CyberArk | Security for the Heart of the Enterprise

Por qué CyberArk

CyberArk es el líder de referencia en Seguridad de Cuentas Privilegiadas. Más de la mitad de las empresas clasificadas en el Fortune 100 confían en nuestras soluciones para proteger sus activos fundamentales y de mayor valor.

Piense como un pirata informático

Los atacantes pasan una media de 99 días dentro de nuestros sistemas sin ser detectados.


Llegar a las cuentas privilegiadas que carecen de seguridad y que les garantizan el acceso a sus datos y sus activos de mayor valor.

CyberArk cuenta con la solución más completa del sector, por lo que somos los únicos capaces de proteger su empresa de los ataques en aumento. Aseguramos sus cuentas privilegiadas cualquiera que sea su entorno: servidores locales del cliente, en nube o en entornos híbridos.

CyberArk en la prensa



The CyberArk Blog
Threat Research Blog

BoundHook: Exception Based, Kernel-Controlled UserMode Hooking

In this article, we’ll present a new hooking technique that we have found during our research work. Hooking techniques give you control over the way an operating system or a piece of software behaves. Some of the software that utilizes hooks include: application security solutions, system utilities, tools for programming (e.g. interception, debugging, extending software, […]

Illusion Gap – Antivirus Bypass Part 1

Introduction During our research, CyberArk Labs encountered a strange behavior in the file scanning process of Windows Defender. This problem may possibly exist in other anti-viruses, which we have not yet tested. This behavior led us to investigate the Antivirus scanning process over SMB shares and the outcome is a surprising cause for concern. Now […]

Implementing Malware Command and Control Using Major CDNs and High-Traffic Domains

In this blog post, we will present a new technique for domain fronting, which enables attackers to abuse Content Delivery Networks (CDNs) to mask malware command and control (C2) traffic. This research demonstrates a new technique for hiding a C2 channel completely within a CDN. While many CDNs are potentially impacted, Akamai is one of […]


Webinar Series: On The Front Lines

24/10/2017 - 24/10/2017

Cyber Threat Summit 2017

01/11/2017 - 02/11/2017

Infosecurity Netherlands


Don’t go it alone

CyberArk has created an expansive partner ecosystem of technology vendors, solutions integrations and channel partners to help your organization tackle the most complex security challenges


C3 Alliance Global Technology Partner Program: Building on the power of privileged account security to better protect customers from cyber threats.

Learn More


CyberArk has built an enviable channel partner community to help customers around the world secure and manage their privileged accounts.

Learn More

Stay one step ahead

Up your security IQ by checking out our collection of curated resources including ebooks, webinars and videos covering a wide-range of security topics

More Resources