{"id":115214,"date":"2021-02-03T18:25:43","date_gmt":"2021-02-03T23:25:43","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/credential-providers\/"},"modified":"2025-11-25T15:12:01","modified_gmt":"2025-11-25T20:12:01","slug":"credential-providers","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/es\/products\/credential-providers\/","title":{"rendered":"Credential Providers"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row el_class=\u00bbcybv2 int-hero\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-1&#8243;][vc_column_text el_class=\u00bbcyb-breadcrumb\u00bb]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/es\/products\/secrets-management\/\">Volver a Gesti\u00f3n de secretos<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>Credential Providers<\/h1>\n<p><\/p>\n<h2>A los desarrolladores y a los equipos de seguridad les encanta lo f\u00e1cil que es eliminar las credenciales incrustadas en el c\u00f3digo en una amplia gama de aplicaciones mediante integraciones listas para usar.<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00bbSolicitar una demostraci\u00f3n\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ftry-buy%2Fsecrets-manager-enterprise%2F|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-2&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-110308 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg\" alt=\"\" width=\"730\" height=\"530\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg 730w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero-300x218.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero-150x109.jpg 150w\" sizes=\"auto, (max-width: 730px) 100vw, 730px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcybv2 cybv2_sticky_nav\u00bb css=\u00bb.vc_custom_1614201964540{background-color: #f7f7f7 !important;}\u00bb][vc_column width=\u00bb1\/4&#8243;][vc_column_text el_class=\u00bbsticky-nav-title\u00bb]<\/p>\n<h3><i class=\"fas fa-long-arrow-alt-up\"><\/i>Credential Providers<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243;][vc_raw_html el_class=\u00bbsticky-nav-buttons\u00bb]PCEtLSBBZGQgbGkgZm9yIHNlY3Rpb24gZGF0YS1zY3JvbGwtY2xhc3MgaXMgd2hlcmUgeW91IHB1dCB0aGUgc2VjdGlvbiBjbGFzcyB5b3Ugd2FudCB0byBzY3JvbGwgdG8gLS0+PGJyPjx1bD4NCiAJPGxpIGRhdGEtc2Nyb2xsLWNsYXNzPSJzdWItMSI+VmVudGFqYXM8L2xpPg0KIAk8bGkgZGF0YS1zY3JvbGwtY2xhc3M9InN1Yi0yIj5JbnRlZ3JhY2lvbmVzPC9saT4NCiAJPGxpIGRhdGEtc2Nyb2xsLWNsYXNzPSJzdWItMyI+RnVuY2lvbmFsaWRhZGVzPC9saT4NCiAJPGxpIGRhdGEtc2Nyb2xsLWNsYXNzPSJzdWItNCI+Q8OzbW8gZnVuY2lvbmE8L2xpPg0KPC91bD4=[\/vc_raw_html][\/vc_column][vc_column width=\u00bb1\/4&#8243;][vc_btn title=\u00bbSolicitar una demostraci\u00f3n\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ftry-buy%2Fsecrets-manager-enterprise%2F|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbsubnav-dropdown\u00bb][vc_column_text el_class=\u00bbsticky-nav-title\u00bb]<\/p>\n<h5 style=\"text-align: right;\">Saltar a<i class=\"fas fa-chevron-circle-down\"><\/i><\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2-pad-top overview-vt sub-1&#8243; css=\u00bb.vc_custom_1617034769910{background-color: #f7f7f7 !important;}\u00bb][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbhead-box\u00bb][vc_column_text]<\/p>\n<h3>Permita que las aplicaciones accedan de forma segura a los secretos que necesitan<\/h3>\n<p>Administre, rote y proteja los secretos utilizados por las aplicaciones comerciales (COTS), RPA, Java, .Net, scripts de automatizaci\u00f3n y otras identidades no humanas.[\/vc_column_text][\/vc_column][vc_column width=\u00bb5\/12&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/High-Performance.svg\"><img decoding=\"async\" class=\"alignnone wp-image-110316\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/High-Performance.svg\" alt=\"\" width=\"94\" \/><\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Alto rendimiento<\/h4>\n<p>Satisface las necesidades de las aplicaciones m\u00e1s exigentes y de misi\u00f3n cr\u00edtica de la empresa.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Strong-Authentication.svg\"><img decoding=\"async\" class=\"alignnone wp-image-110324\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Strong-Authentication.svg\" alt=\"\" width=\"94\" \/><\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Autenticaci\u00f3n s\u00f3lida<\/h4>\n<p>Verifica el origen de cualquier aplicaci\u00f3n que solicite una credencial.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/No-Downtime.svg\"><img decoding=\"async\" class=\"alignnone wp-image-110332\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/No-Downtime.svg\" alt=\"\" width=\"94\" \/><\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Sin tiempo de inactividad<\/h4>\n<p>Rota las credenciales seg\u00fan las pol\u00edticas mientras las aplicaciones siguen ejecut\u00e1ndose.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 customer-stories cybv2-pad\u00bb][vc_column width=\u00bb2\/3&#8243;][vc_column_text el_class=\u00bbpb-4&#8243;]<\/p>\n<h3>Simplificaci\u00f3n de la protecci\u00f3n de aplicaciones y software COTS con cientos de integraciones listas para usar<\/h3>\n<p><\/p>\n<h6>Los clientes de CyberArk utilizan CyberArk Secrets Manager y la plataforma de Seguridad de la Identidad para proteger todas sus identidades humanas y no humanas.<\/h6>\n<p>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/?post_type=customer_story&#038;p=128197\">Ver m\u00e1s clientes<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cyb-pad-btm featured-video-overflow\u00bb css=\u00bb.vc_custom_1671212795028{background-color: #ffffff !important;}\u00bb][vc_column width=\u00bb1\/2&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"border-radius alignnone wp-image-181894 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/medical-staff-image.jpg\" alt=\"\" width=\"640\" height=\"440\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/medical-staff-image.jpg 640w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/medical-staff-image-300x206.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/medical-staff-image-150x103.jpg 150w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00bb5\/12&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_column_text el_class=\u00bbpb-4&#8243;]<span class=\"large-quote\">\u201cLa extensibilidad de CyberArk Secrets Manager ha supuesto una gran ventaja para nosotros. Las integraciones listas para usar con software de terceros han simplificado la forma de integrar de manera segura estas aplicaciones con el resto de nuestra cartera, lo cual es fant\u00e1stico\u00bb.<\/span><\/p>\n<p><strong>Responsable de seguridad de la informaci\u00f3n de un destacado hospital de Estados Unidos<\/strong>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/top-us-hospital\/\">Consulte el caso pr\u00e1ctico<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 cybv2-pad-btm\u00bb][vc_column][vc_raw_html]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0iY3VzdG9tZXJfc3RvcnkiIHBvc3RzX3Blcl9wYWdlPSI0IiBjb2x1bW5zX2xhcmdlPSIzIiBzaG93X2F1dGhvcj0iZmFsc2UiIHNob3dfZXhjZXJwdD0iZmFsc2UiIHBvczFfaWQ9IjEzODQzNCIgcG9zMl9pZD0iMTI4MTQyIiBwb3MzX2lkPSIxODIzNTMiIHBvczRfaWQ9IjEzNTQ3NiJd[\/vc_raw_html][\/vc_column][\/vc_row][vc_row el_class=\u00bbsub-2&#8243;][vc_column]<div class=\"templatera_shortcode\"><div data-vc-full-width=\"true\" data-vc-full-width-temp=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_logos vc_custom_1705518984428 vc_row-has-fill\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section7_carou_text extra-space link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4 style=\"text-align: center;\">CyberArk Marketplace<\/h4>\n<p style=\"text-align: center; font-weight: 300; padding-bottom: 0px;\">Navegue por nuestro Marketplace en l\u00ednea para encontrar integraciones.<br \/>\n<a style=\"display: inline-block; margin-top: 15px;\" href=\"https:\/\/cyberark-customers.force.com\/mplace\/s\/\" target=\"_blank\" rel=\"noopener noreferrer\">Visite Marketplace<i class=\"fas fa-external-link-alt\"><\/i><\/a><\/p>\n<p><style>\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69f5871a85a4f .sp-lcp-item img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69f5871a85a4f .sp-lcp-item:hover img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv#sp-logo-carousel-pro69f5871a85a4f.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69f5871a85a4f.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\tpadding: 0px;\n\t\t\t\tbackground: rgba(10,10,10,0.01);\n\t\t\t}\n\t\t\tdiv#sp-logo-carousel-pro69f5871a85a4f.sp-logo-carousel-pro-area .sp-lcp-item:hover .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69f5871a85a4f.sp-logo-carousel-pro-area .sp-lcp-item:hover.sp-lcp-item-border{\n\t\t\t\tbackground: rgba(0,0,0,0.01);\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section.layout-carousel div#sp-logo-carousel-pro69f5871a85a4f .slick-slide {\n\t\t\t\tfloat: none !important;\n\t\t\t\tdisplay: inline-block;\n\t\t\t\tvertical-align: middle;\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69f5871a85a4f [class*=\"lcp-col\"]{\n\t\t\t\tvertical-align: middle;\n\t\t\t\tmargin: 0;\n\t\t\t\tbox-shadow: none;\n\t\t\t}.sp-logo-carousel-pro-section #sp-logo-carousel-pro69f5871a85a4f .sp-lcpro-readmore-area{\n\t\t\t\t\ttext-align: center;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69f5871a85a4f .sp-lcpro-readmore-area .sp-lcpro-readmore{\n\t\t\t\t\tbackground: transparent;\n\t\t\t\t\tcolor: #05b3c6;\n\t\t\t\t\tpadding: 5px 13px;\n\t\t\t\t\tmargin-bottom: 18px;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tborder-radius: 2px;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t\tfont-size: 14px;font-family: Ubuntu;\n\t\t\t\t\t\tfont-style: normal; font-weight: 400;line-height:20px;\n\t\t\t\t\tletter-spacing: normal;\n\t\t\t\t\ttext-transform: none;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69f5871a85a4f .sp-lcpro-readmore-area .sp-lcpro-readmore:hover{\n\t\t\t\t\tbackground: #05b3c6;\n\t\t\t\t\tcolor: #ffffff;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t}div.sp-logo-section-id-69f5871a85a4f .bx-viewport.bx-viewport { height: auto !important; }\n\t\t\t\tdiv#sp-logo-carousel-pro69f5871a85a4f.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69f5871a85a4f.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\t\tborder-radius: 100%;\n\t\t\t\t\tz-index: 1;\n\t\t\t\t\toverflow: hidden;\n\t\t\t\t}\n\t\t\t\t\tdiv#sp-logo-carousel-pro69f5871a85a4f.sp-logo-carousel-pro-area .sp-lcp-item{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tfloat: none !important;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tvertical-align: middle;}\n\t\t\t\tdiv#sp-logo-carousel-pro69f5871a85a4f.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69f5871a85a4f.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\t\t-webkit-box-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\t-moz-box-shadow:: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tbox-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tmargin-top: 6px;\n\t\t\t\t\tmargin-bottom:6px;\n\t\t\t\t}\n\t\t\t\tdiv#sp-logo-carousel-pro69f5871a85a4f.sp-logo-carousel-pro-area .sp-lcp-item:hover .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69f5871a85a4f.sp-logo-carousel-pro-area .sp-lcp-item:hover.sp-lcp-item-border{\n\t\t\t\t\t-webkit-box-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\t-moz-box-shadow:: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tbox-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-carousel.lcp_horizontal div#sp-logo-carousel-pro69f5871a85a4f.sp-logo-carousel-pro-area .slick-list{\n\t\t\t\t\tmargin-left: 0;\n\t\t\t\t\tmargin-right: 0;\n\t\t\t\t}\n\t\t\t\tdiv#sp-logo-carousel-pro69f5871a85a4f.sp-logo-carousel-pro-area [class*=\"lcp-col-\"]{\n\t\t\t\t\tmargin-bottom: 6px;\n\t\t\t\t}div.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69f5871a85a4f [class*=\"lcp-col\"]{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tbox-shadow: none;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69f5871a85a4f.sp-logo-carousel-pro-area [class*=\"lcp-col\"],\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69f5871a85a4f.sp-logo-carousel-pro-area [class*=\"lcp-col\"]{\n\t\t\t\t\tpadding-left: 10px;\n\t\t\t\t\tpadding-right: 10px;\n\t\t\t\t\tpadding-bottom: 20px;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69f5871a85a4f.sp-logo-carousel-pro-area.lcp-container,\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69f5871a85a4f.sp-logo-carousel-pro-area.lcp-container{\n\t\t\t\t\tmargin-left: -10px;\n\t\t\t\t\tmargin-right: -10px;\n\t\t\t\t\tmargin-bottom: -20px;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\t.sp-logo-carousel-pro-section.sp-lcpro-id-105685{\n\t\t\t\t\tposition: relative;\n\t\t\t\t}\n\t\t\t\t#lcp-preloader-105685{\n\t\t\t\t\tposition: absolute;\n\t\t\t\t\tleft: 0;\n\t\t\t\t\ttop: 0;\n\t\t\t\t\theight: 100%;\n\t\t\t\t\twidth: 100%;\n\t\t\t\t\ttext-align: center;\n\t\t\t\t\tdisplay: flex;\n\t\t\t\t\talign-items: center;\n\t\t\t\t\tjustify-content: center;\n\t\t\t\t\tbackground: #fff;\n\t\t\t\t\tz-index: 9999;\n\t\t\t\t}\n\t\t\t\t<\/style><div class=\"sp-logo-carousel-pro-section layout-carousel sp-lcpro-id-105685 sp-logo-section-id-69f5871a85a4f nav_position_top_right title_position_bottom sp-lcpro-clear lcp_horizontal\"><div id=\"lcp-preloader-105685\" class=\"sp-logo-carousel-pro-preloader\"><img decoding=\"async\" src=\" https:\/\/www.cyberark.com\/wp-content\/plugins\/logo-carousel-pro\/public\/assets\/css\/images\/bx_loader.gif \"\/><\/div><div id=\"sp-logo-carousel-pro69f5871a85a4f\" class=\"sp-logo-carousel-pro-area lcp-preloader mode_ticker \" data-minslide=\"1\" data-maxslide=\"1\" data-slidewidth=\"\" data-slidemargin=\"20\" data-speed=\"30000\" data-mode=\"horizontal\" data-direction=\"next\" data-tickerhover=\"false\"><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/aws.png\" alt=\"aws logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/crowdstrike.png\" alt=\"crowdstrike logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Google.png\" alt=\"Google logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/microsoft-logo.png\" alt=\"Microsoft logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/paloalto.png\" alt=\"paloalto logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Proofpoint.png\" alt=\"Proofpoint logo\" ><\/div><\/div><\/div><\/div><\/div><br \/>\n<style>\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69f5871a8a6db .sp-lcp-item img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69f5871a8a6db .sp-lcp-item:hover img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv#sp-logo-carousel-pro69f5871a8a6db.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69f5871a8a6db.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\tpadding: 0px;\n\t\t\t\tbackground: rgba(10,10,10,0.01);\n\t\t\t}\n\t\t\tdiv#sp-logo-carousel-pro69f5871a8a6db.sp-logo-carousel-pro-area .sp-lcp-item:hover .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69f5871a8a6db.sp-logo-carousel-pro-area .sp-lcp-item:hover.sp-lcp-item-border{\n\t\t\t\tbackground: rgba(0,0,0,0.01);\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section.layout-carousel div#sp-logo-carousel-pro69f5871a8a6db .slick-slide {\n\t\t\t\tfloat: none !important;\n\t\t\t\tdisplay: inline-block;\n\t\t\t\tvertical-align: middle;\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69f5871a8a6db [class*=\"lcp-col\"]{\n\t\t\t\tvertical-align: middle;\n\t\t\t\tmargin: 0;\n\t\t\t\tbox-shadow: none;\n\t\t\t}\n\t\t\t\tdiv.sp-logo-section-id-69f5871a8a6db .bx-viewport{\n\t\t\t\tdirection: ltr;\n\t\t\t\t}.sp-logo-carousel-pro-section #sp-logo-carousel-pro69f5871a8a6db .sp-lcpro-readmore-area{\n\t\t\t\t\ttext-align: center;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69f5871a8a6db .sp-lcpro-readmore-area .sp-lcpro-readmore{\n\t\t\t\t\tbackground: transparent;\n\t\t\t\t\tcolor: #05b3c6;\n\t\t\t\t\tpadding: 5px 13px;\n\t\t\t\t\tmargin-bottom: 18px;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tborder-radius: 2px;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t\tfont-size: 14px;font-family: Ubuntu;\n\t\t\t\t\t\tfont-style: normal; font-weight: 400;line-height:20px;\n\t\t\t\t\tletter-spacing: normal;\n\t\t\t\t\ttext-transform: none;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69f5871a8a6db .sp-lcpro-readmore-area .sp-lcpro-readmore:hover{\n\t\t\t\t\tbackground: #05b3c6;\n\t\t\t\t\tcolor: #ffffff;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t}div.sp-logo-section-id-69f5871a8a6db .bx-viewport.bx-viewport { height: auto !important; }\n\t\t\t\tdiv#sp-logo-carousel-pro69f5871a8a6db.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69f5871a8a6db.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\t\tborder-radius: 100%;\n\t\t\t\t\tz-index: 1;\n\t\t\t\t\toverflow: hidden;\n\t\t\t\t}\n\t\t\t\t\tdiv#sp-logo-carousel-pro69f5871a8a6db.sp-logo-carousel-pro-area .sp-lcp-item{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tfloat: none !important;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tvertical-align: middle;}\n\t\t\t\tdiv#sp-logo-carousel-pro69f5871a8a6db.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69f5871a8a6db.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\t\t-webkit-box-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\t-moz-box-shadow:: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tbox-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tmargin-top: 6px;\n\t\t\t\t\tmargin-bottom:6px;\n\t\t\t\t}\n\t\t\t\tdiv#sp-logo-carousel-pro69f5871a8a6db.sp-logo-carousel-pro-area .sp-lcp-item:hover .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69f5871a8a6db.sp-logo-carousel-pro-area .sp-lcp-item:hover.sp-lcp-item-border{\n\t\t\t\t\t-webkit-box-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\t-moz-box-shadow:: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tbox-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-carousel.lcp_horizontal div#sp-logo-carousel-pro69f5871a8a6db.sp-logo-carousel-pro-area .slick-list{\n\t\t\t\t\tmargin-left: 0;\n\t\t\t\t\tmargin-right: 0;\n\t\t\t\t}\n\t\t\t\tdiv#sp-logo-carousel-pro69f5871a8a6db.sp-logo-carousel-pro-area [class*=\"lcp-col-\"]{\n\t\t\t\t\tmargin-bottom: 6px;\n\t\t\t\t}div.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69f5871a8a6db [class*=\"lcp-col\"]{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tbox-shadow: none;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69f5871a8a6db.sp-logo-carousel-pro-area [class*=\"lcp-col\"],\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69f5871a8a6db.sp-logo-carousel-pro-area [class*=\"lcp-col\"]{\n\t\t\t\t\tpadding-left: 10px;\n\t\t\t\t\tpadding-right: 10px;\n\t\t\t\t\tpadding-bottom: 20px;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69f5871a8a6db.sp-logo-carousel-pro-area.lcp-container,\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69f5871a8a6db.sp-logo-carousel-pro-area.lcp-container{\n\t\t\t\t\tmargin-left: -10px;\n\t\t\t\t\tmargin-right: -10px;\n\t\t\t\t\tmargin-bottom: -20px;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\t.sp-logo-carousel-pro-section.sp-lcpro-id-105741{\n\t\t\t\t\tposition: relative;\n\t\t\t\t}\n\t\t\t\t#lcp-preloader-105741{\n\t\t\t\t\tposition: absolute;\n\t\t\t\t\tleft: 0;\n\t\t\t\t\ttop: 0;\n\t\t\t\t\theight: 100%;\n\t\t\t\t\twidth: 100%;\n\t\t\t\t\ttext-align: center;\n\t\t\t\t\tdisplay: flex;\n\t\t\t\t\talign-items: center;\n\t\t\t\t\tjustify-content: center;\n\t\t\t\t\tbackground: #fff;\n\t\t\t\t\tz-index: 9999;\n\t\t\t\t}\n\t\t\t\t<\/style><div class=\"sp-logo-carousel-pro-section layout-carousel sp-lcpro-id-105741 sp-logo-section-id-69f5871a8a6db nav_position_top_right title_position_bottom sp-lcpro-clear lcp_horizontal\"><div id=\"sp-logo-carousel-pro69f5871a8a6db\" class=\"sp-logo-carousel-pro-area lcp-preloader mode_ticker \" data-minslide=\"1\" data-maxslide=\"1\" data-slidewidth=\"\" data-slidemargin=\"20\" data-speed=\"30000\" data-mode=\"horizontal\" data-direction=\"prev\" data-tickerhover=\"false\"><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/RedHat.png\" alt=\"RedHat Logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Sailpoint.png\" alt=\"Sailpoint logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/sap.png\" alt=\"sap logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Servicenow.png\" alt=\"Servicenow logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Tenable.png\" alt=\"Tenable\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/UIPath.png\" alt=\"UiPath\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/vmware-1.png\" alt=\"vmware logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/vmware-tanzu.png\" alt=\"vmware-tanzu logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Workday.png\" alt=\"Workday logo\" ><\/div><\/div><\/div><\/div><\/div>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div><\/div><\/a><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><div data-vc-full-width=\"true\" data-vc-full-width-temp=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid vc_custom_1611095281474 vc_row-has-fill\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<style>\r\n.page-id-105338 #hero-logo-container{\r\n    display: none;\r\n}\r\n\/* General *\/\r\n.cybv2 .link-arrow-right a {\r\n\tmargin-right: 6px;\r\n}\r\n.cybv2 h4 {\r\n\tline-height: 1.3em;\r\n}\r\n.cybv2 a.big_link {\r\n\tmargin: 0;\r\n}\r\n@media only screen and (max-device-width: 767px) {\r\n.cybv2 h2 {\r\n\tfont-size: 40px;\r\n}\r\n}\r\n.page-id-105338 .vc_btn3-color-grey{\r\n    font-weight: 600 !important;\r\n}\r\n\/* End General *\/\r\n\r\n\/* Section 7 *\/\r\n.cybv2.cybv2_logos h4 {\r\n\tcolor: #ffffff !important;\r\n}\r\n.cybv2.cybv2_logos .extra-space {\r\n\tmargin-bottom: 50px;\r\n}\r\n.cybv2_logos {\r\n    padding: 75px 100px 90px 100px;\r\n}\r\n.new_hpstyle_section7_carou_text p {\r\n    font-size: 20px;\r\n    color: #fff;\r\n    padding-bottom: 60px;\r\n}\r\n.new_hpstyle_section7_carousel1 {\r\n    padding: 50px 0 30px 500px;\r\n}\r\n.new_hpstyle_section7_carousel2 {\r\n    padding: 20px 500px 30px 0;\r\n}\r\n.cybv2_logos .sp-logo-carousel-pro-section.sp-lcpro-id-105685{\r\n    margin-bottom: 20px;\r\n}\r\n.cybv2_logos .link-arrow-right p a,\r\n.cybv2_logos .link-arrow-right p i{\r\n    color: #D4EB33 !important;\r\n}\r\n\r\n.cybv2_logos .link-arrow-right .wpb_wrapper p a:hover,\r\n.cybv2_logos .link-arrow-right .wpb_wrapper p a:hover i{\r\n    color: #F3FFA0 !important;\r\n}\r\n@media only screen and (max-width: 1024px) {\r\n.new_hpstyle_section7_carousel1 {\r\n    padding: 50px 0 30px 300px;\r\n}\r\n.new_hpstyle_section7_carousel2 {\r\n    padding: 20px 300px 30px 0;\r\n}\r\n}\r\n@media only screen and (max-width: 767px) {\r\n.cybv2.cybv2_logos .extra-space {\r\n\tmargin-bottom: 30px;\r\n}\r\n.cybv2_logos .sp-logo-carousel-pro-area .sp-lcp-item {\r\n\tmax-width: 82px;\r\n\tmargin-right: 10px !important;\r\n}\r\n.cybv2_logos {\r\n\tpadding: 40px 100px 50px 100px;\r\n}\r\n}\r\n\/* End section 7 *\/\r\n\r\n<\/style>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/div>[\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2-pad-top cybv2 cybv2-background-oval tour sub-3&#8243;][vc_column][vc_row_inner el_class=\u00bbcyb-center\u00bb][vc_column_inner el_class=\u00bbcyb-pad-btm\u00bb][vc_column_text el_class=\u00bbleft-mobile\u00bb]<\/p>\n<h3>Recupere de forma segura las credenciales en tiempo de ejecuci\u00f3n<\/h3>\n<p>Evite la exposici\u00f3n de credenciales incrustadas en el c\u00f3digo en aplicaciones est\u00e1ticas de misi\u00f3n cr\u00edtica.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=\u00bbsquare\u00bb active_section=\u00bb1&#8243; css_animation=\u00bbnone\u00bb][vc_tta_section i_position=\u00bbright\u00bb i_icon_fontawesome=\u00bbfas fa-chevron-circle-down\u00bb add_icon=\u00bbtrue\u00bb title=\u00bbAcceso seguro a credenciales\u00bb tab_id=\u00bbtelescopes6a1f-7911&#8243;][vc_row_inner el_class=\u00bbcybv2&#8243;][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Proteja el acceso a las credenciales<\/h4>\n<p>Las contrase\u00f1as almacenadas en CyberArk Digital Vault se pueden recuperar en Credential Provider y, a continuaci\u00f3n, se puede acceder a ellas mediante aplicaciones remotas autorizadas.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-109489 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-1.png\" alt=\"Acceso seguro a credenciales\" width=\"665\" height=\"451\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00bbright\u00bb i_icon_fontawesome=\u00bbfas fa-chevron-circle-down\u00bb add_icon=\u00bbtrue\u00bb title=\u00bbAcceso controlado\u00bb tab_id=\u00bb1607454710346-6cbd482c-157b6a1f-7911&#8243;][vc_row_inner el_class=\u00bbcybv2&#8243;][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Acceso controlado<\/h4>\n<p>El <a href=\"https:\/\/www.cyberark.com\/es\/what-is\/least-privilege\/\">m\u00ednimo privilegio<\/a> permite a cada aplicaci\u00f3n recibir la contrase\u00f1a espec\u00edfica que ha solicitado y nada m\u00e1s.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-111782 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-CredentialProviders-2.png\" alt=\"Acceso controlado\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-CredentialProviders-2.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-CredentialProviders-2-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-CredentialProviders-2-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00bbright\u00bb i_icon_fontawesome=\u00bbfas fa-chevron-circle-down\u00bb add_icon=\u00bbtrue\u00bb title=\u00bbAutenticaci\u00f3n s\u00f3lida\u00bb tab_id=\u00bb1607454768235-0288b534-07116a1f-7911&#8243;][vc_row_inner el_class=\u00bbcybv2&#8243;][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Autenticaci\u00f3n s\u00f3lida<\/h4>\n<p>Utiliza las caracter\u00edsticas nativas de las cargas de trabajo de las aplicaciones para aplicar una autenticaci\u00f3n s\u00f3lida a las aplicaciones y eliminar el \u00absecreto cero\u00bb.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-109505 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-3.png\" alt=\"Autenticaci\u00f3n s\u00f3lida\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-3.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-3-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-3-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00bbright\u00bb i_icon_fontawesome=\u00bbfas fa-chevron-circle-down\u00bb add_icon=\u00bbtrue\u00bb title=\u00bbAlta fiabilidad\u00bb tab_id=\u00bb1607454800369-5ed63486-a9726a1f-7911&#8243;][vc_row_inner el_class=\u00bbcybv2&#8243;][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Alta fiabilidad<\/h4>\n<p>Las credenciales almacenadas en cach\u00e9 localmente garantizan una alta disponibilidad, la continuidad del negocio y el m\u00e1ximo rendimiento para las aplicaciones de misi\u00f3n cr\u00edtica de la empresa.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-109513 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-4.png\" alt=\"Alta fiabilidad\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-4.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-4-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-4-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00bbright\u00bb i_icon_fontawesome=\u00bbfas fa-chevron-circle-up\u00bb add_icon=\u00bbtrue\u00bb title=\u00bbAuditor\u00edas completas\u00bb tab_id=\u00bb1607454820130-080c61a7-b88f6a1f-7911&#8243;][vc_row_inner el_class=\u00bbcybv2&#8243;][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Auditor\u00edas completas<\/h4>\n<p>Los registros de auditor\u00eda rastrean el acceso a las contrase\u00f1as, lo que proporciona una completa supervisi\u00f3n y rendici\u00f3n de cuentas de cada contrase\u00f1a solicitada por cada aplicaci\u00f3n.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-109521 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-5.png\" alt=\"Auditor\u00edas completas\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-5.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-5-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Products-Tour-CredentialProviders-5-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 cybv2-pad-top info-graphic sub-4&#8243;][vc_column width=\u00bb2\/3&#8243; offset=\u00bbvc_col-sm-offset-2&#8243;][vc_column_text el_class=\u00bbtext-md-center head-box\u00bb]<\/p>\n<h3>Gesti\u00f3n centralizada de credenciales en todos los entornos distribuidos<\/h3>\n<p>La arquitectura flexible y las opciones de implementaci\u00f3n permiten a una amplia gama de aplicaciones recuperar de forma segura las credenciales de acceso a recursos sensibles como las bases de datos.[\/vc_column_text][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Infographic_DEVOPS_CP_CredentialProviders.svg\"><img decoding=\"async\" class=\"alignnone wp-image-109561 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Infographic_DEVOPS_CP_CredentialProviders.svg\" alt=\"Gesti\u00f3n de credenciales centralizada\" \/><\/a>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcybv2 cyberark-blueprint dark\u00bb][vc_column width=\u00bb1\/4&#8243;][vc_column_text el_class=\u00bbnew_hpstyle_section3_h4&#8243;]<\/p>\n<h3>Una Seguridad de la Identidad que le conoce pero que no le detiene<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb5\/12&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_column_text el_class=\u00bbnew_hpstyle_section3_text\u00bb]<\/p>\n<h4>Descubra todas las formas en las que CyberArk le ofrece tranquilidad para avanzar sin miedo.<\/h4>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243;][vc_btn title=\u00bbM\u00e1s informaci\u00f3n\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb align=\u00bbright\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fproducts%2F|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2_resources\u00bb css=\u00bb.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}\u00bb][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbno-break\u00bb][vc_column_text el_class=\u00bbno-break\u00bb]<\/p>\n<h3>Explorar<br \/>\nrecursos<br \/>\nrelacionados<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=\u00bbnew_hpstyle_section8_text2&#8243;]C\u00e9ntrese en dirigir su negocio, no en reaccionar a las amenazas[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/resources\/\">Ver todos los recursos<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/3&#8243;][\/vc_column][vc_column width=\u00bb1\/3&#8243;][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2_resources_uberflip\u00bb][vc_column el_class=\u00bbnew_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=\u00bb.vc_custom_1695144687474{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbnew_hpstyle_section8_uberflip\u00bb]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb css=\u00bb.vc_custom_1609868130755{background-color: #f7f7f7 !important;}\u00bb el_class=\u00bbcybv2 cybv2-pad-top hv-cta\u00bb][vc_column width=\u00bb7\/12&#8243; el_class=\u00bbleft-clmn\u00bb][vc_column_text]<\/p>\n<h2>Solicitar demostraci\u00f3n<\/h2>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner el_class=\u00bbhead-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbhead-box-text\u00bb]Evite que las aplicaciones de misi\u00f3n cr\u00edtica expongan las credenciales incrustadas en el c\u00f3digo[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbhead-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbhead-box-text\u00bb]Simplifique la protecci\u00f3n de las aplicaciones con la m\u00e1s amplia gama de integraciones listas para usar[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbhead-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbhead-box-text\u00bb]Mant\u00e9ngase un paso por delante de las auditor\u00edas y el cumplimiento[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_single_image image=\u00bb108954&#8243; img_size=\u00bbfull\u00bb el_class=\u00bbd-none d-md-block\u00bb][\/vc_column][vc_column width=\u00bb1\/12&#8243; css=\u00bb.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}\u00bb][\/vc_column][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbright-clmn cybv2-form\u00bb][vc_column_text el_class=\u00bbbold\u00bb]<\/p>\n<h4>Reg\u00edstrese para una demostraci\u00f3n personalizada<\/h4>\n<p>[\/vc_column_text][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iODIzMCIgdHlfcGFnZV91cmw9Imh0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS90cnktYnV5L3RoYW5rLXlvdS1zZWNyZXRzLW1hbmFnZXItZW50ZXJwcmlzZS8iXQ==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row el_class=\u00bbcyb-pad cybv2&#8243;][vc_column][vc_column_text css=\u00bb\u00bb el_class=\u00bbtiny\u00bb]CyberArk Has Patent Rights Relating To This Technology &#8211; <a href=\"https:\/\/www.cyberark.com\/es\/patents\/\">https:\/\/www.cyberark.com\/patents<\/a>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":203,"featured_media":0,"parent":53045,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27774],"class_list":["post-115214","page","type-page","status-publish","hentry","product_category-devsecops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Credential Providers - Gesti\u00f3n centralizada de credenciales | CyberArk<\/title>\n<meta name=\"description\" content=\"CyberArk Credential Provider almacena, registra y gestiona de forma centralizada las contrase\u00f1as confidenciales para que cada aplicaci\u00f3n pueda acceder a ellas de forma segura utilizando los m\u00ednimos privilegios.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/es\/products\/credential-providers\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Credential Providers\" \/>\n<meta property=\"og:description\" content=\"CyberArk Credential Provider almacena, registra y gestiona de forma centralizada las contrase\u00f1as confidenciales para que cada aplicaci\u00f3n pueda acceder a ellas de forma segura utilizando los m\u00ednimos privilegios.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/es\/products\/credential-providers\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-25T20:12:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"530\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/credential-providers\/\",\"url\":\"https:\/\/www.cyberark.com\/es\/products\/credential-providers\/\",\"name\":\"Credential Providers - Gesti\u00f3n centralizada de credenciales | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/credential-providers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/credential-providers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg\",\"datePublished\":\"2021-02-03T23:25:43+00:00\",\"dateModified\":\"2025-11-25T20:12:01+00:00\",\"description\":\"CyberArk Credential Provider almacena, registra y gestiona de forma centralizada las contrase\u00f1as confidenciales para que cada aplicaci\u00f3n pueda acceder a ellas de forma segura utilizando los m\u00ednimos privilegios.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/credential-providers\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/es\/products\/credential-providers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/credential-providers\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/credential-providers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Productos\",\"item\":\"https:\/\/www.cyberark.com\/es\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Credential Providers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/es\/#website\",\"url\":\"https:\/\/www.cyberark.com\/es\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/es\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Credential Providers - Gesti\u00f3n centralizada de credenciales | CyberArk","description":"CyberArk Credential Provider almacena, registra y gestiona de forma centralizada las contrase\u00f1as confidenciales para que cada aplicaci\u00f3n pueda acceder a ellas de forma segura utilizando los m\u00ednimos privilegios.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/es\/products\/credential-providers\/","og_locale":"es_ES","og_type":"article","og_title":"Credential Providers","og_description":"CyberArk Credential Provider almacena, registra y gestiona de forma centralizada las contrase\u00f1as confidenciales para que cada aplicaci\u00f3n pueda acceder a ellas de forma segura utilizando los m\u00ednimos privilegios.","og_url":"https:\/\/www.cyberark.com\/es\/products\/credential-providers\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-11-25T20:12:01+00:00","og_image":[{"width":730,"height":530,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/es\/products\/credential-providers\/","url":"https:\/\/www.cyberark.com\/es\/products\/credential-providers\/","name":"Credential Providers - Gesti\u00f3n centralizada de credenciales | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/es\/products\/credential-providers\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/es\/products\/credential-providers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg","datePublished":"2021-02-03T23:25:43+00:00","dateModified":"2025-11-25T20:12:01+00:00","description":"CyberArk Credential Provider almacena, registra y gestiona de forma centralizada las contrase\u00f1as confidenciales para que cada aplicaci\u00f3n pueda acceder a ellas de forma segura utilizando los m\u00ednimos privilegios.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/es\/products\/credential-providers\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/es\/products\/credential-providers\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/es\/products\/credential-providers\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Credential-Providers-hero.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/es\/products\/credential-providers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/es\/"},{"@type":"ListItem","position":2,"name":"Productos","item":"https:\/\/www.cyberark.com\/es\/products\/"},{"@type":"ListItem","position":3,"name":"Credential Providers"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/es\/#website","url":"https:\/\/www.cyberark.com\/es\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/es\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/115214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/users\/203"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/comments?post=115214"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/115214\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/53045"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/media?parent=115214"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/product_category?post=115214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}