{"id":29263,"date":"2022-06-20T16:46:25","date_gmt":"2022-06-20T14:46:25","guid":{"rendered":"https:\/\/www.tecsens.com\/com-saber-si-un-cloud-es-segur\/"},"modified":"2022-06-20T16:46:27","modified_gmt":"2022-06-20T14:46:27","slug":"com-saber-si-un-cloud-es-segur","status":"publish","type":"post","link":"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/","title":{"rendered":"Com saber si un cloud \u00e9s segur"},"content":{"rendered":"\n<p>A causa del panorama actual en el qual es produeixen cents de ciberatacs diaris, la seguretat de la informaci\u00f3 es torna prioritat per a qualsevol empresa. Cada vegada s\u00f3n m\u00e9s les empreses que aposten per migrar les seves aplicacions i dades al cloud, per la qual cosa aquesta prioritat per la seguretat augmenta.  <strong>Elegir un prove\u00efdor cloud amb infraestructures de seguretat avan\u00e7ades que garanteixin el m\u00e0xim nivell de seguretat en els accessos remots als seus servidors no \u00e9s f\u00e0cil i s&#8217; han de tenir en compte una s\u00e8rie de caracter\u00edstiques.  <\/strong>Et comptem els motius de<strong>  com saber si un cloud \u00e9s segur.<\/strong><\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>Aspectes pels quals saber si un cloud \u00e9s segur<\/strong><\/h2>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>Malgrat les pors de moltes dades i aplicacions al n\u00favol en l&#8217;actualitat ofereix molta m\u00e9s seguretat que guardar-lo en servidors o dispositius locals. No obstant aix\u00f2, sempre cal analitzar el que ofereixen els diferents prove\u00efdors d&#8217; infraestructures cloud i <strong>tenir en compte els seg\u00fcents aspectes relacionats amb la seguretat de les seves infraestructures:<\/strong><\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\"><strong>Encriptaci\u00f3 de dades<\/strong><\/h3>\n\n<p>Utilitzaci\u00f3 de certificats de seguretat SSL i TCL perqu\u00e8 totes les dades que s\u00f3n transferides s&#8217; encriptin i si un tercer no autoritzat arrib\u00e9s a interceptar dades no podria accedir sense disposar de claus de desencriptaci\u00f3.<\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"\" target=\"_blank\" rel=\"noreferrer noopener\">certificats SSL<\/a><\/div>\n<\/div>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\"><strong>Seguretat f\u00edsica en els data centers i certificacions<\/strong><\/h3>\n\n<p>No tothom \u00e9s conscient que la seguretat dels data centers \u00e9s fonamental ja que d&#8217;aix\u00f2 dep\u00e8n la integritat, disponibilitat i confidencialitat de les dades. Per a aix\u00f2 han de comptar amb:<\/p>\n\n<ul class=\"wp-block-list\"><li>Sistemes de contenci\u00f3 de seguretat de diverses etapes<\/li><\/ul>\n<ul class=\"wp-block-list\"><li>Autentificaci\u00f3 biom\u00e8trica i acc\u00e9s amb targetes RFID<\/li><\/ul>\n<ul class=\"wp-block-list\"><li>Sistemes de detecci\u00f3 d&#8217; intrusos<\/li><\/ul>\n<ul class=\"wp-block-list\"><li>Cobertura de CCTV interna i externa 24&#215;7<\/li><\/ul>\n<ul class=\"wp-block-list\"><li>Sales de dades, suites i g\u00e0bies dedicades per minimitzar el tr\u00e0nsit<\/li><\/ul>\n<ul class=\"wp-block-list\"><li>Serveis NOC in situ 24&#215;7<\/li><\/ul>\n<ul class=\"wp-block-list\"><li>Sistemes d&#8217; energia alternatius per poder fer front davant de possibles talls de subministrament el\u00e8ctric.<\/li><\/ul>\n<p>A m\u00e9s de la seguretat f\u00edsica dels data centers \u00e9s molt important que aquests comptin amb certificacions de qualitat com ho s\u00f3n les TIER. Les certificacions TIER s\u00f3n classificacions reconegudes globalment, que valoren l&#8217; estructura, disseny, acompliment i fiabilitat d&#8217; un Data Center<em>.<\/em> Finalment, \u00e9s important comptar amb la certificaci\u00f3 pci-DSS (In progress), ISO 27001, 50001, Tiers III i el compliment ENS a Espanya.<\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\"><strong>Plataforma de gesti\u00f3<\/strong><\/h3>\n\n<p>Amb una plataforma de gesti\u00f3 pr\u00f2pia del cloud \u00e9s possible fer un seguiment i control a trav\u00e9s del monitoratge de la infraestructura. D&#8217; aquesta manera es poden detectar possibles intrusions o fallades en el sistema.<\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\"><strong>Accessos segurs<\/strong><\/h3>\n\n<p>Aquest \u00e9s un dels punts m\u00e9s cr\u00edtics en un cloud i \u00e9s l&#8217; acc\u00e9s dels usuaris als diferents serveis, per garantir el nivell de seguretat s&#8217; ha de fer servir:<\/p>\n\n<ul class=\"wp-block-list\"><li>Pol\u00edtiques d&#8217; acc\u00e9s<\/li><\/ul>\n<ul class=\"wp-block-list\"><li>Contrasenyes segures<\/li><\/ul>\n<ul class=\"wp-block-list\"><li>Sistemes de doble factor d&#8217; autenticaci\u00f3.<\/li><\/ul>\n<ul class=\"wp-block-list\"><li>Connexi\u00f3 a trav\u00e9s de VPN<\/li><\/ul>\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-2 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.tecsens.com\/ca\/serveis-internet-empreses\/seguretat-informatica\/\" target=\"_blank\" rel=\"noreferrer noopener\">M\u00e9s sobre VPN<\/a><\/div>\n<\/div>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\"><strong>Plans de conting\u00e8ncia<\/strong><\/h3>\n\n<p>Una cosa imprescindible \u00e9s comptar amb un pla de conting\u00e8ncia i m\u00e9s quan es tracta d&#8217;una infraestructura cloud. Dins d&#8217; ells s&#8217; ha d&#8217; analitzar que necessitats requereix el client i decidir si cal aplicar serveis de BaaS, DRaaS o fins i tot la combinaci\u00f3 d&#8217; ambd\u00f3s.<\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\"><strong>Alta disponibilitat, visibilitat i transpar\u00e8ncia<\/strong><\/h3>\n\n<p>Comptant amb sistemes de virtualitzaci\u00f3 la disponibilitat augmenta, garantint aix\u00ed el seu correcte funcionament. A m\u00e9s, gr\u00e0cies als sistemes de monitoratge que inclouen les plataformes cloud es permet apreciar l&#8217;entorn i detectar qualsevol incid\u00e8ncia.<\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\"><strong>Sistemes de control i protecci\u00f3 de dades<\/strong><\/h3>\n\n<p>Con\u00e8ixer els sistemes de protecci\u00f3 de dades utilitzats pel prove\u00efdor cloud \u00e9s imprescindible, ja que d&#8217; aix\u00f2 dependr\u00e0 la seguretat de la informaci\u00f3. Comptar amb certificacions ISO com la 27001 que garanteix la seguretat de la informaci\u00f3, formaci\u00f3 dels empleats, auditories i controls peri\u00f2dics. A m\u00e9s d&#8217; incorporar eines automatitzades per a la inspecci\u00f3 i control de possibles vulnerabilitats, incompliments de pol\u00edtiques de seguretat, dispositius no autoritzats, programari desactualitzat etc.<\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h4 class=\"wp-block-heading\">Les nostres solucions cloud compleixen amb tots aquests requisits que garanteixen que s\u00f3n entorns segurs. Encara et queden dubtes?<\/h4>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-3 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.tecsens.com\/ca\/contacte-2\/\" target=\"_blank\" rel=\"noreferrer noopener\">Sol\u00b7licitar consultoria<\/a><\/div>\n<\/div>\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A causa del panorama actual en el qual es produeixen cents de ciberatacs diaris, la seguretat de la informaci\u00f3 es torna prioritat per a qualsevol empresa. Cada vegada s\u00f3n m\u00e9s les empreses que aposten per migrar les seves aplicacions i dades al cloud, per la qual cosa aquesta prioritat per la seguretat augmenta. Elegir un [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":28710,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[498,496,497],"tags":[157,390,110,459,133,381],"class_list":["post-29263","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-ca","category-consulting-ca","category-seguretat-ti","tag-backup-ca","tag-ciberseguretat","tag-cloud-ca","tag-cloudbackup","tag-consultoria-ca","tag-seguretat"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Com saber si un cloud \u00e9s segur - Tecsens -<\/title>\n<meta name=\"description\" content=\"Per triar un prove\u00efdor cloud amb entorns segurs s&#039; han de tenir en compte unes caracter\u00edstiques. Et comptem com saber si un cloud \u00e9s segur.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Com saber si un cloud \u00e9s segur - Tecsens -\" \/>\n<meta property=\"og:description\" content=\"Per triar un prove\u00efdor cloud amb entorns segurs s&#039; han de tenir en compte unes caracter\u00edstiques. Et comptem com saber si un cloud \u00e9s segur.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/\" \/>\n<meta property=\"og:site_name\" content=\"Tecsens\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-20T14:46:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-20T14:46:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/05\/TECSENS_Como-saber-si-un-cloud-es-seguro-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1442\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TECSENS Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TECSENS Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/\"},\"author\":{\"name\":\"TECSENS Marketing\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\"},\"headline\":\"Com saber si un cloud \u00e9s segur\",\"datePublished\":\"2022-06-20T14:46:25+00:00\",\"dateModified\":\"2022-06-20T14:46:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/\"},\"wordCount\":695,\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/05\/TECSENS_Como-saber-si-un-cloud-es-seguro-scaled.jpg\",\"keywords\":[\"backup\",\"Ciberseguretat\",\"Cloud\",\"CloudBackup\",\"Consultoria\",\"Seguretat\"],\"articleSection\":[\"Cloud\",\"Consulting\",\"Seguretat TI\"],\"inLanguage\":\"ca-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/\",\"url\":\"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/\",\"name\":\"Com saber si un cloud \u00e9s segur - Tecsens -\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/05\/TECSENS_Como-saber-si-un-cloud-es-seguro-scaled.jpg\",\"datePublished\":\"2022-06-20T14:46:25+00:00\",\"dateModified\":\"2022-06-20T14:46:27+00:00\",\"description\":\"Per triar un prove\u00efdor cloud amb entorns segurs s' han de tenir en compte unes caracter\u00edstiques. Et comptem com saber si un cloud \u00e9s segur.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/#breadcrumb\"},\"inLanguage\":\"ca-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/#primaryimage\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/05\/TECSENS_Como-saber-si-un-cloud-es-seguro-scaled.jpg\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/05\/TECSENS_Como-saber-si-un-cloud-es-seguro-scaled.jpg\",\"width\":2560,\"height\":1442,\"caption\":\"Com saber si un cloud \u00e9s segur\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.tecsens.com\/ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Com saber si un cloud \u00e9s segur\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tecsens.com\/#website\",\"url\":\"https:\/\/www.tecsens.com\/\",\"name\":\"TECSENS - Empowering companies\",\"description\":\"Sense &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tecsens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tecsens.com\/#organization\",\"name\":\"TECSENS\",\"url\":\"https:\/\/www.tecsens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"width\":411,\"height\":85,\"caption\":\"TECSENS\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/tecsens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\",\"name\":\"TECSENS Marketing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"caption\":\"TECSENS Marketing\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Com saber si un cloud \u00e9s segur - Tecsens -","description":"Per triar un prove\u00efdor cloud amb entorns segurs s' han de tenir en compte unes caracter\u00edstiques. Et comptem com saber si un cloud \u00e9s segur.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/","og_locale":"ca_ES","og_type":"article","og_title":"Com saber si un cloud \u00e9s segur - Tecsens -","og_description":"Per triar un prove\u00efdor cloud amb entorns segurs s' han de tenir en compte unes caracter\u00edstiques. Et comptem com saber si un cloud \u00e9s segur.","og_url":"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/","og_site_name":"Tecsens","article_published_time":"2022-06-20T14:46:25+00:00","article_modified_time":"2022-06-20T14:46:27+00:00","og_image":[{"width":2560,"height":1442,"url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/05\/TECSENS_Como-saber-si-un-cloud-es-seguro-scaled.jpg","type":"image\/jpeg"}],"author":"TECSENS Marketing","twitter_card":"summary_large_image","twitter_misc":{"Written by":"TECSENS Marketing","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/#article","isPartOf":{"@id":"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/"},"author":{"name":"TECSENS Marketing","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd"},"headline":"Com saber si un cloud \u00e9s segur","datePublished":"2022-06-20T14:46:25+00:00","dateModified":"2022-06-20T14:46:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/"},"wordCount":695,"publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"image":{"@id":"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/05\/TECSENS_Como-saber-si-un-cloud-es-seguro-scaled.jpg","keywords":["backup","Ciberseguretat","Cloud","CloudBackup","Consultoria","Seguretat"],"articleSection":["Cloud","Consulting","Seguretat TI"],"inLanguage":"ca-ES"},{"@type":"WebPage","@id":"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/","url":"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/","name":"Com saber si un cloud \u00e9s segur - Tecsens -","isPartOf":{"@id":"https:\/\/www.tecsens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/#primaryimage"},"image":{"@id":"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/05\/TECSENS_Como-saber-si-un-cloud-es-seguro-scaled.jpg","datePublished":"2022-06-20T14:46:25+00:00","dateModified":"2022-06-20T14:46:27+00:00","description":"Per triar un prove\u00efdor cloud amb entorns segurs s' han de tenir en compte unes caracter\u00edstiques. Et comptem com saber si un cloud \u00e9s segur.","breadcrumb":{"@id":"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/#breadcrumb"},"inLanguage":"ca-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/"]}]},{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/#primaryimage","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/05\/TECSENS_Como-saber-si-un-cloud-es-seguro-scaled.jpg","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/05\/TECSENS_Como-saber-si-un-cloud-es-seguro-scaled.jpg","width":2560,"height":1442,"caption":"Com saber si un cloud \u00e9s segur"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecsens.com\/ca\/com-saber-si-un-cloud-es-segur\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.tecsens.com\/ca\/"},{"@type":"ListItem","position":2,"name":"Com saber si un cloud \u00e9s segur"}]},{"@type":"WebSite","@id":"https:\/\/www.tecsens.com\/#website","url":"https:\/\/www.tecsens.com\/","name":"TECSENS - Empowering companies","description":"Sense &amp; Technology","publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecsens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca-ES"},{"@type":"Organization","@id":"https:\/\/www.tecsens.com\/#organization","name":"TECSENS","url":"https:\/\/www.tecsens.com\/","logo":{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","width":411,"height":85,"caption":"TECSENS"},"image":{"@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/tecsens\/"]},{"@type":"Person","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd","name":"TECSENS Marketing","image":{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","caption":"TECSENS Marketing"}}]}},"_links":{"self":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts\/29263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/comments?post=29263"}],"version-history":[{"count":1,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts\/29263\/revisions"}],"predecessor-version":[{"id":29264,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts\/29263\/revisions\/29264"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/media\/28710"}],"wp:attachment":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/media?parent=29263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/categories?post=29263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/tags?post=29263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}