{"id":194,"date":"2020-03-13T16:00:00","date_gmt":"2020-03-13T21:00:00","guid":{"rendered":"https:\/\/ciber.co\/blog\/?p=194"},"modified":"2020-03-07T11:28:46","modified_gmt":"2020-03-07T16:28:46","slug":"lenel-onguard","status":"publish","type":"post","link":"https:\/\/ciber.co\/blog\/2020\/03\/13\/lenel-onguard\/","title":{"rendered":"Lenel OnGuard"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"512\" src=\"https:\/\/ciber.co\/blog\/wp-content\/uploads\/2020\/03\/Black-and-White-Fashion-For-Men-Twitter-Post-6.jpg\" alt=\"\" class=\"wp-image-195\" srcset=\"https:\/\/ciber.co\/blog\/wp-content\/uploads\/2020\/03\/Black-and-White-Fashion-For-Men-Twitter-Post-6.jpg 1024w, https:\/\/ciber.co\/blog\/wp-content\/uploads\/2020\/03\/Black-and-White-Fashion-For-Men-Twitter-Post-6-300x150.jpg 300w, https:\/\/ciber.co\/blog\/wp-content\/uploads\/2020\/03\/Black-and-White-Fashion-For-Men-Twitter-Post-6-768x384.jpg 768w, https:\/\/ciber.co\/blog\/wp-content\/uploads\/2020\/03\/Black-and-White-Fashion-For-Men-Twitter-Post-6-150x75.jpg 150w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p> Como socio definitivo de Open Architecture, Lenel ofrece opciones flexibles y confiables que respaldan sus prioridades de seguridad actuales y futuras.\u00a0Desde la base del sistema OnGuard, puede agregar casi cualquier hardware o software de terceros para crear un sistema que se adapte a sus necesidades espec\u00edficas. <\/p>\n\n\n\n<h3>Las mejoras de operatividad ampl\u00edan la compatibilidad con la nube y la ciberseguridad<\/h3>\n\n\n\n<p>La versi\u00f3n 7.6 de OnGuard\u00ae ofrece caracter\u00edsticas avanzadas y mejoras de operatividad a su plataforma de control de acceso, al tiempo que extiende su compatibilidad con la nube, movilidad, capacidades de integraci\u00f3n y conveniencia.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Como socio definitivo de Open Architecture, Lenel ofrece opciones flexibles y confiables que respaldan sus prioridades de seguridad actuales y futuras.\u00a0Desde la base del sistema OnGuard, puede agregar casi cualquier hardware o software de terceros para crear un sistema que se adapte a sus necesidades espec\u00edficas. Las mejoras de operatividad&#8230;<\/p>\n","protected":false},"author":1,"featured_media":195,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[99,10],"_links":{"self":[{"href":"https:\/\/ciber.co\/blog\/wp-json\/wp\/v2\/posts\/194"}],"collection":[{"href":"https:\/\/ciber.co\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ciber.co\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ciber.co\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ciber.co\/blog\/wp-json\/wp\/v2\/comments?post=194"}],"version-history":[{"count":1,"href":"https:\/\/ciber.co\/blog\/wp-json\/wp\/v2\/posts\/194\/revisions"}],"predecessor-version":[{"id":196,"href":"https:\/\/ciber.co\/blog\/wp-json\/wp\/v2\/posts\/194\/revisions\/196"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ciber.co\/blog\/wp-json\/wp\/v2\/media\/195"}],"wp:attachment":[{"href":"https:\/\/ciber.co\/blog\/wp-json\/wp\/v2\/media?parent=194"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ciber.co\/blog\/wp-json\/wp\/v2\/categories?post=194"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ciber.co\/blog\/wp-json\/wp\/v2\/tags?post=194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}