{"id":2355,"date":"2025-01-14T21:21:12","date_gmt":"2025-01-14T21:21:12","guid":{"rendered":"http:\/\/touchconsulting.io\/pe\/?p=2355"},"modified":"2025-05-12T19:16:16","modified_gmt":"2025-05-12T19:16:16","slug":"por-que-low-code-es-la-respuesta-estrategica-al-shadow-it","status":"publish","type":"post","link":"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/","title":{"rendered":"\u00bfPor qu\u00e9 Low Code es la Respuesta Estrat\u00e9gica al Shadow IT?"},"content":{"rendered":"<p data-start=\"507\" data-end=\"1107\"><span class=\"_fadeIn_m1hgl_8\">El <\/span><strong data-start=\"510\" data-end=\"523\"><span class=\"_fadeIn_m1hgl_8\">Shadow <\/span><span class=\"_fadeIn_m1hgl_8\">IT<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">o <\/span><span class=\"_fadeIn_m1hgl_8\">TI <\/span><span class=\"_fadeIn_m1hgl_8\">en <\/span><span class=\"_fadeIn_m1hgl_8\">las <\/span><span class=\"_fadeIn_m1hgl_8\">sombras <\/span><span class=\"_fadeIn_m1hgl_8\">representa <\/span><span class=\"_fadeIn_m1hgl_8\">un <\/span><span class=\"_fadeIn_m1hgl_8\">desaf\u00edo <\/span><span class=\"_fadeIn_m1hgl_8\">significativo <\/span><span class=\"_fadeIn_m1hgl_8\">para <\/span><span class=\"_fadeIn_m1hgl_8\">las <\/span><span class=\"_fadeIn_m1hgl_8\">organizaciones <\/span><span class=\"_fadeIn_m1hgl_8\">modernas. <\/span><span class=\"_fadeIn_m1hgl_8\">Seg\u00fan <\/span><span class=\"_fadeIn_m1hgl_8\">Gartner, <\/span><span class=\"_fadeIn_m1hgl_8\">entre <\/span><span class=\"_fadeIn_m1hgl_8\">el <\/span><span class=\"_fadeIn_m1hgl_8\">30% <\/span><span class=\"_fadeIn_m1hgl_8\">y <\/span><span class=\"_fadeIn_m1hgl_8\">el <\/span><span class=\"_fadeIn_m1hgl_8\">40% <\/span><span class=\"_fadeIn_m1hgl_8\">del <\/span><span class=\"_fadeIn_m1hgl_8\">gasto <\/span><span class=\"_fadeIn_m1hgl_8\">en <\/span><span class=\"_fadeIn_m1hgl_8\">tecnolog\u00eda <\/span><span class=\"_fadeIn_m1hgl_8\">ocurre <\/span><span class=\"_fadeIn_m1hgl_8\">fuera <\/span><span class=\"_fadeIn_m1hgl_8\">del <\/span><span class=\"_fadeIn_m1hgl_8\">control <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">los <\/span><span class=\"_fadeIn_m1hgl_8\">departamentos <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">TI, <\/span><span class=\"_fadeIn_m1hgl_8\">lo <\/span><span class=\"_fadeIn_m1hgl_8\">que <\/span><span class=\"_fadeIn_m1hgl_8\">expone <\/span><span class=\"_fadeIn_m1hgl_8\">a <\/span><span class=\"_fadeIn_m1hgl_8\">las <\/span><span class=\"_fadeIn_m1hgl_8\">empresas <\/span><span class=\"_fadeIn_m1hgl_8\">a <\/span><span class=\"_fadeIn_m1hgl_8\">riesgos <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">seguridad, <\/span><span class=\"_fadeIn_m1hgl_8\">costos <\/span><span class=\"_fadeIn_m1hgl_8\">inesperados <\/span><span class=\"_fadeIn_m1hgl_8\">y <\/span><span class=\"_fadeIn_m1hgl_8\">problemas <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">integraci\u00f3n. <\/span><span class=\"_fadeIn_m1hgl_8\">Afortunadamente, <\/span><strong data-start=\"845\" data-end=\"873\"><span class=\"_fadeIn_m1hgl_8\">las <\/span><span class=\"_fadeIn_m1hgl_8\">plataformas <\/span><span class=\"_fadeIn_m1hgl_8\">Low <\/span><span class=\"_fadeIn_m1hgl_8\">Code<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">como <\/span><span class=\"_fadeIn_m1hgl_8\">Microsoft <\/span><span class=\"_fadeIn_m1hgl_8\">Power <\/span><span class=\"_fadeIn_m1hgl_8\">Platform <\/span><span class=\"_fadeIn_m1hgl_8\">y <\/span><span class=\"_fadeIn_m1hgl_8\">Google <\/span><span class=\"_fadeIn_m1hgl_8\">AppSheet <\/span><span class=\"_fadeIn_m1hgl_8\">ofrecen <\/span><span class=\"_fadeIn_m1hgl_8\">una <\/span><span class=\"_fadeIn_m1hgl_8\">soluci\u00f3n <\/span><span class=\"_fadeIn_m1hgl_8\">eficaz <\/span><span class=\"_fadeIn_m1hgl_8\">para <\/span><span class=\"_fadeIn_m1hgl_8\">mitigar <\/span><span class=\"_fadeIn_m1hgl_8\">estos <\/span><span class=\"_fadeIn_m1hgl_8\">riesgos <\/span><span class=\"_fadeIn_m1hgl_8\">y <\/span><span class=\"_fadeIn_m1hgl_8\">alinear <\/span><span class=\"_fadeIn_m1hgl_8\">las <\/span><span class=\"_fadeIn_m1hgl_8\">iniciativas <\/span><span class=\"_fadeIn_m1hgl_8\">tecnol\u00f3gicas <\/span><span class=\"_fadeIn_m1hgl_8\">con <\/span><span class=\"_fadeIn_m1hgl_8\">los <\/span><span class=\"_fadeIn_m1hgl_8\">objetivos <\/span><span class=\"_fadeIn_m1hgl_8\">estrat\u00e9gicos <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">las <\/span><span class=\"_fadeIn_m1hgl_8\">empresas, <\/span><span class=\"_fadeIn_m1hgl_8\">minimizando <\/span><span class=\"_fadeIn_m1hgl_8\">los <\/span><span class=\"_fadeIn_m1hgl_8\">peligros <\/span><span class=\"_fadeIn_m1hgl_8\">del <\/span><strong data-start=\"1093\" data-end=\"1106\"><span class=\"_fadeIn_m1hgl_8\">Shadow <\/span><span class=\"_fadeIn_m1hgl_8\">IT<\/span><\/strong><span class=\"_fadeIn_m1hgl_8\">.<\/span><\/p>\n<h3 data-start=\"1114\" data-end=\"1139\"><span class=\"_fadeIn_m1hgl_8\">\u00bf<\/span><span class=\"_fadeIn_m1hgl_8\">Qu\u00e9 <\/span><span class=\"_fadeIn_m1hgl_8\">es <\/span><span class=\"_fadeIn_m1hgl_8\">el <\/span><span class=\"_fadeIn_m1hgl_8\">Shadow <\/span><span class=\"_fadeIn_m1hgl_8\">IT?<\/span><\/h3>\n<p data-start=\"1141\" data-end=\"1409\"><span class=\"_fadeIn_m1hgl_8\">El <\/span><strong data-start=\"1144\" data-end=\"1157\"><span class=\"_fadeIn_m1hgl_8\">Shadow <\/span><span class=\"_fadeIn_m1hgl_8\">IT<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">se <\/span><span class=\"_fadeIn_m1hgl_8\">refiere <\/span><span class=\"_fadeIn_m1hgl_8\">al <\/span><span class=\"_fadeIn_m1hgl_8\">uso <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">aplicaciones, <\/span><span class=\"_fadeIn_m1hgl_8\">herramientas <\/span><span class=\"_fadeIn_m1hgl_8\">o <\/span><span class=\"_fadeIn_m1hgl_8\">soluciones <\/span><span class=\"_fadeIn_m1hgl_8\">tecnol\u00f3gicas <\/span><span class=\"_fadeIn_m1hgl_8\">no <\/span><span class=\"_fadeIn_m1hgl_8\">autorizadas <\/span><span class=\"_fadeIn_m1hgl_8\">ni <\/span><span class=\"_fadeIn_m1hgl_8\">supervisadas <\/span><span class=\"_fadeIn_m1hgl_8\">por <\/span><span class=\"_fadeIn_m1hgl_8\">el <\/span><span class=\"_fadeIn_m1hgl_8\">\u00e1rea <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">TI. <\/span><span class=\"_fadeIn_m1hgl_8\">Aunque <\/span><span class=\"_fadeIn_m1hgl_8\">estas <\/span><span class=\"_fadeIn_m1hgl_8\">herramientas <\/span><span class=\"_fadeIn_m1hgl_8\">pueden <\/span><span class=\"_fadeIn_m1hgl_8\">resolver <\/span><span class=\"_fadeIn_m1hgl_8\">necesidades <\/span><span class=\"_fadeIn_m1hgl_8\">espec\u00edficas <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">las <\/span><span class=\"_fadeIn_m1hgl_8\">\u00e1reas <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">negocio, <\/span><span class=\"_fadeIn_m1hgl_8\">tambi\u00e9n <\/span><span class=\"_fadeIn_m1hgl_8\">generan <\/span><span class=\"_fadeIn_m1hgl_8\">m\u00faltiples <\/span><span class=\"_fadeIn_m1hgl_8\">problemas:<\/span><\/p>\n<ul data-start=\"1411\" data-end=\"1804\">\n<li data-start=\"1411\" data-end=\"1540\">\n<p data-start=\"1413\" data-end=\"1540\"><strong data-start=\"1413\" data-end=\"1438\"><span class=\"_fadeIn_m1hgl_8\">Riesgos <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">seguridad:<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">Las <\/span><span class=\"_fadeIn_m1hgl_8\">aplicaciones <\/span><span class=\"_fadeIn_m1hgl_8\">no <\/span><span class=\"_fadeIn_m1hgl_8\">auditadas <\/span><span class=\"_fadeIn_m1hgl_8\">pueden <\/span><span class=\"_fadeIn_m1hgl_8\">comprometer <\/span><span class=\"_fadeIn_m1hgl_8\">datos <\/span><span class=\"_fadeIn_m1hgl_8\">sensibles <\/span><span class=\"_fadeIn_m1hgl_8\">y <\/span><span class=\"_fadeIn_m1hgl_8\">exponer <\/span><span class=\"_fadeIn_m1hgl_8\">vulnerabilidades <\/span><span class=\"_fadeIn_m1hgl_8\">cr\u00edticas.<\/span><\/p>\n<\/li>\n<li data-start=\"1541\" data-end=\"1675\">\n<p data-start=\"1543\" data-end=\"1675\"><strong data-start=\"1543\" data-end=\"1568\"><span class=\"_fadeIn_m1hgl_8\">Falta <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">integraci\u00f3n:<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">Los <\/span><span class=\"_fadeIn_m1hgl_8\">sistemas <\/span><span class=\"_fadeIn_m1hgl_8\">fragmentados <\/span><span class=\"_fadeIn_m1hgl_8\">dificultan <\/span><span class=\"_fadeIn_m1hgl_8\">la <\/span><span class=\"_fadeIn_m1hgl_8\">interoperabilidad <\/span><span class=\"_fadeIn_m1hgl_8\">entre <\/span><span class=\"_fadeIn_m1hgl_8\">\u00e1reas, <\/span><span class=\"_fadeIn_m1hgl_8\">lo <\/span><span class=\"_fadeIn_m1hgl_8\">que <\/span><span class=\"_fadeIn_m1hgl_8\">genera <\/span><span class=\"_fadeIn_m1hgl_8\">silos <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">informaci\u00f3n.<\/span><\/p>\n<\/li>\n<li data-start=\"1676\" data-end=\"1804\">\n<p data-start=\"1678\" data-end=\"1804\"><strong data-start=\"1678\" data-end=\"1697\"><span class=\"_fadeIn_m1hgl_8\">Costos <\/span><span class=\"_fadeIn_m1hgl_8\">ocultos:<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">El <\/span><span class=\"_fadeIn_m1hgl_8\">mantenimiento <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">estas <\/span><span class=\"_fadeIn_m1hgl_8\">soluciones <\/span><span class=\"_fadeIn_m1hgl_8\">puede <\/span><span class=\"_fadeIn_m1hgl_8\">disparar <\/span><span class=\"_fadeIn_m1hgl_8\">los <\/span><span class=\"_fadeIn_m1hgl_8\">gastos <\/span><span class=\"_fadeIn_m1hgl_8\">tecnol\u00f3gicos <\/span><span class=\"_fadeIn_m1hgl_8\">sin <\/span><span class=\"_fadeIn_m1hgl_8\">aportar <\/span><span class=\"_fadeIn_m1hgl_8\">valor <\/span><span class=\"_fadeIn_m1hgl_8\">estrat\u00e9gico.<\/span><\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"1811\" data-end=\"1850\"><span class=\"_fadeIn_m1hgl_8\">\u00bf<\/span><span class=\"_fadeIn_m1hgl_8\">C\u00f3mo <\/span><span class=\"_fadeIn_m1hgl_8\">Low <\/span><span class=\"_fadeIn_m1hgl_8\">Code <\/span><span class=\"_fadeIn_m1hgl_8\">aborda <\/span><span class=\"_fadeIn_m1hgl_8\">el <\/span><span class=\"_fadeIn_m1hgl_8\">Shadow <\/span><span class=\"_fadeIn_m1hgl_8\">IT?<\/span><\/h3>\n<p data-start=\"1852\" data-end=\"2186\"><strong><span class=\"_fadeIn_m1hgl_8\">Las <\/span><span class=\"_fadeIn_m1hgl_8\">plataformas <\/span><span class=\"_fadeIn_m1hgl_8\">Low <\/span><span class=\"_fadeIn_m1hgl_8\">Code<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">ofrecen <\/span><span class=\"_fadeIn_m1hgl_8\">un <\/span><span class=\"_fadeIn_m1hgl_8\">enfoque <\/span><span class=\"_fadeIn_m1hgl_8\">equilibrado <\/span><span class=\"_fadeIn_m1hgl_8\">entre <\/span><span class=\"_fadeIn_m1hgl_8\">agilidad <\/span><span class=\"_fadeIn_m1hgl_8\">y <\/span><span class=\"_fadeIn_m1hgl_8\">control, <\/span><span class=\"_fadeIn_m1hgl_8\">permitiendo <\/span><span class=\"_fadeIn_m1hgl_8\">que <\/span><span class=\"_fadeIn_m1hgl_8\">las <\/span><span class=\"_fadeIn_m1hgl_8\">\u00e1reas <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">negocio <\/span><span class=\"_fadeIn_m1hgl_8\">colaboren <\/span><span class=\"_fadeIn_m1hgl_8\">con <\/span><span class=\"_fadeIn_m1hgl_8\">TI <\/span><span class=\"_fadeIn_m1hgl_8\">para <\/span><span class=\"_fadeIn_m1hgl_8\">desarrollar <\/span><span class=\"_fadeIn_m1hgl_8\">aplicaciones <\/span><span class=\"_fadeIn_m1hgl_8\">bajo <\/span><span class=\"_fadeIn_m1hgl_8\">est\u00e1ndares <\/span><span class=\"_fadeIn_m1hgl_8\">corporativos. <\/span><span class=\"_fadeIn_m1hgl_8\">De <\/span><span class=\"_fadeIn_m1hgl_8\">esta <\/span><span class=\"_fadeIn_m1hgl_8\">forma, <\/span><strong data-start=\"2067\" data-end=\"2083\"><span class=\"_fadeIn_m1hgl_8\">el <\/span><span class=\"_fadeIn_m1hgl_8\">Shadow <\/span><span class=\"_fadeIn_m1hgl_8\">IT<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">se <\/span><span class=\"_fadeIn_m1hgl_8\">aborda <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">manera <\/span><span class=\"_fadeIn_m1hgl_8\">estrat\u00e9gica, <\/span><span class=\"_fadeIn_m1hgl_8\">permitiendo <\/span><span class=\"_fadeIn_m1hgl_8\">la <\/span><span class=\"_fadeIn_m1hgl_8\">innovaci\u00f3n <\/span><span class=\"_fadeIn_m1hgl_8\">sin <\/span><span class=\"_fadeIn_m1hgl_8\">comprometer <\/span><span class=\"_fadeIn_m1hgl_8\">la <\/span><span class=\"_fadeIn_m1hgl_8\">seguridad <\/span><span class=\"_fadeIn_m1hgl_8\">ni <\/span><span class=\"_fadeIn_m1hgl_8\">el <\/span><span class=\"_fadeIn_m1hgl_8\">control.<\/span><\/p>\n<ul data-start=\"2188\" data-end=\"2916\">\n<li data-start=\"2188\" data-end=\"2375\">\n<p data-start=\"2190\" data-end=\"2375\"><strong data-start=\"2190\" data-end=\"2215\"><span class=\"_fadeIn_m1hgl_8\">Control <\/span><span class=\"_fadeIn_m1hgl_8\">centralizado:<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">Low <\/span><span class=\"_fadeIn_m1hgl_8\">Code <\/span><span class=\"_fadeIn_m1hgl_8\">integra <\/span><span class=\"_fadeIn_m1hgl_8\">pol\u00edticas <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">gobernanza <\/span><span class=\"_fadeIn_m1hgl_8\">tecnol\u00f3gica <\/span><span class=\"_fadeIn_m1hgl_8\">que <\/span><span class=\"_fadeIn_m1hgl_8\">aseguran <\/span><span class=\"_fadeIn_m1hgl_8\">que <\/span><span class=\"_fadeIn_m1hgl_8\">todas <\/span><span class=\"_fadeIn_m1hgl_8\">las <\/span><span class=\"_fadeIn_m1hgl_8\">aplicaciones <\/span><span class=\"_fadeIn_m1hgl_8\">cumplan <\/span><span class=\"_fadeIn_m1hgl_8\">con <\/span><span class=\"_fadeIn_m1hgl_8\">normativas <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">seguridad <\/span><span class=\"_fadeIn_m1hgl_8\">y <\/span><span class=\"_fadeIn_m1hgl_8\">los <\/span><span class=\"_fadeIn_m1hgl_8\">objetivos <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">la <\/span><span class=\"_fadeIn_m1hgl_8\">empresa.<\/span><\/p>\n<\/li>\n<li data-start=\"2376\" data-end=\"2569\">\n<p data-start=\"2378\" data-end=\"2569\"><strong data-start=\"2378\" data-end=\"2407\"><span class=\"_fadeIn_m1hgl_8\">Colaboraci\u00f3n <\/span><span class=\"_fadeIn_m1hgl_8\">TI-<\/span><span class=\"_fadeIn_m1hgl_8\">Negocios:<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">Estas <\/span><span class=\"_fadeIn_m1hgl_8\">plataformas <\/span><span class=\"_fadeIn_m1hgl_8\">fomentan <\/span><span class=\"_fadeIn_m1hgl_8\">la <\/span><span class=\"_fadeIn_m1hgl_8\">co-<\/span><span class=\"_fadeIn_m1hgl_8\">creaci\u00f3n <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">soluciones, <\/span><span class=\"_fadeIn_m1hgl_8\">permitiendo <\/span><span class=\"_fadeIn_m1hgl_8\">que <\/span><span class=\"_fadeIn_m1hgl_8\">las <\/span><span class=\"_fadeIn_m1hgl_8\">\u00e1reas <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">negocio <\/span><span class=\"_fadeIn_m1hgl_8\">trabajen <\/span><span class=\"_fadeIn_m1hgl_8\">junto <\/span><span class=\"_fadeIn_m1hgl_8\">con <\/span><span class=\"_fadeIn_m1hgl_8\">TI <\/span><span class=\"_fadeIn_m1hgl_8\">para <\/span><span class=\"_fadeIn_m1hgl_8\">desarrollar <\/span><span class=\"_fadeIn_m1hgl_8\">herramientas <\/span><span class=\"_fadeIn_m1hgl_8\">personalizadas.<\/span><\/p>\n<\/li>\n<li data-start=\"2570\" data-end=\"2731\">\n<p data-start=\"2572\" data-end=\"2731\"><strong data-start=\"2572\" data-end=\"2598\"><span class=\"_fadeIn_m1hgl_8\">Seguridad <\/span><span class=\"_fadeIn_m1hgl_8\">incorporada:<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">Cumpliendo <\/span><span class=\"_fadeIn_m1hgl_8\">con <\/span><span class=\"_fadeIn_m1hgl_8\">est\u00e1ndares <\/span><span class=\"_fadeIn_m1hgl_8\">como <\/span><span class=\"_fadeIn_m1hgl_8\">ISO <\/span><span class=\"_fadeIn_m1hgl_8\">27001, <\/span><span class=\"_fadeIn_m1hgl_8\">las <\/span><span class=\"_fadeIn_m1hgl_8\">plataformas <\/span><strong data-start=\"2657\" data-end=\"2669\"><span class=\"_fadeIn_m1hgl_8\">Low <\/span><span class=\"_fadeIn_m1hgl_8\">Code<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">implementan <\/span><span class=\"_fadeIn_m1hgl_8\">controles <\/span><span class=\"_fadeIn_m1hgl_8\">avanzados <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">seguridad <\/span><span class=\"_fadeIn_m1hgl_8\">desde <\/span><span class=\"_fadeIn_m1hgl_8\">el <\/span><span class=\"_fadeIn_m1hgl_8\">dise\u00f1o.<\/span><\/p>\n<\/li>\n<li data-start=\"2732\" data-end=\"2916\">\n<p data-start=\"2734\" data-end=\"2916\"><strong data-start=\"2734\" data-end=\"2763\"><span class=\"_fadeIn_m1hgl_8\">Facilidad <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">integraci\u00f3n:<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">Con <\/span><span class=\"_fadeIn_m1hgl_8\">conectores <\/span><span class=\"_fadeIn_m1hgl_8\">predise\u00f1ados, <\/span><span class=\"_fadeIn_m1hgl_8\">las <\/span><span class=\"_fadeIn_m1hgl_8\">plataformas <\/span><strong data-start=\"2809\" data-end=\"2821\"><span class=\"_fadeIn_m1hgl_8\">Low <\/span><span class=\"_fadeIn_m1hgl_8\">Code<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">garantizan <\/span><span class=\"_fadeIn_m1hgl_8\">la <\/span><span class=\"_fadeIn_m1hgl_8\">integraci\u00f3n <\/span><span class=\"_fadeIn_m1hgl_8\">con <\/span><span class=\"_fadeIn_m1hgl_8\">sistemas <\/span><span class=\"_fadeIn_m1hgl_8\">cr\u00edticos <\/span><span class=\"_fadeIn_m1hgl_8\">como <\/span><span class=\"_fadeIn_m1hgl_8\">ERP <\/span><span class=\"_fadeIn_m1hgl_8\">y <\/span><span class=\"_fadeIn_m1hgl_8\">CRM, <\/span><span class=\"_fadeIn_m1hgl_8\">evitando <\/span><span class=\"_fadeIn_m1hgl_8\">silos <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">informaci\u00f3n.<\/span><\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"2923\" data-end=\"2989\"><span class=\"_fadeIn_m1hgl_8\">Pasos <\/span><span class=\"_fadeIn_m1hgl_8\">clave <\/span><span class=\"_fadeIn_m1hgl_8\">para <\/span><span class=\"_fadeIn_m1hgl_8\">implementar <\/span><span class=\"_fadeIn_m1hgl_8\">Low <\/span><span class=\"_fadeIn_m1hgl_8\">Code <\/span><span class=\"_fadeIn_m1hgl_8\">y <\/span><span class=\"_fadeIn_m1hgl_8\">controlar <\/span><span class=\"_fadeIn_m1hgl_8\">el <\/span><span class=\"_fadeIn_m1hgl_8\">Shadow <\/span><span class=\"_fadeIn_m1hgl_8\">IT<\/span><\/h3>\n<p data-start=\"2991\" data-end=\"3103\"><span class=\"_fadeIn_m1hgl_8\">En <\/span><span class=\"_fadeIn_m1hgl_8\">Touch <\/span><span class=\"_fadeIn_m1hgl_8\">Consulting, <\/span><span class=\"_fadeIn_m1hgl_8\">guiamos <\/span><span class=\"_fadeIn_m1hgl_8\">a <\/span><span class=\"_fadeIn_m1hgl_8\">las <\/span><span class=\"_fadeIn_m1hgl_8\">empresas <\/span><span class=\"_fadeIn_m1hgl_8\">en <\/span><span class=\"_fadeIn_m1hgl_8\">la <\/span><span class=\"_fadeIn_m1hgl_8\">adopci\u00f3n <\/span><span class=\"_fadeIn_m1hgl_8\">estrat\u00e9gica <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><strong data-start=\"3065\" data-end=\"3077\"><span class=\"_fadeIn_m1hgl_8\">Low <\/span><span class=\"_fadeIn_m1hgl_8\">Code<\/span><\/strong><span class=\"_fadeIn_m1hgl_8\">. <\/span><span class=\"_fadeIn_m1hgl_8\">Nuestro <\/span><span class=\"_fadeIn_m1hgl_8\">enfoque <\/span><span class=\"_fadeIn_m1hgl_8\">incluye:<\/span><\/p>\n<ul data-start=\"3105\" data-end=\"3494\">\n<li data-start=\"3105\" data-end=\"3241\">\n<p data-start=\"3107\" data-end=\"3241\"><strong data-start=\"3107\" data-end=\"3141\"><span class=\"_fadeIn_m1hgl_8\">Establecimiento <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">gobernanza:<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">Definimos <\/span><span class=\"_fadeIn_m1hgl_8\">reglas <\/span><span class=\"_fadeIn_m1hgl_8\">claras <\/span><span class=\"_fadeIn_m1hgl_8\">para <\/span><span class=\"_fadeIn_m1hgl_8\">asegurar <\/span><span class=\"_fadeIn_m1hgl_8\">que <\/span><span class=\"_fadeIn_m1hgl_8\">las <\/span><span class=\"_fadeIn_m1hgl_8\">aplicaciones <\/span><span class=\"_fadeIn_m1hgl_8\">est\u00e9n <\/span><span class=\"_fadeIn_m1hgl_8\">alineadas <\/span><span class=\"_fadeIn_m1hgl_8\">con <\/span><span class=\"_fadeIn_m1hgl_8\">la <\/span><span class=\"_fadeIn_m1hgl_8\">estrategia <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">TI.<\/span><\/p>\n<\/li>\n<li data-start=\"3242\" data-end=\"3365\">\n<p data-start=\"3244\" data-end=\"3365\"><strong data-start=\"3244\" data-end=\"3270\"><span class=\"_fadeIn_m1hgl_8\">Integraci\u00f3n <\/span><span class=\"_fadeIn_m1hgl_8\">eficiente:<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">Implementamos <\/span><span class=\"_fadeIn_m1hgl_8\">APIs <\/span><span class=\"_fadeIn_m1hgl_8\">y <\/span><span class=\"_fadeIn_m1hgl_8\">conectores <\/span><span class=\"_fadeIn_m1hgl_8\">para <\/span><span class=\"_fadeIn_m1hgl_8\">integrar <\/span><span class=\"_fadeIn_m1hgl_8\">soluciones <\/span><strong data-start=\"3328\" data-end=\"3340\"><span class=\"_fadeIn_m1hgl_8\">Low <\/span><span class=\"_fadeIn_m1hgl_8\">Code<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">con <\/span><span class=\"_fadeIn_m1hgl_8\">sistemas <\/span><span class=\"_fadeIn_m1hgl_8\">existentes.<\/span><\/p>\n<\/li>\n<li data-start=\"3366\" data-end=\"3494\">\n<p data-start=\"3368\" data-end=\"3494\"><strong data-start=\"3368\" data-end=\"3398\"><span class=\"_fadeIn_m1hgl_8\">Seguridad <\/span><span class=\"_fadeIn_m1hgl_8\">desde <\/span><span class=\"_fadeIn_m1hgl_8\">el <\/span><span class=\"_fadeIn_m1hgl_8\">dise\u00f1o:<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">Dise\u00f1amos <\/span><span class=\"_fadeIn_m1hgl_8\">controles <\/span><span class=\"_fadeIn_m1hgl_8\">avanzados <\/span><span class=\"_fadeIn_m1hgl_8\">que <\/span><span class=\"_fadeIn_m1hgl_8\">protegen <\/span><span class=\"_fadeIn_m1hgl_8\">las <\/span><span class=\"_fadeIn_m1hgl_8\">aplicaciones <\/span><span class=\"_fadeIn_m1hgl_8\">frente <\/span><span class=\"_fadeIn_m1hgl_8\">a <\/span><span class=\"_fadeIn_m1hgl_8\">posibles <\/span><span class=\"_fadeIn_m1hgl_8\">vulnerabilidades.<\/span><\/p>\n<\/li>\n<\/ul>\n<p data-start=\"3501\" data-end=\"3853\"><span class=\"_fadeIn_m1hgl_8\">El <\/span><strong data-start=\"3504\" data-end=\"3516\"><span class=\"_fadeIn_m1hgl_8\">Low <\/span><span class=\"_fadeIn_m1hgl_8\">Code<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">no <\/span><span class=\"_fadeIn_m1hgl_8\">solo <\/span><span class=\"_fadeIn_m1hgl_8\">elimina <\/span><span class=\"_fadeIn_m1hgl_8\">los <\/span><span class=\"_fadeIn_m1hgl_8\">riesgos <\/span><span class=\"_fadeIn_m1hgl_8\">asociados <\/span><span class=\"_fadeIn_m1hgl_8\">al <\/span><strong data-start=\"3558\" data-end=\"3571\"><span class=\"_fadeIn_m1hgl_8\">Shadow <\/span><span class=\"_fadeIn_m1hgl_8\">IT<\/span><\/strong><span class=\"_fadeIn_m1hgl_8\">, <\/span><span class=\"_fadeIn_m1hgl_8\">sino <\/span><span class=\"_fadeIn_m1hgl_8\">que <\/span><span class=\"_fadeIn_m1hgl_8\">tambi\u00e9n <\/span><span class=\"_fadeIn_m1hgl_8\">impulsa <\/span><span class=\"_fadeIn_m1hgl_8\">la <\/span><span class=\"_fadeIn_m1hgl_8\">colaboraci\u00f3n <\/span><span class=\"_fadeIn_m1hgl_8\">entre <\/span><span class=\"_fadeIn_m1hgl_8\">TI <\/span><span class=\"_fadeIn_m1hgl_8\">y <\/span><span class=\"_fadeIn_m1hgl_8\">las <\/span><span class=\"_fadeIn_m1hgl_8\">\u00e1reas <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">negocio, <\/span><span class=\"_fadeIn_m1hgl_8\">centraliza <\/span><span class=\"_fadeIn_m1hgl_8\">el <\/span><span class=\"_fadeIn_m1hgl_8\">control <\/span><span class=\"_fadeIn_m1hgl_8\">y <\/span><span class=\"_fadeIn_m1hgl_8\">acelera <\/span><span class=\"_fadeIn_m1hgl_8\">la <\/span><span class=\"_fadeIn_m1hgl_8\">innovaci\u00f3n. <\/span><span class=\"_fadeIn_m1hgl_8\">En <\/span><span class=\"_fadeIn_m1hgl_8\">Touch <\/span><span class=\"_fadeIn_m1hgl_8\">Consulting, <\/span><span class=\"_fadeIn_m1hgl_8\">adaptamos <\/span><span class=\"_fadeIn_m1hgl_8\">soluciones <\/span><strong data-start=\"3736\" data-end=\"3748\"><span class=\"_fadeIn_m1hgl_8\">Low <\/span><span class=\"_fadeIn_m1hgl_8\">Code<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">a <\/span><span class=\"_fadeIn_m1hgl_8\">las <\/span><span class=\"_fadeIn_m1hgl_8\">necesidades <\/span><span class=\"_fadeIn_m1hgl_8\">espec\u00edficas <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">tu <\/span><span class=\"_fadeIn_m1hgl_8\">empresa, <\/span><span class=\"_fadeIn_m1hgl_8\">asegurando <\/span><span class=\"_fadeIn_m1hgl_8\">un <\/span><span class=\"_fadeIn_m1hgl_8\">equilibrio <\/span><span class=\"_fadeIn_m1hgl_8\">perfecto <\/span><span class=\"_fadeIn_m1hgl_8\">entre <\/span><span class=\"_fadeIn_m1hgl_8\">agilidad <\/span><span class=\"_fadeIn_m1hgl_8\">y <\/span><span class=\"_fadeIn_m1hgl_8\">control.<\/span><\/p>\n<p data-start=\"3855\" data-end=\"3978\"><span class=\"_fadeIn_m1hgl_8\">\ud83d\udccc <\/span><strong data-start=\"3858\" data-end=\"3878\"><a class=\"\" href=\"#\" rel=\"noopener\" data-start=\"3860\" data-end=\"3876\"><span class=\"_fadeIn_m1hgl_8\">Cont\u00e1ctanos<\/span><\/a><\/strong> <span class=\"_fadeIn_m1hgl_8\">para <\/span><span class=\"_fadeIn_m1hgl_8\">descubrir <\/span><span class=\"_fadeIn_m1hgl_8\">c\u00f3mo <\/span><span class=\"_fadeIn_m1hgl_8\">el <\/span><strong data-start=\"3902\" data-end=\"3914\"><span class=\"_fadeIn_m1hgl_8\">Low <\/span><span class=\"_fadeIn_m1hgl_8\">Code<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">puede <\/span><span class=\"_fadeIn_m1hgl_8\">transformar <\/span><span class=\"_fadeIn_m1hgl_8\">la <\/span><span class=\"_fadeIn_m1hgl_8\">estrategia <\/span><span class=\"_fadeIn_m1hgl_8\">tecnol\u00f3gica <\/span><span class=\"_fadeIn_m1hgl_8\">de <\/span><span class=\"_fadeIn_m1hgl_8\">tu <\/span><span class=\"_fadeIn_m1hgl_8\">organizaci\u00f3n.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El Shadow IT o TI en las sombras representa un desaf\u00edo significativo para las organizaciones modernas. Seg\u00fan Gartner, entre el 30% y el 40% del gasto en tecnolog\u00eda ocurre fuera del control de los departamentos de TI, lo que expone a las empresas a riesgos de seguridad, costos inesperados y problemas de integraci\u00f3n. Afortunadamente, las [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2353,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_joinchat":[],"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2355","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-software-factory"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Shadow IT y Plataformas Low Code - Touch Consulting Per\u00fa<\/title>\n<meta name=\"description\" content=\"Descubre c\u00f3mo las plataformas Low Code como Microsoft Power Platform y Google AppSheet ayudan a las empresas a controlar el Shadow IT, mejorando la seguridad, integraci\u00f3n y reducci\u00f3n de costos, mientras fomentan la colaboraci\u00f3n entre TI y las \u00e1reas de negocio.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shadow IT y Plataformas Low Code - Touch Consulting Per\u00fa\" \/>\n<meta property=\"og:description\" content=\"Descubre c\u00f3mo las plataformas Low Code como Microsoft Power Platform y Google AppSheet ayudan a las empresas a controlar el Shadow IT, mejorando la seguridad, integraci\u00f3n y reducci\u00f3n de costos, mientras fomentan la colaboraci\u00f3n entre TI y las \u00e1reas de negocio.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Touch Consulting Per\u00fa\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-14T21:21:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-12T19:16:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/touchconsulting.io\/pe\/wp-content\/uploads\/sites\/2\/2025\/01\/PC-Por-que-Low-Code-es-la-Respuesta-Estrategica-al-Shadow-IT-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Cesar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cesar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/\"},\"author\":{\"name\":\"Cesar\",\"@id\":\"https:\/\/touchconsulting.io\/pe\/#\/schema\/person\/9db0c142fc891a868623208951dd4e1a\"},\"headline\":\"\u00bfPor qu\u00e9 Low Code es la Respuesta Estrat\u00e9gica al Shadow IT?\",\"datePublished\":\"2025-01-14T21:21:12+00:00\",\"dateModified\":\"2025-05-12T19:16:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/\"},\"wordCount\":530,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/touchconsulting.io\/pe\/#organization\"},\"image\":{\"@id\":\"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/touchconsulting.io\/pe\/wp-content\/uploads\/sites\/2\/2025\/01\/PC-Por-que-Low-Code-es-la-Respuesta-Estrategica-al-Shadow-IT-1.webp\",\"articleSection\":[\"Software Factory\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/\",\"url\":\"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/\",\"name\":\"Shadow IT y Plataformas Low Code - Touch Consulting Per\u00fa\",\"isPartOf\":{\"@id\":\"https:\/\/touchconsulting.io\/pe\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/touchconsulting.io\/pe\/wp-content\/uploads\/sites\/2\/2025\/01\/PC-Por-que-Low-Code-es-la-Respuesta-Estrategica-al-Shadow-IT-1.webp\",\"datePublished\":\"2025-01-14T21:21:12+00:00\",\"dateModified\":\"2025-05-12T19:16:16+00:00\",\"description\":\"Descubre c\u00f3mo las plataformas Low Code como Microsoft Power Platform y Google AppSheet ayudan a las empresas a controlar el Shadow IT, mejorando la seguridad, integraci\u00f3n y reducci\u00f3n de costos, mientras fomentan la colaboraci\u00f3n entre TI y las \u00e1reas de negocio.\",\"breadcrumb\":{\"@id\":\"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/#primaryimage\",\"url\":\"https:\/\/touchconsulting.io\/pe\/wp-content\/uploads\/sites\/2\/2025\/01\/PC-Por-que-Low-Code-es-la-Respuesta-Estrategica-al-Shadow-IT-1.webp\",\"contentUrl\":\"https:\/\/touchconsulting.io\/pe\/wp-content\/uploads\/sites\/2\/2025\/01\/PC-Por-que-Low-Code-es-la-Respuesta-Estrategica-al-Shadow-IT-1.webp\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/touchconsulting.io\/pe\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfPor qu\u00e9 Low Code es la Respuesta Estrat\u00e9gica al Shadow IT?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/touchconsulting.io\/pe\/#website\",\"url\":\"https:\/\/touchconsulting.io\/pe\/\",\"name\":\"Touch Consulting Per\u00fa\",\"description\":\"Consultora TI\",\"publisher\":{\"@id\":\"https:\/\/touchconsulting.io\/pe\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/touchconsulting.io\/pe\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/touchconsulting.io\/pe\/#organization\",\"name\":\"TOUCH CONSULTING\",\"alternateName\":\"TOUCH\",\"url\":\"https:\/\/touchconsulting.io\/pe\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/touchconsulting.io\/pe\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/touchconsulting.io\/pe\/wp-content\/uploads\/sites\/2\/2024\/03\/LogotiposTouch_Logo-min.png\",\"contentUrl\":\"https:\/\/touchconsulting.io\/pe\/wp-content\/uploads\/sites\/2\/2024\/03\/LogotiposTouch_Logo-min.png\",\"width\":281,\"height\":105,\"caption\":\"TOUCH CONSULTING\"},\"image\":{\"@id\":\"https:\/\/touchconsulting.io\/pe\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/touchconsulting.io\/pe\/#\/schema\/person\/9db0c142fc891a868623208951dd4e1a\",\"name\":\"Cesar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/touchconsulting.io\/pe\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4a55a61d5e414eb871a993e295be42612f72699bf1472961baa79efb06d892db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4a55a61d5e414eb871a993e295be42612f72699bf1472961baa79efb06d892db?s=96&d=mm&r=g\",\"caption\":\"Cesar\"},\"sameAs\":[\"https:\/\/www.touchconsulting.es\/\"],\"url\":\"https:\/\/touchconsulting.io\/pe\/blog\/author\/admwplogintouch\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Shadow IT y Plataformas Low Code - Touch Consulting Per\u00fa","description":"Descubre c\u00f3mo las plataformas Low Code como Microsoft Power Platform y Google AppSheet ayudan a las empresas a controlar el Shadow IT, mejorando la seguridad, integraci\u00f3n y reducci\u00f3n de costos, mientras fomentan la colaboraci\u00f3n entre TI y las \u00e1reas de negocio.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/","og_locale":"es_ES","og_type":"article","og_title":"Shadow IT y Plataformas Low Code - Touch Consulting Per\u00fa","og_description":"Descubre c\u00f3mo las plataformas Low Code como Microsoft Power Platform y Google AppSheet ayudan a las empresas a controlar el Shadow IT, mejorando la seguridad, integraci\u00f3n y reducci\u00f3n de costos, mientras fomentan la colaboraci\u00f3n entre TI y las \u00e1reas de negocio.","og_url":"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/","og_site_name":"Touch Consulting Per\u00fa","article_published_time":"2025-01-14T21:21:12+00:00","article_modified_time":"2025-05-12T19:16:16+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/touchconsulting.io\/pe\/wp-content\/uploads\/sites\/2\/2025\/01\/PC-Por-que-Low-Code-es-la-Respuesta-Estrategica-al-Shadow-IT-1.webp","type":"image\/webp"}],"author":"Cesar","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Cesar","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/#article","isPartOf":{"@id":"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/"},"author":{"name":"Cesar","@id":"https:\/\/touchconsulting.io\/pe\/#\/schema\/person\/9db0c142fc891a868623208951dd4e1a"},"headline":"\u00bfPor qu\u00e9 Low Code es la Respuesta Estrat\u00e9gica al Shadow IT?","datePublished":"2025-01-14T21:21:12+00:00","dateModified":"2025-05-12T19:16:16+00:00","mainEntityOfPage":{"@id":"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/"},"wordCount":530,"commentCount":0,"publisher":{"@id":"https:\/\/touchconsulting.io\/pe\/#organization"},"image":{"@id":"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/#primaryimage"},"thumbnailUrl":"https:\/\/touchconsulting.io\/pe\/wp-content\/uploads\/sites\/2\/2025\/01\/PC-Por-que-Low-Code-es-la-Respuesta-Estrategica-al-Shadow-IT-1.webp","articleSection":["Software Factory"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/","url":"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/","name":"Shadow IT y Plataformas Low Code - Touch Consulting Per\u00fa","isPartOf":{"@id":"https:\/\/touchconsulting.io\/pe\/#website"},"primaryImageOfPage":{"@id":"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/#primaryimage"},"image":{"@id":"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/#primaryimage"},"thumbnailUrl":"https:\/\/touchconsulting.io\/pe\/wp-content\/uploads\/sites\/2\/2025\/01\/PC-Por-que-Low-Code-es-la-Respuesta-Estrategica-al-Shadow-IT-1.webp","datePublished":"2025-01-14T21:21:12+00:00","dateModified":"2025-05-12T19:16:16+00:00","description":"Descubre c\u00f3mo las plataformas Low Code como Microsoft Power Platform y Google AppSheet ayudan a las empresas a controlar el Shadow IT, mejorando la seguridad, integraci\u00f3n y reducci\u00f3n de costos, mientras fomentan la colaboraci\u00f3n entre TI y las \u00e1reas de negocio.","breadcrumb":{"@id":"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/#primaryimage","url":"https:\/\/touchconsulting.io\/pe\/wp-content\/uploads\/sites\/2\/2025\/01\/PC-Por-que-Low-Code-es-la-Respuesta-Estrategica-al-Shadow-IT-1.webp","contentUrl":"https:\/\/touchconsulting.io\/pe\/wp-content\/uploads\/sites\/2\/2025\/01\/PC-Por-que-Low-Code-es-la-Respuesta-Estrategica-al-Shadow-IT-1.webp","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/touchconsulting.io\/pe\/blog\/2025\/01\/14\/por-que-low-code-es-la-respuesta-estrategica-al-shadow-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/touchconsulting.io\/pe\/"},{"@type":"ListItem","position":2,"name":"\u00bfPor qu\u00e9 Low Code es la Respuesta Estrat\u00e9gica al Shadow IT?"}]},{"@type":"WebSite","@id":"https:\/\/touchconsulting.io\/pe\/#website","url":"https:\/\/touchconsulting.io\/pe\/","name":"Touch Consulting Per\u00fa","description":"Consultora TI","publisher":{"@id":"https:\/\/touchconsulting.io\/pe\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/touchconsulting.io\/pe\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/touchconsulting.io\/pe\/#organization","name":"TOUCH CONSULTING","alternateName":"TOUCH","url":"https:\/\/touchconsulting.io\/pe\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/touchconsulting.io\/pe\/#\/schema\/logo\/image\/","url":"https:\/\/touchconsulting.io\/pe\/wp-content\/uploads\/sites\/2\/2024\/03\/LogotiposTouch_Logo-min.png","contentUrl":"https:\/\/touchconsulting.io\/pe\/wp-content\/uploads\/sites\/2\/2024\/03\/LogotiposTouch_Logo-min.png","width":281,"height":105,"caption":"TOUCH CONSULTING"},"image":{"@id":"https:\/\/touchconsulting.io\/pe\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/touchconsulting.io\/pe\/#\/schema\/person\/9db0c142fc891a868623208951dd4e1a","name":"Cesar","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/touchconsulting.io\/pe\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4a55a61d5e414eb871a993e295be42612f72699bf1472961baa79efb06d892db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4a55a61d5e414eb871a993e295be42612f72699bf1472961baa79efb06d892db?s=96&d=mm&r=g","caption":"Cesar"},"sameAs":["https:\/\/www.touchconsulting.es\/"],"url":"https:\/\/touchconsulting.io\/pe\/blog\/author\/admwplogintouch\/"}]}},"_links":{"self":[{"href":"https:\/\/touchconsulting.io\/pe\/wp-json\/wp\/v2\/posts\/2355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/touchconsulting.io\/pe\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/touchconsulting.io\/pe\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/touchconsulting.io\/pe\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/touchconsulting.io\/pe\/wp-json\/wp\/v2\/comments?post=2355"}],"version-history":[{"count":4,"href":"https:\/\/touchconsulting.io\/pe\/wp-json\/wp\/v2\/posts\/2355\/revisions"}],"predecessor-version":[{"id":2591,"href":"https:\/\/touchconsulting.io\/pe\/wp-json\/wp\/v2\/posts\/2355\/revisions\/2591"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/touchconsulting.io\/pe\/wp-json\/wp\/v2\/media\/2353"}],"wp:attachment":[{"href":"https:\/\/touchconsulting.io\/pe\/wp-json\/wp\/v2\/media?parent=2355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/touchconsulting.io\/pe\/wp-json\/wp\/v2\/categories?post=2355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/touchconsulting.io\/pe\/wp-json\/wp\/v2\/tags?post=2355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}