{"id":115263,"date":"2021-02-03T17:56:37","date_gmt":"2021-02-03T22:56:37","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/user-behavior-analytics\/"},"modified":"2025-12-24T02:04:43","modified_gmt":"2025-12-24T07:04:43","slug":"user-behavior-analytics","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/es\/products\/user-behavior-analytics\/","title":{"rendered":"An\u00e1lisis del comportamiento del usuario (novedad)"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row el_class=\u00bbcybv2 int-hero\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-1&#8243;][vc_column_text el_class=\u00bbcyb-breadcrumb\u00bb]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/es\/products\/workforce-identity\/\">Volver a Identidad del personal<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>User Behavior Analytics<\/h1>\n<p><\/p>\n<h2>Un motor inteligente con IA para recopilar, analizar y visualizar la informaci\u00f3n sobre el comportamiento de los usuarios en tiempo real.<\/h2>\n<p>\n[\/vc_column_text][vc_btn title=\u00bbObtenga una demostraci\u00f3n\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb css=\u00bb\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Ftry-buy%2Fworkforce-access-solutions-demo%2F|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-2&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-111496\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/User-Behavior-Analytics-hero.jpg\" alt=\"User Behavior Analytics\" width=\"770\" height=\"530\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/User-Behavior-Analytics-hero.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/User-Behavior-Analytics-hero-300x206.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/User-Behavior-Analytics-hero-768x529.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/User-Behavior-Analytics-hero-150x103.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcybv2 cybv2_sticky_nav\u00bb css=\u00bb.vc_custom_1614201964540{background-color: #f7f7f7 !important;}\u00bb][vc_column width=\u00bb1\/4&#8243;][vc_column_text el_class=\u00bbsticky-nav-title\u00bb]<\/p>\n<h3><i class=\"fas fa-long-arrow-alt-up\"><\/i>User Behavior Analytics<\/h3>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243;][vc_raw_html el_class=\u00bbsticky-nav-buttons\u00bb]PCEtLSBBZGQgbGkgZm9yIHNlY3Rpb24gZGF0YS1zY3JvbGwtY2xhc3MgaXMgd2hlcmUgeW91IHB1dCB0aGUgc2VjdGlvbiBjbGFzcyB5b3Ugd2FudCB0byBzY3JvbGwgdG8gLS0+PGJyPjx1bD4NCjxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTEiPlZlbnRhamFzPC9saT4NCjxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTIiPkZ1bmNpb25hbGlkYWRlczwvbGk+DQo8bGkgZGF0YS1zY3JvbGwtY2xhc3M9InN1Yi0zIj5Dw7NtbyBmdW5jaW9uYTwvbGk+DQo8bGkgZGF0YS1zY3JvbGwtY2xhc3M9InN1Yi00Ij5SZWN1cnNvczwvbGk+DQo8L3VsPg==[\/vc_raw_html][\/vc_column][vc_column width=\u00bb1\/4&#8243;][vc_btn title=\u00bbObtenga una demostraci\u00f3n\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb css=\u00bb\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Ftry-buy%2Fworkforce-access-solutions-demo%2F|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbsubnav-dropdown\u00bb][vc_column_text el_class=\u00bbsticky-nav-title\u00bb]<\/p>\n<h5 style=\"text-align: right;\">Saltar a<i class=\"fas fa-chevron-circle-down\"><\/i><\/h5>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2-pad-top overview-vt sub-1&#8243; css=\u00bb.vc_custom_1617032558402{background-color: #f7f7f7 !important;}\u00bb][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbhead-box\u00bb][vc_column_text]<\/p>\n<h3>Decisiones de acceso inteligentes<\/h3>\n<p>Un motor de an\u00e1lisis del comportamiento del usuario integrado en las soluciones de <a href=\"https:\/\/www.cyberark.com\/es\/products\/workforce-identity\/\">Identidad del personal<\/a> de CyberArk.[\/vc_column_text][\/vc_column][vc_column width=\u00bb5\/12&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-111512\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Visualize-Risk.svg\" alt=\"Visualize Risk Icon\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Visualice el riesgo<\/h4>\n<p>Utilice paneles de control interactivos para profundizar en el contexto de los eventos de seguridad e identificar las causas ra\u00edz.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-111520\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Uncover-Threats.svg\" alt=\"Uncover Threats Icon\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Detecte amenazas<\/h4>\n<p>Elimine la revisi\u00f3n manual de los datos de registro y utilice la IA para identificar patrones de condiciones de acceso de riesgo.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-111528\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Demonstrate-Compliance.svg\" alt=\"Demonstrate Compliance Icon\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Acredite la conformidad normativa<\/h4>\n<p>Configure paneles de control e informes detallados para dar cuenta de los eventos y actividades relacionados con el acceso.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 cybv2-pad-top stckd-cllt cyb-reverse\u00bb][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbleft-clmn\u00bb][vc_column_text el_class=\u00bbhead-box\u00bb]<\/p>\n<h3>Conozca a sus usuarios a fondo<\/h3>\n<p>Utilice los datos de terceros como vector de amenazas en sus modelos de c\u00e1lculo de riesgos.<\/p>\n<ul>\n<li>Arquitectura ampliable basada en sensores para la ingesta de datos de registro de terceros<\/li>\n<li>Ajuste din\u00e1micamente los perfiles de riesgo de cada usuario<\/li>\n<li>Utilice los eventos recogidos por Palo Alto Networks Cortex Data Lake<\/li>\n<\/ul>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbright-clmn\u00bb offset=\u00bbvc_col-sm-offset-1&#8243;][vc_single_image image=\u00bb111511&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbcenter\u00bb el_class=\u00bb.border-shadow\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2-pad-top cybv2 cybv2-background-oval tour sub-2&#8243;][vc_column][vc_row_inner el_class=\u00bbcyb-center\u00bb][vc_column_inner el_class=\u00bbcyb-pad-btm\u00bb][vc_column_text el_class=\u00bbleft-mobile\u00bb]<\/p>\n<h3>Put security first without putting productivity second<\/h3>\n<p>Ensure secure access, without slowing down users.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=\u00bbsquare\u00bb active_section=\u00bb1&#8243; css_animation=\u00bbnone\u00bb][vc_tta_section i_position=\u00bbright\u00bb i_icon_fontawesome=\u00bbfas fa-chevron-circle-down\u00bb add_icon=\u00bbtrue\u00bb title=\u00bbDesarrolle paneles de control\u00bb tab_id=\u00bbdevelop\u00bb][vc_row_inner el_class=\u00bbcybv2&#8243;][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Desarrolle paneles de control<\/h4>\n<p>Mejore la visibilidad en todos los puntos de acceso para garantizar que las pol\u00edticas funcionan como se espera con paneles de control que contabilizan las alertas y visualizan las tendencias.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-111536\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-UserBehaviorAnalytics-1.png\" alt=\"Monitor User Behavior\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-UserBehaviorAnalytics-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-UserBehaviorAnalytics-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-UserBehaviorAnalytics-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00bbright\u00bb i_icon_fontawesome=\u00bbfas fa-chevron-circle-down\u00bb add_icon=\u00bbtrue\u00bb title=\u00bbPriorice los riesgos\u00bb tab_id=\u00bbprioritize\u00bb][vc_row_inner el_class=\u00bbcybv2&#8243;][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Priorice los riesgos<\/h4>\n<p>Priorice las alertas en funci\u00f3n del riesgo e identifique f\u00e1cilmente las cuentas comprometidas para remediar la actividad sospechosa y detener las amenazas.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-111544\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-UserBehaviorAnalytics-2.png\" alt=\"Prioritize Risks\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-UserBehaviorAnalytics-2.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-UserBehaviorAnalytics-2-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-UserBehaviorAnalytics-2-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00bbright\u00bb i_icon_fontawesome=\u00bbfas fa-chevron-circle-down\u00bb add_icon=\u00bbtrue\u00bb title=\u00bbControle el acceso\u00bb tab_id=\u00bbmonitor\u00bb][vc_row_inner el_class=\u00bbcybv2&#8243;][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Controle el acceso<\/h4>\n<p>Los informes interactivos facilitan la identificaci\u00f3n de las cuentas espec\u00edficas que se han visto comprometidas, o por qu\u00e9 a un usuario se le ha solicitado la <a href=\"https:\/\/www.cyberark.com\/es\/?page_id=115228\">MFA<\/a>, se le ha bloqueado o se le ha permitido el acceso.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-111552\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-UserBehaviorAnalytics-3.png\" alt=\"Monitor User Access\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-UserBehaviorAnalytics-3.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-UserBehaviorAnalytics-3-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-UserBehaviorAnalytics-3-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00bbright\u00bb i_icon_fontawesome=\u00bbfas fa-chevron-circle-down\u00bb add_icon=\u00bbtrue\u00bb title=\u00bbInvestigue los eventos\u00bb tab_id=\u00bbinvestigate\u00bb][vc_row_inner el_class=\u00bbcybv2&#8243;][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Investigue los eventos<\/h4>\n<p>Visualice de forma interactiva conjuntos de datos, a\u00edsle eventos de acceso espec\u00edficos y examine los detalles de los eventos, incluidos la hora, la ubicaci\u00f3n y el dispositivo desde el que se ha originado la solicitud.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-111560\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-UserBehaviorAnalytics-4.png\" alt=\"Investigate User Events\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-UserBehaviorAnalytics-4.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-UserBehaviorAnalytics-4-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-UserBehaviorAnalytics-4-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00bbright\u00bb i_icon_fontawesome=\u00bbfas fa-chevron-circle-down\u00bb add_icon=\u00bbtrue\u00bb title=\u00bbAutomatice las alertas\u00bb tab_id=\u00bbautomate\u00bb][vc_row_inner el_class=\u00bbcybv2&#8243;][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Automatice las alertas<\/h4>\n<p>Env\u00ede detalles de eventos de acceso a aplicaciones de terceros que acepten webhooks entrantes. Por ejemplo, configure un webhook para activar una notificaci\u00f3n de Slack a su equipo de seguridad sobre una solicitud de acceso de alto riesgo.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-112781\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-UserBehaviorAnalytics-5.png\" alt=\"Automate Alerts\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-UserBehaviorAnalytics-5.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-UserBehaviorAnalytics-5-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-UserBehaviorAnalytics-5-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 cybv2-pad info-graphic sub-3&#8243;][vc_column width=\u00bb2\/3&#8243; offset=\u00bbvc_col-sm-offset-2&#8243;][vc_column_text el_class=\u00bbtext-md-center head-box\u00bb]<\/p>\n<h3>An\u00e1lisis basados en el comportamiento del usuario<\/h3>\n<p>El <a href=\"https:\/\/www.cyberark.com\/es\/products\/single-sign-on\/\">SSO<\/a> y la <a href=\"https:\/\/www.cyberark.com\/es\/?page_id=115228\">MFA<\/a> adaptativos se sirven de los atributos contextuales espec\u00edficos del usuario y las puntuaciones de riesgo para activar de forma din\u00e1mica las pol\u00edticas de acceso.[\/vc_column_text][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-111568\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/infographics_Access_UserBehaviorAnalytics.svg\" alt=\"User Behavior-Based Analytics\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"templatera_shortcode\"><div data-vc-full-width=\"true\" data-vc-full-width-temp=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_full_width_resource\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_title\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h5 style=\"text-align: center;\">Identity security: centrada en<br \/>\ncontroles de privilegios inteligentes<\/h5>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section5_container\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_center   new_hpstyle_section5_gart_img\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/11\/gartner-square-cta.jpg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"gartner-square-cta\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/11\/gartner-square-cta.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/11\/gartner-square-cta-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/11\/gartner-square-cta-100x100.jpg 100w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>CyberArk es un l\u00edder en el Gartner\u00ae Magic Quadrant\u2122 2022 para la Gesti\u00f3n del Acceso.<\/h4>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_btn3-container  cybv2-button-solid cyb-button-hpstyle_section5 vc_btn3-inline\"  >\n\t<a class=\"vc_btn3-color-grey\" href=\"https:\/\/www.cyberark.com\/es\/gartner-magic-quadrant-for-access-management\/\" title=\"\">Lea el Informe<\/a><\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/a><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"templatera_shortcode\"><div class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_customer_stories vc_tta-o-non-responsive vc_custom_1608676874239 vc_row-has-fill vc_row-o-equal-height vc_row-flex\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_js\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<link rel=\"stylesheet\" type=\"text\/css\" href=\"\/\/cdn.jsdelivr.net\/npm\/slick-carousel@1.8.1\/slick\/slick.css\"\/>\n<script type=\"text\/javascript\" src=\"\/\/cdn.jsdelivr.net\/npm\/slick-carousel@1.8.1\/slick\/slick.min.js\"><\/script>\n<script>\njQuery(document).ready(function(){\n    \/\/Add Active to tab on page load\n    $panels = jQuery('.cybv2_customer_stories_tabs .vc_tta-panels .vc_tta-panel');\n    $tabs = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-list .vc_tta-tab');\n    var index = 0;\n\n    \/\/Align Tabs with panels\n    $panels.each(function(){\n        jQuery(this).hasClass('vc_active');\n        return false;\n        index++;\n    })\n    var newIndex = 0;\n    $tabs.each(function(){\n        if(index == newIndex){\n            jQuery(this).addClass('vc_active');\n        }\n        newIndex++;\n    })\n\n    \/\/Add custom icon to tabs\n    var iconIndex = 1;\n    $panels.each(function(){\n        $this = jQuery(this);\n        $tab = $this.find('.tab-icon');\n        $tab.find('img').prependTo(jQuery('.cybv2_customer_stories_tabs .vc_tta-tab:nth-of-type(' + iconIndex + ') a'));\n        jQuery('.cybv2_customer_stories_tabs .vc_tta-tab:nth-of-type(' + iconIndex + ') a i').remove()\n        $tab.remove();\n        iconIndex++;\n    })\n});\njQuery(window).on('load resize orientationchange', function() {\n    var $carousel = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list');\n    var $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n\n    \/\/Change slide to selected panel for tabs\n    var slideGoTo = function(){\n        if ($carousel.hasClass('slick-initialized')) {\n            $carousel.slick('slickGoTo', +jQuery(this).attr('data-slick-index'));\n            setTimeout(function(){ \n                $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n                $click.each(function(){\n                    if(jQuery(this).hasClass('vc_active') && (!jQuery(this).hasClass('slick-center') || !jQuery(this).hasClass('slick-active'))){\n                        jQuery(this).removeClass('vc_active');\n                    }\n                })\n            }, 1000);\n        }\n    }\n\n    \/\/Update panel for selected slide (aka tab)\n    var afterChangeFunction = function(slick, currentSlide){\n        $currentTab = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab.slick-center.slick-active a');\n        if(!$currentTab.parent().hasClass('vc_active')){\n            $currentTab.trigger('click');\n        }\n        \/*setTimeout(function(){ \n            $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n            $click.each(function(){\n                if(jQuery(this).hasClass('vc_active') && (!jQuery(this).hasClass('slick-center') || !jQuery(this).hasClass('slick-active'))){\n                    jQuery(this).removeClass('vc_active');\n                }\n            })\n        }, 1000);*\/\n    }\n\n    \/* Initializes a slick carousel only on mobile screens *\/\n    \/\/ slick on mobile\n    if (jQuery(window).width() > 768) {\n        if ($carousel.hasClass('slick-initialized')) {\n            $carousel.slick('unslick');\n            $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n            $click.unbind('click', slideGoTo)\n            $carousel.unbind('afterChange', afterChangeFunction);\n        }\n    }\n    else{\n        if (!$carousel.hasClass('slick-initialized')) {\n            $carousel.slick({\n                slidesToShow: 3,\n                slidesToScroll: 1,\n                mobileFirst: true,\n                infinite: true,\n                centerMode: true,\n                centerPadding: '50px'\n            });\n            $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n            $click.bind('click', slideGoTo)\n            $carousel.bind('afterChange', afterChangeFunction);\n            $click.each(function(){\n                if(jQuery(this).hasClass('vc_active') && !jQuery(this).hasClass('slick-cloned')){\n                    jQuery(this).trigger('click');\n                }\n            })\n        }\n    }\n});\n<\/script>\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_tta-container\" data-vc-action=\"collapse\"><div class=\"vc_general vc_tta vc_tta-tabs vc_tta-color-white vc_tta-style-flat vc_tta-shape-square vc_tta-o-shape-group vc_tta-gap-20  cybv2_customer_stories_tabs vc_tta-tabs-position-top vc_tta-controls-align-center vc_custom_1608676900675\"><div class=\"vc_tta-tabs-container\"><ul class=\"vc_tta-tabs-list\" role=\"tablist\"><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742493330-265de97c-f2d9eb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742493330-265de97c-f2d9eb66-6bf8\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Clientes<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742494008-8c0fb98b-2b6beb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742494008-8c0fb98b-2b6beb66-6bf8\"><i class=\"vc_tta-icon fas fa-satellite-dish\"><\/i><span class=\"vc_tta-title-text\">Telco<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742494616-60a6dced-32cfeb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742494616-60a6dced-32cfeb66-6bf8\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Financiero<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742495229-255d985e-6d0ceb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742495229-255d985e-6d0ceb66-6bf8\"><i class=\"vc_tta-icon fas fa-industry\"><\/i><span class=\"vc_tta-title-text\">Industrial<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742495902-f2d9a00d-8e74eb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742495902-f2d9a00d-8e74eb66-6bf8\"><i class=\"vc_tta-icon fas fa-university\"><\/i><span class=\"vc_tta-title-text\">Seguros<\/span><\/a><\/li><\/ul><\/div><div class=\"vc_tta-panels-container\"><div class=\"vc_tta-panels\"><div class=\"vc_tta-panel new_hpstyle_section6_tab1_icon vc_active\" id=\"1607742493330-265de97c-f2d9eb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742493330-265de97c-f2d9eb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Clientes<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653500231\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Finance-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Finance\" title=\"Finance-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/customers-icon.svg\" class=\"vc_single_image-img attachment-full\" alt=\"customer icon\" title=\"customers-icon\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\"CyberArk ha sido el mejor proveedor con el que he trabajado en mis 20 a\u00f1os de carrera en TI. CyberArk ofrece excelentes productos que lideran el sector en el \u00e1mbito de la gesti\u00f3n del acceso con privilegios.\"<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Director de Seguridad inform\u00e1tica,<\/strong> Seguridad y gesti\u00f3n de riesgos<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/es\/customer-stories\/\">Consulte m\u00e1s experiencias de clientes<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab2_icon\" id=\"1607742494008-8c0fb98b-2b6beb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742494008-8c0fb98b-2b6beb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-satellite-dish\"><\/i><span class=\"vc_tta-title-text\">Telco<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653503563\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Telecom-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Telecom\" title=\"Telecom-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Telecom-1.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"Telecom\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\"Con CyberArk, podemos estar seguros de haber implementado una tecnolog\u00eda que seguir\u00e1 funcionando a medida que nuestro negocio crezca y prospere.\"<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Jean-Pierre Blanc<\/strong>, Bouygues Telecom<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/es\/customer-stories\/bouygues-telecom\/\">Consulte el caso pr\u00e1ctico<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab3_icon\" id=\"1607742494616-60a6dced-32cfeb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742494616-60a6dced-32cfeb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Financiero<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653481888\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Finance-02-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Finance-02-590x500\" title=\"Finance-02-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Finance.svg\" class=\"vc_single_image-img attachment-full\" alt=\"Finance\" title=\"Finance\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\"No solo nos permite cumplir con los requisitos de cumplimiento, sino tambi\u00e9n dise\u00f1ar y adaptar activamente las pol\u00edticas conforme a las mejores pr\u00e1cticas de ciberseguridad a fin de consolidar nuestra posici\u00f3n general en materia de seguridad y ajustar los equipos internos.\"<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Joel Harris<\/strong>, Director<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/es\/customer-stories\/national-australia-bank\/\">Consulte el caso pr\u00e1ctico<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab4_icon\" id=\"1607742495229-255d985e-6d0ceb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742495229-255d985e-6d0ceb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-industry\"><\/i><span class=\"vc_tta-title-text\">Industrial<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653496575\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Customer-Identities-770x550-1-590x500.jpg\" width=\"590\" height=\"500\" alt=\"Customer-Identities----770x550\" title=\"Customer-Identities----770x550\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Manufactoring.svg\" class=\"vc_single_image-img attachment-full\" alt=\"Manufacturing\" title=\"Manufactoring\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\"CyberArk nos proporcion\u00f3 la visibilidad y el control granular necesarios para implementar tanto el m\u00ednimo privilegio como el control de aplicaciones de 'denegaci\u00f3n predeterminada' con una interrupci\u00f3n m\u00ednima de la actividad.\"<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Ken Brown<\/strong>, CISO<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/es\/customer-stories\/milliken\/\">Consulte el caso pr\u00e1ctico<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab5_icon\" id=\"1607742495902-f2d9a00d-8e74eb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742495902-f2d9a00d-8e74eb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-university\"><\/i><span class=\"vc_tta-title-text\">Seguros<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653492933\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Insurance-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Insurance-590x500\" title=\"Insurance-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Insurance-1.svg\" class=\"vc_single_image-img attachment-full\" alt=\"insurance\" title=\"Insurance\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\"Con RPA y las migraciones en la nube, las credenciales cada vez se apartan m\u00e1s de los controles 'normales'. CyberArk puede ampliarse para abarcar todos los escenarios de forma habitual.\"<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Asesor de Seguridad de la informaci\u00f3n<\/strong>, Enterprise Cybersecurity Solutions Technologies<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/es\/customer-stories\/\">Consulte m\u00e1s experiencias de clientes<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/a><\/div><\/div><\/div><\/div>[\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcybv2 cyberark-blueprint dark\u00bb][vc_column width=\u00bb1\/4&#8243;][vc_column_text el_class=\u00bbnew_hpstyle_section3_h4&#8243;]<\/p>\n<h3>An\u00e1lisis basados en el comportamiento del usuario<br \/>\n<\/h3>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=\u00bb5\/12&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_column_text el_class=\u00bbnew_hpstyle_section3_text\u00bb]<\/p>\n<h4>Descubra todas las formas en las que CyberArk le ofrece tranquilidad para avanzar sin miedo.<\/h4>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243;][vc_btn title=\u00bbM\u00e1s informaci\u00f3n\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb align=\u00bbright\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fproducts%2F|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 cybv2-pad cybv2-oval-left-background hv-cta-list\u00bb css=\u00bb.vc_custom_1617030681079{background-color: #ff7600 !important;}\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbimg-box cyb-clm-background-rc\u00bb css=\u00bb.vc_custom_1612303189333{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/WorkForceIdent_Page-High-value-CTA-770&#215;515-1.jpg?id=111231) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbstat-column\u00bb][vc_row_inner][vc_column_inner el_class=\u00bbhead-box\u00bb width=\u00bb3\/4&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text]<\/p>\n<h2>Ricevi una demo personalizzata<\/h2>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bblist-box\u00bb width=\u00bb11\/12&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=\u00bbbenefits-content-icon\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblist-text\u00bb]Dai maggior controllo ai tuoi dipendenti con il single sign-on[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bblist-box\u00bb width=\u00bb11\/12&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=\u00bbbenefits-content-icon\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblist-text\u00bb]Autentica in sicurezza grazie all\u2019IA e all\u2019analisi del comportamento degli utenti[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bblist-box\u00bb width=\u00bb11\/12&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=\u00bbbenefits-content-icon\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblist-text\u00bb]Riduci il carico di lavoro del reparto IT, grazie a tool self-service sicuri[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bblist-box\u00bb width=\u00bb11\/12&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=\u00bbbenefits-content-icon\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblist-text\u00bb]Elimina la necessit\u00e0 di VPN[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bblist-box\u00bb width=\u00bb11\/12&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_btn title=\u00bbObtenga una demostraci\u00f3n\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb css=\u00bb\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Ftry-buy%2Fworkforce-access-solutions-demo%2F|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":198,"featured_media":0,"parent":53045,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-115263","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>An\u00e1lisis del comportamiento del usuario | CyberArk<\/title>\n<meta name=\"description\" content=\"El software CyberArk User Behavior Analytics recopila, analiza y visualiza la informaci\u00f3n sobre el comportamiento de los usuarios en tiempo real sin ralentizarlos.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/es\/products\/user-behavior-analytics\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An\u00e1lisis del comportamiento del usuario (novedad)\" \/>\n<meta property=\"og:description\" content=\"El software CyberArk User Behavior Analytics recopila, analiza y visualiza la informaci\u00f3n sobre el comportamiento de los usuarios en tiempo real sin ralentizarlos.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/es\/products\/user-behavior-analytics\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-24T07:04:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/User-Behavior-Analytics-hero.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"530\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/user-behavior-analytics\/\",\"url\":\"https:\/\/www.cyberark.com\/es\/products\/user-behavior-analytics\/\",\"name\":\"An\u00e1lisis del comportamiento del usuario | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/user-behavior-analytics\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/user-behavior-analytics\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/User-Behavior-Analytics-hero.jpg\",\"datePublished\":\"2021-02-03T22:56:37+00:00\",\"dateModified\":\"2025-12-24T07:04:43+00:00\",\"description\":\"El software CyberArk User Behavior Analytics recopila, analiza y visualiza la informaci\u00f3n sobre el comportamiento de los usuarios en tiempo real sin ralentizarlos.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/user-behavior-analytics\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/es\/products\/user-behavior-analytics\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/user-behavior-analytics\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/User-Behavior-Analytics-hero.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/User-Behavior-Analytics-hero.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/es\/products\/user-behavior-analytics\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Productos\",\"item\":\"https:\/\/www.cyberark.com\/es\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"An\u00e1lisis del comportamiento del usuario (novedad)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/es\/#website\",\"url\":\"https:\/\/www.cyberark.com\/es\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/es\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"An\u00e1lisis del comportamiento del usuario | CyberArk","description":"El software CyberArk User Behavior Analytics recopila, analiza y visualiza la informaci\u00f3n sobre el comportamiento de los usuarios en tiempo real sin ralentizarlos.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/es\/products\/user-behavior-analytics\/","og_locale":"es_ES","og_type":"article","og_title":"An\u00e1lisis del comportamiento del usuario (novedad)","og_description":"El software CyberArk User Behavior Analytics recopila, analiza y visualiza la informaci\u00f3n sobre el comportamiento de los usuarios en tiempo real sin ralentizarlos.","og_url":"https:\/\/www.cyberark.com\/es\/products\/user-behavior-analytics\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-12-24T07:04:43+00:00","og_image":[{"width":770,"height":530,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/User-Behavior-Analytics-hero.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tiempo de lectura":"9 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/es\/products\/user-behavior-analytics\/","url":"https:\/\/www.cyberark.com\/es\/products\/user-behavior-analytics\/","name":"An\u00e1lisis del comportamiento del usuario | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/es\/products\/user-behavior-analytics\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/es\/products\/user-behavior-analytics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/User-Behavior-Analytics-hero.jpg","datePublished":"2021-02-03T22:56:37+00:00","dateModified":"2025-12-24T07:04:43+00:00","description":"El software CyberArk User Behavior Analytics recopila, analiza y visualiza la informaci\u00f3n sobre el comportamiento de los usuarios en tiempo real sin ralentizarlos.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/es\/products\/user-behavior-analytics\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/es\/products\/user-behavior-analytics\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/es\/products\/user-behavior-analytics\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/User-Behavior-Analytics-hero.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/User-Behavior-Analytics-hero.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/es\/products\/user-behavior-analytics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/es\/"},{"@type":"ListItem","position":2,"name":"Productos","item":"https:\/\/www.cyberark.com\/es\/products\/"},{"@type":"ListItem","position":3,"name":"An\u00e1lisis del comportamiento del usuario (novedad)"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/es\/#website","url":"https:\/\/www.cyberark.com\/es\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/es\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/115263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/users\/198"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/comments?post=115263"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/115263\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/53045"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/media?parent=115263"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/product_category?post=115263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}