[{"id":"ci_82d7f2c24fce835a1c44c4ad212b18a3eb91e8fb6eec12d22c47721aab4df483","title":"Despliegue seguro de MyQ X","path":"/es/security/1.0/secure-deployment","children":[{"id":"ci_326b751647887e73e20856c5a9737ce048776a4b32e31e42a7fa4cd2f5b88e2e","title":"Servidor Central MyQ X","path":"/es/security/1.0/myq-central-server","children":[{"id":"ci_5a567f7450de840c9697cbfbdbda2532000f12342996075a22caf2efec79d9b0","title":"Seguridad de la conexión","path":"/es/security/1.0/connection-security","children":[]},{"id":"ci_c5e0fab42294bbfb83f331db7577600341b31bf1276c1979782744df2154685a","title":"Seguridad de los datos","path":"/es/security/1.0/data-security","children":[]},{"id":"ci_19f0908c4730e71c1c104bb49fc09ead283748c960943996f9e29b4b10ef7805","title":"Recomendaciones adicionales","path":"/es/security/1.0/additional-recommendations","children":[]}]},{"id":"ci_c04ea798c8fc7a82053b0171a1866cea5ea21aee3c6c31a7e25370ce2f248ede","title":"Servidor Print Server MyQ X","path":"/es/security/1.0/myq-print-server","children":[{"id":"ci_01de1be02afde9c45bb0e2d3eb0ba94903e493b00a2fe57feec217fe957a4b95","title":"PS Seguridad de la conexión","path":"/es/security/1.0/ps-connection-security","children":[]},{"id":"ci_aed841eceae9f0d6e01c6838b6aa919ac52ba90483f7af3f505e9cc0db2ee8ce","title":"PS Seguridad de los datos","path":"/es/security/1.0/ps-data-security","children":[]},{"id":"ci_ddf3c44878062ee9cf84791cc65b910fa6031939cac5658fbec71695163bfc08","title":"PS Recomendaciones adicionales","path":"/es/security/1.0/ps-additional-recommendations","children":[]}]},{"id":"ci_7692a94c62143995a9a06c00a060fe775a383a1cebf544459f2688543ab347e0","title":"Cliente de escritorio MyQ X","path":"/es/security/1.0/myq-desktop-client","children":[]}]},{"id":"ci_be45abab9d9be0359311b1986be97db8fe4cca5e72ff858b3eecbbee874365ac","title":"Informe sobre la seguridad de MyQ X","path":"/es/security/1.0/security-whitepaper","children":[{"id":"ci_a3797015303d44e9c7b68a81c536e3709c5fe2fd7752b5098ff373bc42078962","title":"Principales mejoras de seguridad en 10.2","path":"/es/security/1.0/key-security-improvements-in-10-2","children":[]},{"id":"ci_18c514d3e37ff680e4e047769e2244efbcb81be8c6c1bdc58e32525c77f80fc2","title":"Valor empresarial de la gestión segura de la impresión","path":"/es/security/1.0/business-value-of-secure-print-management","children":[]},{"id":"ci_17c8ab41d43f8c5bb58d879af7a95f1c8e810a49b04611df31843c96ebb03110","title":"Conformidad","path":"/es/security/1.0/compliance","children":[]},{"id":"ci_791041aa719c27d64dbd8ef893fa3583e2ae5e544f45fd41726d44129c0c402e","title":"Implantación de la arquitectura de confianza cero","path":"/es/security/1.0/zero-trust-architecture-implementation","children":[]},{"id":"ci_117ee06b48cb20b85e5cdf7827b293e21fdec5ecc0d5b88ec871e74fe11811c5","title":"Gestión de identidades y accesos","path":"/es/security/1.0/identity-and-access-management","children":[]},{"id":"ci_8e39c83c81ac6c029fa3b318c433ba64f58cc85312ec00be3e6883ad81dcb9e6","title":"Seguridad de las infraestructuras","path":"/es/security/1.0/infrastructure-security","children":[]},{"id":"ci_c40df80aa619ce539c02b5a442c6bfa9f2a1a259134c8c3d6fb887b03c1e1a0c","title":"Protección y cifrado de datos","path":"/es/security/1.0/data-protection-and-encryption","children":[]},{"id":"ci_b5dd007e30486d5daa63b4f7aed7dfbbc3702c67fc10888929f65e92b264546f","title":"Flujos de trabajo de impresión seguros","path":"/es/security/1.0/secure-printing-workflows","children":[]},{"id":"ci_9ecc930bc330d8ddc0fa413391fadcda43da6de7dc08db0e28a711fd608ac0d1","title":"Seguridad de dispositivos y redes","path":"/es/security/1.0/device-and-network-security","children":[]},{"id":"ci_f99712ad30a448b49e8c5e1cdf9b0c8482821aec258e073f5581c577658e3731","title":"Auditoría y control","path":"/es/security/1.0/audit-and-monitoring","children":[]},{"id":"ci_96d5af04883c56c63b8d7a4545617b2563d6b30f608f4a7f4db8d92b47e35910","title":"Respuesta a incidentes y recuperación","path":"/es/security/1.0/incident-response-and-recovery","children":[]}]},{"id":"ci_5adb5094212b596fb854827e8ea1dfc109ab54630fe8a87269478a8406a134ea","title":"MyQ X y NIS2","path":"/es/security/1.0/myq-x-and-nis2","children":[]},{"id":"ci_be4760fd20b5b7773827d93ebdcded547f6514467f8c57cdb2fd758709a6ed4c","title":"Lista de materiales de software","path":"/es/security/1.0/software-bill-of-materials","children":[]}]