{"id":13153,"date":"2026-01-29T10:00:00","date_gmt":"2026-01-29T09:00:00","guid":{"rendered":"https:\/\/epic.es\/passkeys-vs-contrasenas-guia-migracion-biometrica\/"},"modified":"2026-01-29T10:00:00","modified_gmt":"2026-01-29T09:00:00","slug":"passkeys-vs-contrasenas-guia-migracion-biometrica","status":"publish","type":"post","link":"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/","title":{"rendered":"Passkeys vs Contrase\u00f1as: Gu\u00eda definitiva para migrar tu empresa a la autenticaci\u00f3n biom\u00e9trica"},"content":{"rendered":"\n<p>Si gestionas la tecnolog\u00eda de una empresa, hay una batalla que llevas a\u00f1os perdiendo: la batalla de las contrase\u00f1as. Da igual cu\u00e1ntas pol\u00edticas de complejidad impongas o cada cu\u00e1nto obligues a cambiarlas; los usuarios las olvidan, las reutilizan o, peor a\u00fan, las entregan en un ataque de Phishing.<\/p>\n\n\n\n<p>En 2026, la industria ha dicho &#8220;basta&#8221;. La soluci\u00f3n ya no es mejorar la contrase\u00f1a, sino eliminarla.<\/p>\n\n\n\n<p>Las <strong>Passkeys<\/strong> (Llaves de Acceso) se han convertido en el est\u00e1ndar de facto para la seguridad corporativa. Pero, \u00bfen qu\u00e9 se diferencian realmente de una contrase\u00f1a y c\u00f3mo puedes empezar a usarlas hoy mismo sin caos? En esta gu\u00eda analizamos la tecnolog\u00eda y te damos la hoja de ruta para la migraci\u00f3n.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">El combate t\u00e9cnico: \u00bfPor qu\u00e9 gana la Passkey?<\/h2>\n\n\n\n<p>Para entender por qu\u00e9 el cambio es urgente, hay que mirar bajo el cap\u00f3. La diferencia fundamental es arquitect\u00f3nica.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><td><strong>Caracter\u00edstica<\/strong><\/td><td><strong>Contrase\u00f1a Tradicional<\/strong><\/td><td><strong>Passkey (FIDO2)<\/strong><\/td><\/tr><\/thead><tbody><tr><td><strong>Factor de conocimiento<\/strong><\/td><td>Algo que sabes (y puedes olvidar).<\/td><td>Algo que tienes (dispositivo) + Algo que eres (biometr\u00eda).<\/td><\/tr><tr><td><strong>Almacenamiento<\/strong><\/td><td>Se guarda en el servidor (si hackean el servidor, roban tu clave).<\/td><td><strong>Clave P\u00fablica<\/strong> en el servidor \/ <strong>Clave Privada<\/strong> en tu dispositivo (nunca sale de \u00e9l).<\/td><\/tr><tr><td><strong>Resistencia al Phishing<\/strong><\/td><td><strong>Nula.<\/strong> Si el usuario la escribe en una web falsa, el hacker la tiene.<\/td><td><strong>Total.<\/strong> El protocolo falla si el dominio web no coincide exactamente. No se puede entregar por error.<\/td><\/tr><tr><td><strong>Experiencia de usuario<\/strong><\/td><td>Lenta, requiere memoria y tecleo.<\/td><td>Instant\u00e1nea (Huella, Cara o PIN local).<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Como ves, no es una mejora incremental. Es un cambio de paradigma: pasamos de la &#8220;seguridad compartida&#8221; (t\u00fa y el servidor sab\u00e9is el secreto) a la &#8220;criptograf\u00eda asim\u00e9trica&#8221; (el servidor solo tiene la cerradura, t\u00fa tienes la \u00fanica llave).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Hoja de Ruta: C\u00f3mo migrar tu empresa en 3 pasos<\/h2>\n\n\n\n<p>Implementar Passkeys no significa borrar todas las contrase\u00f1as ma\u00f1ana y bloquear a los usuarios. En <strong>Epic Solutions<\/strong> recomendamos una transici\u00f3n suave en tres fases:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Fase 1: Habilitaci\u00f3n H\u00edbrida (El presente)<\/h3>\n\n\n\n<p>No fuerces nada todav\u00eda. Simplemente, habilita la opci\u00f3n en tu proveedor de identidad (Microsoft Entra ID, Google Workspace, Okta).<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Permite que los usuarios registren sus dispositivos corporativos (port\u00e1tiles con Windows Hello o MacBooks con TouchID) como m\u00e9todo de autenticaci\u00f3n.<\/li>\n\n\n\n<li>Mant\u00e9n la contrase\u00f1a como &#8220;backup&#8221;, pero configura el sistema para que pida la Passkey por defecto.<\/li>\n\n\n\n<li><strong>Resultado:<\/strong> El 80% de los inicios de sesi\u00f3n diarios se volver\u00e1n biom\u00e9tricos por pura comodidad del usuario.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Fase 2: Eliminaci\u00f3n de la rotaci\u00f3n de contrase\u00f1as<\/h3>\n\n\n\n<p>Este paso es contraintuitivo pero necesario. Si tus usuarios ya usan Passkeys mayoritariamente, deja de obligarles a cambiar su contrase\u00f1a antigua cada 90 d\u00edas.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Al quitar esta fricci\u00f3n, eliminas el incentivo de apuntar claves en Post-its.<\/li>\n\n\n\n<li>La contrase\u00f1a pasa a ser un mecanismo de recuperaci\u00f3n de emergencia, no la llave diaria.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Fase 3: &#8220;Passwordless&#8221; Total (El objetivo 2027)<\/h3>\n\n\n\n<p>Una vez que todos los empleados tienen dispositivos compatibles y llaves de seguridad f\u00edsicas (FIDO2 keys) para aquellos que no tienen m\u00f3vil corporativo, puedes desactivar el uso de contrase\u00f1as para el acceso a sistemas cr\u00edticos.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusi\u00f3n<\/h2>\n\n\n\n<p>La adopci\u00f3n de las Passkeys no es una simple actualizaci\u00f3n de software; representa un cambio fundamental en c\u00f3mo protegemos la identidad corporativa. Hoy en d\u00eda, la seguridad ya no puede basarse en la memoria del usuario, sino en sistemas robustos que integren biometr\u00eda y criptograf\u00eda de forma transparente.<\/p>\n\n\n\n<p>Entender y ejecutar esta transici\u00f3n requiere algo m\u00e1s que conocimientos t\u00e9cnicos: exige planificaci\u00f3n para no detener la operativa diaria y criterio para elegir las herramientas adecuadas.<\/p>\n\n\n\n<p>Si tu empresa quiere modernizar sus accesos, eliminar los riesgos asociados a las contrase\u00f1as y contar con una infraestructura segura y gestionada con sentido profesional, en Epic Solutions te ayudamos a dar el paso con una visi\u00f3n global.<\/p>\n\n\n\n<p>M\u00e1s informaci\u00f3n sobre mantenimiento inform\u00e1tico: <a target=\"_blank\" rel=\"noreferrer noopener\" href=\"https:\/\/epic.es\/ca\/manteniment-informatic\/\">https:\/\/epic.es\/mantenimiento-informatico\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Si gestionas la tecnolog\u00eda de una empresa, hay una batalla que llevas a\u00f1os perdiendo: la batalla de las contrase\u00f1as. Da igual cu\u00e1ntas pol\u00edticas de complejidad impongas o cada cu\u00e1nto obligues a cambiarlas; los usuarios las olvidan, las reutilizan o, peor a\u00fan, las entregan en un ataque de Phishing. En 2026, la industria ha dicho &#8220;basta&#8221;. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":12254,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426],"tags":[519,520,521,522,523],"class_list":["post-13153","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad-informatica","tag-autenticacion-sin-contrasena","tag-ciberseguridad","tag-gestion-de-identidad","tag-microsoft-entra-id","tag-passkeys"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Passkeys vs Contrase\u00f1as: Gu\u00eda definitiva para migrar tu empresa a la autenticaci\u00f3n biom\u00e9trica - Epic<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Passkeys vs Contrase\u00f1as: Gu\u00eda definitiva para migrar tu empresa a la autenticaci\u00f3n biom\u00e9trica - Epic\" \/>\n<meta property=\"og:description\" content=\"Si gestionas la tecnolog\u00eda de una empresa, hay una batalla que llevas a\u00f1os perdiendo: la batalla de las contrase\u00f1as. Da igual cu\u00e1ntas pol\u00edticas de complejidad impongas o cada cu\u00e1nto obligues a cambiarlas; los usuarios las olvidan, las reutilizan o, peor a\u00fan, las entregan en un ataque de Phishing. En 2026, la industria ha dicho &#8220;basta&#8221;. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/\" \/>\n<meta property=\"og:site_name\" content=\"Epic\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-29T09:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Epic Inform\u00e1tica\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrit per\" \/>\n\t<meta name=\"twitter:data1\" content=\"Epic Inform\u00e1tica\" \/>\n\t<meta name=\"twitter:label2\" content=\"Temps estimat de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuts\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/\"},\"author\":{\"name\":\"Epic Inform\u00e1tica\",\"@id\":\"https:\/\/epic.es\/#\/schema\/person\/09e2e10c4a52338f338f379b6d07acba\"},\"headline\":\"Passkeys vs Contrase\u00f1as: Gu\u00eda definitiva para migrar tu empresa a la autenticaci\u00f3n biom\u00e9trica\",\"datePublished\":\"2026-01-29T09:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/\"},\"wordCount\":693,\"publisher\":{\"@id\":\"https:\/\/epic.es\/#organization\"},\"image\":{\"@id\":\"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/epic.es\/wp-content\/uploads\/2026\/01\/fdfg.png\",\"keywords\":[\"autenticaci\u00f3n sin contrase\u00f1a\",\"ciberseguridad\",\"gesti\u00f3n de identidad\",\"Microsoft Entra ID\",\"passkeys\"],\"articleSection\":[\"Seguridad Inform\u00e1tica\"],\"inLanguage\":\"ca\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/\",\"url\":\"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/\",\"name\":\"Passkeys vs Contrase\u00f1as: Gu\u00eda definitiva para migrar tu empresa a la autenticaci\u00f3n biom\u00e9trica - Epic\",\"isPartOf\":{\"@id\":\"https:\/\/epic.es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/epic.es\/wp-content\/uploads\/2026\/01\/fdfg.png\",\"datePublished\":\"2026-01-29T09:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/#breadcrumb\"},\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/#primaryimage\",\"url\":\"https:\/\/epic.es\/wp-content\/uploads\/2026\/01\/fdfg.png\",\"contentUrl\":\"https:\/\/epic.es\/wp-content\/uploads\/2026\/01\/fdfg.png\",\"width\":1103,\"height\":624},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/epic.es\/ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Passkeys vs Contrase\u00f1as: Gu\u00eda definitiva para migrar tu empresa a la autenticaci\u00f3n biom\u00e9trica\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/epic.es\/#website\",\"url\":\"https:\/\/epic.es\/\",\"name\":\"Epic Inform\u00e0tica\",\"description\":\"Dise\u00f1o y Programaci\u00f3n web \u00b7 Realizamos todo tipo de dise\u00f1o y programaci\u00f3n web completamente a medida, webs corporativas, cms, tiendas on-line, hosting etc.\",\"publisher\":{\"@id\":\"https:\/\/epic.es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/epic.es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/epic.es\/#organization\",\"name\":\"Epic Solutions\",\"url\":\"https:\/\/epic.es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\/\/epic.es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/epic.es\/wp-content\/uploads\/2025\/02\/epic-white.png\",\"contentUrl\":\"https:\/\/epic.es\/wp-content\/uploads\/2025\/02\/epic-white.png\",\"width\":435,\"height\":165,\"caption\":\"Epic Solutions\"},\"image\":{\"@id\":\"https:\/\/epic.es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/epictelecom\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/epic.es\/#\/schema\/person\/09e2e10c4a52338f338f379b6d07acba\",\"name\":\"Epic Inform\u00e1tica\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\/\/epic.es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/epic.es\/wp-content\/uploads\/2025\/06\/epic-informatica_avatar-96x96.png\",\"contentUrl\":\"https:\/\/epic.es\/wp-content\/uploads\/2025\/06\/epic-informatica_avatar-96x96.png\",\"caption\":\"Epic Inform\u00e1tica\"},\"description\":\"Asesoramiento, an\u00e1lisis, consultor\u00eda y acompa\u00f1amiento. Adaptados a las necesidades de cada cliente.\",\"sameAs\":[\"http:\/\/epic.es\",\"https:\/\/www.linkedin.com\/company\/epictelecom\/\"],\"url\":\"https:\/\/epic.es\/ca\/author\/w38-3p1c\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Passkeys vs Contrase\u00f1as: Gu\u00eda definitiva para migrar tu empresa a la autenticaci\u00f3n biom\u00e9trica - Epic","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/","og_locale":"ca_ES","og_type":"article","og_title":"Passkeys vs Contrase\u00f1as: Gu\u00eda definitiva para migrar tu empresa a la autenticaci\u00f3n biom\u00e9trica - Epic","og_description":"Si gestionas la tecnolog\u00eda de una empresa, hay una batalla que llevas a\u00f1os perdiendo: la batalla de las contrase\u00f1as. Da igual cu\u00e1ntas pol\u00edticas de complejidad impongas o cada cu\u00e1nto obligues a cambiarlas; los usuarios las olvidan, las reutilizan o, peor a\u00fan, las entregan en un ataque de Phishing. En 2026, la industria ha dicho &#8220;basta&#8221;. [&hellip;]","og_url":"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/","og_site_name":"Epic","article_published_time":"2026-01-29T09:00:00+00:00","author":"Epic Inform\u00e1tica","twitter_card":"summary_large_image","twitter_misc":{"Escrit per":"Epic Inform\u00e1tica","Temps estimat de lectura":"3 minuts"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/#article","isPartOf":{"@id":"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/"},"author":{"name":"Epic Inform\u00e1tica","@id":"https:\/\/epic.es\/#\/schema\/person\/09e2e10c4a52338f338f379b6d07acba"},"headline":"Passkeys vs Contrase\u00f1as: Gu\u00eda definitiva para migrar tu empresa a la autenticaci\u00f3n biom\u00e9trica","datePublished":"2026-01-29T09:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/"},"wordCount":693,"publisher":{"@id":"https:\/\/epic.es\/#organization"},"image":{"@id":"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/#primaryimage"},"thumbnailUrl":"https:\/\/epic.es\/wp-content\/uploads\/2026\/01\/fdfg.png","keywords":["autenticaci\u00f3n sin contrase\u00f1a","ciberseguridad","gesti\u00f3n de identidad","Microsoft Entra ID","passkeys"],"articleSection":["Seguridad Inform\u00e1tica"],"inLanguage":"ca"},{"@type":"WebPage","@id":"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/","url":"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/","name":"Passkeys vs Contrase\u00f1as: Gu\u00eda definitiva para migrar tu empresa a la autenticaci\u00f3n biom\u00e9trica - Epic","isPartOf":{"@id":"https:\/\/epic.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/#primaryimage"},"image":{"@id":"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/#primaryimage"},"thumbnailUrl":"https:\/\/epic.es\/wp-content\/uploads\/2026\/01\/fdfg.png","datePublished":"2026-01-29T09:00:00+00:00","breadcrumb":{"@id":"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/#breadcrumb"},"inLanguage":"ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/"]}]},{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/#primaryimage","url":"https:\/\/epic.es\/wp-content\/uploads\/2026\/01\/fdfg.png","contentUrl":"https:\/\/epic.es\/wp-content\/uploads\/2026\/01\/fdfg.png","width":1103,"height":624},{"@type":"BreadcrumbList","@id":"https:\/\/epic.es\/ca\/passkeys-vs-contrasenas-guia-migracion-biometrica\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/epic.es\/ca\/"},{"@type":"ListItem","position":2,"name":"Passkeys vs Contrase\u00f1as: Gu\u00eda definitiva para migrar tu empresa a la autenticaci\u00f3n biom\u00e9trica"}]},{"@type":"WebSite","@id":"https:\/\/epic.es\/#website","url":"https:\/\/epic.es\/","name":"Epic Inform\u00e0tica","description":"Dise\u00f1o y Programaci\u00f3n web \u00b7 Realizamos todo tipo de dise\u00f1o y programaci\u00f3n web completamente a medida, webs corporativas, cms, tiendas on-line, hosting etc.","publisher":{"@id":"https:\/\/epic.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/epic.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca"},{"@type":"Organization","@id":"https:\/\/epic.es\/#organization","name":"Epic Solutions","url":"https:\/\/epic.es\/","logo":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/epic.es\/#\/schema\/logo\/image\/","url":"https:\/\/epic.es\/wp-content\/uploads\/2025\/02\/epic-white.png","contentUrl":"https:\/\/epic.es\/wp-content\/uploads\/2025\/02\/epic-white.png","width":435,"height":165,"caption":"Epic Solutions"},"image":{"@id":"https:\/\/epic.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/epictelecom\/"]},{"@type":"Person","@id":"https:\/\/epic.es\/#\/schema\/person\/09e2e10c4a52338f338f379b6d07acba","name":"Epic Inform\u00e1tica","image":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/epic.es\/#\/schema\/person\/image\/","url":"https:\/\/epic.es\/wp-content\/uploads\/2025\/06\/epic-informatica_avatar-96x96.png","contentUrl":"https:\/\/epic.es\/wp-content\/uploads\/2025\/06\/epic-informatica_avatar-96x96.png","caption":"Epic Inform\u00e1tica"},"description":"Asesoramiento, an\u00e1lisis, consultor\u00eda y acompa\u00f1amiento. Adaptados a las necesidades de cada cliente.","sameAs":["http:\/\/epic.es","https:\/\/www.linkedin.com\/company\/epictelecom\/"],"url":"https:\/\/epic.es\/ca\/author\/w38-3p1c\/"}]}},"_links":{"self":[{"href":"https:\/\/epic.es\/ca\/wp-json\/wp\/v2\/posts\/13153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/epic.es\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/epic.es\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/epic.es\/ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/epic.es\/ca\/wp-json\/wp\/v2\/comments?post=13153"}],"version-history":[{"count":0,"href":"https:\/\/epic.es\/ca\/wp-json\/wp\/v2\/posts\/13153\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/epic.es\/ca\/wp-json\/wp\/v2\/media\/12254"}],"wp:attachment":[{"href":"https:\/\/epic.es\/ca\/wp-json\/wp\/v2\/media?parent=13153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/epic.es\/ca\/wp-json\/wp\/v2\/categories?post=13153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/epic.es\/ca\/wp-json\/wp\/v2\/tags?post=13153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}