{"id":9633,"date":"2025-12-15T11:18:47","date_gmt":"2025-12-15T11:18:47","guid":{"rendered":"https:\/\/www.salesforce.com\/?p=9633"},"modified":"2025-12-15T11:56:57","modified_gmt":"2025-12-15T11:56:57","slug":"how-to-detect-sensitive-data-at-scale","status":"publish","type":"post","link":"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/","title":{"rendered":"C\u00f3mo detectar datos sensibles dentro de su organizaci\u00f3n de Salesforce"},"content":{"rendered":"\n<section class=\"key-takeaways wp-block-salesforce-blog-key-takeaways\" aria-label=\"Key Takeaways\">\n\t<div class=\"wp-block-salesforce-blog-key-takeaways__inner\">\n\t\t<div class=\"wp-block-salesforce-blog-key-takeaways__header\">\n\t\t\t<div class=\"wp-block-salesforce-blog-key-takeaways__title\">\n\t\t\t\t<h2 class=\"wp-block-salesforce-blog-key-takeaways__title-text\">\n\t\t\t\t\tKey Takeaways\t\t\t\t<\/h2>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t<button \n\t\t\tid=\"wp-block-salesforce-blog-key-takeaways-button\"\n\t\t\tclass=\"wp-block-salesforce-blog-key-takeaways__button\"\n\t\t\taria-controls=\"wp-block-salesforce-blog-key-takeaways-content\"\n\t\t\taria-expanded=\"false\"\n\t\t\taria-label=\"\n\t\t\tToggle Key Takeaways content\t\t\t\"\n\t\t>\n\t\t\t\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"22\" height=\"22\" fill=\"none\" viewBox=\"0 0 22 22\" aria-hidden=\"true\"><path fill=\"url(#a)\" d=\"M17.401 6.445a1.525 1.525 0 0 1 2.153 0 1.517 1.517 0 0 1 0 2.149l-7.977 7.961a1.526 1.526 0 0 1-2.154 0L1.446 8.594a1.517 1.517 0 0 1 0-2.149 1.524 1.524 0 0 1 2.153 0l6.9 6.886z\" \/><defs><linearGradient id=\"a\" x2=\"10.5\" y2=\"17\" gradientUnits=\"userSpaceOnUse\"><stop stop-color=\"#BA01FF\" \/><stop offset=\"1\" stop-color=\"#0250D9\" \/><\/linearGradient><\/defs><\/svg>\n\t\t<\/button>\n\n\t\t\t\t\t<div id=\"wp-block-salesforce-blog-key-takeaways-content\" class=\"wp-block-salesforce-blog-key-takeaways__content\" aria-hidden=\"true\">\n\t\t\t\t\n\n<ul class=\"wp-block-list\">\n<li>Utilice las reglas regex preconfiguradas y personalizadas de Data Detect para identificar m\u00e1s de 20 tipos de datos sensibles de Salesforce.<\/li>\n\n\n\n<li>Dirija los escaneos a nivel de objeto o campo y excluya los campos clasificados para agilizar el proceso.<\/li>\n\n\n\n<li>Reciba notificaciones de los escaneos, actualice las clasificaciones a partir de los resultados y exporte los hallazgos en formato .csv o mediante SOQL.<\/li>\n<\/ul>\n\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<footer class=\"wp-block-salesforce-blog-key-takeaways__footer\">\n\t\t\t\t\tThis summary was created with AI and reviewed by an editor.\t\t\t\t<\/footer>\n\t\t\t\t\t\t<\/div>\n<\/section>\n\n\n\n<p>A medida que el volumen de datos aumenta y las <a href=\"https:\/\/www.salesforce.com\/es\/form\/platform\/regulations-whitepaper\/\" target=\"_blank\" rel=\"noreferrer noopener\">regulaciones<\/a> cambian, identificar y gestionar datos sensibles a gran escala se vuelve un desaf\u00edo constante. Localizar cada dato sensible en su organizaci\u00f3n de Salesforce puede ser tan complicado como buscar una aguja en un pajar en expansi\u00f3n.<\/p>\n\n\n\n<p>Por eso, <a href=\"https:\/\/www.salesforce.com\/es\/platform\/shield\/\">Salesforce Shield<\/a> ofrece <a href=\"https:\/\/help.salesforce.com\/s\/articleView?id=xcloud.einstein_data_detect.htm&amp;type=5\" target=\"_blank\" rel=\"noreferrer noopener\">Data Detect<\/a>, una herramienta dise\u00f1ada para identificar datos sensibles. A continuaci\u00f3n, se presentan algunas de sus nuevas funcionalidades y c\u00f3mo ayudan a proteger la informaci\u00f3n m\u00e1s valiosa de su organizaci\u00f3n.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-aproveche-la-deteccion-predisenada-para-mas-de-20-tipos-de-datos-sensibles\"><strong>Aproveche la detecci\u00f3n predise\u00f1ada para m\u00e1s de 20 tipos de datos sensibles<\/strong><\/h2>\n\n\n\n<p>Data Detect incluye reglas de detecci\u00f3n preconfiguradas para 21 tipos de datos sensibles, lo que permite iniciar de inmediato el escaneo de su organizaci\u00f3n de Salesforce en busca de informaci\u00f3n cr\u00edtica, como datos de identificaci\u00f3n personal (PII), financieros, historiales m\u00e9dicos y otros datos esenciales.<\/p>\n\n\n\n<p>Aunque la detecci\u00f3n predise\u00f1ada cubre muchas categor\u00edas comunes de datos sensibles, es posible que su organizaci\u00f3n tenga requisitos de seguridad espec\u00edficos que exijan reglas de detecci\u00f3n personalizadas. Para dar respuesta a estas necesidades, Data Detect le ofrece la posibilidad de definir patrones personalizados mediante expresiones regulares (regex).<\/p>\n\n\n\n<p>Esta funcionalidad permite adaptar el proceso de detecci\u00f3n a requisitos espec\u00edficos, como formatos de datos propios, identificadores de sector u otros patrones relevantes. Gracias a la compatibilidad con regex, se logra un mayor control sobre la detecci\u00f3n de datos sensibles, asegurando que ninguna informaci\u00f3n cr\u00edtica pase desapercibida.<\/p>\n\n\n\n<div class=\"layout-astro wp-block-salesforce-blog-related-trail\">\n\n\t<img decoding=\"async\" class=\"related-trail__illustration related-trail__cloud\" src=\"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/related-trail-cloud-layout-astro.png\" alt=\"\">\n\n\t\n\t<img decoding=\"async\" class=\"related-trail__illustration related-trail__background\" src=\"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/related-trail-background-layout-astro.png\" alt=\"\">\n\n\t<div class=\"related-trail__wrapper\">\n\t\t<div class=\"related-trail__content\">\n\t\t\t\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 345.8 82.8\" aria-hidden=\"true\" class=\"related-trail__logo\"><path fill=\"#1d3767\" d=\"M96.6 33h9v22.6h4.8V33h8.8v-4.3H96.6zm49.8 5.3c0-5.7-3.6-9.6-10.8-9.6H127v27h4.8v-7.9h3l2.3-.1 5.7 8h5.6l-7-9.2c3.4-1.6 5-4.5 5-8.2m-11.1 5.3h-3.6V33h3.6c4.4 0 6 2.3 6 5.3s-1.6 5.3-6 5.3m30.8-15.2-12.6 27.2h5l2.3-5.3h11.6l2.4 5.3h5l-12.6-27.1zm-3.6 18 4.1-9.2 4.1 9.3zm25.2-17.7h4.8v27h-4.8zm20.7 0h-4.8v27h17.6v-4.4h-12.8zm38.4 12.1h-13.2V28.7H229v27h4.7V45h13.2v10.6h4.7V28.7h-4.7zm15.9 14.8h17.5v-4.4h-12.7v-6.4H279v-4.2h-11.5v-7.5h12.7v-4.4h-17.5zm36.9-27.2L287 55.6h5l2.3-5.3H306l2.4 5.3h5l-12.6-27.1zm-3.6 18 4.1-9.2 4.1 9.3zm35.4-17.7h-10.2v27h10.2c8.2 0 14.4-5.9 14.4-13.6s-6-13.4-14.4-13.4m0 22.6H326V33h5.4a9.1 9.1 0 1 1 0 18.1z\" \/><path fill=\"#1d315f\" d=\"M43 82.8h.1a74 74 0 0 0 38.5-12.3 3 3 0 0 0 1.3-2.4v-6A66.2 66.2 0 0 0 42.5.2a3 3 0 0 0-2.3 0A66.2 66.2 0 0 0 0 62.2V68a3 3 0 0 0 1.2 2.4 74 74 0 0 0 40.2 12.4z\" \/><path fill=\"#8ed1f4\" d=\"M13.8 51.8a.3.3 0 0 0 0-.1L33 23.6a3.1 3.1 0 0 1 .8-.8 3 3 0 0 1 4 .8l9.5 13.8 3.5-5a3 3 0 0 1 4.9 0L69 51.6a.3.3 0 0 1 .1.3h7C70.7 17.7 43.7 7.2 41.4 6.2c0 0-11.2 4-21.2 16A59.6 59.6 0 0 0 6.8 51.8zm21.7-21.3\" \/><path fill=\"#aa76b3\" d=\"m62 51.9-8.7-12.6-4.2 6.1 4.8 6.4z\" \/><path fill=\"#722a87\" d=\"m49 45.4-4.4 6.4H54z\" \/><path fill=\"#8ed1f4\" d=\"m37 32.6-1.5-2.1z\" \/><path fill=\"#aa76b3\" d=\"m28 41.4 7.6 10.4h1.8l6.4-9.2-6.8-10-1.5-2.1z\" \/><path fill=\"#722a87\" d=\"m28 41.4-7 10.4h14.6z\" \/><path fill=\"#069a49\" d=\"M43.8 72.5a1.8 1.8 0 0 0-1-2.4L40.1 69a8 8 0 0 1-1-.5 7.8 7.8 0 0 1-2.4-10.7H6a44 44 0 0 0-.2 4.4v4.4A70 70 0 0 0 26 75a70 70 0 0 0 15.2 2l2.4-4.3zm33-14.8H44.3l-2.5 3a1.7 1.7 0 0 0-.2.5 1.8 1.8 0 0 0 1 2.3l2.7 1.2.7.4a7.8 7.8 0 0 1 3 10.6l-.5.9 4.8-.8a71 71 0 0 0 8.4-2.2l1.3-.4a71 71 0 0 0 14-6.7v-8.8z\" \/><path fill=\"#fff\" d=\"m46 65-.7-.3-2.7-1.2a1.8 1.8 0 0 1-1-2.4 1.7 1.7 0 0 1 .2-.4l2.5-3h-7.6A7.8 7.8 0 0 0 39 68.4a8 8 0 0 0 1 .5l2.7 1.2a1.8 1.8 0 0 1 1 2.4l-.1.2-2.5 4.3a52.5 52.5 0 0 0 7.2-.4l.5-.9A7.8 7.8 0 0 0 46 65.1z\" \/><path fill=\"#157139\" d=\"M56.9 67.3h8.8l-4.4-5zM23 71h9l-4.5-5.1zm-4.1-10.4-4.5 5h8.9z\" \/><\/svg>\n\t\t\t<h2 class=\"wp-block-related-trail__title\">Shield Platform Encryption<\/h2>\n\t\t\t<p>Aprenda c\u00f3mo puede cifrar los datos almacenados en la nube y gestionar el ciclo de vida de las claves de cifrado.<\/p>\n\t\t\t\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/trailhead.salesforce.com\/es\/content\/learn\/modules\/spe_admins\">Empezar a aprender<\/a><\/div>\n\n\t\t<\/div>\n\t\t<div class=\"related-trail__mock\">\n\t\t\t<div class=\"related-trail__points\">+400 puntos<\/div>\n\t\t\t<div class=\"related-trail__eyebrow\">Trail<\/div>\n\t\t\t<p class=\"related-trail__trail-title h3\">Shield Platform Encryption<\/p>\n\t\t\t<p class=\"related-trail__trail-description\"><\/p>\n\t\t\t<div class=\"related-trail__actions\">\n\t\t\t\t<div class=\"related-trail__action\">\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 10 10\" aria-hidden=\"true\"><path fill=\"#747474\" fill-rule=\"evenodd\" d=\"m4.93.69.88 2.88c.04.12.16.18.27.18h2.89c.29 0 .4.38.17.56L6.79 6.04c-.1.07-.13.2-.1.32l1.12 2.96c.08.27-.2.5-.44.33L4.85 7.77c-.1-.08-.23-.08-.34 0L1.97 9.65a.29.29 0 0 1-.45-.33L2.6 6.36a.3.3 0 0 0-.1-.32L.17 4.3c-.23-.18-.1-.56.17-.56h2.89c.13 0 .23-.04.27-.18l.9-2.9c.08-.27.46-.25.54.02Z\" clip-rule=\"evenodd\" \/><\/svg>\n<\/div>\n\t\t\t\t<div class=\"related-trail__action\">\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 9 5\" aria-hidden=\"true\"><path fill=\"#747474\" d=\"M4.16 4.5.26 0h7.8z\" \/><\/svg>\n<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t<img decoding=\"async\" class=\"related-trail__illustration related-trail__foreground\" src=\"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/related-trail-foreground-layout-astro.png\" alt=\"\">\n\t<img decoding=\"async\" class=\"related-trail__illustration related-trail__parks\" src=\"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/related-trail-parks-layout-astro.png\" alt=\"\">\n\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-obtenga-control-granular-con-escaneos-a-nivel-de-objeto-y-campo\"><strong>Obtenga control granular con escaneos a nivel de objeto y campo<\/strong><\/h2>\n\n\n\n<p>Data Detect permite realizar escaneos a nivel de objeto y campo dentro de su organizaci\u00f3n de Salesforce, facilitando la identificaci\u00f3n de datos sensibles en objetos espec\u00edficos, incluidos objetos est\u00e1ndar y personalizados. Este enfoque optimiza los tiempos de escaneo, reduce el consumo de recursos y permite priorizar la revisi\u00f3n de la informaci\u00f3n m\u00e1s cr\u00edtica.<\/p>\n\n\n\n<p>Adem\u00e1s, los escaneos a nivel de objeto mejoran la generaci\u00f3n de informes y el an\u00e1lisis, al ofrecer una visibilidad m\u00e1s precisa de los datos sensibles en \u00e1reas concretas de su entorno de Salesforce, lo que resulta especialmente valioso si su organizaci\u00f3n tiene estructuras de datos complejas y diversos requisitos de seguridad.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-simplifique-el-proceso-de-escaneo\"><strong>Simplifique el proceso de escaneo<\/strong><\/h2>\n\n\n\n<p>En su organizaci\u00f3n de Salesforce, es posible que ya tenga los campos clasificados por nivel de sensibilidad, cumplimiento o uso que pueden excluirse del proceso de escaneo mediante Data Detect. Esta funcionalidad evita an\u00e1lisis redundantes, reduce los tiempos de ejecuci\u00f3n y optimiza el uso de recursos, permitiendo centrar los escaneos exclusivamente en las \u00e1reas que requieren una evaluaci\u00f3n adicional.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-mantengase-informado-y-tome-medidas\">Mant\u00e9ngase informado y tome medidas<\/h2>\n\n\n\n<p>Data Detect env\u00eda notificaciones por correo electr\u00f3nico al finalizar los escaneos de datos sensibles, lo que le permite revisar los resultados, priorizar acciones de seguimiento y tomar medidas proactivas ante posibles riesgos de seguridad.<\/p>\n\n\n\n<p>Los resultados de los escaneos ofrecen visibilidad sobre el contenido real de los campos y su clasificaci\u00f3n. Esto le permite actualizar directamente las clasificaciones, asegurando que los niveles de sensibilidad y las categor\u00edas de cumplimiento se mantengan precisos y actualizados en toda su organizaci\u00f3n.<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e69c9997e8a&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e69c9997e8a\" class=\"wp-block-image size-large wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" height=\"505\" width=\"1024\" src=\"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/uploads\/sites\/13\/2025\/12\/image-110.png?w=1024\" alt=\"\" class=\"wp-image-9650\" srcset=\"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/uploads\/sites\/13\/2025\/12\/image-110.png 1354w, https:\/\/www.salesforce.com\/es\/blog\/wp-content\/uploads\/sites\/13\/2025\/12\/image-110.png?w=300&amp;h=148 300w, https:\/\/www.salesforce.com\/es\/blog\/wp-content\/uploads\/sites\/13\/2025\/12\/image-110.png?w=768&amp;h=379 768w, https:\/\/www.salesforce.com\/es\/blog\/wp-content\/uploads\/sites\/13\/2025\/12\/image-110.png?w=1024&amp;h=505 1024w, https:\/\/www.salesforce.com\/es\/blog\/wp-content\/uploads\/sites\/13\/2025\/12\/image-110.png?w=150&amp;h=74 150w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><em>Resultados del escaneo de Data Detect<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-acceso-flexible-a-resultados-e-informes\"><strong>Acceso flexible a resultados e informes<\/strong><\/h2>\n\n\n\n<p>Data Detect permite visualizar y analizar los resultados directamente en la aplicaci\u00f3n, as\u00ed como exportarlos para un an\u00e1lisis m\u00e1s avanzado o su integraci\u00f3n con otras herramientas. Los resultados se pueden exportar en formato .csv para compartirlos f\u00e1cilmente, analizarlos sin conexi\u00f3n o incorporarlos a otros sistemas.<\/p>\n\n\n\n<p>Como alternativa, puede acceder a los resultados mediante consultas SOQL (Salesforce Object Query Language) desde la <a href=\"https:\/\/www.salesforce.com\/es\/platform\/\">Agentforce 360 Platform<\/a>, lo que facilita una integraci\u00f3n fluida con aplicaciones y flujos de trabajo, como <a href=\"https:\/\/developer.salesforce.com\/tools\/data-loader\" target=\"_blank\" rel=\"noreferrer noopener\">Data Loader<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-refuerce-la-seguridad-de-su-organizacion-con-data-detect\"><strong><strong>Refuerce la seguridad de su organizaci\u00f3n con Data Detect<\/strong><\/strong><\/h2>\n\n\n\n<p>Con Data Detect, fortalezca su seguridad, respalde el cumplimiento normativo y genere confianza entre sus clientes. La detecci\u00f3n de datos sensibles es clave para proteger la informaci\u00f3n m\u00e1s valiosa frente a brechas de seguridad.<\/p>\n\n\n\n<p>Si ya cuenta con Data Detect a trav\u00e9s de <a href=\"https:\/\/www.salesforce.com\/es\/platform\/shield\/\">Shield<\/a>, ejecute un an\u00e1lisis desde la secci\u00f3n correspondiente para evaluar la exposici\u00f3n de sus datos sensibles. Si a\u00fan no dispone de esta funcionalidad, consulte la hoja de datos o contacte a su ejecutivo de cuentas.<\/p>\n\n\n\n<div class=\"layout-two wp-block-salesforce-blog-offer\">\n\t<div class=\"wp-block-offer__wrapper\">\n\n\t\t<div class=\"wp-block-offer__content\">\n\t\t\t<h2 class=\"wp-block-offer__title\">\u00bfAlguna pregunta?<br>Nosotros le ayudamos<\/h2>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"wp-block-button\">\n\t\t\t\t\t<a class=\"wp-block-button__link\" target=\"_self\" href=\"https:\/\/www.salesforce.com\/es\/form\/contact\/contactme\/\">Contactar<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"wp-block-offer__media\">\n\t\t\t\t\t<\/div>\n\t<\/div>\n\n\t\t\t<div class=\"wp-block-offer__graphics wp-block-offer__contour\"><\/div>\n\t\n\t\t\t<!-- Standard Illustration -->\n\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__illustration\" src=\"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-illustration-layout-two.png\" alt=\"\">\n\n\t\t<!-- Small Accent Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__accent\" src=\"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-accent-layout-two.png\" alt=\"\">\n\t\t\n\t\t<!-- Left Side Illustration -->\n\t\t\n\t\t<!-- Cloud Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__cloud\" src=\"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-cloud-layout-two.png\" alt=\"\">\n\t\t\n\t<\/div>\n\n\n\n<p><br><\/p>\n\n\n\n<p><br><\/p>\n\n\n\n<p><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data Detect puede proteger de forma proactiva su informaci\u00f3n m\u00e1s valiosa.<\/p>\n","protected":false},"author":517,"featured_media":9638,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sf_justforyou_enable_alt":true,"optimizely_content_id":"b67b9580eacd4855b900063c603f5106","post_meta_title":"","ai_synopsis":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"sf_topic":[126,198,16,705],"sf_content_type":[],"blog":[],"coauthors":[118],"class_list":["post-9633","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","sf_topic-admins","sf_topic-salesforce-platform","sf_topic-it","sf_topic-data"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>C\u00f3mo detectar datos sensibles con Data Detect | Salesforce Blog<\/title>\n<meta name=\"description\" content=\"Descubra c\u00f3mo Data Detect puede ayudarle a proteger de forma proactiva la informaci\u00f3n m\u00e1s valiosa de su organizaci\u00f3n de Salesforce.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"C\u00f3mo detectar datos sensibles dentro de su organizaci\u00f3n de Salesforce\" \/>\n<meta property=\"og:description\" content=\"Data Detect puede proteger de forma proactiva su informaci\u00f3n m\u00e1s valiosa.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/\" \/>\n<meta property=\"og:site_name\" content=\"Salesforce\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-15T11:18:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-15T11:56:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/uploads\/sites\/13\/2025\/12\/How-to-Detect-Sensitive-Data-at-Scale-Within-your-Salesforce-Org.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"6000\" \/>\n\t<meta property=\"og:image:height\" content=\"3450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Salesforce Espa\u00f1a\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n\t<meta name=\"twitter:label3\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data3\" content=\"Salesforce Espa\u00f1a\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/\"},\"author\":[{\"@id\":\"https:\/\/www.salesforce.com\/es\/blog\/#\/schema\/person\/image\/e2f6c6d481bffc386e6e8cdaecd17df6\"}],\"headline\":\"C\u00f3mo detectar datos sensibles dentro de su organizaci\u00f3n de Salesforce\",\"datePublished\":\"2025-12-15T11:18:47+00:00\",\"dateModified\":\"2025-12-15T11:56:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/\"},\"wordCount\":814,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/uploads\/sites\/13\/2025\/12\/How-to-Detect-Sensitive-Data-at-Scale-Within-your-Salesforce-Org.jpeg\",\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/\",\"url\":\"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/\",\"name\":\"C\u00f3mo detectar datos sensibles con Data Detect | Salesforce Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/es\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/uploads\/sites\/13\/2025\/12\/How-to-Detect-Sensitive-Data-at-Scale-Within-your-Salesforce-Org.jpeg\",\"datePublished\":\"2025-12-15T11:18:47+00:00\",\"dateModified\":\"2025-12-15T11:56:57+00:00\",\"author\":{\"@id\":\"https:\/\/www.salesforce.com\/es\/blog\/#\/schema\/person\/10c646a29de04cc21d51f17c13bf2327\"},\"description\":\"Descubra c\u00f3mo Data Detect puede ayudarle a proteger de forma proactiva la informaci\u00f3n m\u00e1s valiosa de su organizaci\u00f3n de Salesforce.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/#primaryimage\",\"url\":\"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/uploads\/sites\/13\/2025\/12\/How-to-Detect-Sensitive-Data-at-Scale-Within-your-Salesforce-Org.jpeg\",\"contentUrl\":\"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/uploads\/sites\/13\/2025\/12\/How-to-Detect-Sensitive-Data-at-Scale-Within-your-Salesforce-Org.jpeg\",\"width\":6000,\"height\":3450,\"caption\":\"Data Detect puede ayudarle a identificar datos sensibles en su organizaci\u00f3n de Salesforce, como informaci\u00f3n de identificaci\u00f3n personal (PII), datos financieros y m\u00e1s. [Cr\u00e9dito de la imagen: Adobe Stock]\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.salesforce.com\/es\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"C\u00f3mo detectar datos sensibles dentro de su organizaci\u00f3n de Salesforce\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.salesforce.com\/es\/blog\/#website\",\"url\":\"https:\/\/www.salesforce.com\/es\/blog\/\",\"name\":\"Salesforce\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.salesforce.com\/es\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.salesforce.com\/es\/blog\/#\/schema\/person\/image\/e2f6c6d481bffc386e6e8cdaecd17df6\",\"name\":\"Salesforce Espa\u00f1a\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.salesforce.com\/es\/blog\/#\/schema\/person\/image\/9671a9a1f236a48b35497e55c367902a\",\"url\":\"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/uploads\/sites\/13\/2023\/10\/Salesforce-300x300-1.png?w=150&h=150&crop=1\",\"contentUrl\":\"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/uploads\/sites\/13\/2023\/10\/Salesforce-300x300-1.png?w=150&h=150&crop=1\",\"width\":\"150\",\"height\":\"150\",\"caption\":\"Salesforce Espa\u00f1a\"},\"url\":\"https:\/\/www.salesforce.com\/es\/blog\/author\/salesforce-espana\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"C\u00f3mo detectar datos sensibles con Data Detect | Salesforce Blog","description":"Descubra c\u00f3mo Data Detect puede ayudarle a proteger de forma proactiva la informaci\u00f3n m\u00e1s valiosa de su organizaci\u00f3n de Salesforce.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/","og_locale":"es_ES","og_type":"article","og_title":"C\u00f3mo detectar datos sensibles dentro de su organizaci\u00f3n de Salesforce","og_description":"Data Detect puede proteger de forma proactiva su informaci\u00f3n m\u00e1s valiosa.","og_url":"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/","og_site_name":"Salesforce","article_published_time":"2025-12-15T11:18:47+00:00","article_modified_time":"2025-12-15T11:56:57+00:00","og_image":[{"width":6000,"height":3450,"url":"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/uploads\/sites\/13\/2025\/12\/How-to-Detect-Sensitive-Data-at-Scale-Within-your-Salesforce-Org.jpeg","type":"image\/jpeg"}],"author":"Salesforce Espa\u00f1a","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"","Tiempo de lectura":"4 minutos","Written by":"Salesforce Espa\u00f1a"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/#article","isPartOf":{"@id":"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/"},"author":[{"@id":"https:\/\/www.salesforce.com\/es\/blog\/#\/schema\/person\/image\/e2f6c6d481bffc386e6e8cdaecd17df6"}],"headline":"C\u00f3mo detectar datos sensibles dentro de su organizaci\u00f3n de Salesforce","datePublished":"2025-12-15T11:18:47+00:00","dateModified":"2025-12-15T11:56:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/"},"wordCount":814,"commentCount":0,"image":{"@id":"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/uploads\/sites\/13\/2025\/12\/How-to-Detect-Sensitive-Data-at-Scale-Within-your-Salesforce-Org.jpeg","inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/","url":"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/","name":"C\u00f3mo detectar datos sensibles con Data Detect | Salesforce Blog","isPartOf":{"@id":"https:\/\/www.salesforce.com\/es\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/#primaryimage"},"image":{"@id":"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/uploads\/sites\/13\/2025\/12\/How-to-Detect-Sensitive-Data-at-Scale-Within-your-Salesforce-Org.jpeg","datePublished":"2025-12-15T11:18:47+00:00","dateModified":"2025-12-15T11:56:57+00:00","author":{"@id":"https:\/\/www.salesforce.com\/es\/blog\/#\/schema\/person\/10c646a29de04cc21d51f17c13bf2327"},"description":"Descubra c\u00f3mo Data Detect puede ayudarle a proteger de forma proactiva la informaci\u00f3n m\u00e1s valiosa de su organizaci\u00f3n de Salesforce.","breadcrumb":{"@id":"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/#primaryimage","url":"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/uploads\/sites\/13\/2025\/12\/How-to-Detect-Sensitive-Data-at-Scale-Within-your-Salesforce-Org.jpeg","contentUrl":"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/uploads\/sites\/13\/2025\/12\/How-to-Detect-Sensitive-Data-at-Scale-Within-your-Salesforce-Org.jpeg","width":6000,"height":3450,"caption":"Data Detect puede ayudarle a identificar datos sensibles en su organizaci\u00f3n de Salesforce, como informaci\u00f3n de identificaci\u00f3n personal (PII), datos financieros y m\u00e1s. [Cr\u00e9dito de la imagen: Adobe Stock]"},{"@type":"BreadcrumbList","@id":"https:\/\/www.salesforce.com\/es\/blog\/how-to-detect-sensitive-data-at-scale\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.salesforce.com\/es\/blog\/"},{"@type":"ListItem","position":2,"name":"C\u00f3mo detectar datos sensibles dentro de su organizaci\u00f3n de Salesforce"}]},{"@type":"WebSite","@id":"https:\/\/www.salesforce.com\/es\/blog\/#website","url":"https:\/\/www.salesforce.com\/es\/blog\/","name":"Salesforce","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.salesforce.com\/es\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/www.salesforce.com\/es\/blog\/#\/schema\/person\/image\/e2f6c6d481bffc386e6e8cdaecd17df6","name":"Salesforce Espa\u00f1a","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.salesforce.com\/es\/blog\/#\/schema\/person\/image\/9671a9a1f236a48b35497e55c367902a","url":"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/uploads\/sites\/13\/2023\/10\/Salesforce-300x300-1.png?w=150&h=150&crop=1","contentUrl":"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/uploads\/sites\/13\/2023\/10\/Salesforce-300x300-1.png?w=150&h=150&crop=1","width":"150","height":"150","caption":"Salesforce Espa\u00f1a"},"url":"https:\/\/www.salesforce.com\/es\/blog\/author\/salesforce-espana\/"}]}},"jetpack_featured_media_url":"https:\/\/www.salesforce.com\/es\/blog\/wp-content\/uploads\/sites\/13\/2025\/12\/How-to-Detect-Sensitive-Data-at-Scale-Within-your-Salesforce-Org.jpeg","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Salesforce","distributor_original_site_url":"https:\/\/www.salesforce.com\/es\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.salesforce.com\/es\/blog\/wp-json\/wp\/v2\/posts\/9633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.salesforce.com\/es\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.salesforce.com\/es\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/es\/blog\/wp-json\/wp\/v2\/users\/517"}],"replies":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/es\/blog\/wp-json\/wp\/v2\/comments?post=9633"}],"version-history":[{"count":31,"href":"https:\/\/www.salesforce.com\/es\/blog\/wp-json\/wp\/v2\/posts\/9633\/revisions"}],"predecessor-version":[{"id":9669,"href":"https:\/\/www.salesforce.com\/es\/blog\/wp-json\/wp\/v2\/posts\/9633\/revisions\/9669"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/es\/blog\/wp-json\/wp\/v2\/media\/9638"}],"wp:attachment":[{"href":"https:\/\/www.salesforce.com\/es\/blog\/wp-json\/wp\/v2\/media?parent=9633"}],"wp:term":[{"taxonomy":"sf_topic","embeddable":true,"href":"https:\/\/www.salesforce.com\/es\/blog\/wp-json\/wp\/v2\/sf_topic?post=9633"},{"taxonomy":"sf_content_type","embeddable":true,"href":"https:\/\/www.salesforce.com\/es\/blog\/wp-json\/wp\/v2\/sf_content_type?post=9633"},{"taxonomy":"blog","embeddable":true,"href":"https:\/\/www.salesforce.com\/es\/blog\/wp-json\/wp\/v2\/blog?post=9633"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.salesforce.com\/es\/blog\/wp-json\/wp\/v2\/coauthors?post=9633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}