{"id":270,"date":"2018-06-21T11:17:40","date_gmt":"2018-06-21T17:17:40","guid":{"rendered":"https:\/\/www.iterati.com.mx\/wp\/wordpress\/?p=270"},"modified":"2018-06-21T11:17:40","modified_gmt":"2018-06-21T17:17:40","slug":"white-paper-the-new-standard-in-dns-security","status":"publish","type":"post","link":"https:\/\/www.iterati.com.mx\/posts\/white-paper-the-new-standard-in-dns-security\/","title":{"rendered":"White Paper: The New Standard in DNS Security"},"content":{"rendered":"<p>Los desaf&iacute;os de seguridad actuales exigen la necesidad de soluciones de seguridad DNS dise&ntilde;adas espec&iacute;ficamente para abordar las amenazas internas y externas, y proteger el servidor DNS al aprovechar la posici&oacute;n &uacute;nica del DNS en la red. Este informe t&eacute;cnico proporciona una descripci&oacute;n general de c&oacute;mo puede proteger el DNS externo de los ataques cibern&eacute;ticos y el DNS interno contra los ataques de infraestructura, APT y malware malicioso explotado por DNS y la exfiltraci&oacute;n de datos.<\/p>\n<p style=\"text-align: center;\"><!--[if mso]><v:roundrect xmlns:v=\"urn:schemas-microsoft-com:vml\" xmlns:w=\"urn:schemas-microsoft-com:office:word\" href=\"http:\/\/stuf.in\/biwf8\" style=\"height: 45px;v-text-anchor:middle;width: 220px;\" arcsize=\"11.11111111111111%\" strokecolor=\" rgb(85, 98, 112)\" fillcolor=\" rgb(85, 98, 112)\"> <w:anchorlock\/> <center style=\"color:#ffffff;font-family:Helvetica, Arial,sans-serif;font-size: 18px;\">Descargar White Paper<\/center><\/v:roundrect><![endif]--><a class=\"simple-button-plugin\" href=\"http:\/\/stuf.in\/biwf8\" style=\"background-color: rgb(85, 98, 112); border: 1px solid rgb(85, 98, 112); border-radius: 5px; display: inline-block; font-size: 18px; line-height: 45px; width: 220px; text-align: center; cursor: pointer; text-size-adjust: none; color: rgb(255, 255, 255) !important; text-decoration: none !important; -webkit-text-size-adjust:none; mso-hide:all;\" target=\"_blank\">Descargar White Paper<\/a><\/p>\n<p><!-- cmxpix-13440 --><br \/>\n<img decoding=\"async\" border=\"0\" style=\"display:none;border:none;\" src=\"http:\/\/www.google-analytics.com\/collect?v=1&#038;tid=UA-47948606-1&#038;cid=cmx3443&#038;t=event&#038;ec=article&#038;ea=view&#038;el=White+Paper%3A+The+New+Standard+in+DNS+Security&#038;cs=354157&#038;cm=13442&#038;cn=White+Paper%3A+The+New+Standard+in+DNS+Security\"\/><\/p>\n<p><a href=\"http:\/\/stuf.in\/biwf8\" target=\"_blank\">View: White Paper: The New Standard in DNS Security<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00bfPor qu\u00e9 fallan los enfoques de seguridad tradicionales en la lucha contra los ataques distribuidos de denegaci\u00f3n de servicio? Descargue esta nota t\u00e9cnica para explorar las trampas de las soluciones de seguridad DNS convencionales, y aprenda c\u00f3mo aprovechar la posici\u00f3n \u00fanica de DNS en la red para transformar los servidores DNS de talones de Aquiles en activos de seguridad. Luego, cont\u00e1ctate para obtener m\u00e1s informaci\u00f3n.<\/p>\n","protected":false},"author":1,"featured_media":269,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-270","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sin-categoria"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>White Paper: The New Standard in DNS Security - Blog Iterati<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iterati.com.mx\/posts\/white-paper-the-new-standard-in-dns-security\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"White Paper: The New Standard in DNS Security - Blog Iterati\" \/>\n<meta property=\"og:description\" content=\"\u00bfPor qu\u00e9 fallan los enfoques de seguridad tradicionales en la lucha contra los ataques distribuidos de denegaci\u00f3n de servicio? Descargue esta nota t\u00e9cnica para explorar las trampas de las soluciones de seguridad DNS convencionales, y aprenda c\u00f3mo aprovechar la posici\u00f3n \u00fanica de DNS en la red para transformar los servidores DNS de talones de Aquiles en activos de seguridad. Luego, cont\u00e1ctate para obtener m\u00e1s informaci\u00f3n.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iterati.com.mx\/posts\/white-paper-the-new-standard-in-dns-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog Iterati\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iteratimx\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-21T17:17:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.iterati.com.mx\/posts\/wp-content\/uploads\/2018\/06\/new-standard-in-DNS-security-2016-thumb.png?fit=451%2C584&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"451\" \/>\n\t<meta property=\"og:image:height\" content=\"584\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Eduardo Ram\u00edrez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@iteratimx\" \/>\n<meta name=\"twitter:site\" content=\"@iteratimx\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eduardo Ram\u00edrez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/white-paper-the-new-standard-in-dns-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/white-paper-the-new-standard-in-dns-security\\\/\"},\"author\":{\"name\":\"Eduardo Ram\u00edrez\",\"@id\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/#\\\/schema\\\/person\\\/9dcc75cc9a1a2d645b86b6c4b1ed84c7\"},\"headline\":\"White Paper: The New Standard in DNS Security\",\"datePublished\":\"2018-06-21T17:17:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/white-paper-the-new-standard-in-dns-security\\\/\"},\"wordCount\":115,\"publisher\":{\"@id\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/white-paper-the-new-standard-in-dns-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.iterati.com.mx\\\/posts\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/new-standard-in-DNS-security-2016-thumb.png?fit=451%2C584&ssl=1\",\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/white-paper-the-new-standard-in-dns-security\\\/\",\"url\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/white-paper-the-new-standard-in-dns-security\\\/\",\"name\":\"White Paper: The New Standard in DNS Security - Blog Iterati\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/white-paper-the-new-standard-in-dns-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/white-paper-the-new-standard-in-dns-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.iterati.com.mx\\\/posts\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/new-standard-in-DNS-security-2016-thumb.png?fit=451%2C584&ssl=1\",\"datePublished\":\"2018-06-21T17:17:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/white-paper-the-new-standard-in-dns-security\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/white-paper-the-new-standard-in-dns-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/white-paper-the-new-standard-in-dns-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.iterati.com.mx\\\/posts\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/new-standard-in-DNS-security-2016-thumb.png?fit=451%2C584&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.iterati.com.mx\\\/posts\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/new-standard-in-DNS-security-2016-thumb.png?fit=451%2C584&ssl=1\",\"width\":451,\"height\":584},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/white-paper-the-new-standard-in-dns-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"White Paper: The New Standard in DNS Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/#website\",\"url\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/\",\"name\":\"Blog Iterati\",\"description\":\"Eleve el potencial de su empresa con tecnolog\u00edas de informaci\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/#organization\",\"name\":\"Iterati\",\"url\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.iterati.com.mx\\\/posts\\\/wp-content\\\/uploads\\\/2016\\\/08\\\/cropped-IteratiLogoFondoAzul-1.jpg?fit=180%2C179&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.iterati.com.mx\\\/posts\\\/wp-content\\\/uploads\\\/2016\\\/08\\\/cropped-IteratiLogoFondoAzul-1.jpg?fit=180%2C179&ssl=1\",\"width\":180,\"height\":179,\"caption\":\"Iterati\"},\"image\":{\"@id\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iteratimx\\\/\",\"https:\\\/\\\/x.com\\\/iteratimx\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/iterati-mexico\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/#\\\/schema\\\/person\\\/9dcc75cc9a1a2d645b86b6c4b1ed84c7\",\"name\":\"Eduardo Ram\u00edrez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fd3dbfe1515572f29b43bdd3cb9da7db88701fa9703845379f81ca82b652f825?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fd3dbfe1515572f29b43bdd3cb9da7db88701fa9703845379f81ca82b652f825?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fd3dbfe1515572f29b43bdd3cb9da7db88701fa9703845379f81ca82b652f825?s=96&d=mm&r=g\",\"caption\":\"Eduardo Ram\u00edrez\"},\"sameAs\":[\"http:\\\/\\\/www.iterati.com.mx\"],\"url\":\"https:\\\/\\\/www.iterati.com.mx\\\/posts\\\/author\\\/db645335530\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"White Paper: The New Standard in DNS Security - Blog Iterati","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iterati.com.mx\/posts\/white-paper-the-new-standard-in-dns-security\/","og_locale":"es_MX","og_type":"article","og_title":"White Paper: The New Standard in DNS Security - Blog Iterati","og_description":"\u00bfPor qu\u00e9 fallan los enfoques de seguridad tradicionales en la lucha contra los ataques distribuidos de denegaci\u00f3n de servicio? Descargue esta nota t\u00e9cnica para explorar las trampas de las soluciones de seguridad DNS convencionales, y aprenda c\u00f3mo aprovechar la posici\u00f3n \u00fanica de DNS en la red para transformar los servidores DNS de talones de Aquiles en activos de seguridad. Luego, cont\u00e1ctate para obtener m\u00e1s informaci\u00f3n.","og_url":"https:\/\/www.iterati.com.mx\/posts\/white-paper-the-new-standard-in-dns-security\/","og_site_name":"Blog Iterati","article_publisher":"https:\/\/www.facebook.com\/iteratimx\/","article_published_time":"2018-06-21T17:17:40+00:00","og_image":[{"width":451,"height":584,"url":"https:\/\/i0.wp.com\/www.iterati.com.mx\/posts\/wp-content\/uploads\/2018\/06\/new-standard-in-DNS-security-2016-thumb.png?fit=451%2C584&ssl=1","type":"image\/png"}],"author":"Eduardo Ram\u00edrez","twitter_card":"summary_large_image","twitter_creator":"@iteratimx","twitter_site":"@iteratimx","twitter_misc":{"Escrito por":"Eduardo Ram\u00edrez","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iterati.com.mx\/posts\/white-paper-the-new-standard-in-dns-security\/#article","isPartOf":{"@id":"https:\/\/www.iterati.com.mx\/posts\/white-paper-the-new-standard-in-dns-security\/"},"author":{"name":"Eduardo Ram\u00edrez","@id":"https:\/\/www.iterati.com.mx\/posts\/#\/schema\/person\/9dcc75cc9a1a2d645b86b6c4b1ed84c7"},"headline":"White Paper: The New Standard in DNS Security","datePublished":"2018-06-21T17:17:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iterati.com.mx\/posts\/white-paper-the-new-standard-in-dns-security\/"},"wordCount":115,"publisher":{"@id":"https:\/\/www.iterati.com.mx\/posts\/#organization"},"image":{"@id":"https:\/\/www.iterati.com.mx\/posts\/white-paper-the-new-standard-in-dns-security\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.iterati.com.mx\/posts\/wp-content\/uploads\/2018\/06\/new-standard-in-DNS-security-2016-thumb.png?fit=451%2C584&ssl=1","inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.iterati.com.mx\/posts\/white-paper-the-new-standard-in-dns-security\/","url":"https:\/\/www.iterati.com.mx\/posts\/white-paper-the-new-standard-in-dns-security\/","name":"White Paper: The New Standard in DNS Security - Blog Iterati","isPartOf":{"@id":"https:\/\/www.iterati.com.mx\/posts\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iterati.com.mx\/posts\/white-paper-the-new-standard-in-dns-security\/#primaryimage"},"image":{"@id":"https:\/\/www.iterati.com.mx\/posts\/white-paper-the-new-standard-in-dns-security\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.iterati.com.mx\/posts\/wp-content\/uploads\/2018\/06\/new-standard-in-DNS-security-2016-thumb.png?fit=451%2C584&ssl=1","datePublished":"2018-06-21T17:17:40+00:00","breadcrumb":{"@id":"https:\/\/www.iterati.com.mx\/posts\/white-paper-the-new-standard-in-dns-security\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iterati.com.mx\/posts\/white-paper-the-new-standard-in-dns-security\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.iterati.com.mx\/posts\/white-paper-the-new-standard-in-dns-security\/#primaryimage","url":"https:\/\/i0.wp.com\/www.iterati.com.mx\/posts\/wp-content\/uploads\/2018\/06\/new-standard-in-DNS-security-2016-thumb.png?fit=451%2C584&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.iterati.com.mx\/posts\/wp-content\/uploads\/2018\/06\/new-standard-in-DNS-security-2016-thumb.png?fit=451%2C584&ssl=1","width":451,"height":584},{"@type":"BreadcrumbList","@id":"https:\/\/www.iterati.com.mx\/posts\/white-paper-the-new-standard-in-dns-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/www.iterati.com.mx\/posts\/"},{"@type":"ListItem","position":2,"name":"White Paper: The New Standard in DNS Security"}]},{"@type":"WebSite","@id":"https:\/\/www.iterati.com.mx\/posts\/#website","url":"https:\/\/www.iterati.com.mx\/posts\/","name":"Blog Iterati","description":"Eleve el potencial de su empresa con tecnolog\u00edas de informaci\u00f3n","publisher":{"@id":"https:\/\/www.iterati.com.mx\/posts\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iterati.com.mx\/posts\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.iterati.com.mx\/posts\/#organization","name":"Iterati","url":"https:\/\/www.iterati.com.mx\/posts\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.iterati.com.mx\/posts\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.iterati.com.mx\/posts\/wp-content\/uploads\/2016\/08\/cropped-IteratiLogoFondoAzul-1.jpg?fit=180%2C179&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.iterati.com.mx\/posts\/wp-content\/uploads\/2016\/08\/cropped-IteratiLogoFondoAzul-1.jpg?fit=180%2C179&ssl=1","width":180,"height":179,"caption":"Iterati"},"image":{"@id":"https:\/\/www.iterati.com.mx\/posts\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iteratimx\/","https:\/\/x.com\/iteratimx","https:\/\/www.linkedin.com\/company\/iterati-mexico"]},{"@type":"Person","@id":"https:\/\/www.iterati.com.mx\/posts\/#\/schema\/person\/9dcc75cc9a1a2d645b86b6c4b1ed84c7","name":"Eduardo Ram\u00edrez","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/fd3dbfe1515572f29b43bdd3cb9da7db88701fa9703845379f81ca82b652f825?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd3dbfe1515572f29b43bdd3cb9da7db88701fa9703845379f81ca82b652f825?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fd3dbfe1515572f29b43bdd3cb9da7db88701fa9703845379f81ca82b652f825?s=96&d=mm&r=g","caption":"Eduardo Ram\u00edrez"},"sameAs":["http:\/\/www.iterati.com.mx"],"url":"https:\/\/www.iterati.com.mx\/posts\/author\/db645335530\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.iterati.com.mx\/posts\/wp-content\/uploads\/2018\/06\/new-standard-in-DNS-security-2016-thumb.png?fit=451%2C584&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8hDb4-4m","jetpack-related-posts":[{"id":296,"url":"https:\/\/www.iterati.com.mx\/posts\/dns-es-una-puerta-abierta-a-los-cibercriminales-como-mitigar-la-brecha-con-infoblox-actionable-network-intelligence\/","url_meta":{"origin":270,"position":0},"title":"DNS es una puerta abierta a los cibercriminales, como mitigar la brecha con Infoblox Actionable Network Intelligence","author":"Eduardo Ram\u00edrez","date":"13 agosto, 2018","format":false,"excerpt":"Entienda porque DNS es una puerta abierta a los cibercriminales y como mitigar la brecha con Infoblox Actionable Network Intelligence A pesar de todas sus inversiones en seguridad, su red a\u00fan est\u00e1 abierta a una amplia gama de ciberamenazas. Infoblox DNS Infoblox Actionable Network Intelligence lo ayudara. Eso se debe\u2026","rel":"","context":"En &quot;Seguridad&quot;","block_context":{"text":"Seguridad","link":"https:\/\/www.iterati.com.mx\/posts\/category\/seguridad\/"},"img":{"alt_text":"Infoblox Actionable Network Intelligence","src":"https:\/\/i0.wp.com\/www.iterati.com.mx\/posts\/wp-content\/uploads\/2018\/08\/infoblox.jpg?fit=598%2C384&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.iterati.com.mx\/posts\/wp-content\/uploads\/2018\/08\/infoblox.jpg?fit=598%2C384&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.iterati.com.mx\/posts\/wp-content\/uploads\/2018\/08\/infoblox.jpg?fit=598%2C384&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":95,"url":"https:\/\/www.iterati.com.mx\/posts\/ddi-dns-dhcp-and-ipam-infoblox\/","url_meta":{"origin":270,"position":1},"title":"DDI (DNS, DHCP and IPAM) de INFOBLOX","author":"Eduardo Ram\u00edrez","date":"25 noviembre, 2020","format":false,"excerpt":"DDI (DNS, DHCP and IPAM) de INFOBLOX DDI: Proporciona un gran nivel de disponibilidad, escalabilidad el\u00e1stica y seguridad avanzada, todo ello integrado en una base de gesti\u00f3n y automatizaci\u00f3n impulsada por las normativas. DDI\u00a0asegura una alta disponibilidad de DNS, DHCP, IPAM y servicios a trav\u00e9s de su red distribuida. Infoblox\u2026","rel":"","context":"En &quot;Sin categor\u00eda&quot;","block_context":{"text":"Sin categor\u00eda","link":"https:\/\/www.iterati.com.mx\/posts\/category\/sin-categoria\/"},"img":{"alt_text":"Windows Server 2016","src":"https:\/\/i0.wp.com\/www.iterati.com.mx\/posts\/wp-content\/uploads\/2017\/07\/Picture1.jpg?fit=593%2C310&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.iterati.com.mx\/posts\/wp-content\/uploads\/2017\/07\/Picture1.jpg?fit=593%2C310&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.iterati.com.mx\/posts\/wp-content\/uploads\/2017\/07\/Picture1.jpg?fit=593%2C310&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":348,"url":"https:\/\/www.iterati.com.mx\/posts\/predicciones-de-ciberseguridad-para-2020\/","url_meta":{"origin":270,"position":2},"title":"Predicciones de CiberSeguridad para 2020","author":"Eduardo Ram\u00edrez","date":"25 noviembre, 2019","format":false,"excerpt":"CheckPoint ha presentado sus predicciones de seguridad cibern\u00e9tica para 2020. Estas ideas provienen de investigadores de CheckPoint, quienes se\u00f1alan los principales incidentes cibern\u00e9ticos y desarrollos tecnol\u00f3gicos que impactar\u00e1n nuestras sociedades y negocios en el pr\u00f3ximo a\u00f1o. La retrospectiva es la visi\u00f3n 20\/20, como dice el viejo refr\u00e1n: siempre es f\u00e1cil\u2026","rel":"","context":"En &quot;Sin categor\u00eda&quot;","block_context":{"text":"Sin categor\u00eda","link":"https:\/\/www.iterati.com.mx\/posts\/category\/sin-categoria\/"},"img":{"alt_text":"Checkpoint","src":"https:\/\/i0.wp.com\/www.iterati.com.mx\/posts\/wp-content\/uploads\/2018\/08\/800x500_check_point_0_0.png?fit=800%2C500&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.iterati.com.mx\/posts\/wp-content\/uploads\/2018\/08\/800x500_check_point_0_0.png?fit=800%2C500&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.iterati.com.mx\/posts\/wp-content\/uploads\/2018\/08\/800x500_check_point_0_0.png?fit=800%2C500&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.iterati.com.mx\/posts\/wp-content\/uploads\/2018\/08\/800x500_check_point_0_0.png?fit=800%2C500&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":119,"url":"https:\/\/www.iterati.com.mx\/posts\/5-consejos-luchar-contra-ransomware\/","url_meta":{"origin":270,"position":3},"title":"5 consejos para luchar contra Ransomware","author":"Eduardo Ram\u00edrez","date":"17 enero, 2017","format":false,"excerpt":"\u00a0 1. Copia de seguridad de sus datos y archivos Con el advenimiento de redes m\u00e1s confiables y almacenamiento basado en nube, muchos de nosotros simplemente han salido del h\u00e1bito de hacer copias de seguridad de archivos y datos. Sin embargo, en el caso de un ataque de ransomware, puede\u2026","rel":"","context":"En &quot;Sin categor\u00eda&quot;","block_context":{"text":"Sin categor\u00eda","link":"https:\/\/www.iterati.com.mx\/posts\/category\/sin-categoria\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":246,"url":"https:\/\/www.iterati.com.mx\/posts\/funcionan-las-vulnerabilidades-spectre-meltdown-equipo-investigacion-check-point\/","url_meta":{"origin":270,"position":4},"title":"C\u00f3mo funcionan las vulnerabilidades Spectre \/ Meltdown por el equipo de investigaci\u00f3n de Check Point.","author":"Eduardo Ram\u00edrez","date":"15 enero, 2018","format":false,"excerpt":"Por el equipo de investigaci\u00f3n de Check Point. Las vulnerabilidades de Spectre y Meltdown descubiertas recientemente en los procesadores Intel, AMD y ARM son bastante complejas. En esta publicaci\u00f3n trataremos de simplificar cu\u00e1l es el problema, c\u00f3mo podr\u00eda afectar a su negocio y qu\u00e9 medidas se pueden tomar para protegerse\u2026","rel":"","context":"En &quot;Sin categor\u00eda&quot;","block_context":{"text":"Sin categor\u00eda","link":"https:\/\/www.iterati.com.mx\/posts\/category\/sin-categoria\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.checkpoint.com\/wp-content\/uploads\/2018\/01\/CHIP_Blog_260x260-2.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":285,"url":"https:\/\/www.iterati.com.mx\/posts\/checkpoint-sandblast-agent-ciberamenazas-evolucionan-a-5ta-generacion-evolucione-en-su-seguridad\/","url_meta":{"origin":270,"position":5},"title":"Ciberamenazas evolucionan a 5ta generaci\u00f3n , evolucione en su seguridad Checkpoint Sandblast Agent","author":"Eduardo Ram\u00edrez","date":"9 agosto, 2018","format":false,"excerpt":"Comprenda las amenazas de hoy en d\u00eda y prot\u00e9jase con Checkpoint Sandblast Agent. Hoy en d\u00eda nos encontramos ante la quinta generaci\u00f3n de ciberataques y en plena batalla contra los mas impactante y avanzados \"mega ataques\" multivector a gran escala. Las generaciones previas de ciberseguridad ya no son efectivas. Es\u2026","rel":"","context":"En &quot;Checkpoint&quot;","block_context":{"text":"Checkpoint","link":"https:\/\/www.iterati.com.mx\/posts\/category\/checkpoint\/"},"img":{"alt_text":"Checkpoint GenV Sandblast agent","src":"https:\/\/i0.wp.com\/www.iterati.com.mx\/posts\/wp-content\/uploads\/2018\/08\/Resources-Featured-GenV-352x332.jpg?fit=352%2C332&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.iterati.com.mx\/posts\/wp-json\/wp\/v2\/posts\/270","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.iterati.com.mx\/posts\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iterati.com.mx\/posts\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iterati.com.mx\/posts\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iterati.com.mx\/posts\/wp-json\/wp\/v2\/comments?post=270"}],"version-history":[{"count":1,"href":"https:\/\/www.iterati.com.mx\/posts\/wp-json\/wp\/v2\/posts\/270\/revisions"}],"predecessor-version":[{"id":271,"href":"https:\/\/www.iterati.com.mx\/posts\/wp-json\/wp\/v2\/posts\/270\/revisions\/271"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iterati.com.mx\/posts\/wp-json\/wp\/v2\/media\/269"}],"wp:attachment":[{"href":"https:\/\/www.iterati.com.mx\/posts\/wp-json\/wp\/v2\/media?parent=270"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iterati.com.mx\/posts\/wp-json\/wp\/v2\/categories?post=270"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iterati.com.mx\/posts\/wp-json\/wp\/v2\/tags?post=270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}