{"id":27842,"date":"2017-09-15T09:02:04","date_gmt":"2017-09-15T09:02:04","guid":{"rendered":"http:\/\/www.zemsania.com\/?p=16927"},"modified":"2022-12-23T09:55:28","modified_gmt":"2022-12-23T09:55:28","slug":"cloud-computing-la-seguretat-cap-a-on-anem","status":"publish","type":"post","link":"https:\/\/zemsaniaglobalgroup.com\/ca\/cloud-computing-la-seguridad-hacia-donde-vamos\/","title":{"rendered":"El Cloud Computing i la seguretat: cap on anem?"},"content":{"rendered":"<p>La consultora Gartner ha tret a la llum recentment el seu cl\u00e0ssic estudi <a href=\"http:\/\/www.gartner.com\/smarterwithgartner\/top-trends-in-the-gartner-hype-cycle-for-emerging-technologies-2017\/\" target=\"_blank\" rel=\"noopener\">Hype Cycle for Emerging Technologies<\/a>, un <strong>estudi que analitza les diferents fases en qu\u00e8 es troben les tecnologies relacionades amb la Transformaci\u00f3 Digital<\/strong>. En aquesta ocasi\u00f3, a m\u00e9s, ha realitzat un petit informe extra on s&#039;analitzen les tecnologies vinculades amb la <strong>seguretat del Cloud Computing<\/strong>, un dels \u00e0mbits amb m\u00e9s creixement dels \u00faltims anys i que est\u00e0 cridat a ser el futur de lemmagatzematge dinformaci\u00f3 i serveis empresarials properament.<\/p>\n\n\n\n<p>Al llarg del darrer any hem experimentat diversos episodis d&#039;atacs cibern\u00e8tics massius que han posat en perill algunes de les principals empreses del mercat. Bancs, empreses energ\u00e8tiques, de comunicaci\u00f3\u2026<strong>o hi ha hagut un patr\u00f3 exacte a l&#039;hora de predir els atacs de ransomware<\/strong>, que han suposat el caos en molts moments de l&#039;any. Per aquest motiu, encara cobra m\u00e9s rellev\u00e0ncia l&#039;opini\u00f3 d&#039;una consultora tan especialitzada com <strong>Gartner<\/strong> amb refer\u00e8ncia a les tecnologies que estan cridades a securitzar els n\u00favols de les companyies.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">\u00cdndex de continguts<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/zemsaniaglobalgroup.com\/ca\/cloud-computing-la-seguridad-hacia-donde-vamos\/#El_futuro_proximo_de_la_ciberseguridad_en_la_nube\" >El futur proper de la ciberseguretat al n\u00favol<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/zemsaniaglobalgroup.com\/ca\/cloud-computing-la-seguridad-hacia-donde-vamos\/#Pero_%C2%BFque_ocurre_con_el_futuro_mas_proximo_de_estas_tecnologias\" >Per\u00f2 qu\u00e8 passa amb el futur m\u00e9s proper d&#039;aquestes tecnologies?<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 class=\"has-ast-global-color-0-color has-text-color wp-block-heading\"><span class=\"ez-toc-section\" id=\"El_futuro_proximo_de_la_ciberseguridad_en_la_nube\"><\/span>El futur proper de la ciberseguretat al n\u00favol<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Abans d&#039;entrar en mat\u00e8ria sobre les tecnologies que coparan el mercat de la seguretat Cloud durant els propers anys, cal distingir entre dues fases que Gartner sempre inclou als seus informes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>La fase de cim<\/strong>: \u00e9s aquella en qu\u00e8 una tecnologia concreta arriba al seu zenit, que no pas l&#039;\u00e8xit.<\/li>\n\n\n\n<li><strong>La fase de la desil\u00b7lusi\u00f3<\/strong>: aquella en qu\u00e8 les diferents tecnologies no s\u00f3n capaces de complir amb les expectatives creades i decauen.<\/li>\n<\/ul>\n\n\n\n<p>Un cop aclarits aquests dos conceptes, molt utilitzats a l&#039;informe Hype Cycle for Emerging Technologies, analitzarem algunes de les tecnologies m\u00e9s importants que es troben ara mateix en diferents fases de desenvolupament i acceptaci\u00f3.<\/p>\n\n\n\n<p>D&#039;una banda, trobem totes aquelles solucions, tecnologies i productes que han assolit el cim aquest mateix any 2017, com ara els <strong>sistemes especialitzats en evitar la p\u00e8rdua de dades confidencials en dispositius m\u00f2bils<\/strong>, la g<strong>esti\u00f3 de les diferents claus d&#039;acc\u00e9s<\/strong> a les plataformes empresarials o la <strong>gesti\u00f3 de la <a href=\"https:\/\/zemsaniaglobalgroup.com\/ca\/consejos-prevenir-ciberataques-ciberseguridad\/\" target=\"_blank\" rel=\"noreferrer noopener\">seguretat de les infraestructures<\/a><\/strong>. Totes aquestes tecnologies, moltes vinculades amb el Cloud, han assolit la seva fase m\u00e9s important al llarg d&#039;aquest any a causa dels problemes de seguretat que moltes companyies han experimentat el 2017, tal com hem esmentat anteriorment.<\/p>\n\n\n\n<h3 class=\"has-ast-global-color-0-color has-text-color wp-block-heading\"><span class=\"ez-toc-section\" id=\"Pero_%C2%BFque_ocurre_con_el_futuro_mas_proximo_de_estas_tecnologias\"><\/span>Per\u00f2 qu\u00e8 passa amb el futur m\u00e9s proper d&#039;aquestes tecnologies?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Segons Gartner, els <strong>serveis de recuperaci\u00f3 de desastres inform\u00e0tics i el Cloud privat<\/strong> seran dues solucions a tenir molt en compte en el futur proper. En els propers dos anys, aquest tipus de tecnologies s&#039;implantaran de forma massiva a la major part de les companyies. El m\u00e9s curi\u00f3s d&#039;aquestes dues tecnologies \u00e9s que l&#039;informe Hype Cycle for Emerging Technologies les classifica dins de la fase de la \u00abdesil\u00b7lusi\u00f3\u00bb, ja que no han aconseguit superar les expectatives. Tot i aix\u00f2, seran dues solucions a tenir en compte durant els propers anys.<\/p>\n\n\n\n<p>Finalment, l&#039;informe destaca aquelles noves tecnologies que encara es troben de cam\u00ed a la fase de cim, com les <strong>solucions DLP (Data Loss Protection) <\/strong>i les <strong>infraestructures com a Servei (IaaS)<\/strong>. Ambdues assoliran el seu major grau de maduresa, aix\u00ed com el seu major abast i implementaci\u00f3 en tan sols 2 o 3 anys.<\/p>\n\n\n\n<p>Ara nom\u00e9s queda esperar per comprovar si aquestes prediccions de la famosa consultora tecnol\u00f2gica es compleixen. El que s\u00ed que podem afirmar amb total rotunditat \u00e9s que la seguretat del n\u00favol \u00e9s i continuar\u00e0 sent durant els propers anys un dels aspectes m\u00e9s importants a tractar dins del Cloud Computing.<\/p>","protected":false},"excerpt":{"rendered":"<p>La consultora Gartner ha sacado a la luz recientemente su cl\u00e1sico estudio Hype Cycle for Emerging Technologies, un estudio que analiza las distintas fases en las que se encuentran las tecnolog\u00edas relacionadas con la Transformaci\u00f3n Digital. En esta ocasi\u00f3n, adem\u00e1s, ha realizado un peque\u00f1o informe extra en el que se analizan las tecnolog\u00edas vinculadas con [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":27843,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[2,3],"tags":[],"class_list":["post-27842","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noticias-zemsania","category-tendencias-it-digital"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>El Cloud Computing y la seguridad: \u00bfhacia d\u00f3nde vamos? - Zemsania Global Group<\/title>\n<meta name=\"description\" content=\"An\u00e1lisis de los resultados de un informe de Gartner sober el futuro de las tecnolog\u00edas de seguridad para Cloud Computing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/zemsaniaglobalgroup.com\/ca\/cloud-computing-la-seguretat-cap-a-on-anem\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"El Cloud Computing y la seguridad: \u00bfhacia d\u00f3nde vamos? - Zemsania Global Group\" \/>\n<meta property=\"og:description\" content=\"An\u00e1lisis de los resultados de un informe de Gartner sober el futuro de las tecnolog\u00edas de seguridad para Cloud Computing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/zemsaniaglobalgroup.com\/ca\/cloud-computing-la-seguretat-cap-a-on-anem\/\" \/>\n<meta property=\"og:site_name\" content=\"Zemsania Global Group\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-15T09:02:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-23T09:55:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"618\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"jmarin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrit per\" \/>\n\t<meta name=\"twitter:data1\" content=\"jmarin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Temps estimat de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuts\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/\"},\"author\":{\"name\":\"jmarin\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#\\\/schema\\\/person\\\/0725e5e5b51900fbf2d344a650e9b75c\"},\"headline\":\"El Cloud Computing y la seguridad: \u00bfhacia d\u00f3nde vamos?\",\"datePublished\":\"2017-09-15T09:02:04+00:00\",\"dateModified\":\"2022-12-23T09:55:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/\"},\"wordCount\":678,\"publisher\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/plantilla-5c-20_35607988.png\",\"articleSection\":[\"Blog\",\"Tendencias IT &amp; Digital\"],\"inLanguage\":\"ca\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/\",\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/\",\"name\":\"El Cloud Computing y la seguridad: \u00bfhacia d\u00f3nde vamos? - Zemsania Global Group\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/plantilla-5c-20_35607988.png\",\"datePublished\":\"2017-09-15T09:02:04+00:00\",\"dateModified\":\"2022-12-23T09:55:28+00:00\",\"description\":\"An\u00e1lisis de los resultados de un informe de Gartner sober el futuro de las tecnolog\u00edas de seguridad para Cloud Computing.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/#breadcrumb\"},\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/plantilla-5c-20_35607988.png\",\"contentUrl\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/plantilla-5c-20_35607988.png\",\"width\":1100,\"height\":618},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/category\\\/noticias-zemsania\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"El Cloud Computing y la seguridad: \u00bfhacia d\u00f3nde vamos?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#website\",\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/\",\"name\":\"Zemsania Global Group\",\"description\":\"Ofrecemos soluciones digitales innovadoras y talento IT especializado, siendo un referente para nuestros clientes y un partner tecnol\u00f3gico de confianza en los diferentes procesos empresariales.\",\"publisher\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#organization\"},\"alternateName\":\"Zemsania\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#organization\",\"name\":\"Zemsania Global Group\",\"alternateName\":\"Zemsania\",\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/logo-zemsania-horiz.svg\",\"contentUrl\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/logo-zemsania-horiz.svg\",\"caption\":\"Zemsania Global Group\"},\"image\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/zemsania-global-group\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#\\\/schema\\\/person\\\/0725e5e5b51900fbf2d344a650e9b75c\",\"name\":\"jmarin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g\",\"caption\":\"jmarin\"},\"sameAs\":[\"https:\\\/\\\/zemsaniaglobalgroup.com\"],\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/ca\\\/author\\\/jmarin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"El Cloud Computing i la seguretat: cap on anem? - Zemsania Global Group","description":"An\u00e0lisi dels resultats d&#039;un informe de Gartner sobre el futur de les tecnologies de seguretat per a Cloud Computing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/zemsaniaglobalgroup.com\/ca\/cloud-computing-la-seguretat-cap-a-on-anem\/","og_locale":"ca_ES","og_type":"article","og_title":"El Cloud Computing y la seguridad: \u00bfhacia d\u00f3nde vamos? - Zemsania Global Group","og_description":"An\u00e1lisis de los resultados de un informe de Gartner sober el futuro de las tecnolog\u00edas de seguridad para Cloud Computing.","og_url":"https:\/\/zemsaniaglobalgroup.com\/ca\/cloud-computing-la-seguretat-cap-a-on-anem\/","og_site_name":"Zemsania Global Group","article_published_time":"2017-09-15T09:02:04+00:00","article_modified_time":"2022-12-23T09:55:28+00:00","og_image":[{"width":1100,"height":618,"url":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988.png","type":"image\/png"}],"author":"jmarin","twitter_card":"summary_large_image","twitter_misc":{"Escrit per":"jmarin","Temps estimat de lectura":"3 minuts"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/#article","isPartOf":{"@id":"https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/"},"author":{"name":"jmarin","@id":"https:\/\/zemsaniaglobalgroup.com\/#\/schema\/person\/0725e5e5b51900fbf2d344a650e9b75c"},"headline":"El Cloud Computing y la seguridad: \u00bfhacia d\u00f3nde vamos?","datePublished":"2017-09-15T09:02:04+00:00","dateModified":"2022-12-23T09:55:28+00:00","mainEntityOfPage":{"@id":"https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/"},"wordCount":678,"publisher":{"@id":"https:\/\/zemsaniaglobalgroup.com\/#organization"},"image":{"@id":"https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/#primaryimage"},"thumbnailUrl":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988.png","articleSection":["Blog","Tendencias IT &amp; Digital"],"inLanguage":"ca"},{"@type":"WebPage","@id":"https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/","url":"https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/","name":"El Cloud Computing i la seguretat: cap on anem? - Zemsania Global Group","isPartOf":{"@id":"https:\/\/zemsaniaglobalgroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/#primaryimage"},"image":{"@id":"https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/#primaryimage"},"thumbnailUrl":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988.png","datePublished":"2017-09-15T09:02:04+00:00","dateModified":"2022-12-23T09:55:28+00:00","description":"An\u00e0lisi dels resultats d&#039;un informe de Gartner sobre el futur de les tecnologies de seguretat per a Cloud Computing.","breadcrumb":{"@id":"https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/#breadcrumb"},"inLanguage":"ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/"]}]},{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/#primaryimage","url":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988.png","contentUrl":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988.png","width":1100,"height":618},{"@type":"BreadcrumbList","@id":"https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/zemsaniaglobalgroup.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/zemsaniaglobalgroup.com\/category\/noticias-zemsania\/"},{"@type":"ListItem","position":3,"name":"El Cloud Computing y la seguridad: \u00bfhacia d\u00f3nde vamos?"}]},{"@type":"WebSite","@id":"https:\/\/zemsaniaglobalgroup.com\/#website","url":"https:\/\/zemsaniaglobalgroup.com\/","name":"Zemsania Global Group","description":"Oferim solucions digitals innovadores i talent IT especialitzat, essent un referent pels nostres clients i un partner tecnol\u00f2gic de confian\u00e7a en els diferents processos empresarials.","publisher":{"@id":"https:\/\/zemsaniaglobalgroup.com\/#organization"},"alternateName":"Zemsania","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/zemsaniaglobalgroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca"},{"@type":"Organization","@id":"https:\/\/zemsaniaglobalgroup.com\/#organization","name":"Zemsania Global Group","alternateName":"Zemsania","url":"https:\/\/zemsaniaglobalgroup.com\/","logo":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/zemsaniaglobalgroup.com\/#\/schema\/logo\/image\/","url":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2024\/04\/logo-zemsania-horiz.svg","contentUrl":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2024\/04\/logo-zemsania-horiz.svg","caption":"Zemsania Global Group"},"image":{"@id":"https:\/\/zemsaniaglobalgroup.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/zemsania-global-group"]},{"@type":"Person","@id":"https:\/\/zemsaniaglobalgroup.com\/#\/schema\/person\/0725e5e5b51900fbf2d344a650e9b75c","name":"jmarin","image":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/secure.gravatar.com\/avatar\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g","caption":"jmarin"},"sameAs":["https:\/\/zemsaniaglobalgroup.com"],"url":"https:\/\/zemsaniaglobalgroup.com\/ca\/author\/jmarin\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988.png",1100,618,false],"thumbnail":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988-150x150.png",150,150,true],"medium":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988-300x169.png",300,169,true],"medium_large":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988-768x431.png",768,431,true],"large":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988-1024x575.png",1024,575,true],"1536x1536":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988.png",1100,618,false],"2048x2048":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988.png",1100,618,false],"trp-custom-language-flag":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988.png",18,10,false],"cover":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988.png",819,460,false]},"uagb_author_info":{"display_name":"jmarin","author_link":"https:\/\/zemsaniaglobalgroup.com\/ca\/author\/jmarin\/"},"uagb_comment_info":0,"uagb_excerpt":"La consultora Gartner ha sacado a la luz recientemente su cl\u00e1sico estudio Hype Cycle for Emerging Technologies, un estudio que analiza las distintas fases en las que se encuentran las tecnolog\u00edas relacionadas con la Transformaci\u00f3n Digital. En esta ocasi\u00f3n, adem\u00e1s, ha realizado un peque\u00f1o informe extra en el que se analizan las tecnolog\u00edas vinculadas con&hellip;","_links":{"self":[{"href":"https:\/\/zemsaniaglobalgroup.com\/ca\/wp-json\/wp\/v2\/posts\/27842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zemsaniaglobalgroup.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zemsaniaglobalgroup.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zemsaniaglobalgroup.com\/ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zemsaniaglobalgroup.com\/ca\/wp-json\/wp\/v2\/comments?post=27842"}],"version-history":[{"count":0,"href":"https:\/\/zemsaniaglobalgroup.com\/ca\/wp-json\/wp\/v2\/posts\/27842\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zemsaniaglobalgroup.com\/ca\/wp-json\/wp\/v2\/media\/27843"}],"wp:attachment":[{"href":"https:\/\/zemsaniaglobalgroup.com\/ca\/wp-json\/wp\/v2\/media?parent=27842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zemsaniaglobalgroup.com\/ca\/wp-json\/wp\/v2\/categories?post=27842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zemsaniaglobalgroup.com\/ca\/wp-json\/wp\/v2\/tags?post=27842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}