{"id":27842,"date":"2017-09-15T09:02:04","date_gmt":"2017-09-15T09:02:04","guid":{"rendered":"http:\/\/www.zemsania.com\/?p=16927"},"modified":"2022-12-23T09:55:28","modified_gmt":"2022-12-23T09:55:28","slug":"cloud-computing-security-where-we-are-going","status":"publish","type":"post","link":"https:\/\/zemsaniaglobalgroup.com\/en\/cloud-computing-la-seguridad-hacia-donde-vamos\/","title":{"rendered":"Cloud Computing and security: where are we going?"},"content":{"rendered":"<p>The consulting firm Gartner has recently released its classic study <a href=\"http:\/\/www.gartner.com\/smarterwithgartner\/top-trends-in-the-gartner-hype-cycle-for-emerging-technologies-2017\/\" target=\"_blank\" rel=\"noopener\">Hype Cycle for Emerging Technologies<\/a>, a <strong>study that analyzes the different phases in which the technologies related to Digital Transformation are in.<\/strong>. On this occasion, it has also produced a small extra report that analyzes the technologies linked to the <strong>Cloud Computing security<\/strong>, The new technology, one of the fastest growing areas in recent years, is set to become the future of information storage and business services in the near future.<\/p>\n\n\n\n<p>Over the last year we have experienced several episodes of massive cyber attacks that have put some of the main companies in the market in check. Banks, energy companies, communications companies... n<strong>or has there been an exact pattern in predicting ransomware attacks?<\/strong>, The company's products and services have been chaotic at many times during the year. For that reason, the opinion of such a specialized consulting firm as <strong>Gartner<\/strong> in reference to the technologies that are set to secure companies' clouds.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Contents\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/zemsaniaglobalgroup.com\/en\/cloud-computing-la-seguridad-hacia-donde-vamos\/#El_futuro_proximo_de_la_ciberseguridad_en_la_nube\" >The near future of cybersecurity in the cloud<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/zemsaniaglobalgroup.com\/en\/cloud-computing-la-seguridad-hacia-donde-vamos\/#Pero_%C2%BFque_ocurre_con_el_futuro_mas_proximo_de_estas_tecnologias\" >But what about the near future of these technologies?<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 class=\"has-ast-global-color-0-color has-text-color wp-block-heading\"><span class=\"ez-toc-section\" id=\"El_futuro_proximo_de_la_ciberseguridad_en_la_nube\"><\/span>The near future of cybersecurity in the cloud<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Before going into the technologies that will dominate the cloud security market in the coming years, it is necessary to distinguish between two phases that Gartner always includes in its reports:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The peak phase<\/strong>is the one in which a particular technology reaches its zenith, not its success.<\/li>\n\n\n\n<li><strong>The disillusionment phase<\/strong>The first one is that in which the different technologies are not able to meet the expectations created and decline.<\/li>\n<\/ul>\n\n\n\n<p>Having clarified these two concepts, which are widely used in the Hype Cycle for Emerging Technologies report, we will analyze some of the most important technologies that are currently at different stages of development and acceptance.<\/p>\n\n\n\n<p>On the one hand, we find all those solutions, technologies and products that have reached the top this very year 2017, such as, for example, the <strong>specialized systems to prevent the loss of confidential data on mobile devices<\/strong>, the g<strong>estimony of the different access keys<\/strong> to enterprise platforms or the <strong>management of the <a href=\"https:\/\/zemsaniaglobalgroup.com\/en\/tips-to-prevent-cyber-attacks-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">infrastructure security<\/a><\/strong>. All these technologies, many of them linked to the Cloud, have reached their most important phase throughout this year due to the security issues that many companies have experienced in 2017, as we mentioned above.<\/p>\n\n\n\n<h3 class=\"has-ast-global-color-0-color has-text-color wp-block-heading\"><span class=\"ez-toc-section\" id=\"Pero_%C2%BFque_ocurre_con_el_futuro_mas_proximo_de_estas_tecnologias\"><\/span>But what about the near future of these technologies?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>According to Gartner, the <strong>IT disaster recovery services and the Private Cloud<\/strong> will be two solutions to be taken into account in the near future. In the next two years, these technologies will be massively implemented in most companies. The curious thing about these two technologies is that the Hype Cycle for Emerging Technologies report classifies them in the \u00abdisappointment\u00bb phase, as they have failed to exceed expectations. Nevertheless, they will be two solutions to watch over the next few years.<\/p>\n\n\n\n<p>Lastly, the report highlights those new technologies that are still on their way to the peak phase, such as the <strong>DLP (Data Loss Protection) solutions <\/strong>and the <strong>Infrastructure as a Service (IaaS)<\/strong>. Both will reach their highest degree of maturity, as well as their greatest scope and implementation in just 2 to 3 years.<\/p>\n\n\n\n<p>Now we can only wait to see if these predictions of the famous technology consulting firm come true. What we can say with absolute certainty is that cloud security is and will continue to be one of the most important aspects to be addressed in the coming years within Cloud Computing.<\/p>","protected":false},"excerpt":{"rendered":"<p>La consultora Gartner ha sacado a la luz recientemente su cl\u00e1sico estudio Hype Cycle for Emerging Technologies, un estudio que analiza las distintas fases en las que se encuentran las tecnolog\u00edas relacionadas con la Transformaci\u00f3n Digital. En esta ocasi\u00f3n, adem\u00e1s, ha realizado un peque\u00f1o informe extra en el que se analizan las tecnolog\u00edas vinculadas con [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":27843,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[2,3],"tags":[],"class_list":["post-27842","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noticias-zemsania","category-tendencias-it-digital"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>El Cloud Computing y la seguridad: \u00bfhacia d\u00f3nde vamos? - Zemsania Global Group<\/title>\n<meta name=\"description\" content=\"An\u00e1lisis de los resultados de un informe de Gartner sober el futuro de las tecnolog\u00edas de seguridad para Cloud Computing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/zemsaniaglobalgroup.com\/en\/cloud-computing-security-where-we-are-going\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"El Cloud Computing y la seguridad: \u00bfhacia d\u00f3nde vamos? - Zemsania Global Group\" \/>\n<meta property=\"og:description\" content=\"An\u00e1lisis de los resultados de un informe de Gartner sober el futuro de las tecnolog\u00edas de seguridad para Cloud Computing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/zemsaniaglobalgroup.com\/en\/cloud-computing-security-where-we-are-going\/\" \/>\n<meta property=\"og:site_name\" content=\"Zemsania Global Group\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-15T09:02:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-23T09:55:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"618\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"jmarin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"jmarin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/\"},\"author\":{\"name\":\"jmarin\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#\\\/schema\\\/person\\\/0725e5e5b51900fbf2d344a650e9b75c\"},\"headline\":\"El Cloud Computing y la seguridad: \u00bfhacia d\u00f3nde vamos?\",\"datePublished\":\"2017-09-15T09:02:04+00:00\",\"dateModified\":\"2022-12-23T09:55:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/\"},\"wordCount\":678,\"publisher\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/plantilla-5c-20_35607988.png\",\"articleSection\":[\"Blog\",\"Tendencias IT &amp; Digital\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/\",\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/\",\"name\":\"El Cloud Computing y la seguridad: \u00bfhacia d\u00f3nde vamos? - Zemsania Global Group\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/plantilla-5c-20_35607988.png\",\"datePublished\":\"2017-09-15T09:02:04+00:00\",\"dateModified\":\"2022-12-23T09:55:28+00:00\",\"description\":\"An\u00e1lisis de los resultados de un informe de Gartner sober el futuro de las tecnolog\u00edas de seguridad para Cloud Computing.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/plantilla-5c-20_35607988.png\",\"contentUrl\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/plantilla-5c-20_35607988.png\",\"width\":1100,\"height\":618},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/cloud-computing-la-seguridad-hacia-donde-vamos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/category\\\/noticias-zemsania\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"El Cloud Computing y la seguridad: \u00bfhacia d\u00f3nde vamos?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#website\",\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/\",\"name\":\"Zemsania Global Group\",\"description\":\"Ofrecemos soluciones digitales innovadoras y talento IT especializado, siendo un referente para nuestros clientes y un partner tecnol\u00f3gico de confianza en los diferentes procesos empresariales.\",\"publisher\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#organization\"},\"alternateName\":\"Zemsania\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#organization\",\"name\":\"Zemsania Global Group\",\"alternateName\":\"Zemsania\",\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/logo-zemsania-horiz.svg\",\"contentUrl\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/logo-zemsania-horiz.svg\",\"caption\":\"Zemsania Global Group\"},\"image\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/zemsania-global-group\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#\\\/schema\\\/person\\\/0725e5e5b51900fbf2d344a650e9b75c\",\"name\":\"jmarin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g\",\"caption\":\"jmarin\"},\"sameAs\":[\"https:\\\/\\\/zemsaniaglobalgroup.com\"],\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/en\\\/author\\\/jmarin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud Computing and security: where are we going? - Zemsania Global Group","description":"Analysis of the results of a Gartner report on the future of security technologies for Cloud Computing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/zemsaniaglobalgroup.com\/en\/cloud-computing-security-where-we-are-going\/","og_locale":"en_US","og_type":"article","og_title":"El Cloud Computing y la seguridad: \u00bfhacia d\u00f3nde vamos? - Zemsania Global Group","og_description":"An\u00e1lisis de los resultados de un informe de Gartner sober el futuro de las tecnolog\u00edas de seguridad para Cloud Computing.","og_url":"https:\/\/zemsaniaglobalgroup.com\/en\/cloud-computing-security-where-we-are-going\/","og_site_name":"Zemsania Global Group","article_published_time":"2017-09-15T09:02:04+00:00","article_modified_time":"2022-12-23T09:55:28+00:00","og_image":[{"width":1100,"height":618,"url":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988.png","type":"image\/png"}],"author":"jmarin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"jmarin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/#article","isPartOf":{"@id":"https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/"},"author":{"name":"jmarin","@id":"https:\/\/zemsaniaglobalgroup.com\/#\/schema\/person\/0725e5e5b51900fbf2d344a650e9b75c"},"headline":"El Cloud Computing y la seguridad: \u00bfhacia d\u00f3nde vamos?","datePublished":"2017-09-15T09:02:04+00:00","dateModified":"2022-12-23T09:55:28+00:00","mainEntityOfPage":{"@id":"https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/"},"wordCount":678,"publisher":{"@id":"https:\/\/zemsaniaglobalgroup.com\/#organization"},"image":{"@id":"https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/#primaryimage"},"thumbnailUrl":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988.png","articleSection":["Blog","Tendencias IT &amp; Digital"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/","url":"https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/","name":"Cloud Computing and security: where are we going? - Zemsania Global Group","isPartOf":{"@id":"https:\/\/zemsaniaglobalgroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/#primaryimage"},"image":{"@id":"https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/#primaryimage"},"thumbnailUrl":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988.png","datePublished":"2017-09-15T09:02:04+00:00","dateModified":"2022-12-23T09:55:28+00:00","description":"Analysis of the results of a Gartner report on the future of security technologies for Cloud Computing.","breadcrumb":{"@id":"https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/#primaryimage","url":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988.png","contentUrl":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988.png","width":1100,"height":618},{"@type":"BreadcrumbList","@id":"https:\/\/zemsaniaglobalgroup.com\/cloud-computing-la-seguridad-hacia-donde-vamos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/zemsaniaglobalgroup.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/zemsaniaglobalgroup.com\/category\/noticias-zemsania\/"},{"@type":"ListItem","position":3,"name":"El Cloud Computing y la seguridad: \u00bfhacia d\u00f3nde vamos?"}]},{"@type":"WebSite","@id":"https:\/\/zemsaniaglobalgroup.com\/#website","url":"https:\/\/zemsaniaglobalgroup.com\/","name":"Zemsania Global Group","description":"We offer innovative digital solutions and specialized IT talent, being a reference for our customers and a trusted technology partner in different business processes.","publisher":{"@id":"https:\/\/zemsaniaglobalgroup.com\/#organization"},"alternateName":"Zemsania","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/zemsaniaglobalgroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/zemsaniaglobalgroup.com\/#organization","name":"Zemsania Global Group","alternateName":"Zemsania","url":"https:\/\/zemsaniaglobalgroup.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zemsaniaglobalgroup.com\/#\/schema\/logo\/image\/","url":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2024\/04\/logo-zemsania-horiz.svg","contentUrl":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2024\/04\/logo-zemsania-horiz.svg","caption":"Zemsania Global Group"},"image":{"@id":"https:\/\/zemsaniaglobalgroup.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/zemsania-global-group"]},{"@type":"Person","@id":"https:\/\/zemsaniaglobalgroup.com\/#\/schema\/person\/0725e5e5b51900fbf2d344a650e9b75c","name":"jmarin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g","caption":"jmarin"},"sameAs":["https:\/\/zemsaniaglobalgroup.com"],"url":"https:\/\/zemsaniaglobalgroup.com\/en\/author\/jmarin\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988.png",1100,618,false],"thumbnail":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988-150x150.png",150,150,true],"medium":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988-300x169.png",300,169,true],"medium_large":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988-768x431.png",768,431,true],"large":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988-1024x575.png",1024,575,true],"1536x1536":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988.png",1100,618,false],"2048x2048":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988.png",1100,618,false],"trp-custom-language-flag":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988.png",18,10,false],"cover":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/09\/plantilla-5c-20_35607988.png",819,460,false]},"uagb_author_info":{"display_name":"jmarin","author_link":"https:\/\/zemsaniaglobalgroup.com\/en\/author\/jmarin\/"},"uagb_comment_info":0,"uagb_excerpt":"La consultora Gartner ha sacado a la luz recientemente su cl\u00e1sico estudio Hype Cycle for Emerging Technologies, un estudio que analiza las distintas fases en las que se encuentran las tecnolog\u00edas relacionadas con la Transformaci\u00f3n Digital. En esta ocasi\u00f3n, adem\u00e1s, ha realizado un peque\u00f1o informe extra en el que se analizan las tecnolog\u00edas vinculadas con&hellip;","_links":{"self":[{"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/posts\/27842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/comments?post=27842"}],"version-history":[{"count":0,"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/posts\/27842\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/media\/27843"}],"wp:attachment":[{"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/media?parent=27842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/categories?post=27842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/tags?post=27842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}