{"id":53376,"date":"2025-06-20T13:07:31","date_gmt":"2025-06-20T13:07:31","guid":{"rendered":"https:\/\/www.edgenexus.io\/sin-categoria\/la-vida-despues-del-portal-de-gestion-de-amenazas\/"},"modified":"2025-06-20T13:07:31","modified_gmt":"2025-06-20T13:07:31","slug":"la-vida-despues-del-portal-de-gestion-de-amenazas","status":"publish","type":"post","link":"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/","title":{"rendered":"La vida despu\u00e9s del Portal de Gesti\u00f3n de Amenazas"},"content":{"rendered":"<p><span class=\"multiline-text\">Una buena lectura del equipo de Microsoft Exchange sobre el fin de la vida \u00fatil de Threat Management Gateway (tambi\u00e9n conocido como TMG). Ciertamente, en edgeNEXUS vemos cada vez m\u00e1s inter\u00e9s en edgeNEXUS espec\u00edficamente como sustituto de Reverse Proxy \/ TMG, sobre todo porque forma parte inherente de nuestro producto, permitiendo a nuestros clientes equilibrar la carga de sus implementaciones de Exchange Y ocuparse del elemento Reverse Proxy sin necesidad de complementos adicionales. <\/span><\/p>\n<blockquote><p>La vida en un mundo post TMG &#8211; \u00bfEs tan aterradora como crees?<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Una buena lectura del equipo de Microsoft Exchange sobre el fin de la vida \u00fatil de Threat Management Gateway (tambi\u00e9n conocido como TMG). Ciertamente, en edgeNEXUS vemos cada vez m\u00e1s inter\u00e9s en edgeNEXUS espec\u00edficamente como sustituto de Reverse Proxy \/ TMG, sobre todo porque forma parte inherente de nuestro producto, permitiendo a nuestros clientes equilibrar [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":53377,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[500],"tags":[],"class_list":["post-53376","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-es"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>La vida despu\u00e9s del Portal de Gesti\u00f3n de Amenazas - Edgenexus load balancers and Application Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Donna Toomey\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/\"},\"author\":{\"name\":\"Donna Toomey\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/dc553ff5b496630eb88bf2d9ee2b31ca\"},\"headline\":\"La vida despu\u00e9s del Portal de Gesti\u00f3n de Amenazas\",\"datePublished\":\"2025-06-20T13:07:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/\"},\"wordCount\":100,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2013-08-14-11-00-58-546-0876_5000x500.you_2D00_had_2D00_me_2D00_at_2D00_ehlo_5000x500.png\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/\",\"url\":\"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/\",\"name\":\"La vida despu\u00e9s del Portal de Gesti\u00f3n de Amenazas - Edgenexus load balancers and Application Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2013-08-14-11-00-58-546-0876_5000x500.you_2D00_had_2D00_me_2D00_at_2D00_ehlo_5000x500.png\",\"datePublished\":\"2025-06-20T13:07:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/#primaryimage\",\"url\":\"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2013-08-14-11-00-58-546-0876_5000x500.you_2D00_had_2D00_me_2D00_at_2D00_ehlo_5000x500.png\",\"contentUrl\":\"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2013-08-14-11-00-58-546-0876_5000x500.you_2D00_had_2D00_me_2D00_at_2D00_ehlo_5000x500.png\",\"width\":448,\"height\":84,\"caption\":\"The Exchange Team Blog\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.edgenexus.io\/es\/controlador-de-entrega-de-aplicaciones\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La vida despu\u00e9s del Portal de Gesti\u00f3n de Amenazas\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#website\",\"url\":\"https:\/\/www.edgenexus.io\/zh-hans\/\",\"name\":\"Edgenexus load balancers and Application Security\",\"description\":\"Edgenexus Load Balancers, ADC and Web application Firewalls (WAF)\",\"publisher\":{\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#organization\"},\"alternateName\":\"Load balancers and Web application firewall\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.edgenexus.io\/zh-hans\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#organization\",\"name\":\"Edgenexus\",\"url\":\"https:\/\/www.edgenexus.io\/zh-hans\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2023\/09\/edgenexus-adc-sq-transparentAsset-7.png\",\"contentUrl\":\"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2023\/09\/edgenexus-adc-sq-transparentAsset-7.png\",\"width\":903,\"height\":921,\"caption\":\"Edgenexus\"},\"image\":{\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/edgenexusio\",\"https:\/\/x.com\/edgenexusio\",\"https:\/\/www.linkedin.com\/company\/edgenexus\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/dc553ff5b496630eb88bf2d9ee2b31ca\",\"name\":\"Donna Toomey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3d4a009f6c17add48ad6905e40aac5308c04c77cdcff0616649d6c31251d1955?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3d4a009f6c17add48ad6905e40aac5308c04c77cdcff0616649d6c31251d1955?s=96&d=identicon&r=g\",\"caption\":\"Donna Toomey\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"La vida despu\u00e9s del Portal de Gesti\u00f3n de Amenazas - Edgenexus load balancers and Application Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/","twitter_misc":{"Escrito por":"Donna Toomey"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/#article","isPartOf":{"@id":"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/"},"author":{"name":"Donna Toomey","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/dc553ff5b496630eb88bf2d9ee2b31ca"},"headline":"La vida despu\u00e9s del Portal de Gesti\u00f3n de Amenazas","datePublished":"2025-06-20T13:07:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/"},"wordCount":100,"commentCount":0,"publisher":{"@id":"https:\/\/www.edgenexus.io\/zh-hans\/#organization"},"image":{"@id":"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/#primaryimage"},"thumbnailUrl":"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2013-08-14-11-00-58-546-0876_5000x500.you_2D00_had_2D00_me_2D00_at_2D00_ehlo_5000x500.png","articleSection":["Blog"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/","url":"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/","name":"La vida despu\u00e9s del Portal de Gesti\u00f3n de Amenazas - Edgenexus load balancers and Application Security","isPartOf":{"@id":"https:\/\/www.edgenexus.io\/zh-hans\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/#primaryimage"},"image":{"@id":"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/#primaryimage"},"thumbnailUrl":"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2013-08-14-11-00-58-546-0876_5000x500.you_2D00_had_2D00_me_2D00_at_2D00_ehlo_5000x500.png","datePublished":"2025-06-20T13:07:31+00:00","breadcrumb":{"@id":"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/#primaryimage","url":"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2013-08-14-11-00-58-546-0876_5000x500.you_2D00_had_2D00_me_2D00_at_2D00_ehlo_5000x500.png","contentUrl":"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2013-08-14-11-00-58-546-0876_5000x500.you_2D00_had_2D00_me_2D00_at_2D00_ehlo_5000x500.png","width":448,"height":84,"caption":"The Exchange Team Blog"},{"@type":"BreadcrumbList","@id":"https:\/\/www.edgenexus.io\/es\/blog-es\/la-vida-despues-del-portal-de-gestion-de-amenazas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.edgenexus.io\/es\/controlador-de-entrega-de-aplicaciones\/"},{"@type":"ListItem","position":2,"name":"La vida despu\u00e9s del Portal de Gesti\u00f3n de Amenazas"}]},{"@type":"WebSite","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#website","url":"https:\/\/www.edgenexus.io\/zh-hans\/","name":"Edgenexus load balancers and Application Security","description":"Edgenexus Load Balancers, ADC and Web application Firewalls (WAF)","publisher":{"@id":"https:\/\/www.edgenexus.io\/zh-hans\/#organization"},"alternateName":"Load balancers and Web application firewall","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.edgenexus.io\/zh-hans\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#organization","name":"Edgenexus","url":"https:\/\/www.edgenexus.io\/zh-hans\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/logo\/image\/","url":"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2023\/09\/edgenexus-adc-sq-transparentAsset-7.png","contentUrl":"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2023\/09\/edgenexus-adc-sq-transparentAsset-7.png","width":903,"height":921,"caption":"Edgenexus"},"image":{"@id":"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/edgenexusio","https:\/\/x.com\/edgenexusio","https:\/\/www.linkedin.com\/company\/edgenexus\/"]},{"@type":"Person","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/dc553ff5b496630eb88bf2d9ee2b31ca","name":"Donna Toomey","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3d4a009f6c17add48ad6905e40aac5308c04c77cdcff0616649d6c31251d1955?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3d4a009f6c17add48ad6905e40aac5308c04c77cdcff0616649d6c31251d1955?s=96&d=identicon&r=g","caption":"Donna Toomey"}}]}},"_links":{"self":[{"href":"https:\/\/www.edgenexus.io\/es\/wp-json\/wp\/v2\/posts\/53376","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.edgenexus.io\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.edgenexus.io\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.edgenexus.io\/es\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.edgenexus.io\/es\/wp-json\/wp\/v2\/comments?post=53376"}],"version-history":[{"count":0,"href":"https:\/\/www.edgenexus.io\/es\/wp-json\/wp\/v2\/posts\/53376\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.edgenexus.io\/es\/wp-json\/wp\/v2\/media\/53377"}],"wp:attachment":[{"href":"https:\/\/www.edgenexus.io\/es\/wp-json\/wp\/v2\/media?parent=53376"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.edgenexus.io\/es\/wp-json\/wp\/v2\/categories?post=53376"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.edgenexus.io\/es\/wp-json\/wp\/v2\/tags?post=53376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}