{"id":115044,"date":"2021-02-03T19:01:12","date_gmt":"2021-02-04T00:01:12","guid":{"rendered":"https:\/\/www.cyberark.com\/try-buy\/"},"modified":"2026-01-15T00:27:37","modified_gmt":"2026-01-15T05:27:37","slug":"try-buy","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/es\/try-buy\/","title":{"rendered":"Pruebe y compre"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row el_class=\u00bbcybv2 cybv2-pad box-row\u00bb][vc_column][vc_column_text el_class=\u00bbhead-box\u00bb]<\/p>\n<h1>Pruebas y demostraciones gratuitas<\/h1>\n<p>[\/vc_column_text][vc_row_inner equal_height=\u00bbyes\u00bb][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb1\/2&#8243;][vc_column_text el_class=\u00bbcta-box-text\u00bb]<\/p>\n<h4>Privileged Access Manager<\/h4>\n<p><\/p>\n<p class=\"bold\">Impida el uso malicioso de cuentas y credenciales con privilegios.<\/p>\n<p>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/try-buy\/privileged-access-manager-demo\/\">Solicitar demostraci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb1\/2&#8243;][vc_column_text el_class=\u00bbcta-box-text\u00bb]<\/p>\n<h4>Workforce Identity<\/h4>\n<p><\/p>\n<p class=\"bold\">Proporcione a su personal un acceso seguro a los recursos de la empresa.<\/p>\n<p>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/try-buy\/workforce-access-solutions-demo\/\" rel=\"noopener noreferrer\">Solicitar demostraci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=\u00bbyes\u00bb][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb1\/2&#8243;][vc_column_text el_class=\u00bbcta-box-text\u00bb]<\/p>\n<h4>Vendor Privileged Access Manager<\/h4>\n<p><\/p>\n<p class=\"bold\">Proteja el acceso de terceros sin VPN, agentes ni contrase\u00f1as.<\/p>\n<p>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/try-buy\/vendor-privileged-access-manager-trial\/\">Iniciar prueba<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb1\/2&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbcta-box-text\u00bb]<\/p>\n<h4>CyberArk Secrets Manager, SaaS<\/h4>\n<p><\/p>\n<p class=\"bold\">Gestione el acceso no humano y la identidad de las m\u00e1quinas en entornos multinube e h\u00edbridos con una experiencia uniforme para la seguridad y los desarrolladores, independientemente de d\u00f3nde se encuentren sus secretos.<\/p>\n<p>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/try-buy\/conjur-cloud-demo\/\">Solicitar demostraci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=\u00bbyes\u00bb][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb1\/2&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbcta-box-text\u00bb]<\/p>\n<h4>CyberArk Certificate Manager, SaaS<\/h4>\n<p><\/p>\n<p class=\"bold\">Empiece hoy mismo y compruebe lo f\u00e1cil que es gestionar todos los certificados TLS\/SSL de su red.<\/p>\n<p>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/try-buy\/certificate-manager-saas-trial\/\">Iniciar una prueba<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb1\/2&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbcta-box-text\u00bb]<\/p>\n<h4>CyberArk Certificate Manager para Kubernetes<\/h4>\n<p><\/p>\n<p class=\"bold\">Proteja sus entornos nativos en la nube con una gesti\u00f3n de la identidad de m\u00e1quinas Kubernetes moderna y de clase empresarial, y utilice cert-manager en varios cl\u00fasteres.<\/p>\n<p>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/try-buy\/certificate-manager-kubernetes-trial\/\">Iniciar una prueba<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=\u00bbyes\u00bb][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb1\/2&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbcta-box-text\u00bb]<\/p>\n<h4>Soluciones Modern IGA<\/h4>\n<p><\/p>\n<p class=\"bold\">Solicite una demo personalizada para descubrir c\u00f3mo las soluciones Modern IGA de CyberArk automatizan las revisiones de acceso y agilizan la validaci\u00f3n de permisos en su organizaci\u00f3n.<\/p>\n<p>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/try-buy\/modern-iga-demo\/\">Obtenga una demostraci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb1\/2&#8243;][vc_column_text el_class=\u00bbcta-box-text\u00bb]<\/p>\n<h4>Workforce Password Management<\/h4>\n<p><\/p>\n<p class=\"bold\">Almacene, gestione y comparta de forma segura las credenciales de las aplicaciones empresariales.<\/p>\n<p>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/try-buy\/workforce-password-management-demo\/\">Obtenga una demostraci\u00f3n\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=\u00bbyes\u00bb][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb1\/2&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbcta-box-text\u00bb]<\/p>\n<h4>CyberArk Workload Identity Manager<\/h4>\n<p><\/p>\n<p class=\"bold\">Implemente de forma eficiente identidades de carga de trabajo fiables y conformes con la normativa para el desarrollo moderno.<\/p>\n<p>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/try-buy\/workload-identity-manager-trial\/\">Iniciar una prueba<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb1\/2&#8243;][vc_column_text el_class=\u00bbcta-box-text\u00bb]<\/p>\n<h4>Secrets Hub<\/h4>\n<p><\/p>\n<p class=\"bold\">Gesti\u00f3n, visibilidad y rotaci\u00f3n centralizadas para sus secretos en la nube.<\/p>\n<p>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/try-buy\/secrets-hub\/\">Solicitar demostraci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=\u00bbyes\u00bb][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb1\/2&#8243;][vc_column_text el_class=\u00bbcta-box-text\u00bb]<\/p>\n<h4>Endpoint Privilege Manager<\/h4>\n<p><\/p>\n<p class=\"bold\">Bloquee los privilegios en todos los endpoints y evite la propagaci\u00f3n lateral.<\/p>\n<p>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/try-buy\/endpoint-privilege-manager-demo\/\">Solicite una demo personalizada<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/es\/try-buy\/epm-interactive-tour\/\">Take an Interactive Product Tour<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb1\/2&#8243;][vc_column_text el_class=\u00bbcta-box-text\u00bb]<\/p>\n<h4>Rapid Risk Assessment<\/h4>\n<p><\/p>\n<p class=\"bold\">Recupere el comando y el control del acceso con privilegios con una evaluaci\u00f3n de riesgos gratuita.<\/p>\n<p>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/try-buy\/rapid-risk-assessment\/\">Solicitar evaluaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=\u00bbyes\u00bb][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb1\/2&#8243;][vc_column_text el_class=\u00bbcta-box-text\u00bb]<\/p>\n<h4>CyberArk Blueprint Toolkit<\/h4>\n<p><\/p>\n<p class=\"bold\">Un conjunto completo de recursos para desarrollar con \u00e9xito un programa de Seguridad de la Identidad.<\/p>\n<p>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/try-buy\/blueprint-toolkit\/\">Obtenga el kit de herramientas<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb1\/2&#8243;][vc_column_text el_class=\u00bbcta-box-text\u00bb]<\/p>\n<h4>CyberArk<sup>\u00ae<\/sup> Discovery &amp; Audit<sup>\u2122<\/sup><\/h4>\n<p><\/p>\n<p class=\"bold\">D\u00e9 el primer paso para mejorar su posici\u00f3n en materia de seguridad con una evaluaci\u00f3n detallada y completamente gratuita de los riesgos del acceso con privilegios.<\/p>\n<p>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/discovery-audit\/\">Iniciar evaluaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=\u00bbyes\u00bb][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb1\/2&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbcta-box-text\u00bb]<\/p>\n<h4>Secure AI Agents<\/h4>\n<p><\/p>\n<p class=\"bold\">Explore con un experto c\u00f3mo proteger esta nueva clase de identidad privilegiada.<\/p>\n<p>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/try-buy\/secure-ai-agents\/\">Solicitud para hablar con un experto<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 cybv2-pad cybv2-oval-left-background hv-cta-list\u00bb css=\u00bb.vc_custom_1611885567532{background-color: #ff7600 !important;}\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbimg-box\u00bb css=\u00bb.vc_custom_1612237020410{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Homepage-highvalueCTA.jpg?id=108971) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbstat-column\u00bb][vc_row_inner][vc_column_inner el_class=\u00bbhead-box\u00bb width=\u00bb3\/4&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text]<\/p>\n<h2>\u00bfBusca algo m\u00e1s?<\/h2>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bblist-box\u00bb width=\u00bb11\/12&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=\u00bbbenefits-content-icon\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"checkmark icon\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblist-text\u00bb]Hable con un experto sobre las necesidades de su empresa[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bblist-box\u00bb width=\u00bb11\/12&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=\u00bbbenefits-content-icon\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"checkmark icon\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblist-text\u00bb]Comprenda los componentes clave de una estrategia de Seguridad de la Identidad[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bblist-box\u00bb width=\u00bb11\/12&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=\u00bbbenefits-content-icon\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"checkmark icon\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblist-text\u00bb]Solicite una demostraci\u00f3n del producto[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bblist-box\u00bb width=\u00bb11\/12&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_btn title=\u00bbContacto\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fcontact%2F|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row el_class=\u00bbcybv2 cybv2-pad box-row\u00bb][vc_column][vc_column_text el_class=\u00bbhead-box\u00bb] Pruebas y demostraciones gratuitas [\/vc_column_text][vc_row_inner equal_height=\u00bbyes\u00bb][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb1\/2&#8243;][vc_column_text el_class=\u00bbcta-box-text\u00bb] Privileged Access Manager Impida el uso malicioso de cuentas y credenciales con privilegios. [\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]Solicitar demostraci\u00f3n[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb1\/2&#8243;][vc_column_text el_class=\u00bbcta-box-text\u00bb] Workforce Identity&#8230;<\/p>\n","protected":false},"author":125,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27776],"class_list":["post-115044","page","type-page","status-publish","hentry","product_category-identity-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Pruebas y demostraciones gratuitas de la Seguridad de la Identidad | CyberArk<\/title>\n<meta name=\"description\" content=\"Vea la plataforma de Seguridad de la Identidad de CyberArk en acci\u00f3n. Reg\u00edstrese para obtener una prueba gratuita o una demostraci\u00f3n personalizada que puede realizarse en directo in situ o en l\u00ednea.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/try-buy\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pruebe y compre\" \/>\n<meta property=\"og:description\" content=\"Vea la plataforma de Seguridad de la Identidad de CyberArk en acci\u00f3n. Reg\u00edstrese para obtener una prueba gratuita o una demostraci\u00f3n personalizada que puede realizarse en directo in situ o en l\u00ednea.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/try-buy\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-15T05:27:37+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/try-buy\/\",\"url\":\"https:\/\/www.cyberark.com\/try-buy\/\",\"name\":\"Pruebas y demostraciones gratuitas de la Seguridad de la Identidad | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/try-buy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/try-buy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\",\"datePublished\":\"2021-02-04T00:01:12+00:00\",\"dateModified\":\"2026-01-15T05:27:37+00:00\",\"description\":\"Vea la plataforma de Seguridad de la Identidad de CyberArk en acci\u00f3n. Reg\u00edstrese para obtener una prueba gratuita o una demostraci\u00f3n personalizada que puede realizarse en directo in situ o en l\u00ednea.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/try-buy\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/try-buy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/try-buy\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/try-buy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pruebe y compre\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Pruebas y demostraciones gratuitas de la Seguridad de la Identidad | CyberArk","description":"Vea la plataforma de Seguridad de la Identidad de CyberArk en acci\u00f3n. Reg\u00edstrese para obtener una prueba gratuita o una demostraci\u00f3n personalizada que puede realizarse en directo in situ o en l\u00ednea.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/try-buy\/","og_locale":"es_ES","og_type":"article","og_title":"Pruebe y compre","og_description":"Vea la plataforma de Seguridad de la Identidad de CyberArk en acci\u00f3n. Reg\u00edstrese para obtener una prueba gratuita o una demostraci\u00f3n personalizada que puede realizarse en directo in situ o en l\u00ednea.","og_url":"https:\/\/www.cyberark.com\/try-buy\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-01-15T05:27:37+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/try-buy\/","url":"https:\/\/www.cyberark.com\/try-buy\/","name":"Pruebas y demostraciones gratuitas de la Seguridad de la Identidad | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/try-buy\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/try-buy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg","datePublished":"2021-02-04T00:01:12+00:00","dateModified":"2026-01-15T05:27:37+00:00","description":"Vea la plataforma de Seguridad de la Identidad de CyberArk en acci\u00f3n. Reg\u00edstrese para obtener una prueba gratuita o una demostraci\u00f3n personalizada que puede realizarse en directo in situ o en l\u00ednea.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/try-buy\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/try-buy\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/try-buy\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/try-buy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Pruebe y compre"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/115044","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/users\/125"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/comments?post=115044"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/115044\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/media?parent=115044"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/product_category?post=115044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}