{"id":115207,"date":"2021-02-03T18:07:38","date_gmt":"2021-02-03T23:07:38","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/customer-identity\/"},"modified":"2025-12-24T03:06:09","modified_gmt":"2025-12-24T08:06:09","slug":"customer-identity","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/es\/products\/customer-identity\/","title":{"rendered":"Customer Identity"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcybv2 hero dark\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-1&#8243;][vc_column_text el_class=\u00bbcyb-breadcrumb\u00bb]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/es\/products\/access-management\/\">Volver a Gesti\u00f3n del acceso<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>Customer Identity<\/h1>\n<p><\/p>\n<h2>Satisfaga a sus clientes con un acceso f\u00e1cil y seguro a las aplicaciones y sitios web de su empresa a fin de conseguir su fidelidad.<\/h2>\n<p>\n[\/vc_column_text][vc_btn title=\u00bbObtenga una demostraci\u00f3n\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb css=\u00bb\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Ftry-buy%2Fworkforce-access-solutions-demo%2F|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-2&#8243; css=\u00bb.vc_custom_1701722019073{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/12\/businessman-forcefield-hero.png?id=184775) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcybv2 cybv2_sticky_nav\u00bb css=\u00bb.vc_custom_1614201964540{background-color: #f7f7f7 !important;}\u00bb][vc_column width=\u00bb1\/4&#8243;][vc_column_text el_class=\u00bbsticky-nav-title\u00bb]<\/p>\n<h3><i class=\"fas fa-long-arrow-alt-up\"><\/i>Customer Identity<\/h3>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243;][vc_raw_html el_class=\u00bbsticky-nav-buttons\u00bb]PCEtLSBBZGQgbGkgZm9yIHNlY3Rpb24gZGF0YS1zY3JvbGwtY2xhc3MgaXMgd2hlcmUgeW91IHB1dCB0aGUgc2VjdGlvbiBjbGFzcyB5b3Ugd2FudCB0byBzY3JvbGwgdG8gLS0+PGJyPjx1bD4NCjxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTEiPlZlbnRhamFzPC9saT4NCjxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTIiPlByb2R1Y3RvczwvbGk+DQo8bGkgZGF0YS1zY3JvbGwtY2xhc3M9InN1Yi0zIj5DYXNvcyBkZSB1c288L2xpPg0KPC91bD4=[\/vc_raw_html][\/vc_column][vc_column width=\u00bb1\/4&#8243;][vc_btn title=\u00bbObtenga una demostraci\u00f3n\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb css=\u00bb\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Ftry-buy%2Fworkforce-access-solutions-demo%2F|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbsubnav-dropdown\u00bb][vc_column_text el_class=\u00bbsticky-nav-title\u00bb]<\/p>\n<h5 style=\"text-align: right;\">Saltar a<i class=\"fas fa-chevron-circle-down\"><\/i><\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2-pad-top overview-vt sub-1&#8243; css=\u00bb.vc_custom_1617032896465{background-color: #f7f7f7 !important;}\u00bb][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbhead-box\u00bb][vc_column_text]<\/p>\n<h3>Deje entrar a sus clientes y mantenga a los atacantes fuera<\/h3>\n<p>Las expectativas de las grandes experiencias digitales han alcanzado niveles sin precedentes. Mientras tanto, la superficie de ataque es m\u00e1s fr\u00e1gil que nunca. Con CyberArk Customer Identity, puede abrir de forma segura sus sitios web y aplicaciones a los clientes con confianza.[\/vc_column_text][\/vc_column][vc_column width=\u00bb5\/12&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-109267\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/SeamlessIntegration-Overview-Vertical-Customer-Identities.svg\" alt=\"\u00edcono de integraci\u00f3n perfecta\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Una experiencia fant\u00e1stica<\/h4>\n<p>Integraci\u00f3n perfecta, controles de acceso intuitivos y una experiencia de inicio de sesi\u00f3n sin fricciones.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-109275\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Privacy-Overview-Vertical-Customer-Identities.svg\" alt=\"\u00edcono de privacidad\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Seguridad s\u00f3lida<\/h4>\n<p>Verificaci\u00f3n de la privacidad, el consentimiento y la identidad en una \u00fanica plataforma.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-109283\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/PreBuilt_OpenAPI-Overview-Vertical-Customer-Identities.svg\" alt=\"\u00edcono de widgets preconfigurados\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Rapidez en la obtenci\u00f3n de valor<\/h4>\n<p>Widgets preconfigurados y API abiertas para reducir la labor de desarrollo.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 cybv2-pad-top text-md-center sub-2&#8243;][vc_column][vc_column_text]<\/p>\n<h2>Ofrezca experiencias sencillas y segura<\/h2>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 cybv2-pad-btm text-md-center\u00bb][vc_column width=\u00bb2\/3&#8243; offset=\u00bbvc_col-sm-offset-2&#8243;][vc_column_text]<\/p>\n<h5>Permita a los clientes realizar transacciones con confianza.<\/h5>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 seesaw\u00bb][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbabove wistia_embed\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-111750\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Authentication-Authorization-seesaw-1.jpg\" alt=\"Autenticaci\u00f3n y autorizaci\u00f3n\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Authentication-Authorization-seesaw-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Authentication-Authorization-seesaw-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Authentication-Authorization-seesaw-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Authentication-Authorization-seesaw-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00bb7\/12&#8243; el_class=\u00bbbelow-right\u00bb][vc_column_text el_class=\u00bbdark\u00bb]<\/p>\n<h4>Authentication &amp; authorization<\/h4>\n<p>Incluya una experiencia segura de <a href=\"https:\/\/www.cyberark.com\/es\/products\/single-sign-on\/\">Single Sign-On<\/a> y controle el acceso con pol\u00edticas detalladas.[\/vc_column_text][vc_btn title=\u00bbM\u00e1s informaci\u00f3n\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fproducts%2Fauthentication-authorization%2F|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 seesaw cyb-reverse\u00bb][vc_column width=\u00bb7\/12&#8243; el_class=\u00bbbelow-left\u00bb][vc_column_text el_class=\u00bbdark\u00bb]<\/p>\n<h4>Multi-Factor Authentication<\/h4>\n<p>S\u00f3lida autenticaci\u00f3n con IA, consciente de los riesgos y sin contrase\u00f1as.[\/vc_column_text][vc_btn title=\u00bbM\u00e1s informaci\u00f3n\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fproducts%2Fmulti-factor-authentication%2F|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbabove\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-111774\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Multi-factor-Authentication-seesaw-1.jpg\" alt=\"Autenticaci\u00f3n multifactor\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Multi-factor-Authentication-seesaw-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Multi-factor-Authentication-seesaw-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Multi-factor-Authentication-seesaw-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Multi-factor-Authentication-seesaw-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 seesaw\u00bb][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbabove\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-109307\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/DirectoryUserManagement-seesaw.jpg\" alt=\"Gesti\u00f3n de directorios y usuarios\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/DirectoryUserManagement-seesaw.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/DirectoryUserManagement-seesaw-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/DirectoryUserManagement-seesaw-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/DirectoryUserManagement-seesaw-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00bb7\/12&#8243; el_class=\u00bbbelow-right\u00bb][vc_column_text el_class=\u00bbdark\u00bb]<\/p>\n<h4>Directory and user management<\/h4>\n<p>Simplifique el registro y la gesti\u00f3n de la identidad para sus clientes.[\/vc_column_text][vc_btn title=\u00bbM\u00e1s informaci\u00f3n\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fproducts%2Fdirectory-user-management%2F|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 seesaw cyb-reverse\u00bb][vc_column width=\u00bb7\/12&#8243; el_class=\u00bbbelow-left\u00bb][vc_column_text el_class=\u00bbdark\u00bb]<\/p>\n<h4>Developer tools<\/h4>\n<p>Un conjunto completo de recursos, gu\u00edas y herramientas para ayudar a los desarrolladores a integrar la <a href=\"https:\/\/www.cyberark.com\/es\/products\/\">Plataforma de Seguridad de la Identidad de CyberArk<\/a>.[\/vc_column_text][vc_btn title=\u00bbM\u00e1s informaci\u00f3n\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fproducts%2Fdeveloper-tools%2F|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbabove\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-109315\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Developer-Tools-seesaw.jpg\" alt=\"Herramientas para desarrolladores\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Developer-Tools-seesaw.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Developer-Tools-seesaw-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Developer-Tools-seesaw-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Developer-Tools-seesaw-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"templatera_shortcode\"><div data-vc-full-width=\"true\" data-vc-full-width-temp=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_full_width_resource\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_title\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h5 style=\"text-align: center;\">Identity security: centrada en<br \/>\ncontroles de privilegios inteligentes<\/h5>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section5_container\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_center   new_hpstyle_section5_gart_img\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/11\/gartner-square-cta.jpg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"gartner-square-cta\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/11\/gartner-square-cta.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/11\/gartner-square-cta-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/11\/gartner-square-cta-100x100.jpg 100w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>CyberArk es un l\u00edder en el Gartner\u00ae Magic Quadrant\u2122 2022 para la Gesti\u00f3n del Acceso.<\/h4>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_btn3-container  cybv2-button-solid cyb-button-hpstyle_section5 vc_btn3-inline\"  >\n\t<a class=\"vc_btn3-color-grey\" href=\"https:\/\/www.cyberark.com\/es\/gartner-magic-quadrant-for-access-management\/\" title=\"\">Lea el Informe<\/a><\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/a><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/div>[\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 cybv2-pad-top overview-hz sub-3&#8243;][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbhead-box\u00bb][vc_column_text]<\/p>\n<h3>Una seguridad que le funcione<\/h3>\n<p>Estas son solo algunas formas m\u00e1s en las que podemos ayudarle a avanzar sin miedo en un mundo digital.[\/vc_column_text][\/vc_column][vc_column width=\u00bb2\/3&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_row_inner equal_height=\u00bbyes\u00bb][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb5\/12&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-109323\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Enable-the-Digital-Business-icon-1.svg\" alt=\"\u00edcono Habilite el negocio digital\" \/>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1695967928971{padding-bottom: 20px !important;}\u00bb]<\/p>\n<h4>Habilite el negocio digital<\/h4>\n<p>Proteja el acceso a las aplicaciones empresariales para identidades humanas y de m\u00e1quina.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/solutions\/digital-business-transformation\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb5\/12&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-109331\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Secure-DevOps-Cloud-1.svg\" alt=\"\u00edcono Proteja DevOps y la nube\" \/>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1611856995498{padding-bottom: 20px !important;}\u00bb]<\/p>\n<h4>Proteja DevOps y la nube<\/h4>\n<p>Proteja el acceso de las identidades de m\u00e1quinas en los procesos de DevOps.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/solutions\/devsecops-cloud-native-apps\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb5\/12&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-109339\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Drive-Operational-Efficiencies.svg\" alt=\"\u00edcono Impulse la eficiencia operativa\" \/>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1695968875589{padding-bottom: 20px !important;}\u00bb]<\/p>\n<h4>Impulse la eficiencia operativa<\/h4>\n<p>Reduzca la complejidad y la carga de trabajo de los equipos de TI a la vez que mejora la protecci\u00f3n del negocio.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/solutions\/operational-efficiencies\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 cybv2-pad cybv2-oval-left-background hv-cta-list\u00bb css=\u00bb.vc_custom_1611885567532{background-color: #ff7600 !important;}\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbimg-box\u00bb css=\u00bb.vc_custom_1612379041757{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Customer-Identities-highvalueCTA.jpg?id=111993) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbstat-column\u00bb][vc_row_inner][vc_column_inner el_class=\u00bbhead-box\u00bb width=\u00bb3\/4&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text]<\/p>\n<h2>Obtenga una prueba gratuita de 30 d\u00edas<\/h2>\n<p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bblist-box\u00bb width=\u00bb11\/12&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=\u00bbbenefits-content-icon\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblist-text\u00bb]Provide secure Single Sign-On access to your apps and services[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bblist-box\u00bb width=\u00bb11\/12&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=\u00bbbenefits-content-icon\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblist-text\u00bb]Obtenga una s\u00f3lida autenticaci\u00f3n con IA, consciente de los riesgos y sin contrase\u00f1as[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bblist-box\u00bb width=\u00bb11\/12&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=\u00bbbenefits-content-icon\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblist-text\u00bb]Reduzca los gastos de TI con las funciones de autoservicio[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bblist-box\u00bb width=\u00bb11\/12&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_btn title=\u00bbObtenga una demostraci\u00f3n\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb css=\u00bb\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Ftry-buy%2Fworkforce-access-solutions-demo%2F|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00bbcyb-pad cybv2&#8243;][vc_column][vc_column_text css=\u00bb\u00bb el_class=\u00bbtiny\u00bb]CyberArk Has Patent Rights Relating To This Technology &#8211; <a href=\"https:\/\/www.cyberark.com\/es\/patents\/\">https:\/\/www.cyberark.com\/patents<\/a>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":53045,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27773],"class_list":["post-115207","page","type-page","status-publish","hentry","product_category-access"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Customer Identity and Access Management (CIAM) | CyberArk<\/title>\n<meta name=\"description\" content=\"Abra sus sitios web y aplicaciones a los clientes de forma segura con las soluciones CyberArk Customer Identity.\u00a0 Deje que los clientes entren y mantenga a los atacantes fuera.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/products\/customer-identity\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Customer Identity\" \/>\n<meta property=\"og:description\" content=\"Abra sus sitios web y aplicaciones a los clientes de forma segura con las soluciones CyberArk Customer Identity.\u00a0 Deje que los clientes entren y mantenga a los atacantes fuera.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/products\/customer-identity\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-24T08:06:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/products\/customer-identity\/\",\"url\":\"https:\/\/www.cyberark.com\/products\/customer-identity\/\",\"name\":\"Customer Identity and Access Management (CIAM) | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/customer-identity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/customer-identity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/SeamlessIntegration-Overview-Vertical-Customer-Identities.svg\",\"datePublished\":\"2021-02-03T23:07:38+00:00\",\"dateModified\":\"2025-12-24T08:06:09+00:00\",\"description\":\"Abra sus sitios web y aplicaciones a los clientes de forma segura con las soluciones CyberArk Customer Identity.\u00a0 Deje que los clientes entren y mantenga a los atacantes fuera.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/customer-identity\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/products\/customer-identity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/products\/customer-identity\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/SeamlessIntegration-Overview-Vertical-Customer-Identities.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/SeamlessIntegration-Overview-Vertical-Customer-Identities.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/products\/customer-identity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Productos\",\"item\":\"https:\/\/www.cyberark.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Customer Identity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Customer Identity and Access Management (CIAM) | CyberArk","description":"Abra sus sitios web y aplicaciones a los clientes de forma segura con las soluciones CyberArk Customer Identity.\u00a0 Deje que los clientes entren y mantenga a los atacantes fuera.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/products\/customer-identity\/","og_locale":"es_ES","og_type":"article","og_title":"Customer Identity","og_description":"Abra sus sitios web y aplicaciones a los clientes de forma segura con las soluciones CyberArk Customer Identity.\u00a0 Deje que los clientes entren y mantenga a los atacantes fuera.","og_url":"https:\/\/www.cyberark.com\/products\/customer-identity\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-12-24T08:06:09+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/products\/customer-identity\/","url":"https:\/\/www.cyberark.com\/products\/customer-identity\/","name":"Customer Identity and Access Management (CIAM) | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/products\/customer-identity\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/products\/customer-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/SeamlessIntegration-Overview-Vertical-Customer-Identities.svg","datePublished":"2021-02-03T23:07:38+00:00","dateModified":"2025-12-24T08:06:09+00:00","description":"Abra sus sitios web y aplicaciones a los clientes de forma segura con las soluciones CyberArk Customer Identity.\u00a0 Deje que los clientes entren y mantenga a los atacantes fuera.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/products\/customer-identity\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/products\/customer-identity\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/products\/customer-identity\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/SeamlessIntegration-Overview-Vertical-Customer-Identities.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/SeamlessIntegration-Overview-Vertical-Customer-Identities.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/products\/customer-identity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Productos","item":"https:\/\/www.cyberark.com\/products\/"},{"@type":"ListItem","position":3,"name":"Customer Identity"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/115207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/comments?post=115207"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/115207\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/53045"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/media?parent=115207"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/product_category?post=115207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}