{"id":5184,"date":"2022-04-26T07:47:18","date_gmt":"2022-04-26T07:47:18","guid":{"rendered":"http:\/\/www.newadqa.com.mialias.net\/cloud-security-seguridad-nuve\/"},"modified":"2022-06-09T09:26:30","modified_gmt":"2022-06-09T09:26:30","slug":"cloud-security-seguretat-nuvol","status":"publish","type":"post","link":"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/","title":{"rendered":"Cloud Security: La seguretat al n\u00favol"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"5184\" class=\"elementor elementor-5184 elementor-3668\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e888a82 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e888a82\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dcb5d22\" data-id=\"dcb5d22\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8b64c97 elementor-widget elementor-widget-text-editor\" data-id=\"8b64c97\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 08-05-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>Les dades, la infraestructura, els sistemes i les aplicacions del n\u00favol s&#8217;han de protegir de les amenaces d&#8217;Internet; La seguretat al n\u00favol implica desenvolupar tecnologies, controls i procediments de seguretat que garanteixin aquesta protecci\u00f3. <a href=\"\/ca\/serveis-cloud\/\">Cloud Security<\/a> protegeix la privadesa dels usuaris i en regula l&#8217;acc\u00e9s. Amb les r\u00e0pides tend\u00e8ncies en innovaci\u00f3 i tecnologia, les empreses se subscriuen als serveis al n\u00favol per millorar la seguretat de la informaci\u00f3. Els serveis al n\u00favol permeten als usuaris accedir a eines i recursos de bases de dades a Internet, els serveis principals de seguretat al n\u00favol s\u00f3n:<\/p><ul><li><strong>Software As A Service<\/strong>: permeten als usuaris subscriure&#8217;s a programari en l\u00ednia i accedir a serveis espec\u00edfics sense haver d&#8217;instal\u00b7lar-los al sistema; els subscriptors s&#8217;estalvien el cost del manteniment de maquinari i programari.<\/li><li><strong>Platform-as-a-Service<\/strong>: els prove\u00efdors de serveis al n\u00favol ofereixen un munt d&#8217;aplicacions ampliades a qu\u00e8 s&#8217;accedeix a trav\u00e9s del web, PaaS promou el disseny, desenvolupament i gesti\u00f3 d&#8217;aplicacions al n\u00favol.<\/li><li><strong>Infrastructures as Service<\/strong>: aquest servei promou la gesti\u00f3 de dades i sistemes en temps real, els prove\u00efdors de serveis demanen als usuaris que paguin a mesura que vagin, gestionen completament la xarxa, els servidors , l&#8217;emmagatzematge, el programari i el maquinari.<\/li><\/ul><h2>Import\u00e0ncia de la seguretat al n\u00favol<\/h2><p>La seguretat al n\u00favol ha redu\u00eft la necessitat de manteniment de maquinari i programari, la facilitat d&#8217;acc\u00e9s a les dades estalvia temps i recursos que podrien redirigir-se a altres funcions de TI. Els procediments de ciberseguretat requereixen poca o cap interacci\u00f3 humana i ofereixen solucions de seguretat a temps complet.<\/p><p>\u00c9s probable que els sistemes de seguretat interns siguin vulnerables a les amenaces de seguretat, especialment a les infraccions de dades internes. La seguretat al n\u00favol ofereix emmagatzematge fora del lloc de dades confidencials, m\u00e9s del 90% de les organitzacions que adopten la seguretat al n\u00favol han informat duna millora en la seguretat de la informaci\u00f3. Les xarxes al n\u00favol apliquen xifratge de dades d&#8217;extrem a extrem per garantir que el personal no autoritzat no accedeixi a les dades.<\/p><p>La seguretat al n\u00favol promou la flexibilitat mitjan\u00e7ant la subscripci\u00f3 en funci\u00f3 de les necessitats i prefer\u00e8ncies dels usuaris. Els usuaris al n\u00favol tenen garantia de privadesa a temps complet, els prove\u00efdors de serveis al n\u00favol permeten centrar-se en altres funcions empresarials diferents de la seguretat de la informaci\u00f3, per\u00f2 les organitzacions es responsabilitzen en cas de violaci\u00f3 de dades.<\/p><p>La seguretat al n\u00favol permet accedir remot a trav\u00e9s de dispositius m\u00f2bils i es pot accedir a les aplicacions basades en web des de qualsevol lloc. Les tecnologies d&#8217;acc\u00e9s a la xarxa de confian\u00e7a zero permeten un acc\u00e9s expl\u00edcit controlat; aix\u00f2 significa que les organitzacions poden contractar empleats de tot el m\u00f3n.<\/p><p>Els serveis al n\u00favol garanteixen la recuperaci\u00f3 de les dades quan es produeixen cat\u00e0strofes incertes i s&#8217;estableix un pla de recuperaci\u00f3 de desastres per millorar la <a href=\"\/ca\/serveis-cloud\/serveis-datacenter\/back-up-remot\/\"> c\u00f2pia de seguretat de les dades<\/a>. Els desastres com les inundacions i els terratr\u00e8mols poden esborrar totes les dades de les organitzacions.<\/p><p><strong>ADQA<\/strong>, com a prove\u00efdor de serveis al n\u00favol, s&#8217;assegurar\u00e0 que la vostra empresa compleixi les regles, regulacions, pol\u00edtiques i est\u00e0ndards de seguretat, cosa que afavoreix encara m\u00e9s la integritat de les dades.<br \/>Reptes de seguretat al n\u00favol<\/p><ol><li><strong>Invisibilitat<\/strong>: ja que les dades de l&#8217;organitzaci\u00f3 estan totalment controlades fora de l&#8217;organitzaci\u00f3, els usuaris no poden rastrejar, visualitzar o controlar f\u00e0cilment el seu entorn al n\u00favol.<\/li><li><strong>Entorn de n\u00favol complicat<\/strong>: han donat lloc a inconvenients a causa d&#8217;una mala configuraci\u00f3, l&#8217;organitzaci\u00f3 distribu\u00efda \u00e9s dif\u00edcil de gestionar de manera coherent, especialment en un n\u00favol h\u00edbrid.<\/li><li><strong>Compliance<\/strong>: les organitzacions s\u00f3n responsables dels problemes de seguretat i privadesa de les dades, els principals prove\u00efdors de serveis al n\u00favol es verifiquen i alineen amb els millors est\u00e0ndards de seguretat.<\/li><li><strong>El cloud computing introdueix noves amenaces de seguretat<\/strong>: \u00e9s probable que les organitzacions que utilitzen el n\u00favol p\u00fablic es vegin afectades per violacions de dades, el n\u00favol p\u00fablic permet als usuaris accedir a aplicacions, bases de dades i emmagatzematge de forma remota mitjan\u00e7ant una xarxa.<\/li><\/ol><p>En el futur, es preveu que la seguretat al n\u00favol sigui el pilar de la seguretat de totes les organitzacions, la pand\u00e8mia recent va influir en l&#8217;acceleraci\u00f3 important en l&#8217;adopci\u00f3 de la inform\u00e0tica al n\u00favol, algunes solucions de seguretat al n\u00favol encara s\u00f3n a desenvolupament i, sens dubte, revolucionaran la seguretat al n\u00favol. Les startups i aix\u00ed com les empreses ja establertes haurien d&#8217;aprofitar la inform\u00e0tica al n\u00favol per evitar fallar a causa de la violaci\u00f3 de dades. <strong>ADQA<\/strong> us pot oferir orientaci\u00f3 sobre les millors pr\u00e0ctiques de seguretat de la informaci\u00f3.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>La seguretat al n\u00favol implica desenvolupar tecnologies, controls i procediments de seguretat que garanteixin aquesta protecci\u00f3<\/p>\n","protected":false},"author":2,"featured_media":5038,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[48,49],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud Security: La seguretat al n\u00favol - ADQA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Security: La seguretat al n\u00favol - ADQA\" \/>\n<meta property=\"og:description\" content=\"La seguretat al n\u00favol implica desenvolupar tecnologies, controls i procediments de seguretat que garanteixin aquesta protecci\u00f3\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/\" \/>\n<meta property=\"og:site_name\" content=\"ADQA\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-26T07:47:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-09T09:26:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.adqa.com\/wp-content\/uploads\/2022\/04\/adqa_cloud-security-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"733\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"adqa\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrit per\" \/>\n\t<meta name=\"twitter:data1\" content=\"adqa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Temps estimat de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuts\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/\"},\"author\":{\"name\":\"adqa\",\"@id\":\"https:\/\/www.adqa.com\/ca\/#\/schema\/person\/c0f60bdec6679cbb34f3f1fbbcc86c76\"},\"headline\":\"Cloud Security: La seguretat al n\u00favol\",\"datePublished\":\"2022-04-26T07:47:18+00:00\",\"dateModified\":\"2022-06-09T09:26:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/\"},\"wordCount\":833,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.adqa.com\/ca\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adqa.com\/wp-content\/uploads\/2022\/04\/adqa_cloud-security-2.jpg\",\"articleSection\":[\"Blog\",\"Cloud\"],\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/\",\"url\":\"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/\",\"name\":\"Cloud Security: La seguretat al n\u00favol - ADQA\",\"isPartOf\":{\"@id\":\"https:\/\/www.adqa.com\/ca\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adqa.com\/wp-content\/uploads\/2022\/04\/adqa_cloud-security-2.jpg\",\"datePublished\":\"2022-04-26T07:47:18+00:00\",\"dateModified\":\"2022-06-09T09:26:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/#breadcrumb\"},\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/#primaryimage\",\"url\":\"https:\/\/www.adqa.com\/wp-content\/uploads\/2022\/04\/adqa_cloud-security-2.jpg\",\"contentUrl\":\"https:\/\/www.adqa.com\/wp-content\/uploads\/2022\/04\/adqa_cloud-security-2.jpg\",\"width\":1100,\"height\":733},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.adqa.com\/ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Security: La seguretat al n\u00favol\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.adqa.com\/ca\/#website\",\"url\":\"https:\/\/www.adqa.com\/ca\/\",\"name\":\"ADQA\",\"description\":\"Inform\u00e1tica y Telecomunicaciones Vilanova i la Geltr\u00fa\",\"publisher\":{\"@id\":\"https:\/\/www.adqa.com\/ca\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.adqa.com\/ca\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"ca\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.adqa.com\/ca\/#organization\",\"name\":\"ADQA\",\"url\":\"https:\/\/www.adqa.com\/ca\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\/\/www.adqa.com\/ca\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.adqa.com\/wp-content\/uploads\/2022\/03\/logo-180x60-1.png\",\"contentUrl\":\"https:\/\/www.adqa.com\/wp-content\/uploads\/2022\/03\/logo-180x60-1.png\",\"width\":180,\"height\":60,\"caption\":\"ADQA\"},\"image\":{\"@id\":\"https:\/\/www.adqa.com\/ca\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.adqa.com\/ca\/#\/schema\/person\/c0f60bdec6679cbb34f3f1fbbcc86c76\",\"name\":\"adqa\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\/\/www.adqa.com\/ca\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f280054eb6015faf03788c8cb6f5d12d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f280054eb6015faf03788c8cb6f5d12d?s=96&d=mm&r=g\",\"caption\":\"adqa\"},\"url\":\"https:\/\/www.adqa.com\/ca\/author\/adqa\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud Security: La seguretat al n\u00favol - ADQA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/","og_locale":"ca_ES","og_type":"article","og_title":"Cloud Security: La seguretat al n\u00favol - ADQA","og_description":"La seguretat al n\u00favol implica desenvolupar tecnologies, controls i procediments de seguretat que garanteixin aquesta protecci\u00f3","og_url":"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/","og_site_name":"ADQA","article_published_time":"2022-04-26T07:47:18+00:00","article_modified_time":"2022-06-09T09:26:30+00:00","og_image":[{"width":1100,"height":733,"url":"https:\/\/www.adqa.com\/wp-content\/uploads\/2022\/04\/adqa_cloud-security-2.jpg","type":"image\/jpeg"}],"author":"adqa","twitter_card":"summary_large_image","twitter_misc":{"Escrit per":"adqa","Temps estimat de lectura":"4 minuts"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/#article","isPartOf":{"@id":"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/"},"author":{"name":"adqa","@id":"https:\/\/www.adqa.com\/ca\/#\/schema\/person\/c0f60bdec6679cbb34f3f1fbbcc86c76"},"headline":"Cloud Security: La seguretat al n\u00favol","datePublished":"2022-04-26T07:47:18+00:00","dateModified":"2022-06-09T09:26:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/"},"wordCount":833,"commentCount":0,"publisher":{"@id":"https:\/\/www.adqa.com\/ca\/#organization"},"image":{"@id":"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adqa.com\/wp-content\/uploads\/2022\/04\/adqa_cloud-security-2.jpg","articleSection":["Blog","Cloud"],"inLanguage":"ca","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/","url":"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/","name":"Cloud Security: La seguretat al n\u00favol - ADQA","isPartOf":{"@id":"https:\/\/www.adqa.com\/ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/#primaryimage"},"image":{"@id":"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adqa.com\/wp-content\/uploads\/2022\/04\/adqa_cloud-security-2.jpg","datePublished":"2022-04-26T07:47:18+00:00","dateModified":"2022-06-09T09:26:30+00:00","breadcrumb":{"@id":"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/#breadcrumb"},"inLanguage":"ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/"]}]},{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/#primaryimage","url":"https:\/\/www.adqa.com\/wp-content\/uploads\/2022\/04\/adqa_cloud-security-2.jpg","contentUrl":"https:\/\/www.adqa.com\/wp-content\/uploads\/2022\/04\/adqa_cloud-security-2.jpg","width":1100,"height":733},{"@type":"BreadcrumbList","@id":"https:\/\/www.adqa.com\/ca\/cloud-security-seguretat-nuvol\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.adqa.com\/ca\/"},{"@type":"ListItem","position":2,"name":"Cloud Security: La seguretat al n\u00favol"}]},{"@type":"WebSite","@id":"https:\/\/www.adqa.com\/ca\/#website","url":"https:\/\/www.adqa.com\/ca\/","name":"ADQA","description":"Inform\u00e1tica y Telecomunicaciones Vilanova i la Geltr\u00fa","publisher":{"@id":"https:\/\/www.adqa.com\/ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adqa.com\/ca\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"ca"},{"@type":"Organization","@id":"https:\/\/www.adqa.com\/ca\/#organization","name":"ADQA","url":"https:\/\/www.adqa.com\/ca\/","logo":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.adqa.com\/ca\/#\/schema\/logo\/image\/","url":"https:\/\/www.adqa.com\/wp-content\/uploads\/2022\/03\/logo-180x60-1.png","contentUrl":"https:\/\/www.adqa.com\/wp-content\/uploads\/2022\/03\/logo-180x60-1.png","width":180,"height":60,"caption":"ADQA"},"image":{"@id":"https:\/\/www.adqa.com\/ca\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.adqa.com\/ca\/#\/schema\/person\/c0f60bdec6679cbb34f3f1fbbcc86c76","name":"adqa","image":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.adqa.com\/ca\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f280054eb6015faf03788c8cb6f5d12d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f280054eb6015faf03788c8cb6f5d12d?s=96&d=mm&r=g","caption":"adqa"},"url":"https:\/\/www.adqa.com\/ca\/author\/adqa\/"}]}},"_links":{"self":[{"href":"https:\/\/www.adqa.com\/ca\/wp-json\/wp\/v2\/posts\/5184"}],"collection":[{"href":"https:\/\/www.adqa.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adqa.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adqa.com\/ca\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adqa.com\/ca\/wp-json\/wp\/v2\/comments?post=5184"}],"version-history":[{"count":0,"href":"https:\/\/www.adqa.com\/ca\/wp-json\/wp\/v2\/posts\/5184\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adqa.com\/ca\/wp-json\/wp\/v2\/media\/5038"}],"wp:attachment":[{"href":"https:\/\/www.adqa.com\/ca\/wp-json\/wp\/v2\/media?parent=5184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adqa.com\/ca\/wp-json\/wp\/v2\/categories?post=5184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adqa.com\/ca\/wp-json\/wp\/v2\/tags?post=5184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}