{"id":2370,"date":"2014-03-28T00:00:00","date_gmt":"2014-03-27T23:00:00","guid":{"rendered":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/blog\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\/"},"modified":"2024-11-12T16:02:06","modified_gmt":"2024-11-12T15:02:06","slug":"how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm","status":"publish","type":"post","link":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\/","title":{"rendered":"How to prevent leaks of sensitive information with the help of Office 365 \u2013 Part II (IRM)"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_wp_text el_class=&#8217;section-post-default&#8217;]<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" width=\"511\" height=\"248\" alt=\"Proteger archivos importantes desde Office - Parte II (IRM)\" src=\"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/343ae2a4-3415-46ef-88de-7e64f2a53d16\"><\/p>\n<p><strong>Protecting sensitive documents from Microsoft Office<\/strong><\/p>\n<p>As we explained a few days ago, IRM is a tool that encrypts and protects sensitive information from unauthorized access.<\/p>\n<p>In today&#8217;s episode we&#8217;ll talk about how IRM with Microsoft Office, helps businesses and users of these, to meet two basic needs:<\/p>\n<ul>\n<li> <strong>Restrict permission to confidential information:<\/strong> IRM helps prevent unauthorized access and no permitted use of confidential information. <\/li>\n<li> <strong>Integrity, control and information privacy:<\/strong> Employees of a company often work with confidential information. Using IRM, employees do not depend on the discretion of others to ensure that confidential material remains within the company because it eliminates the possibility of users from forwarding, copying or printing confidential information. <\/li>\n<\/ul>\n<p><img decoding=\"async\" alt=\"Proteger archivos importantes desde Office - Parte II (IRM)\" src=\"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/62c08c50-77b3-4511-a1f4-0f484b45b80e\"><\/p>\n<p>In applications such as Word, Excel and PowerPoint you can use rights management to restrict access to documents to Office 365 users in your organization.<\/p>\n<p>These are some of the options available protection for documents:<\/p>\n<ul>\n<li> Avoid the possibility that users can print, make a screenshot, copy or modify a document, workbook, or presentation <\/li>\n<li> Prevent people outside the company can open the document, workbook, or presentation, even if they do physically. <\/li>\n<li> Set an expiration date for permits. After beating the time, users can not access the document, workbook, or presentation <\/li>\n<li> Set a default setting for documents with restricted permission. <\/li>\n<li> Allow users with assigned permission requesting additional permission options. <\/li>\n<li> Require users to authenticate to access the document. <\/li>\n<\/ul>\n<p>In the next article I will talk about how IRM protected emails sent to users of our organization.<\/p>\n<\/p>\n<p>Want to have an overview of how IRM and Office 365 work?<\/p>\n<\/p>\n<p><a title=\"How to prevent leaks of sensitive information with the help of Office 365 - Part I (IRM)\" href=\"\/Rendering\/Render\/en-US\/bc648590-08e8-4316-b0ea-6398e7c86844\">Yes, I want to know more<\/a><\/p>\n<\/p>\n<p>[\/vc_wp_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_wp_text el_class=&#8217;section-post-default&#8217;] Protecting sensitive documents from Microsoft Office As we explained a few days ago, IRM is a tool that encrypts and protects sensitive information from unauthorized access. In today&#8217;s episode we&#8217;ll talk about how IRM with Microsoft Office, helps businesses and users of these, to meet two basic needs: Restrict permission to confidential information: [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[87,1],"tags":[],"categoria_posts":[],"class_list":["post-2370","post","type-post","status-publish","format-standard","hentry","category-modern-work-en","category-sin-categorizar"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to prevent leaks of sensitive information with the help of Office 365 \u2013 Part II (IRM) - Softeng<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to prevent leaks of sensitive information with the help of Office 365 \u2013 Part II (IRM) - Softeng\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][vc_wp_text el_class=&#8217;section-post-default&#8217;] Protecting sensitive documents from Microsoft Office As we explained a few days ago, IRM is a tool that encrypts and protects sensitive information from unauthorized access. In today&#8217;s episode we&#8217;ll talk about how IRM with Microsoft Office, helps businesses and users of these, to meet two basic needs: Restrict permission to confidential information: [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\/\" \/>\n<meta property=\"og:site_name\" content=\"Softeng\" \/>\n<meta property=\"article:published_time\" content=\"2014-03-27T23:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-12T15:02:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/343ae2a4-3415-46ef-88de-7e64f2a53d16\" \/>\n<meta name=\"author\" content=\"Daniel Navarro\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Daniel Navarro\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\\\/\"},\"author\":{\"name\":\"Daniel Navarro\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#\\\/schema\\\/person\\\/ed4f333f0a809c0610c9f7d9f224ff09\"},\"headline\":\"How to prevent leaks of sensitive information with the help of Office 365 \u2013 Part II (IRM)\",\"datePublished\":\"2014-03-27T23:00:00+00:00\",\"dateModified\":\"2024-11-12T15:02:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\\\/\"},\"wordCount\":296,\"publisher\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/softeng.blob.core.windows.net\\\/softengpublish\\\/invar\\\/343ae2a4-3415-46ef-88de-7e64f2a53d16\",\"articleSection\":[\"MODERN WORK\",\"Sin categorizar\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\\\/\",\"url\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\\\/\",\"name\":\"How to prevent leaks of sensitive information with the help of Office 365 \u2013 Part II (IRM) - Softeng\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/softeng.blob.core.windows.net\\\/softengpublish\\\/invar\\\/343ae2a4-3415-46ef-88de-7e64f2a53d16\",\"datePublished\":\"2014-03-27T23:00:00+00:00\",\"dateModified\":\"2024-11-12T15:02:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/softeng.blob.core.windows.net\\\/softengpublish\\\/invar\\\/343ae2a4-3415-46ef-88de-7e64f2a53d16\",\"contentUrl\":\"https:\\\/\\\/softeng.blob.core.windows.net\\\/softengpublish\\\/invar\\\/343ae2a4-3415-46ef-88de-7e64f2a53d16\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to prevent leaks of sensitive information with the help of Office 365 \u2013 Part II (IRM)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/\",\"name\":\"Softeng\",\"description\":\"Softeng | Maximize the cloud. Securely.\",\"publisher\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#organization\",\"name\":\"Softeng\",\"url\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Logotipo-para-SEOYoast.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Logotipo-para-SEOYoast.png\",\"width\":696,\"height\":696,\"caption\":\"Softeng\"},\"image\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/softeng\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@SoftengSL\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#\\\/schema\\\/person\\\/ed4f333f0a809c0610c9f7d9f224ff09\",\"name\":\"Daniel Navarro\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g\",\"caption\":\"Daniel Navarro\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to prevent leaks of sensitive information with the help of Office 365 \u2013 Part II (IRM) - Softeng","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How to prevent leaks of sensitive information with the help of Office 365 \u2013 Part II (IRM) - Softeng","og_description":"[vc_row][vc_column][vc_wp_text el_class=&#8217;section-post-default&#8217;] Protecting sensitive documents from Microsoft Office As we explained a few days ago, IRM is a tool that encrypts and protects sensitive information from unauthorized access. In today&#8217;s episode we&#8217;ll talk about how IRM with Microsoft Office, helps businesses and users of these, to meet two basic needs: Restrict permission to confidential information: [&hellip;]","og_url":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\/","og_site_name":"Softeng","article_published_time":"2014-03-27T23:00:00+00:00","article_modified_time":"2024-11-12T15:02:06+00:00","og_image":[{"url":"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/343ae2a4-3415-46ef-88de-7e64f2a53d16","type":"","width":"","height":""}],"author":"Daniel Navarro","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Daniel Navarro","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\/#article","isPartOf":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\/"},"author":{"name":"Daniel Navarro","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#\/schema\/person\/ed4f333f0a809c0610c9f7d9f224ff09"},"headline":"How to prevent leaks of sensitive information with the help of Office 365 \u2013 Part II (IRM)","datePublished":"2014-03-27T23:00:00+00:00","dateModified":"2024-11-12T15:02:06+00:00","mainEntityOfPage":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\/"},"wordCount":296,"publisher":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#organization"},"image":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\/#primaryimage"},"thumbnailUrl":"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/343ae2a4-3415-46ef-88de-7e64f2a53d16","articleSection":["MODERN WORK","Sin categorizar"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\/","url":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\/","name":"How to prevent leaks of sensitive information with the help of Office 365 \u2013 Part II (IRM) - Softeng","isPartOf":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\/#primaryimage"},"image":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\/#primaryimage"},"thumbnailUrl":"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/343ae2a4-3415-46ef-88de-7e64f2a53d16","datePublished":"2014-03-27T23:00:00+00:00","dateModified":"2024-11-12T15:02:06+00:00","breadcrumb":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\/#primaryimage","url":"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/343ae2a4-3415-46ef-88de-7e64f2a53d16","contentUrl":"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/343ae2a4-3415-46ef-88de-7e64f2a53d16"},{"@type":"BreadcrumbList","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/how-to-prevent-leaks-of-sensitive-information-with-the-help-of-office-365-part-ii-irm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/"},{"@type":"ListItem","position":2,"name":"How to prevent leaks of sensitive information with the help of Office 365 \u2013 Part II (IRM)"}]},{"@type":"WebSite","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#website","url":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/","name":"Softeng","description":"Softeng | Maximize the cloud. Securely.","publisher":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#organization","name":"Softeng","url":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#\/schema\/logo\/image\/","url":"\/wp-content\/uploads\/2024\/11\/Logotipo-para-SEOYoast.png","contentUrl":"\/wp-content\/uploads\/2024\/11\/Logotipo-para-SEOYoast.png","width":696,"height":696,"caption":"Softeng"},"image":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/softeng\/","https:\/\/www.youtube.com\/@SoftengSL"]},{"@type":"Person","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#\/schema\/person\/ed4f333f0a809c0610c9f7d9f224ff09","name":"Daniel Navarro","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g","caption":"Daniel Navarro"}}]}},"_links":{"self":[{"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/posts\/2370","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/comments?post=2370"}],"version-history":[{"count":1,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/posts\/2370\/revisions"}],"predecessor-version":[{"id":36155,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/posts\/2370\/revisions\/36155"}],"wp:attachment":[{"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/media?parent=2370"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/categories?post=2370"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/tags?post=2370"},{"taxonomy":"categoria_posts","embeddable":true,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/categoria_posts?post=2370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}