{"id":104420,"date":"2020-11-04T15:50:11","date_gmt":"2020-11-04T20:50:11","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/privileged-account-security-solution\/cyberark-cloud-entitlements-manager\/"},"modified":"2020-12-23T17:22:27","modified_gmt":"2020-12-23T22:22:27","slug":"cyberark-cloud-entitlements-manager","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/es\/products\/cyberark-cloud-entitlements-manager\/","title":{"rendered":"CyberArk Cloud Entitlements Manager"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1602702717594{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Kubora_1920x520.jpg?id=103748) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbcyb-hero cyb-desktop\u00bb][vc_column el_class=\u00bbcyb-center\u00bb][vc_column_text css=\u00bb.vc_custom_1606325163419{margin-top: 5.3125rem !important;margin-bottom: 20px !important;}\u00bb]<\/p>\n<h1>CYBERARK CLOUD ENTITLEMENTS MANAGER<\/h1>\n<h3 class=\"regular\">Eliminaci\u00f3n de permisos excesivos mediante IA.<\/h3>\n<p>[\/vc_column_text][vc_btn title=\u00bbDESCARGAR EBOOK\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb#ffffff\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Febooks%2Ftake-control-of-cloud-permissions-sprawl-ebook|\u00bb el_class=\u00bbcyb-button solid-blue cyb-center-btn mgn-bottom\u00bb css=\u00bb.vc_custom_1604606514993{margin-right: 5px !important;}\u00bb][vc_btn title=\u00bbPRUEBA GRATUITA\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb#ffffff\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:%23form|\u00bb el_class=\u00bbcyb-button solid-green cyb-center-btn mgn-bottom\u00bb css=\u00bb.vc_custom_1602790752468{margin-left: 5px !important;}\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1602702742623{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Kubora_1920x520.jpg?id=103748) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbcyb-hero cyb-mobile\u00bb][vc_column el_class=\u00bbcyb-center cyb-white cyb-pad-btm\u00bb][vc_column_text css=\u00bb.vc_custom_1606325172501{margin-top: 5.3125rem !important;margin-bottom: 20px !important;}\u00bb]<\/p>\n<h1>CYBERARK CLOUD ENTITLEMENTS MANAGER<\/h1>\n<h3 class=\"regular\">Eliminaci\u00f3n de permisos excesivos mediante IA.<\/h3>\n<p>[\/vc_column_text][vc_btn title=\u00bbDESCARGAR EBOOK\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb#ffffff\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Febooks%2Ftake-control-of-cloud-permissions-sprawl-ebook|\u00bb el_class=\u00bbcyb-button solid-blue cyb-center-btn mgn-bottom\u00bb css=\u00bb.vc_custom_1604606536221{margin-bottom: 1.25rem !important;}\u00bb][vc_btn title=\u00bbPRUEBA GRATUITA\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb#ffffff\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:%23form|target:_blank|\u00bb el_class=\u00bbcyb-button solid-green cyb-center-btn mgn-bottom\u00bb][\/vc_column][\/vc_row][vc_row][vc_column el_class=\u00bbcyb-pad-btm cyb-center\u00bb offset=\u00bbvc_col-md-offset-2 vc_col-md-8&#8243;][vc_column_text]<\/p>\n<h2>M\u00cdNIMO PRIVILEGIO EN TODOS SUS ENTORNOS EN LA NUBE<\/h2>\n<p>CyberArk Cloud Entitlements Manager es un servicio de seguridad en la nube basado en IA que detecta y elimina los permisos excesivos en la nube en un panel de control centralizado e intuitivo. En menos de una hora, las organizaciones pueden desplegar el servicio sin requisitos de espacio para remediar los derechos que suponen un riesgo en sus entornos en la nube.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column offset=\u00bbvc_col-md-offset-2 vc_col-md-8&#8243; el_class=\u00bbcyb-center\u00bb][vc_column_text]<\/p>\n<h2>VENTAJAS<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb el_class=\u00bbcyb-card-hover\u00bb][vc_column width=\u00bb1\/3&#8243; column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fproduct-datasheets%2Fcloud-entitlements-manager-data-sheet|\u00bb][vc_single_image image=\u00bb88986&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbcenter\u00bb css=\u00bb.vc_custom_1606325212526{padding-bottom: 1.5625px !important;}\u00bb][vc_column_text]<\/p>\n<h4>PARA LA SEGURIDAD EN LA NUBE<\/h4>\n<p>Corrija los permisos no utilizados y mal configurados para protegerse de forma proactiva contra amenazas internas y externas.[\/vc_column_text][vc_column_text]M\u00c1S INFORMACI\u00d3N &gt;[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/3&#8243; column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Finfographics%2Fthe-risks-of-excessive-cloud-permissions|\u00bb][vc_single_image image=\u00bb88995&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbcenter\u00bb][vc_column_text]<\/p>\n<h4>PARA LAS OPERACIONES<\/h4>\n<p>Centralice la visibilidad, aplique controles uniformes y unifique la informaci\u00f3n de seguridad mediante la integraci\u00f3n con las soluciones de CyberArk.[\/vc_column_text][vc_column_text]M\u00c1S INFORMACI\u00d3N &gt;[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/3&#8243; column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Febooks%2Ftake-control-of-cloud-permissions-sprawl-ebook|\u00bb][vc_single_image image=\u00bb89004&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbcenter\u00bb][vc_column_text]<\/p>\n<h4>PARA EL CUMPLIMIENTO<\/h4>\n<p>Cumpla con las auditor\u00edas internas y los requisitos normativos y siga las pr\u00e1cticas recomendadas del sector al verificar continuamente el m\u00ednimo privilegio.[\/vc_column_text][vc_column_text]M\u00c1S INFORMACI\u00d3N &gt;[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb css=\u00bb.vc_custom_1602702958862{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Kubora_1920x520_03.jpg?id=103764) !important;}\u00bb][vc_column offset=\u00bbvc_col-md-offset-2 vc_col-md-8&#8243; el_class=\u00bbcyb-cta-card\u00bb][vc_raw_html]PGEgY2xhc3M9ImFuY2hvciIgbmFtZT0idmlkZW8iPjwvYT4=[\/vc_raw_html][vc_column_text]<\/p>\n<h2>RESUMEN DE CLOUD ENTITLEMENTS MANAGER<\/h2>\n<p>[\/vc_column_text][vc_column_text]    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_5p5bkdsutp videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        [\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcyb-reverse cyb-pad-top\u00bb][vc_column width=\u00bb5\/12&#8243; css=\u00bb.vc_custom_1602704076995{padding-bottom: 2.5rem !important;}\u00bb][vc_column_text]<\/p>\n<h2>APLICACI\u00d3N DEL M\u00cdNIMO PRIVILEGIO DE FORMA R\u00c1PIDA, SENCILLA Y UNIFORME<\/h2>\n<p>A medida que las organizaciones ampl\u00edan los despliegues en la nube y contin\u00faan con su transformaci\u00f3n digital, aceleran la creaci\u00f3n de identidades humanas y de m\u00e1quinas. Cada plataforma ofrece miles de permisos de acceso que deben configurarse de forma segura para evitar que los atacantes pongan en peligro los recursos cr\u00edticos de la nube.<\/p>\n<p>Cloud Entitlements Manager reduce el riesgo y mejora la visibilidad mediante la continua detecci\u00f3n y remediaci\u00f3n con IA de permisos ocultos, mal configurados y no utilizados en todos los entornos en la nube de una organizaci\u00f3n, todo ello en un \u00fanico panel de control intuitivo, lo que permite a las organizaciones establecer el m\u00ednimo privilegio en la nube de forma r\u00e1pida y con confianza.[\/vc_column_text][vc_btn title=\u00bbDESCARGAR HOJA DE DATOS\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb#414042&#8243; shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fproduct-datasheets%2Fcloud-entitlements-manager-data-sheet|\u00bb el_class=\u00bbcyb-button mgn-bottom cyb-submargin-top\u00bb css=\u00bb.vc_custom_1604436213140{margin-right: 5px !important;}\u00bb][\/vc_column][vc_column width=\u00bb7\/12&#8243; css=\u00bb.vc_custom_1602704198513{padding-bottom: 2.5rem !important;}\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-103772\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520.png\" alt=\"Cloud Least Privilege Service\" width=\"640\" height=\"520\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520.png 640w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520-300x244.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520-150x122.png 150w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcyb-center cyb-pad-top\u00bb css=\u00bb.vc_custom_1602704947463{background-color: #ffffff !important;}\u00bb][vc_column offset=\u00bbvc_col-md-offset-2 vc_col-md-8&#8243;][vc_column_text el_class=\u00bbcyb-ltr-spc\u00bb]<\/p>\n<h2>DATOS B\u00c1SICOS SOBRE LOS PERMISOS EN LA NUBE<\/h2>\n<p>A medida que las organizaciones despliegan nuevos entornos y servicios en la nube, introducen miles de permisos basados en identidades que deben configurar de forma segura y gestionar permanentemente.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb el_class=\u00bbcyb-card-no-hover\u00bb][vc_column width=\u00bb1\/4&#8243;][vc_column_text el_class=\u00bbcyb-icon-bottom\u00bb]<\/p>\n<h1 class=\"blue-header regular\">19%<\/h1>\n<p>[\/vc_column_text][vc_column_text el_class=\u00bbno-padding-top\u00bb]de las filtraciones de datos est\u00e1n relacionadas con servidores en la nube mal configurados.*[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243;][vc_column_text el_class=\u00bbcyb-icon-bottom\u00bb]<\/p>\n<h1 class=\"blue-header regular\">M\u00e1s de 15.000<\/h1>\n<p>[\/vc_column_text][vc_column_text el_class=\u00bbno-padding-top\u00bb]permisos para acceder a servicios en AWS, Azure y GCP**[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243;][vc_column_text el_class=\u00bbcyb-icon-bottom\u00bb]<\/p>\n<h1 class=\"blue-header regular\">$4,4 millones<\/h1>\n<p>[\/vc_column_text][vc_column_text el_class=\u00bbno-padding-top\u00bb]es el coste medio de una filtraci\u00f3n de datos debido a un error de configuraci\u00f3n en la nube.*[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243;][vc_column_text el_class=\u00bbcyb-icon-bottom\u00bb]<\/p>\n<h1 class=\"blue-header regular\">#1<\/h1>\n<p>[\/vc_column_text][vc_column_text el_class=\u00bbno-padding-top\u00bb]Las \u00abcuentas y roles con exceso de permisos\u00bb encabezan los errores de configuraci\u00f3n de los servicios en la nube.***[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcyb-pad-btm\u00bb][vc_column offset=\u00bbvc_col-md-offset-2 vc_col-md-8&#8243; el_class=\u00bbcyb-center\u00bb][vc_column_text el_class=\u00bbcyb-cta-item\u00bb]<sup>*2020 IBM Cost of a Data Breach Report<\/sup><br \/>\n<sup>**Seg\u00fan la documentaci\u00f3n de los proveedores de seguridad en la nube 1\/9\/2020<\/sup><br \/>\n<sup>***ESG Research &#8211; Trends in IAM: Cloud-driven Identities<\/sup>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb disable_element=\u00bbyes\u00bb css=\u00bb.vc_custom_1608761990476{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/kobura-hero.jpg?id=103843) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_column width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1603847378427{padding-top: 2.5rem !important;padding-right: 10% !important;padding-bottom: 2.5rem !important;padding-left: 10% !important;background-color: #1d4b73 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbcyb-opac-blue cyb-center-mobile\u00bb offset=\u00bbvc_col-sm-offset-0&#8243;][vc_column_text el_class=\u00bbcyb-white\u00bb css=\u00bb.vc_custom_1607566677792{padding-bottom: 2.1875rem !important;}\u00bb]<\/p>\n<h3 class=\"cyb-white\">Expert Insights on How to Secure Identities in Cloud Environments<\/h3>\n<p>In this virtual event, you will gain cloud security insights from CyberArk threat researchers, customers and industry analysts. We also introduce our Cloud Entitlements Manager solution.<\/p>\n<p>The 30 minute showcase features technical demos, cloud attack scenarios, industry research and more! Learn how to secure human and machine identities in cloud environment.[\/vc_column_text][vc_btn title=\u00bbWATCH ON-DEMAND\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb#ffffff\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:%2F%3Fpage_id%3D104615|\u00bb el_class=\u00bbcyb-button white\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb css=\u00bb.vc_custom_1603214432931{background-color: #f1f2f2 !important;}\u00bb][vc_column offset=\u00bbvc_col-md-offset-2 vc_col-md-8&#8243; el_class=\u00bbcyb-center cyb-pad-top\u00bb][vc_column_text]<\/p>\n<h2>CARACTER\u00cdSTICAS PRINCIPALES<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcyb-pad-top\u00bb css=\u00bb.vc_custom_1603214379926{background-color: #f1f2f2 !important;}\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcyb-submargin-btm\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-103965\" style=\"border: 2px solid #f1f2f2;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Visibility_cloud-1.jpg\" alt=\"Centralized Cloud Permissions Dashboard\" width=\"860\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Visibility_cloud-1.jpg 860w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Visibility_cloud-1-300x174.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Visibility_cloud-1-768x447.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Visibility_cloud-1-150x87.jpg 150w\" sizes=\"auto, (max-width: 860px) 100vw, 860px\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/3&#8243; css=\u00bb.vc_custom_1602694987343{padding-bottom: 2.5rem !important;}\u00bb offset=\u00bbvc_col-md-offset-1&#8243;][vc_column_text]<\/p>\n<h3 class=\"blue-header\">POTENTE VISIBILIDAD<\/h3>\n<p>Obtenga una visi\u00f3n agn\u00f3stica de la nube desde un panel de control centralizado para detectar y controlar todos los permisos para acceder a los recursos de AWS, AWS Elastic Kubernetes Service, Azure y GCP. Visualice e interact\u00fae con las relaciones entre las identidades y los recursos en la nube. Mida la reducci\u00f3n del riesgo y corrija los permisos excesivos. Todo desde una \u00fanica pantalla.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcyb-reverse cyb-pad-top\u00bb][vc_column width=\u00bb1\/3&#8243; css=\u00bb.vc_custom_1602695005478{padding-bottom: 2.5rem !important;}\u00bb offset=\u00bbvc_col-md-offset-1&#8243;][vc_column_text]<\/p>\n<h3 class=\"blue-header\">RECOMENDACIONES GRANULARES BASADAS EN IA<\/h3>\n<p>Gestione los permisos en la nube de forma segura e implemente el m\u00ednimo privilegio de forma eficiente. Cloud Entitlements Manager utiliza la IA para aplicar correcciones de pol\u00edticas granulares y a nivel de c\u00f3digo para identidades humanas y de m\u00e1quinas sin afectar a las operaciones en curso. Esto ahorra tiempo a los equipos de seguridad de la nube y estandariza los procesos en todas las plataformas.[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243; offset=\u00bbvc_col-md-offset-1&#8243; el_class=\u00bbcyb-submargin-btm\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-103901\" style=\"border: solid 2px #f1f2f2;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/AI_860x500.jpg\" alt=\"AI-Powered Least Privilege Recommendations\" width=\"860\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/AI_860x500.jpg 860w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/AI_860x500-300x174.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/AI_860x500-768x447.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/AI_860x500-150x87.jpg 150w\" sizes=\"auto, (max-width: 860px) 100vw, 860px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcyb-pad-top\u00bb css=\u00bb.vc_custom_1603214391377{background-color: #f1f2f2 !important;}\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcyb-submargin-btm\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-103893\" style=\"border: solid 2px #f1f2f2;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Exposure_860x500.jpg\" alt=\"Exposure Level Analysis for Cloud Least Privilege\" width=\"860\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Exposure_860x500.jpg 860w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Exposure_860x500-300x174.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Exposure_860x500-768x447.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Exposure_860x500-150x87.jpg 150w\" sizes=\"auto, (max-width: 860px) 100vw, 860px\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/3&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_column_text]<\/p>\n<h3 class=\"blue-header\">AN\u00c1LISIS DEL NIVEL DE EXPOSICI\u00d3N<\/h3>\n<p>Reduzca proactivamente el riesgo y mida el progreso a lo largo del tiempo con puntuaciones de nivel de exposici\u00f3n din\u00e1micas y cuantificables para todas las identidades y plataformas. Los niveles de exposici\u00f3n ponderan los permisos excesivos por el riesgo asociado, aislando las v\u00edas m\u00e1s r\u00e1pidas hacia la reducci\u00f3n del riesgo y permitiendo una medici\u00f3n continua para la auditor\u00eda y el cumplimiento.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcyb-reverse cyb-pad-top\u00bb][vc_column width=\u00bb1\/3&#8243; css=\u00bb.vc_custom_1602695005478{padding-bottom: 2.5rem !important;}\u00bb offset=\u00bbvc_col-md-offset-1&#8243;][vc_column_text]<\/p>\n<h3 class=\"blue-header\">INTEGRACI\u00d3N CON LAS SOLUCIONES DE CYBERARK<\/h3>\n<p>Cloud Entitlements Manager forma parte de una soluci\u00f3n global de seguridad de identidad de CyberArk que protege el acceso de personas y m\u00e1quinas a aplicaciones e infraestructuras en entornos h\u00edbridos y multinube.[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243; offset=\u00bbvc_col-md-offset-1&#8243; el_class=\u00bbcyb-submargin-btm\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-103973\" style=\"border: solid 2px #f1f2f2;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/860x500_04.jpg\" alt=\"Cloud Entitlements Management Part of Identity Security Solutions\" width=\"860\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/860x500_04.jpg 860w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/860x500_04-300x174.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/860x500_04-768x447.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/860x500_04-150x87.jpg 150w\" sizes=\"auto, (max-width: 860px) 100vw, 860px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb][vc_column offset=\u00bbvc_col-md-offset-2 vc_col-md-8&#8243; el_class=\u00bbcyb-pad-top cyb-cta-card\u00bb][vc_column_text el_class=\u00bbcyb-ltr-spc\u00bb]<\/p>\n<h2>RECURSOS<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb css=\u00bb.vc_custom_1602707447265{padding-top: 2rem !important;}\u00bb el_class=\u00bbcyb-center\u00bb][vc_column css=\u00bb.vc_custom_1593651419004{padding-bottom: 1.25rem !important;}\u00bb][vc_raw_html]PGEgY2xhc3M9ImFuY2hvciIgbmFtZT0iZm9ybSI+PC9hPg==[\/vc_raw_html][vc_column_text]<\/p>\n<h2>SOLICITAR EVALUACI\u00d3N GRATUITA<\/h2>\n<p>Ya casi est\u00e1, solo necesitamos que nos d\u00e9 unos pocos datos. A cambio, obtendr\u00e1 una prueba gratuita de 30 d\u00edas que le permitir\u00e1 desplegar Cloud Entitlements Manager como servicio sin requisitos de espacio y comenzar a corregir permisos de riesgo en menos de una hora.[\/vc_column_text][vc_column_text el_class=\u00bbcyb-pad-top\u00bb]    <script type=\"text\/javascript\" src=\"https:\/\/lp.cyberark.com\/js\/forms2\/js\/forms2.min.js\" id=\"marketo-script-js\"><\/script>\n    <script src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/google-libphonenumber\/3.2.38\/libphonenumber.min.js\" integrity=\"sha512-2EBfDCqBiVPlov9vAT9w6xMEIFcg24K3arAldIIgHh1EGrNob66Mc1gGXa5J7LTG3W5sk\/liGFbJUkODW5A8NQ==\" crossorigin=\"anonymous\" referrerpolicy=\"no-referrer\"><\/script>\n    <form id=\"mktoForm_8084\"><\/form>\n    <script>\n        MktoForms2.loadForm(\"\/\/lp.cyberark.com\", \"316-CZP-275\", 8084, function (form) {\n            \n            var match_found;                            \n            \n                        \n            \/\/ Add hidden value with asset info\n            var ecid = decodeURIComponent(document.cookie).match(\/AMCV_.*?=.*?\\|MCMID\\|(.*?)\\|\/)[1];\n                        var utm_source = getParameterByName('utm_source') == undefined ? (jQuery.cookie('utm_source') == undefined ? '' : jQuery.cookie('utm_source')) : getParameterByName('utm_source');\n            var utm_campaign = getParameterByName('utm_campaign') == undefined ? (jQuery.cookie('utm_campaign') == undefined ? '' : jQuery.cookie('utm_campaign')) : getParameterByName('utm_campaign');\n            var utm_medium = getParameterByName('utm_medium') == undefined ? (jQuery.cookie('utm_medium') == undefined ? '' : jQuery.cookie('utm_medium')) : getParameterByName('utm_medium');\n            var utm_term = getParameterByName('utm_term') == undefined ? (jQuery.cookie('utm_term') == undefined ? '' : jQuery.cookie('utm_term')) : getParameterByName('utm_term');\n            var utm_content = getParameterByName('utm_content') == undefined ? (jQuery.cookie('utm_content') == undefined ? '' : jQuery.cookie('utm_content')) : getParameterByName('utm_content');\n            form.addHiddenFields({\n                'marketoAnalyticsID': \"\",\n                'adobecloudid': ecid,\n                'asset_name': \"\",\n                'program_name': \"\",\n                'Lead_Request__c': \"\",\n                'additional_email_content': \"\",\n                'Notes_Restrictions__c': \"\",\n                'utm_source': utm_source,\n                'utm_campaign': utm_campaign,\n                'utm_medium': utm_medium,\n                'utm_term': utm_term,\n                'utm_contact': utm_content,\n                'utmsource': utm_source,\n                'utmcampaign': utm_campaign,\n                'utmmedium': utm_medium,\n                'utmterm': utm_term,\n                'utmcontent': utm_content,\n                'showNotes': ''\n            });\n                            form.addHiddenFields({\n                    'MktoPersonNotes': \"\"\n                });\n                \n            \/***************************\n            Start event assigning for AA\n            ***************************\/\n                        \n            \/*************************\n            End event assigning for AA\n            *************************\/\n\n            \/***********************************************\n            Start event dispatching and email hashing for AA\n            ***********************************************\/\n\n            if( typeof formType !== 'undefined' ) { \/\/following AA dispatching will not run if formType has not been defined above\n\n                \n                \/\/Custom AT event for form view\n                let formViewEvent = new CustomEvent('launch-formView',{\n                    'detail':{\n                    'form_type': formType,\n                    'form_name': formName,\n                    'form_id': '8084'\n                    }\n                })\n                document.querySelector('body').dispatchEvent(formViewEvent);\n                console.log(formViewEvent);\n\n                form.onValidate(function() {\n                    if (jQuery(\"form.mktoForm .mktoInvalid\")[0]){\/\/only fire events if no error class is found\n                        \n                        \/\/Custom AT event for form validate\n                        let formErrorEvent = new CustomEvent('launch-formError',{\n                            'detail':{\n                                'form_type': formType,\n                                'form_name': formName,\n                                'form_id': '8084'\n                            }\n                        })\n                        document.querySelector('body').dispatchEvent(formErrorEvent);\n                        console.log(formErrorEvent);\n                        \n                                              \n                    }\n                    \/\/hash the email\n                    var eInput = jQuery('input[type=\"email\"]').val();\n                    var eHash = sha256(eInput);\n                    console.log(eHash);\n                    \/\/assign the cookie\n                    form.vals({\"marketoAnalyticsID\":eHash});\n                    _satellite.cookie.set('marketoAnalyticsID', eHash, {expires: 365});\n                });\n\n                form.onSuccess(function () {\n\n                    \/\/Custom AT event for form submit\n                    let formSubmitEvent = new CustomEvent('launch-formSubmit',{\n                        'detail':{\n                            'form_type': formType,\n                            'form_name': formName,\n                            'form_id': '8084'\n                        }\n                    })\n                    document.querySelector('body').dispatchEvent(formSubmitEvent);\n                    console.log(formSubmitEvent);\n                });               \n            }\n            \/*********************************************\n            End event dispatching and email hashing for AA\n            *********************************************\/\n            \n            \/\/ TY Message\n            form.onSuccess(function () {\n                dataLayer.push({\n                                    });\n                                    jQuery(\"#mktoForm_8084\").hide();\n                    jQuery(\".ty_message\").show();\n                    var iframe = jQuery(\"<iframe><\/iframe>\",{\n                        src: \"https:\/\/www.cyberark.com\/?reset_mkto=1\",\n                        style: 'position:absolute;top:-9999px;left:-999px;',\n                        width: '10',\n                        height: '10'\n                    });\n                    iframe.appendTo('body');\n                    jQuery.cookie('utm_source', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    jQuery.cookie('utm_medium', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    jQuery.cookie('utm_campaign', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    jQuery.cookie('utm_term', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    jQuery.cookie('utm_content', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    return false;\n                                });\n        });\n    <\/script>\n    <script>\n    \/\/ custom errorMessage + instruction text for embedded Marketo Forms\nMktoForms2.whenReady(function(form) {\n    \/\/ when a field is focused\n    jQuery(document).on('focus', 'input, select, textarea', function(){\n        jQuery(this).parent('.mktoFieldWrap').addClass('activeField');\n        \/\/ if this is a valid input\n        if(jQuery(this).is('.mktoValid')){\n            jQuery(this).parent('.mktoFieldWrap').addClass('fieldValid');\n        }\n        \/\/ if this is an invalid input\n        else if(jQuery(this).is('.mktoInvalid')){\n            jQuery(this).parent('.mktoFieldWrap').addClass('fieldInvalid');\n        }\n        \/\/ else this is not a valid nor invalid input\n        else {}\n    });\n\n    \/\/ when a field is blurred\n    jQuery(document).on('blur', 'input, select, textarea', function(){\n        jQuery(this).parent('.mktoFieldWrap').removeClass('activeField');\n        \/\/ if this is a valid input\n        if(jQuery(this).is('.mktoValid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldInvalid').addClass('fieldValid');\n        }\n        \/\/ if this is an invalid input\n        else if(jQuery(this).is('.mktoInvalid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldValid').addClass('fieldInvalid');\n        }\n        \/\/ else this is not a valid nor invalid input\n        else {}\n    });\n\n    \/\/ when a field is edited (keyup)\n    jQuery(document).on('keyup', 'input, select, textarea', function(e){\n        \/\/ if this is a valid input\n        if(jQuery(this).is('.mktoValid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldInvalid').addClass('fieldValid');\n            \/\/ replace instructions\n                    if(jQuery(this)[0].hasAttribute('title') == false) {\n                jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('');   \n            }\n            else {\n            jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html(jQuery(this).attr('title'));\n            }\n        }\n        \/\/ if this is an invalid input\n        else if(jQuery(this).is('.mktoInvalid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldValid').addClass('fieldInvalid');\n            \/\/ determine which key(s) \n            var code = e.keyCode || e.which;\n            \/\/ if this is 'tab' or 'shift + tab'\n            if (code == '9' || '16') {\n                \/\/ do nothing\n            }\n            \/\/ else this is not the tab or shift + tab key(s)\n            else{}\n        }\n        \/\/ else this is not a valid nor invalid input\n        else {}\n\n    });\n\n    \/\/ when a select field is changed, validate it\n    jQuery(document).on('change', 'select', function(e){\n        jQuery(this).blur().focus();    \n\n        \/\/ if this is a valid input\n        if(jQuery(this).is('.mktoValid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldInvalid').addClass('fieldValid');\n            \/\/ replace instructions\n            if(jQuery(this)[0].hasAttribute('title') == false) {\n                jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('');   \n            }\n            else {\n                jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html(jQuery(this).attr('title'));\n            }\n        }\n        \/\/ if this is an invalid input\n        else if(jQuery(this).is('.mktoInvalid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldValid').addClass('fieldInvalid');\n        }\n        \/\/ else this is not a valid nor invalid input\n        else {}\n    });\n\n    form.onValidate(function() {\n     jQuery('form.mktoForm').addClass('validated');\n     jQuery('.mktoInvalid').each(function(){\n        jQuery(this).parents('.mktoFieldWrap').addClass('fieldInvalid');   \n        if(jQuery(this).is('.mktoTelField')) {\n            jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('<span style=\"color:#c03d33; font-size: 9px; line-height: 1.2em; background-color: #F7F7FA;\">Phone number is required in numerical values only.<\/span>');\n        }\n        else if(jQuery(this).is('.mktoEmailField')) {\n            jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('<span style=\"color:#c03d33; font-size: 9px; line-height: 1.2em; background-color: #F7F7FA;\">Email address is required in this format: yourname@email.com.<\/span>');\n        }\n        else{ \n            jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('<span style=\"color:#c03d33; font-size: 9px; line-height: 1.2em; background-color: #F7F7FA;\">This field is required.<\/span>'); \n        }\n     });\n    });\n});\n    <\/script>\n    <script src=\"https:\/\/www.google.com\/recaptcha\/api.js\" async defer><\/script>\n    <script src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/js-sha256\/0.9.0\/sha256.min.js\"><\/script>\n    <div class=\"ty_message\" style=\"display:none\"><strong>\u00a1Gracias por tu inter\u00e9s!<\/strong><br \/>\nNos comunicaremos con usted en breve con respecto a su inter\u00e9s en CyberArk.<\/div>\n    [\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1602702717594{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Kubora_1920x520.jpg?id=103748) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbcyb-hero cyb-desktop\u00bb][vc_column el_class=\u00bbcyb-center\u00bb][vc_column_text css=\u00bb.vc_custom_1606325163419{margin-top: 5.3125rem !important;margin-bottom: 20px !important;}\u00bb] CYBERARK CLOUD ENTITLEMENTS MANAGER Eliminaci\u00f3n de permisos excesivos mediante IA. [\/vc_column_text][vc_btn title=\u00bbDESCARGAR EBOOK\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":53045,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-104420","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Least Privilege Across Cloud - Entitlement Management | CyberArk<\/title>\n<meta name=\"description\" content=\"Establish least privilege in the cloud with CyberArk Cloud Entitlements Manager. Detect and remove excessive cloud permissions from a centralized dashboard.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/es\/products\/cyberark-cloud-entitlements-manager\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CyberArk Cloud Entitlements Manager\" \/>\n<meta property=\"og:description\" content=\"Establish least privilege in the cloud with CyberArk Cloud Entitlements Manager. Detect and remove excessive cloud permissions from a centralized dashboard.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/es\/products\/cyberark-cloud-entitlements-manager\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-23T22:22:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/cyberark-cloud-entitlements-manager\/\",\"url\":\"https:\/\/www.cyberark.com\/es\/products\/cyberark-cloud-entitlements-manager\/\",\"name\":\"Least Privilege Across Cloud - Entitlement Management | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/cyberark-cloud-entitlements-manager\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/cyberark-cloud-entitlements-manager\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520.png\",\"datePublished\":\"2020-11-04T20:50:11+00:00\",\"dateModified\":\"2020-12-23T22:22:27+00:00\",\"description\":\"Establish least privilege in the cloud with CyberArk Cloud Entitlements Manager. Detect and remove excessive cloud permissions from a centralized dashboard.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/cyberark-cloud-entitlements-manager\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/es\/products\/cyberark-cloud-entitlements-manager\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/cyberark-cloud-entitlements-manager\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520.png\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/cyberark-cloud-entitlements-manager\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Productos\",\"item\":\"https:\/\/www.cyberark.com\/es\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"CyberArk Cloud Entitlements Manager\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/es\/#website\",\"url\":\"https:\/\/www.cyberark.com\/es\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/es\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Least Privilege Across Cloud - Entitlement Management | CyberArk","description":"Establish least privilege in the cloud with CyberArk Cloud Entitlements Manager. Detect and remove excessive cloud permissions from a centralized dashboard.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/es\/products\/cyberark-cloud-entitlements-manager\/","og_locale":"es_ES","og_type":"article","og_title":"CyberArk Cloud Entitlements Manager","og_description":"Establish least privilege in the cloud with CyberArk Cloud Entitlements Manager. Detect and remove excessive cloud permissions from a centralized dashboard.","og_url":"https:\/\/www.cyberark.com\/es\/products\/cyberark-cloud-entitlements-manager\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2020-12-23T22:22:27+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tiempo de lectura":"11 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/es\/products\/cyberark-cloud-entitlements-manager\/","url":"https:\/\/www.cyberark.com\/es\/products\/cyberark-cloud-entitlements-manager\/","name":"Least Privilege Across Cloud - Entitlement Management | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/es\/products\/cyberark-cloud-entitlements-manager\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/es\/products\/cyberark-cloud-entitlements-manager\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520.png","datePublished":"2020-11-04T20:50:11+00:00","dateModified":"2020-12-23T22:22:27+00:00","description":"Establish least privilege in the cloud with CyberArk Cloud Entitlements Manager. Detect and remove excessive cloud permissions from a centralized dashboard.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/es\/products\/cyberark-cloud-entitlements-manager\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/es\/products\/cyberark-cloud-entitlements-manager\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/es\/products\/cyberark-cloud-entitlements-manager\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520.png","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/es\/products\/cyberark-cloud-entitlements-manager\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/es\/"},{"@type":"ListItem","position":2,"name":"Productos","item":"https:\/\/www.cyberark.com\/es\/products\/"},{"@type":"ListItem","position":3,"name":"CyberArk Cloud Entitlements Manager"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/es\/#website","url":"https:\/\/www.cyberark.com\/es\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/es\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/104420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/comments?post=104420"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/104420\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/53045"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/media?parent=104420"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/product_category?post=104420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}