{"id":47050,"date":"2024-04-23T13:53:38","date_gmt":"2024-04-23T11:53:38","guid":{"rendered":"https:\/\/www.tecsens.com\/gestionar-la-seguretat-en-entorns-byod\/"},"modified":"2024-07-30T14:07:25","modified_gmt":"2024-07-30T12:07:25","slug":"gestionar-la-seguretat-en-entorns-byod","status":"publish","type":"post","link":"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/","title":{"rendered":"Gestionar la seguretat en entorns BYOD"},"content":{"rendered":"\n<p>En l&#8217;actualitat, el concepte de Bring Your Own Device (BYOD) ha guanyat popularitat en nombroses organitzacions. Aquesta pr\u00e0ctica permet als empleats utilitzar els seus propis dispositius, com tel\u00e8fons intel\u00b7ligents, tauletes i computadores port\u00e0tils, per realitzar tasques laborals en lloc de dependre \u00fanicament dels dispositius proporcionats per l&#8217;empresa. No obstant aix\u00f2, tot i que BYOD ofereix una s\u00e8rie de beneficis, tamb\u00e9 presenta desafiaments significatius, especialment pel que fa a la seguretat de les dades i la gesti\u00f3 de la informaci\u00f3. A continuaci\u00f3, explorarem aquests aspectes i algunes estrat\u00e8gies per gestionar la seguretat en entorns BYOD amb Comunicacions Unificades (UC).<\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>Desafiaments d&#8217; entorns BYOD:<\/strong><\/h2>\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li><strong>Seguretat de Dades<\/strong>: Un dels principals desafiaments de permetre que els empleats utilitzin els seus propis dispositius \u00e9s la seguretat de les dades. Els dispositius personals poden no tenir les mateixes mesures de seguretat que els dispositius corporatius, cosa que augmenta el risc de p\u00e8rdua o robatori de dades confidencials.<\/li>\n\n\n\n<li><strong>Compatibilitat i Gesti\u00f3 de Plataformes:<\/strong> La diversitat de dispositius i sistemes operatius en un entorn BYOD pot dificultar la compatibilitat i la gesti\u00f3 efectiva de les plataformes. Aix\u00f2 pot portar a problemes d&#8217; integraci\u00f3 amb les eines i aplicacions empresarials.<\/li>\n\n\n\n<li><strong>Compliment Normatiu:<\/strong> La varietat de dispositius i la naturalesa dispersa de les dades poden dificultar el compliment de regulacions i est\u00e0ndards de seguretat, com el Reglament General de Protecci\u00f3 de Dades (GDPR) a Europa o la Llei de Privacitat del Consumidor de Calif\u00f2rnia (CCPA).<\/li>\n\n\n\n<li><strong>A\u00efllament de Dades Personals i Professionals:<\/strong> \u00c9s fonamental establir pol\u00edtiques clares per separar les dades personals de les dades corporatives en dispositius BYOD. Aix\u00f2 pot ser un desafiament, ja que els empleats sovint utilitzen els mateixos dispositius per a activitats personals i professionals.<\/li>\n<\/ol>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.tecsens.com\/ca\/?page_id=45850\">M\u00e9s sobre seguretat<\/a><\/div>\n<\/div>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>Beneficis d&#8217; entorns BYOD:<\/strong><\/h2>\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li><strong>Productivitat Millorada:<\/strong> Permetre que els empleats utilitzin els seus propis dispositius pot augmentar la productivitat en permetre&#8217; ls treballar des de qualsevol lloc i en qualsevol moment, utilitzant les eines amb les quals estan m\u00e9s familiaritzats.<\/li>\n\n\n\n<li><strong>Reducci\u00f3 de Costos:<\/strong> En aprofitar els dispositius personals dels empleats, les organitzacions poden reduir els costos associats amb la compra i manteniment de maquinari.<\/li>\n\n\n\n<li><strong>Flexibilitat i Satisfacci\u00f3 de l&#8217; Empleat:<\/strong> BYOD brinda als empleats la flexibilitat per triar els seus propis dispositius i aplicacions, cosa que pot augmentar la satisfacci\u00f3 laboral i la moral.<\/li>\n<\/ol>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>Estrat\u00e8gies per Gestionar la Seguretat en Entorns BYOD amb UC:<\/strong><\/h2>\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li><strong>Pol\u00edtiques de Seguretat Claras:<\/strong> \u00c9s fonamental establir pol\u00edtiques clares i precises que defineixin els requisits de seguretat i privacitat per als dispositius BYOD. Aix\u00f2 inclou l&#8217; \u00fas de contrasenyes fortes, encriptaci\u00f3 de dades i programari de seguretat actualitzat.<\/li>\n\n\n\n<li><strong>Segmentaci\u00f3 de Xarxes:<\/strong> Implementar una segmentaci\u00f3 de xarxes que separi els dispositius BYOD de la xarxa principal de l&#8217; empresa pot ajudar a reduir el risc d&#8217; acc\u00e9s no autoritzat a les dades corporatives.<\/li>\n\n\n\n<li><strong>Gesti\u00f3 de Dispositius M\u00f2bils (MDM):<\/strong> Utilitzar solucions de MDM que permetin als administradors de TI gestionar de forma centralitzada els dispositius BYOD. Aix\u00f2 inclou la capacitat d&#8217; aplicar pol\u00edtiques de seguretat, realitzar actualitzacions de programari i fer un seguiment de l&#8217; inventari de dispositius.<\/li>\n\n\n\n<li><strong>Educaci\u00f3 i Concientitzaci\u00f3:<\/strong> Capacitar els empleats sobre les millors pr\u00e0ctiques de seguretat i concientitzar-los sobre els riscos associats amb l&#8217; \u00fas de dispositius personals per a activitats laborals pot ajudar a mitigar les amenaces de seguretat.<\/li>\n<\/ol>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>En conclusi\u00f3, permetre que els empleats utilitzin els seus propis dispositius en el treball pot oferir una s\u00e8rie de beneficis, com una major productivitat i flexibilitat, per\u00f2 tamb\u00e9 planteja desafiaments significatius en termes de seguretat de dades i gesti\u00f3 de la informaci\u00f3. Implementar estrat\u00e8gies adequades de seguretat i gesti\u00f3 de dispositius \u00e9s crucial per mitigar aquests riscos i aprofitar al m\u00e0xim els beneficis de BYOD en entorns de Comunicacions Unificades.<\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-2 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.tecsens.com\/ca\/contacte-2\/\">T&#8217;assessorem?<\/a><\/div>\n<\/div>\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>En l&#8217;actualitat, el concepte de Bring Your Own Device (BYOD) ha guanyat popularitat en nombroses organitzacions. Aquesta pr\u00e0ctica permet als empleats utilitzar els seus propis dispositius, com tel\u00e8fons intel\u00b7ligents, tauletes i computadores port\u00e0tils, per realitzar tasques laborals en lloc de dependre \u00fanicament dels dispositius proporcionats per l&#8217;empresa. No obstant aix\u00f2, tot i que BYOD ofereix [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":46909,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[496,497,494],"tags":[175,381,177],"class_list":["post-47050","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-consulting-ca","category-seguretat-ti","category-voice","tag-network-ca","tag-seguretat","tag-voip-ca"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gestionar la seguretat en entorns BYOD - Tecsens -<\/title>\n<meta name=\"description\" content=\"BYOD ofereix una s\u00e8rie de beneficis, tamb\u00e9 presenta desafiaments significatius. Estrat\u00e8gies per gestionar la seguretat en entorns BYOD amb Comunicacions Unificades (UC).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gestionar la seguretat en entorns BYOD - Tecsens -\" \/>\n<meta property=\"og:description\" content=\"BYOD ofereix una s\u00e8rie de beneficis, tamb\u00e9 presenta desafiaments significatius. Estrat\u00e8gies per gestionar la seguretat en entorns BYOD amb Comunicacions Unificades (UC).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/\" \/>\n<meta property=\"og:site_name\" content=\"Tecsens\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-23T11:53:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-30T12:07:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/04\/Gestionar-la-seguridad-en-entornos-BYOD-06-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1442\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TECSENS Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TECSENS Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/\"},\"author\":{\"name\":\"TECSENS Marketing\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\"},\"headline\":\"Gestionar la seguretat en entorns BYOD\",\"datePublished\":\"2024-04-23T11:53:38+00:00\",\"dateModified\":\"2024-07-30T12:07:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/\"},\"wordCount\":638,\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/04\/Gestionar-la-seguridad-en-entornos-BYOD-06-scaled.jpg\",\"keywords\":[\"network\",\"Seguretat\",\"voip\"],\"articleSection\":[\"Consulting\",\"Seguretat TI\",\"Voice\"],\"inLanguage\":\"ca-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/\",\"url\":\"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/\",\"name\":\"Gestionar la seguretat en entorns BYOD - Tecsens -\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/04\/Gestionar-la-seguridad-en-entornos-BYOD-06-scaled.jpg\",\"datePublished\":\"2024-04-23T11:53:38+00:00\",\"dateModified\":\"2024-07-30T12:07:25+00:00\",\"description\":\"BYOD ofereix una s\u00e8rie de beneficis, tamb\u00e9 presenta desafiaments significatius. Estrat\u00e8gies per gestionar la seguretat en entorns BYOD amb Comunicacions Unificades (UC).\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/#breadcrumb\"},\"inLanguage\":\"ca-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/#primaryimage\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/04\/Gestionar-la-seguridad-en-entornos-BYOD-06-scaled.jpg\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/04\/Gestionar-la-seguridad-en-entornos-BYOD-06-scaled.jpg\",\"width\":2560,\"height\":1442,\"caption\":\"Gestionar la seguretat en entorns BYOD\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.tecsens.com\/ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gestionar la seguretat en entorns BYOD\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tecsens.com\/#website\",\"url\":\"https:\/\/www.tecsens.com\/\",\"name\":\"TECSENS - Empowering companies\",\"description\":\"Sense &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tecsens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tecsens.com\/#organization\",\"name\":\"TECSENS\",\"url\":\"https:\/\/www.tecsens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"width\":411,\"height\":85,\"caption\":\"TECSENS\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/tecsens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\",\"name\":\"TECSENS Marketing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"caption\":\"TECSENS Marketing\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gestionar la seguretat en entorns BYOD - Tecsens -","description":"BYOD ofereix una s\u00e8rie de beneficis, tamb\u00e9 presenta desafiaments significatius. Estrat\u00e8gies per gestionar la seguretat en entorns BYOD amb Comunicacions Unificades (UC).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/","og_locale":"ca_ES","og_type":"article","og_title":"Gestionar la seguretat en entorns BYOD - Tecsens -","og_description":"BYOD ofereix una s\u00e8rie de beneficis, tamb\u00e9 presenta desafiaments significatius. Estrat\u00e8gies per gestionar la seguretat en entorns BYOD amb Comunicacions Unificades (UC).","og_url":"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/","og_site_name":"Tecsens","article_published_time":"2024-04-23T11:53:38+00:00","article_modified_time":"2024-07-30T12:07:25+00:00","og_image":[{"width":2560,"height":1442,"url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/04\/Gestionar-la-seguridad-en-entornos-BYOD-06-scaled.jpg","type":"image\/jpeg"}],"author":"TECSENS Marketing","twitter_card":"summary_large_image","twitter_misc":{"Written by":"TECSENS Marketing","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/#article","isPartOf":{"@id":"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/"},"author":{"name":"TECSENS Marketing","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd"},"headline":"Gestionar la seguretat en entorns BYOD","datePublished":"2024-04-23T11:53:38+00:00","dateModified":"2024-07-30T12:07:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/"},"wordCount":638,"publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"image":{"@id":"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/04\/Gestionar-la-seguridad-en-entornos-BYOD-06-scaled.jpg","keywords":["network","Seguretat","voip"],"articleSection":["Consulting","Seguretat TI","Voice"],"inLanguage":"ca-ES"},{"@type":"WebPage","@id":"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/","url":"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/","name":"Gestionar la seguretat en entorns BYOD - Tecsens -","isPartOf":{"@id":"https:\/\/www.tecsens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/#primaryimage"},"image":{"@id":"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/04\/Gestionar-la-seguridad-en-entornos-BYOD-06-scaled.jpg","datePublished":"2024-04-23T11:53:38+00:00","dateModified":"2024-07-30T12:07:25+00:00","description":"BYOD ofereix una s\u00e8rie de beneficis, tamb\u00e9 presenta desafiaments significatius. Estrat\u00e8gies per gestionar la seguretat en entorns BYOD amb Comunicacions Unificades (UC).","breadcrumb":{"@id":"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/#breadcrumb"},"inLanguage":"ca-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/"]}]},{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/#primaryimage","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/04\/Gestionar-la-seguridad-en-entornos-BYOD-06-scaled.jpg","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/04\/Gestionar-la-seguridad-en-entornos-BYOD-06-scaled.jpg","width":2560,"height":1442,"caption":"Gestionar la seguretat en entorns BYOD"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecsens.com\/ca\/gestionar-la-seguretat-en-entorns-byod\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.tecsens.com\/ca\/"},{"@type":"ListItem","position":2,"name":"Gestionar la seguretat en entorns BYOD"}]},{"@type":"WebSite","@id":"https:\/\/www.tecsens.com\/#website","url":"https:\/\/www.tecsens.com\/","name":"TECSENS - Empowering companies","description":"Sense &amp; Technology","publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecsens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca-ES"},{"@type":"Organization","@id":"https:\/\/www.tecsens.com\/#organization","name":"TECSENS","url":"https:\/\/www.tecsens.com\/","logo":{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","width":411,"height":85,"caption":"TECSENS"},"image":{"@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/tecsens\/"]},{"@type":"Person","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd","name":"TECSENS Marketing","image":{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","caption":"TECSENS Marketing"}}]}},"_links":{"self":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts\/47050","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/comments?post=47050"}],"version-history":[{"count":1,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts\/47050\/revisions"}],"predecessor-version":[{"id":47051,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts\/47050\/revisions\/47051"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/media\/46909"}],"wp:attachment":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/media?parent=47050"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/categories?post=47050"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/tags?post=47050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}