/www.capgemini.com\/es-es\/wp-json\/wp\/v2\/theme?post=564160"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/es-es\/wp-json\/wp\/v2\/brand?post=564160"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/es-es\/wp-json\/wp\/v2\/service?post=564160"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/es-es\/wp-json\/wp\/v2\/industry?post=564160"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/es-es\/wp-json\/wp\/v2\/partners?post=564160"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/es-es\/wp-json\/wp\/v2\/content-group?post=564160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}