{"id":2632,"date":"2020-05-29T09:31:07","date_gmt":"2020-05-29T07:31:07","guid":{"rendered":"https:\/\/geko2.factoryfy.com\/dependency-track-analyze-your-vulnerabilities-from-the-use-of-third-party-components\/"},"modified":"2021-11-07T22:30:20","modified_gmt":"2021-11-07T21:30:20","slug":"dependency-track-analyze-your-vulnerabilities-from-the-use-of-third-party-components","status":"publish","type":"post","link":"https:\/\/geko.cloud\/en\/dependency-track-analyze-your-vulnerabilities-from-the-use-of-third-party-components\/","title":{"rendered":"Dependency Track: Analyze your vulnerabilities from the use of third-party components"},"content":{"rendered":"<p>In this post we are going to talk about the OWASP tool called Dependency-Track. To start, a good question is&#8230;.<\/p>\n<h2><strong>What is Dependency-Track?<\/strong><\/h2>\n<p>Dependency Track is a vulnerability analysis tool that <strong>audits the components or external libraries<\/strong> that we use for our applications. This tool has integrations with different vulnerability databases such as NPM Public Advisories, National Vulnerability Database, Sonartype OSS Index and VulnDB.<br \/>\nDependency Track is in charge of proactively analyzing all your applications in order to identify vulnerabilities in open source components that may put your application at risk.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-5395\" src=\"https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/dashboard-dependency-track-2-1024x647.png\" alt=\"dashboard dependency track\" width=\"800\" height=\"505\" srcset=\"https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/dashboard-dependency-track-2-1024x647.png 1024w, https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/dashboard-dependency-track-2-300x190.png 300w, https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/dashboard-dependency-track-2-768x485.png 768w, https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/dashboard-dependency-track-2-1536x970.png 1536w, https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/dashboard-dependency-track-2-2048x1294.png 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<h2><strong>How does Dependency-Track work?<\/strong><\/h2>\n<p>Dependency-Track takes full advantage of the Bill-of-Materials Software (SBOM). Thanks to this, we can obtain more complete and sophisticated information than with traditional component analysis.<\/p>\n<p>These BOM files (bill-of-materials) define and describe the content that is used in the manufacturing of the deliverables. This content includes the data of the author, publishers, licenses, versions and copyright.<\/p>\n<p>To generate the BoM file we have several tools, but one of the better known is CycloneDX. Once we have our BoM file we can upload it to Dependency-Track manually or by integrating the upload in our CICD.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2006\" src=\"https:\/\/geko2.factoryfy.com\/wp-content\/uploads\/bom-component.png\" alt=\"\" width=\"865\" height=\"324\" \/><\/p>\n<p>CycloneDX supports and integrates through its plugins with various languages<\/p>\n<ul>\n<li><a href=\"https:\/\/github.com\/CycloneDX\/cyclonedx-dotnet\">CycloneDX .NET Core<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/CycloneDX\/cyclonedx-node-module\">CycloneDX Node.js Module<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/CycloneDX\/cyclonedx-maven-plugin\">CycloneDX Java (Maven) Plugin<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/CycloneDX\/cyclonedx-gradle-plugin\">CycloneDX Java (Gradle) Plugin<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/CycloneDX\/cyclonedx-core-java\">CycloneDX Java API<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/CycloneDX\/cyclonedx-php-composer\">CycloneDX PHP Composer<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/CycloneDX\/cyclonedx-python\">CycloneDX Python Module<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/CycloneDX\/cyclonedx-ruby-gem\">CycloneDX Ruby Gem<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/CycloneDX\/cyclonedx-rust-cargo\">CycloneDX Rust Cargo<\/a><\/li>\n<\/ul>\n<h2><strong>Dependency-Track Integrations<\/strong><\/h2>\n<p>Dependency Track is designed to be easily integrated into our Continuous Integration and Continuous Deployment processes. In order to do all this, it has a powerful API and a plugin for Jenkins that allows us to integrate this process into our pipelines.<\/p>\n<p>Dependency-Track enables <a href=\"https:\/\/geko.cloud\/en\/devops\/\">DevOps<\/a> teams to accelerate processes and development while still controlling the use of external components and the risks they may cause.<\/p>\n<p>This tool also has an integrated alert system via email or with integrations with various messaging services such as Slack or Microsoft Teams. All of them customizable through templates.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-5386 size-large\" src=\"https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/integrations-dependency-track-1024x781.png\" alt=\"integrations dependency track\" width=\"800\" height=\"610\" srcset=\"https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/integrations-dependency-track-1024x781.png 1024w, https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/integrations-dependency-track-300x229.png 300w, https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/integrations-dependency-track-768x586.png 768w, https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/integrations-dependency-track-1536x1171.png 1536w, https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/integrations-dependency-track.png 1818w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>How can I deploy it?<\/strong><\/h2>\n<p>To create your own Dependency-Track service you have several options:<\/p>\n<ul>\n<li><strong>Using War<\/strong> -&gt; This is the most difficult to deploy option as it requires an already installed and configured Servlet container such as Apache Tomcat 8.5 and higher, however, it offers the most flexible deployment options<\/li>\n<li><strong>Executable War<\/strong> -&gt; The Dependency-Track executable WAR is delivered ready-to-run. An executable WAR is a traditional Java Web Archive (WAR) that is packaged in a way where it can executed from the command-line.<\/li>\n<li><strong>Docker Container<\/strong> -&gt; Deploying with Docker is the easiest and fastest method of getting started. No prerequisites are required other than a modern version of Docker.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Read more about Dependency-Track here:<\/p>\n<ul>\n<li><a href=\"https:\/\/dependencytrack.org\/\">Official Website<\/a><\/li>\n<li><a href=\"https:\/\/docs.dependencytrack.org\/\">Official Documentation<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/DependencyTrack\/dependency-track\">Official Repository<\/a><\/li>\n<li><a href=\"https:\/\/wiki.jenkins.io\/display\/JENKINS\/OWASP+Dependency-Track+Plugin\">Dependency-Track plugin for Jenkins<\/a><\/li>\n<\/ul>\n<hr \/>\n<p>I hope you&#8217;ve enjoyed this post and I encourage you to <a href=\"https:\/\/geko.cloud\/en\/blog\/\">check our blog for other posts<\/a> that you might find helpful. <a href=\"https:\/\/geko.cloud\/en\/contact\/\">Do not hesitate to contact us<\/a> if you would like us to help you on your projects.<\/p>\n<p>See you on the next post!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this post we are going to talk about the OWASP tool called Dependency-Track. To start, a good question is&#8230;. What is Dependency-Track? Dependency Track is a vulnerability analysis tool that audits the components or external libraries that we use for our applications. This tool has integrations with different vulnerability databases such as NPM Public [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2266,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[67],"tags":[73],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Dependency Track: Analyze your vulnerabilities from the use of third-party components - Geko Cloud<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dependency Track: Analyze your vulnerabilities from the use of third-party components - Geko Cloud\" \/>\n<meta property=\"og:description\" content=\"In this post we are going to talk about the OWASP tool called Dependency-Track. To start, a good question is&#8230;. What is Dependency-Track? Dependency Track is a vulnerability analysis tool that audits the components or external libraries that we use for our applications. This tool has integrations with different vulnerability databases such as NPM Public [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/\" \/>\n<meta property=\"og:site_name\" content=\"Geko Cloud\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-29T07:31:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-07T21:30:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/geko.cloud\/wp-content\/uploads\/dtrack-logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"443\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jose Luis S\u00e1nchez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@geko_cloud\" \/>\n<meta name=\"twitter:site\" content=\"@geko_cloud\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/\"},\"author\":{\"name\":\"Jose Luis S\u00e1nchez\",\"@id\":\"https:\/\/geko.cloud\/es\/#\/schema\/person\/d06aff498ebfbc75b5010ebe92af41ed\"},\"headline\":\"Dependency Track: Analyze your vulnerabilities from the use of third-party components\",\"datePublished\":\"2020-05-29T07:31:07+00:00\",\"dateModified\":\"2021-11-07T21:30:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/\"},\"wordCount\":511,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/geko.cloud\/es\/#organization\"},\"image\":{\"@id\":\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/geko.cloud\/wp-content\/uploads\/dtrack-logo.png\",\"keywords\":[\"cicd\"],\"articleSection\":[\"Labs\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/\",\"url\":\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/\",\"name\":\"Dependency Track: Analyze your vulnerabilities from the use of third-party components - Geko Cloud\",\"isPartOf\":{\"@id\":\"https:\/\/geko.cloud\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/geko.cloud\/wp-content\/uploads\/dtrack-logo.png\",\"datePublished\":\"2020-05-29T07:31:07+00:00\",\"dateModified\":\"2021-11-07T21:30:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#primaryimage\",\"url\":\"https:\/\/geko.cloud\/wp-content\/uploads\/dtrack-logo.png\",\"contentUrl\":\"https:\/\/geko.cloud\/wp-content\/uploads\/dtrack-logo.png\",\"width\":1400,\"height\":443,\"caption\":\"dependency track logo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/geko.cloud\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dependency Track: Analyze your vulnerabilities from the use of third-party components\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/geko.cloud\/es\/#website\",\"url\":\"https:\/\/geko.cloud\/es\/\",\"name\":\"Geko Cloud\",\"description\":\"Servicios de consultor\u00eda cloud y devops\",\"publisher\":{\"@id\":\"https:\/\/geko.cloud\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/geko.cloud\/es\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/geko.cloud\/es\/#organization\",\"name\":\"Geko Cloud\",\"url\":\"https:\/\/geko.cloud\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/geko.cloud\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/geko.cloud\/wp-content\/uploads\/2021\/10\/geko_logo-positivo.png\",\"contentUrl\":\"https:\/\/geko.cloud\/wp-content\/uploads\/2021\/10\/geko_logo-positivo.png\",\"width\":1650,\"height\":809,\"caption\":\"Geko Cloud\"},\"image\":{\"@id\":\"https:\/\/geko.cloud\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/geko_cloud\",\"https:\/\/www.instagram.com\/gekocloud\/\",\"https:\/\/www.linkedin.com\/company\/gekocloud\",\"https:\/\/www.youtube.com\/channel\/UC5EFLCqUM7fEaXSa_0nWowQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/geko.cloud\/es\/#\/schema\/person\/d06aff498ebfbc75b5010ebe92af41ed\",\"name\":\"Jose Luis S\u00e1nchez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/geko.cloud\/es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ebfd055d4dba456220c682523fcc237c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ebfd055d4dba456220c682523fcc237c?s=96&d=mm&r=g\",\"caption\":\"Jose Luis S\u00e1nchez\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dependency Track: Analyze your vulnerabilities from the use of third-party components - Geko Cloud","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/","og_locale":"en_US","og_type":"article","og_title":"Dependency Track: Analyze your vulnerabilities from the use of third-party components - Geko Cloud","og_description":"In this post we are going to talk about the OWASP tool called Dependency-Track. To start, a good question is&#8230;. What is Dependency-Track? Dependency Track is a vulnerability analysis tool that audits the components or external libraries that we use for our applications. This tool has integrations with different vulnerability databases such as NPM Public [&hellip;]","og_url":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/","og_site_name":"Geko Cloud","article_published_time":"2020-05-29T07:31:07+00:00","article_modified_time":"2021-11-07T21:30:20+00:00","og_image":[{"width":1400,"height":443,"url":"https:\/\/geko.cloud\/wp-content\/uploads\/dtrack-logo.png","type":"image\/png"}],"author":"Jose Luis S\u00e1nchez","twitter_card":"summary_large_image","twitter_creator":"@geko_cloud","twitter_site":"@geko_cloud","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#article","isPartOf":{"@id":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/"},"author":{"name":"Jose Luis S\u00e1nchez","@id":"https:\/\/geko.cloud\/es\/#\/schema\/person\/d06aff498ebfbc75b5010ebe92af41ed"},"headline":"Dependency Track: Analyze your vulnerabilities from the use of third-party components","datePublished":"2020-05-29T07:31:07+00:00","dateModified":"2021-11-07T21:30:20+00:00","mainEntityOfPage":{"@id":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/"},"wordCount":511,"commentCount":0,"publisher":{"@id":"https:\/\/geko.cloud\/es\/#organization"},"image":{"@id":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#primaryimage"},"thumbnailUrl":"https:\/\/geko.cloud\/wp-content\/uploads\/dtrack-logo.png","keywords":["cicd"],"articleSection":["Labs"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/","url":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/","name":"Dependency Track: Analyze your vulnerabilities from the use of third-party components - Geko Cloud","isPartOf":{"@id":"https:\/\/geko.cloud\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#primaryimage"},"image":{"@id":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#primaryimage"},"thumbnailUrl":"https:\/\/geko.cloud\/wp-content\/uploads\/dtrack-logo.png","datePublished":"2020-05-29T07:31:07+00:00","dateModified":"2021-11-07T21:30:20+00:00","breadcrumb":{"@id":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#primaryimage","url":"https:\/\/geko.cloud\/wp-content\/uploads\/dtrack-logo.png","contentUrl":"https:\/\/geko.cloud\/wp-content\/uploads\/dtrack-logo.png","width":1400,"height":443,"caption":"dependency track logo"},{"@type":"BreadcrumbList","@id":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/geko.cloud\/en\/"},{"@type":"ListItem","position":2,"name":"Dependency Track: Analyze your vulnerabilities from the use of third-party components"}]},{"@type":"WebSite","@id":"https:\/\/geko.cloud\/es\/#website","url":"https:\/\/geko.cloud\/es\/","name":"Geko Cloud","description":"Servicios de consultor\u00eda cloud y devops","publisher":{"@id":"https:\/\/geko.cloud\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/geko.cloud\/es\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/geko.cloud\/es\/#organization","name":"Geko Cloud","url":"https:\/\/geko.cloud\/es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/geko.cloud\/es\/#\/schema\/logo\/image\/","url":"https:\/\/geko.cloud\/wp-content\/uploads\/2021\/10\/geko_logo-positivo.png","contentUrl":"https:\/\/geko.cloud\/wp-content\/uploads\/2021\/10\/geko_logo-positivo.png","width":1650,"height":809,"caption":"Geko Cloud"},"image":{"@id":"https:\/\/geko.cloud\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/geko_cloud","https:\/\/www.instagram.com\/gekocloud\/","https:\/\/www.linkedin.com\/company\/gekocloud","https:\/\/www.youtube.com\/channel\/UC5EFLCqUM7fEaXSa_0nWowQ"]},{"@type":"Person","@id":"https:\/\/geko.cloud\/es\/#\/schema\/person\/d06aff498ebfbc75b5010ebe92af41ed","name":"Jose Luis S\u00e1nchez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/geko.cloud\/es\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ebfd055d4dba456220c682523fcc237c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ebfd055d4dba456220c682523fcc237c?s=96&d=mm&r=g","caption":"Jose Luis S\u00e1nchez"}}]}},"_links":{"self":[{"href":"https:\/\/geko.cloud\/en\/wp-json\/wp\/v2\/posts\/2632"}],"collection":[{"href":"https:\/\/geko.cloud\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/geko.cloud\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/geko.cloud\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/geko.cloud\/en\/wp-json\/wp\/v2\/comments?post=2632"}],"version-history":[{"count":5,"href":"https:\/\/geko.cloud\/en\/wp-json\/wp\/v2\/posts\/2632\/revisions"}],"predecessor-version":[{"id":5397,"href":"https:\/\/geko.cloud\/en\/wp-json\/wp\/v2\/posts\/2632\/revisions\/5397"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/geko.cloud\/en\/wp-json\/wp\/v2\/media\/2266"}],"wp:attachment":[{"href":"https:\/\/geko.cloud\/en\/wp-json\/wp\/v2\/media?parent=2632"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/geko.cloud\/en\/wp-json\/wp\/v2\/categories?post=2632"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/geko.cloud\/en\/wp-json\/wp\/v2\/tags?post=2632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}