{"id":115270,"date":"2021-02-03T16:05:43","date_gmt":"2021-02-03T21:05:43","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/"},"modified":"2025-02-14T12:43:28","modified_gmt":"2025-02-14T17:43:28","slug":"vendor-privileged-access-manager","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/es\/products\/vendor-privileged-access-manager\/","title":{"rendered":"Vendor Privileged Access Manager"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row el_class=\u00bbcybv2 int-hero\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-1&#8243;][vc_column_text el_class=\u00bbcyb-breadcrumb\u00bb]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/es\/products\/privileged-access\/\"> Volver a Privileged Access<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>Vendor Privileged Access Manager<\/h1>\n<h2>Proteja el acceso de terceros a recursos internos cr\u00edticos con funciones completas de aislamiento de sesiones, supervisi\u00f3n y auditor\u00eda sin necesidad de VPN, contrase\u00f1as ni agentes.<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00bbObtenga una prueba gratuita\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ftry-buy%2Fvendor-privileged-access-manager%2F|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/try-buy\/vendor-privileged-access-manager-demo\/\" target=\"_blank\" rel=\"noopener noreferrer\">Solicitar demostraci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-2&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-110200\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg\" alt=\"Gesti\u00f3n del acceso con privilegios de terceros\" width=\"770\" height=\"550\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1-300x214.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1-768x549.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1-150x107.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcybv2 cybv2_sticky_nav\u00bb css=\u00bb.vc_custom_1614201964540{background-color: #f7f7f7 !important;}\u00bb][vc_column width=\u00bb1\/4&#8243;][vc_column_text el_class=\u00bbsticky-nav-title\u00bb]<\/p>\n<h3><i class=\"fas fa-long-arrow-alt-up\"><\/i>Vendor Privileged Access Manager<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243;][vc_raw_html el_class=\u00bbsticky-nav-buttons\u00bb]PCEtLSBBZGQgbGkgZm9yIHNlY3Rpb24gZGF0YS1zY3JvbGwtY2xhc3MgaXMgd2hlcmUgeW91IHB1dCB0aGUgc2VjdGlvbiBjbGFzcyB5b3Ugd2FudCB0byBzY3JvbGwgdG8gLS0+DQo8dWw+DQo8bGkgZGF0YS1zY3JvbGwtY2xhc3M9InN1Yi0xIj5WZW50YWphczwvbGk+DQo8bGkgZGF0YS1zY3JvbGwtY2xhc3M9InN1Yi0yIj5GdW5jaW9uYWxpZGFkZXM8L2xpPg0KPGxpIGRhdGEtc2Nyb2xsLWNsYXNzPSJzdWItMyI+Q8OzbW8gZnVuY2lvbmE8L2xpPg0KPGxpIGRhdGEtc2Nyb2xsLWNsYXNzPSJzdWItNCI+UmVjdXJzb3M8L2xpPg0KPC91bD4=[\/vc_raw_html][\/vc_column][vc_column width=\u00bb1\/4&#8243;][vc_btn title=\u00bbIniciar prueba gratuita\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ftry-buy%2Fvendor-privileged-access-manager%2F|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbsubnav-dropdown\u00bb][vc_column_text el_class=\u00bbsticky-nav-title\u00bb]<\/p>\n<h5 style=\"text-align: right;\">Saltar a<i class=\"fas fa-chevron-circle-down\"><\/i><\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2-pad-top overview-vt sub-1&#8243; css=\u00bb.vc_custom_1616764259942{background-color: #f7f7f7 !important;}\u00bb][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbhead-box\u00bb][vc_column_text]<\/p>\n<h3>Conecte proveedores, bloquee amenazas<\/h3>\n<p>Garantice un acceso con privilegios seguro y sencillo para proveedores externos.[\/vc_column_text][\/vc_column][vc_column width=\u00bb5\/12&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Enable-Digital-Business.svg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-119142\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Enable-Digital-Business-correct.svg\" alt=\"\u00cdcono Habilite el negocio digital\" \/><\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Habilite el negocio digital<\/h4>\n<p>Sin contrase\u00f1a y sin VPN, lo que proporciona un acceso r\u00e1pido y seguro a los proveedores a trav\u00e9s de la MFA biom\u00e9trica.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks2.svg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-118884\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks2.svg\" alt=\"\u00cdcono Defi\u00e9ndase de los ataques\" \/><\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Defi\u00e9ndase de los ataques<\/h4>\n<p>Proteja el acceso con privilegios de los proveedores con sesiones aisladas y supervisadas de forma autom\u00e1tica.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-118726\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Enhance-Operational-Efficiencies.svg\" alt=\"Mejore la eficiencia operativa\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Mejore la eficiencia operativa<\/h4>\n<p>Proporcione acceso just-in-time para el proveedor sin a\u00f1adir sus identidades a AD.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 cybv2-pad cybv2-oval-left-background hv-cta-stats\u00bb css=\u00bb.vc_custom_1611886714437{background-color: #ff7600 !important;}\u00bb][vc_column el_class=\u00bbtext-md-center head-box\u00bb][vc_column_text]<\/p>\n<h3>Acceso seguro de proveedores<\/h3>\n<h5>Proporcione acceso granular a los proveedores sin complicaciones ni dolores de cabeza.<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbimg-box\u00bb css=\u00bb.vc_custom_1612236218569{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-Benefits-Stats-770&#215;550-1.jpg?id=110232) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbstat-column\u00bb][vc_row_inner][vc_column_inner el_class=\u00bblist-box\u00bb width=\u00bb11\/12&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=\u00bbbenefits-content-icon\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblist-text\u00bb]Simplifique el acceso de aprovisionamiento para proveedores externos[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bblist-box\u00bb width=\u00bb11\/12&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=\u00bbbenefits-content-icon\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblist-text\u00bb]Mejore la seguridad sin VPN, agentes ni contrase\u00f1as[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bblist-box\u00bb width=\u00bb11\/12&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=\u00bbbenefits-content-icon\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblist-text\u00bb]Experimente f\u00e1cilmente PAM como servicio[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=\u00bbstat-row\u00bb][vc_column_inner el_class=\u00bbstat\u00bb width=\u00bb5\/12&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-10&#8243;][vc_column_text]<\/p>\n<h4>96%<\/h4>\n<p>de las organizaciones conf\u00edan en proveedores externos para acceder a sistemas cr\u00edticos.*[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbstat\u00bb width=\u00bb5\/12&#8243; offset=\u00bbvc_col-sm-offset-0 vc_col-xs-offset-1 vc_col-xs-10&#8243;][vc_column_text]<\/p>\n<h4>70%<\/h4>\n<p>de las organizaciones consideran el riesgo del acceso de terceros como uno de los 10 principales riesgos.*[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2-pad-top cybv2 cybv2-background-oval tour sub-2&#8243;][vc_column][vc_row_inner el_class=\u00bbcyb-center\u00bb][vc_column_inner el_class=\u00bbcyb-pad-btm\u00bb][vc_column_text el_class=\u00bbleft-mobile\u00bb]<\/p>\n<h3>Abierto a los proveedores, cerrado a las ciberamenazas<\/h3>\n<p>Conecte de forma inteligente a los socios con su negocio.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=\u00bbsquare\u00bb active_section=\u00bb1&#8243; css_animation=\u00bbnone\u00bb][vc_tta_section i_position=\u00bbright\u00bb i_icon_fontawesome=\u00bbfas fa-chevron-circle-down\u00bb add_icon=\u00bbtrue\u00bb title=\u00bbAutenticaci\u00f3n multifactor biom\u00e9trica\u00bb tab_id=\u00bbbiometric\u00bb][vc_row_inner el_class=\u00bbcybv2&#8243;][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Autenticaci\u00f3n multifactor biom\u00e9trica<\/h4>\n<p>Aseg\u00farese de que los proveedores externos confirmen su identidad cada vez que necesiten acceder a activos cr\u00edticos.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-110240\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-1.png\" alt=\"Autenticaci\u00f3n multifactor\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00bbright\u00bb i_icon_fontawesome=\u00bbfas fa-chevron-circle-down\u00bb add_icon=\u00bbtrue\u00bb title=\u00bbAprovisionamiento just-in-time\u00bb tab_id=\u00bbjust-in-time\u00bb][vc_row_inner el_class=\u00bbcybv2&#8243;][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Aprovisionamiento just-in-time<\/h4>\n<p>Incorpore y d\u00e9 de baja f\u00e1cilmente a los proveedores para que accedan a lo que necesitan, cuando lo necesitan; incluye soporte para que los proveedores autogestionen las invitaciones.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-110248\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-2.png\" alt=\"Aprovisionamiento just-in-time\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-2.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-2-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-2-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00bbright\u00bb i_icon_fontawesome=\u00bbfas fa-chevron-circle-down\u00bb add_icon=\u00bbtrue\u00bb title=\u00bbRegistrar y supervisar\u00bb tab_id=\u00bbrecord\u00bb][vc_row_inner el_class=\u00bbcybv2&#8243;][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Registrar y supervisar<\/h4>\n<p>Obtenga una visibilidad total de las actividades de los proveedores con funciones completas de creaci\u00f3n de informes, auditor\u00eda y remediaci\u00f3n.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-110256\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-3.png\" alt=\"Registrar y supervisar\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-3.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-3-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-3-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00bbAcceso sin conexi\u00f3n\u00bb tab_id=\u00bboffline-access\u00bb][vc_row_inner][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Acceso sin conexi\u00f3n<\/h4>\n<p>Proporcione de forma segura credenciales de acceso a terceros autorizados en entornos aislados (air gap) y otros entornos sin conexi\u00f3n. Registre el uso de credenciales a efectos de auditor\u00eda y conformidad.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-127611\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/vendor-pam-tour.png\" alt=\"acceso sin conexi\u00f3n\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/vendor-pam-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/vendor-pam-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/vendor-pam-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/vendor-pam-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 cybv2-pad info-graphic sub-3&#8243;][vc_column width=\u00bb2\/3&#8243; offset=\u00bbvc_col-sm-offset-2&#8243;][vc_column_text el_class=\u00bbtext-md-center head-box\u00bb]<\/p>\n<h3>Acceso privilegiado de terceros zero trust<\/h3>\n<p>Ofrezca a los proveedores externos un acceso privilegiado cifrado de extremo a extremo r\u00e1pido y sencillo a los sistemas internos cr\u00edticos.[\/vc_column_text][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-119171\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/PAM_EV_v3-4.svg\" alt=\"Vendor Privileged Access Manager\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb css=\u00bb.vc_custom_1650997476933{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_column]<div class=\"templatera_shortcode\"><div data-vc-full-width=\"true\" data-vc-full-width-temp=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_full_width_resource\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_title\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h5 style=\"text-align: center;\">Identity security: centrada en<br \/>\ncontroles de privilegios inteligentes<\/h5>\n<p><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section5_container\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_center   new_hpstyle_section5_gart_img\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1.jpg\" class=\"vc_single_image-img attachment-full\" alt=\"Professional woman with glasses standing confidently against a dark background with a glowing triangular frame\" title=\"gartner-300x300\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1-100x100.jpg 100w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>2025 Gartner\u00ae Magic Quadrant\u2122\u00a0para la gesti\u00f3n del acceso con privilegios<\/h4>\n<p><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_btn3-container  cybv2-button-solid cyb-button-hpstyle_section5 vc_btn3-inline\"  >\n\t<a class=\"vc_btn3-color-grey\" href=\"https:\/\/lp.cyberark.com\/gartner-mq-pam-2025-es.html\" title=\"\" target=\"_blank\">Leer el informe<\/a><\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/a><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/div>[\/vc_column][\/vc_row][vc_row equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 cybv2_customer_stories vc_tta-o-non-responsive\u00bb css=\u00bb.vc_custom_1608676874239{background-color: #ffffff !important;}\u00bb][vc_column][vc_raw_js]%3Clink%20rel%3D%22stylesheet%22%20type%3D%22text%2Fcss%22%20href%3D%22%2F%2Fcdn.jsdelivr.net%2Fnpm%2Fslick-carousel%401.8.1%2Fslick%2Fslick.css%22%2F%3E%0A%3Cscript%20type%3D%22text%2Fjavascript%22%20src%3D%22%2F%2Fcdn.jsdelivr.net%2Fnpm%2Fslick-carousel%401.8.1%2Fslick%2Fslick.min.js%22%3E%3C%2Fscript%3E%0A%3Cscript%3E%0AjQuery%28document%29.ready%28function%28%29%7B%0A%20%20%20%20%2F%2FAdd%20Active%20to%20tab%20on%20page%20load%0A%20%20%20%20%24panels%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-panels%20.vc_tta-panel%27%29%3B%0A%20%20%20%20%24tabs%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%20%20%20%20var%20index%20%3D%200%3B%0A%0A%20%20%20%20%2F%2FAlign%20Tabs%20with%20panels%0A%20%20%20%20%24panels.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20jQuery%28this%29.hasClass%28%27vc_active%27%29%3B%0A%20%20%20%20%20%20%20%20return%20false%3B%0A%20%20%20%20%20%20%20%20index%2B%2B%3B%0A%20%20%20%20%7D%29%0A%20%20%20%20var%20newIndex%20%3D%200%3B%0A%20%20%20%20%24tabs.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20if%28index%20%3D%3D%20newIndex%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20jQuery%28this%29.addClass%28%27vc_active%27%29%3B%0A%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20%20%20newIndex%2B%2B%3B%0A%20%20%20%20%7D%29%0A%0A%20%20%20%20%2F%2FAdd%20custom%20icon%20to%20tabs%0A%20%20%20%20var%20iconIndex%20%3D%201%3B%0A%20%20%20%20%24panels.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20%24this%20%3D%20jQuery%28this%29%3B%0A%20%20%20%20%20%20%20%20%24tab%20%3D%20%24this.find%28%27.tab-icon%27%29%3B%0A%20%20%20%20%20%20%20%20%24tab.find%28%27img%27%29.prependTo%28jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tab%3Anth-of-type%28%27%20%2B%20iconIndex%20%2B%20%27%29%20a%27%29%29%3B%0A%20%20%20%20%20%20%20%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tab%3Anth-of-type%28%27%20%2B%20iconIndex%20%2B%20%27%29%20a%20i%27%29.remove%28%29%0A%20%20%20%20%20%20%20%20%24tab.remove%28%29%3B%0A%20%20%20%20%20%20%20%20iconIndex%2B%2B%3B%0A%20%20%20%20%7D%29%0A%7D%29%3B%0AjQuery%28window%29.on%28%27load%20resize%20orientationchange%27%2C%20function%28%29%20%7B%0A%20%20%20%20var%20%24carousel%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%27%29%3B%0A%20%20%20%20var%20%24click%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%0A%20%20%20%20%2F%2FChange%20slide%20to%20selected%20panel%20for%20tabs%0A%20%20%20%20var%20slideGoTo%20%3D%20function%28%29%7B%0A%20%20%20%20%20%20%20%20if%20%28%24carousel.hasClass%28%27slick-initialized%27%29%29%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24carousel.slick%28%27slickGoTo%27%2C%20%2BjQuery%28this%29.attr%28%27data-slick-index%27%29%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20setTimeout%28function%28%29%7B%20%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%24click%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%24click.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20if%28jQuery%28this%29.hasClass%28%27vc_active%27%29%20%26%26%20%28%21jQuery%28this%29.hasClass%28%27slick-center%27%29%20%7C%7C%20%21jQuery%28this%29.hasClass%28%27slick-active%27%29%29%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jQuery%28this%29.removeClass%28%27vc_active%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%7D%29%0A%20%20%20%20%20%20%20%20%20%20%20%20%7D%2C%201000%29%3B%0A%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%7D%0A%0A%20%20%20%20%2F%2FUpdate%20panel%20for%20selected%20slide%20%28aka%20tab%29%0A%20%20%20%20var%20afterChangeFunction%20%3D%20function%28slick%2C%20currentSlide%29%7B%0A%20%20%20%20%20%20%20%20%24currentTab%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab.slick-center.slick-active%20a%27%29%3B%0A%20%20%20%20%20%20%20%20if%28%21%24currentTab.parent%28%29.hasClass%28%27vc_active%27%29%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24currentTab.trigger%28%27click%27%29%3B%0A%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20%20%20%2F%2AsetTimeout%28function%28%29%7B%20%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20if%28jQuery%28this%29.hasClass%28%27vc_active%27%29%20%26%26%20%28%21jQuery%28this%29.hasClass%28%27slick-center%27%29%20%7C%7C%20%21jQuery%28this%29.hasClass%28%27slick-active%27%29%29%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jQuery%28this%29.removeClass%28%27vc_active%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20%20%20%20%20%20%20%7D%29%0A%20%20%20%20%20%20%20%20%7D%2C%201000%29%3B%2A%2F%0A%20%20%20%20%7D%0A%0A%20%20%20%20%2F%2A%20Initializes%20a%20slick%20carousel%20only%20on%20mobile%20screens%20%2A%2F%0A%20%20%20%20%2F%2F%20slick%20on%20mobile%0A%20%20%20%20if%20%28jQuery%28window%29.width%28%29%20%3E%20768%29%20%7B%0A%20%20%20%20%20%20%20%20if%20%28%24carousel.hasClass%28%27slick-initialized%27%29%29%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24carousel.slick%28%27unslick%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click.unbind%28%27click%27%2C%20slideGoTo%29%0A%20%20%20%20%20%20%20%20%20%20%20%20%24carousel.unbind%28%27afterChange%27%2C%20afterChangeFunction%29%3B%0A%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%7D%0A%20%20%20%20else%7B%0A%20%20%20%20%20%20%20%20if%20%28%21%24carousel.hasClass%28%27slick-initialized%27%29%29%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24carousel.slick%28%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20slidesToShow%3A%203%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20slidesToScroll%3A%201%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mobileFirst%3A%20true%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20infinite%3A%20true%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20centerMode%3A%20true%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20centerPadding%3A%20%2750px%27%0A%20%20%20%20%20%20%20%20%20%20%20%20%7D%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click.bind%28%27click%27%2C%20slideGoTo%29%0A%20%20%20%20%20%20%20%20%20%20%20%20%24carousel.bind%28%27afterChange%27%2C%20afterChangeFunction%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20if%28jQuery%28this%29.hasClass%28%27vc_active%27%29%20%26%26%20%21jQuery%28this%29.hasClass%28%27slick-cloned%27%29%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jQuery%28this%29.trigger%28%27click%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20%20%20%20%20%20%20%7D%29%0A%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%7D%0A%7D%29%3B%0A%3C%2Fscript%3E[\/vc_raw_js][vc_tta_tabs style=\u00bbflat\u00bb shape=\u00bbsquare\u00bb color=\u00bbwhite\u00bb spacing=\u00bb\u00bb gap=\u00bb20&#8243; alignment=\u00bbcenter\u00bb active_section=\u00bb\u00bb el_class=\u00bbcybv2_customer_stories_tabs\u00bb css=\u00bb.vc_custom_1608676900675{background-color: #ffffff !important;}\u00bb][vc_tta_section i_icon_fontawesome=\u00bbfas fa-piggy-bank\u00bb add_icon=\u00bbtrue\u00bb title=\u00bbClientes\u00bb tab_id=\u00bb1607742493330-265de97c-f2d9eb66-6bf8a95e-9371&#8243; el_class=\u00bbnew_hpstyle_section6_tab1_icon vc_active\u00bb][vc_row_inner equal_height=\u00bbyes\u00bb el_class=\u00bbnew_hpstyle_section6_maintab_row\u00bb][vc_column_inner el_class=\u00bbimage-column\u00bb width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_single_image image=\u00bb135854&#8243; img_size=\u00bb590&#215;500&#8243; alignment=\u00bbright\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_left_image\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00bb width=\u00bb1\/2&#8243;][vc_single_image image=\u00bb127960&#8243; img_size=\u00bbfull\u00bb el_class=\u00bbtab-icon\u00bb][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text1 text\u00bb]\u00bbNos impresion\u00f3 mucho el portal de acceso para proveedores, la integraci\u00f3n con nuestro entorno, que es algo que no creemos que ofrecieran otros, y el hecho de que, en general, fuera una soluci\u00f3n intuitiva y f\u00e1cil de usar\u00bb.[\/vc_column_text][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text2&#8243;]<strong>Brent Wallace,<\/strong> director de TI, Condado de Norfolk[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/norfolk-county-meets-strict-insurance-guidelines-and-improves-third-party-access-management\/\">Consulte el caso pr\u00e1ctico<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=\u00bbfas fa-satellite-dish\u00bb add_icon=\u00bbtrue\u00bb title=\u00bbTelco\u00bb tab_id=\u00bb1607742494008-8c0fb98b-2b6beb66-6bf8a95e-9371&#8243; el_class=\u00bbnew_hpstyle_section6_tab2_icon\u00bb][vc_row_inner equal_height=\u00bbyes\u00bb el_class=\u00bbnew_hpstyle_section6_maintab_row\u00bb][vc_column_inner el_class=\u00bbimage-column\u00bb width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1607653503563{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_single_image image=\u00bb108213&#8243; img_size=\u00bb590&#215;500&#8243; alignment=\u00bbright\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_left_image\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00bb width=\u00bb1\/2&#8243;][vc_single_image image=\u00bb108255&#8243; img_size=\u00bbfull\u00bb el_class=\u00bbtab-icon\u00bb][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text1 text\u00bb]\u00bbCon CyberArk, podemos estar seguros de haber implementado una tecnolog\u00eda que seguir\u00e1 funcionando a medida que nuestro negocio crezca y prospere\u00bb.[\/vc_column_text][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text2&#8243;]<strong>Jean-Pierre Blanc<\/strong>, Bouygues Telecom[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/case-studies\/bouygues-telecom-secures-critical-business-systems-and-maintains-high-levels-of-customer-service-with-cyberark-solutions\">Consulte el caso pr\u00e1ctico<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=\u00bbfas fa-piggy-bank\u00bb add_icon=\u00bbtrue\u00bb title=\u00bbInformaci\u00f3n financiera\u00bb tab_id=\u00bb1607742494616-60a6dced-32cfeb66-6bf8a95e-9371&#8243; el_class=\u00bbnew_hpstyle_section6_tab3_icon\u00bb][vc_row_inner equal_height=\u00bbyes\u00bb el_class=\u00bbnew_hpstyle_section6_maintab_row\u00bb][vc_column_inner el_class=\u00bbimage-column\u00bb width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1607653481888{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_single_image image=\u00bb108222&#8243; img_size=\u00bb590&#215;500&#8243; alignment=\u00bbright\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_left_image\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00bb width=\u00bb1\/2&#8243;][vc_single_image image=\u00bb108247&#8243; img_size=\u00bbfull\u00bb el_class=\u00bbtab-icon\u00bb][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text1 text\u00bb]\u00bbNo solo nos permite cumplir con los requisitos de conformidad, sino tambi\u00e9n dise\u00f1ar y adaptar activamente las pol\u00edticas conforme a las mejores pr\u00e1cticas de ciberseguridad a fin de consolidar nuestra posici\u00f3n general en materia de seguridad y ajustar los equipos internos\u00bb.[\/vc_column_text][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text2&#8243;]<strong>Joel Harris,<\/strong> Director[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/case-studies\/national-australia-bank-implements-pam-across-multiple-operation-areas\">Consulte el caso pr\u00e1ctico<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=\u00bbfas fa-industry\u00bb add_icon=\u00bbtrue\u00bb title=\u00bbFabricaci\u00f3n\u00bb tab_id=\u00bb1607742495229-255d985e-6d0ceb66-6bf8a95e-9371&#8243; el_class=\u00bbnew_hpstyle_section6_tab4_icon\u00bb][vc_row_inner equal_height=\u00bbyes\u00bb el_class=\u00bbnew_hpstyle_section6_maintab_row\u00bb][vc_column_inner el_class=\u00bbimage-column\u00bb width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1607653496575{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_single_image image=\u00bb110300&#8243; img_size=\u00bb590&#215;500&#8243; alignment=\u00bbright\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_left_image\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00bb width=\u00bb1\/2&#8243;][vc_single_image image=\u00bb108271&#8243; img_size=\u00bbfull\u00bb el_class=\u00bbtab-icon\u00bb][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text1 text\u00bb]\u00bbCyberArk nos proporcion\u00f3 la visibilidad y el control granular necesarios para implementar tanto el m\u00ednimo privilegio como el control de aplicaciones de &#8216;denegaci\u00f3n predeterminada&#8217; con una interrupci\u00f3n m\u00ednima de la actividad\u00bb.[\/vc_column_text][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text2&#8243;]<strong>Ken Brown,<\/strong> CISO[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/case-studies\/milliken-company-enhances-security-protocol-through-least-privilege-with-default-deny-application-control-to-protect-global-end-users\">Consulte el caso pr\u00e1ctico<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=\u00bbfas fa-university\u00bb add_icon=\u00bbtrue\u00bb title=\u00bbAseguradoras\u00bb tab_id=\u00bb1607742495902-f2d9a00d-8e74eb66-6bf8a95e-9371&#8243; el_class=\u00bbnew_hpstyle_section6_tab5_icon\u00bb][vc_row_inner equal_height=\u00bbyes\u00bb el_class=\u00bbnew_hpstyle_section6_maintab_row\u00bb][vc_column_inner el_class=\u00bbimage-column\u00bb width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1607653492933{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_single_image image=\u00bb108238&#8243; img_size=\u00bb590&#215;500&#8243; alignment=\u00bbright\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_left_image\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00bb width=\u00bb1\/2&#8243;][vc_single_image image=\u00bb108263&#8243; img_size=\u00bbfull\u00bb el_class=\u00bbtab-icon\u00bb][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text1 text\u00bb]\u00bbCon RPA y las migraciones en la nube, las credenciales cada vez se apartan m\u00e1s de los controles &#8216;normales&#8217;. CyberArk puede ampliarse para abarcar todos los escenarios de forma habitual\u00bb.[\/vc_column_text][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text2&#8243;]<strong>Asesor de Seguridad de la informaci\u00f3n<\/strong>, Enterprise Cybersecurity Solutions Technologies[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/customer-stories\">Consulte m\u00e1s experiencias de clientes<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=\u00bbfas fa-school\u00bb add_icon=\u00bbtrue\u00bb title=\u00bbEducation\u00bb tab_id=\u00bbeducation\u00bb el_class=\u00bbnew_hpstyle_section6_tab5_icon\u00bb][vc_row_inner equal_height=\u00bbyes\u00bb el_class=\u00bbnew_hpstyle_section6_maintab_row\u00bb][vc_column_inner el_class=\u00bbimage-column\u00bb width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1607653492933{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_single_image image=\u00bb183627&#8243; img_size=\u00bb590&#215;500&#8243; alignment=\u00bbright\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_left_image\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00bb width=\u00bb1\/2&#8243;][vc_single_image image=\u00bb183681&#8243; img_size=\u00bbfull\u00bb el_class=\u00bbtab-icon\u00bb][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text1 text\u00bb]\u201cNow we are starting to use CyberArk Vendor Privileged Access Manager to secure and streamline vendor access. It is a beautiful thing because now vendors enjoy a password-less and VPN-less experience to access their target systems, they authenticate in a seamless way and only have access to their product. We can also control and limit their access to certain hours, and we can rotate passwords as soon as they log off.\u201d[\/vc_column_text][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text2&#8243;]<strong>John Vincent, Director of Technology<\/strong>, Chico Unified School District[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/chico-unified-school-district\/\">Read the Case Study<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row][vc_row disable_element=\u00bbyes\u00bb][vc_column][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2_resources sub-4&#8243; css=\u00bb.vc_custom_1616764361087{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}\u00bb][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbno-break\u00bb][vc_column_text el_class=\u00bbno-break\u00bb]<\/p>\n<h3>Explore<br \/>\nrecursos<br \/>\nrelacionados<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/vendor-privileged-access-manager\">Ver todos los recursos<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2_resources_uberflip\u00bb][vc_column el_class=\u00bbnew_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=\u00bb.vc_custom_1611331958175{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbnew_hpstyle_section8_uberflip\u00bb]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb css=\u00bb.vc_custom_1617028647965{background-color: #f7f7f7 !important;}\u00bb el_class=\u00bbcybv2 cybv2-pad-top hv-cta\u00bb][vc_column width=\u00bb7\/12&#8243; el_class=\u00bbleft-clmn\u00bb][vc_column_text]<\/p>\n<h2>Obtenga una prueba gratuita de 30 d\u00edas<\/h2>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner el_class=\u00bbhead-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbhead-box-text\u00bb]Acceso seguro para proveedores externos[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbhead-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbhead-box-text\u00bb]Sin VPN, contrase\u00f1as ni agentes[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbhead-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbhead-box-text\u00bb]Mantenga a los socios productivos y a los atacantes alejados[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbhead-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbhead-box-text\u00bb]Auditor\u00eda y gesti\u00f3n de sesiones sin problemas[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_single_image image=\u00bb108760&#8243; img_size=\u00bbfull\u00bb el_class=\u00bbd-none d-md-block\u00bb][\/vc_column][vc_column width=\u00bb1\/12&#8243; css=\u00bb.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}\u00bb][\/vc_column][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbright-clmn cybv2-form\u00bb][vc_column_text el_class=\u00bbbold\u00bb]<\/p>\n<h4>Reg\u00edstrese<\/h4>\n<p>[\/vc_column_text][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iODUwOSIgdHlfcGFnZV91cmw9Imh0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS90cnktYnV5L3RoYW5rLXlvdS12ZW5kb3ItcHJpdmlsZWdlZC1hY2Nlc3MtbWFuYWdlci8iXQ==[\/vc_raw_html][vc_column_text el_class=\u00bbmore-tiny form-notice\u00bb]<strong>Nota para los clientes actuales<\/strong> CyberArk ofrece actualmente a los clientes existentes de CorePAS y\/o de modelos antiguos de EPV\/PSM (v10.3 y versiones posteriores) la posibilidad de desplegar y utilizar Alero durante 30 d\u00edas*, para gestionar hasta 100 usuarios de terceros. CyberArk es consciente de la presi\u00f3n a la que se ven sometidos usted y su empresa en la actualidad y se compromete a ayudar a nuestros clientes a garantizar su seguridad en todo lo posible.<\/p>\n<p><strong>*T\u00e9rminos y condiciones<\/strong> El acceso a la suscripci\u00f3n gratuita de CyberArk Vendor Privileged Access Manager est\u00e1 disponible \u00fanicamente para los clientes existentes de CyberArk CorePAS y\/o de modelos antiguos de EPV\/PSM que cumplen los requisitos del sistema para ejecutar Vendor Privileged Access Manager y est\u00e1 sujeto a unas condiciones establecidas a la exclusiva discreci\u00f3n de CyberArk.<\/p>\n<p>El calendario de implementaci\u00f3n de Vendor Privileged Access Manager est\u00e1 sujeto a la disponibilidad de los servicios profesionales y socios especializados de CyberArk.[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00bbcyb-pad cybv2&#8243;][vc_column][vc_column_text el_class=\u00bbtiny\u00bb]*FUENTE: <a href=\"https:\/\/www.cyberark.com\/resources\/ebooks\/third-party-privileged-access-to-critical-systems-ebook\">CyberArk, \u00abThird Party Privileged Access to Critical Systems\u00bb 2020<\/a>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbtiny\u00bb]CyberArk Has Patent Rights Relating To This Technology &#8211; <a href=\"https:\/\/www.cyberark.com\/es\/patents\/\">https:\/\/www.cyberark.com\/patents<\/a>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":198,"featured_media":0,"parent":53045,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27777],"class_list":["post-115270","page","type-page","status-publish","hentry","product_category-privilege"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Vendor Access - Gesti\u00f3n del acceso con privilegios de terceros | CyberArk<\/title>\n<meta name=\"description\" content=\"Proporcione acceso seguro a proveedores externos de confianza sin necesidad de VPN, agentes ni contrase\u00f1as con CyberArk Vendor Privileged Access Manager.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vendor Privileged Access Manager\" \/>\n<meta property=\"og:description\" content=\"Proporcione acceso seguro a proveedores externos de confianza sin necesidad de VPN, agentes ni contrase\u00f1as con CyberArk Vendor Privileged Access Manager.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-14T17:43:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/\",\"url\":\"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/\",\"name\":\"Vendor Access - Gesti\u00f3n del acceso con privilegios de terceros | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg\",\"datePublished\":\"2021-02-03T21:05:43+00:00\",\"dateModified\":\"2025-02-14T17:43:28+00:00\",\"description\":\"Proporcione acceso seguro a proveedores externos de confianza sin necesidad de VPN, agentes ni contrase\u00f1as con CyberArk Vendor Privileged Access Manager.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Productos\",\"item\":\"https:\/\/www.cyberark.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Vendor Privileged Access Manager\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Vendor Access - Gesti\u00f3n del acceso con privilegios de terceros | CyberArk","description":"Proporcione acceso seguro a proveedores externos de confianza sin necesidad de VPN, agentes ni contrase\u00f1as con CyberArk Vendor Privileged Access Manager.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/","og_locale":"es_ES","og_type":"article","og_title":"Vendor Privileged Access Manager","og_description":"Proporcione acceso seguro a proveedores externos de confianza sin necesidad de VPN, agentes ni contrase\u00f1as con CyberArk Vendor Privileged Access Manager.","og_url":"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-02-14T17:43:28+00:00","og_image":[{"width":770,"height":550,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tiempo de lectura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/","url":"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/","name":"Vendor Access - Gesti\u00f3n del acceso con privilegios de terceros | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg","datePublished":"2021-02-03T21:05:43+00:00","dateModified":"2025-02-14T17:43:28+00:00","description":"Proporcione acceso seguro a proveedores externos de confianza sin necesidad de VPN, agentes ni contrase\u00f1as con CyberArk Vendor Privileged Access Manager.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Productos","item":"https:\/\/www.cyberark.com\/products\/"},{"@type":"ListItem","position":3,"name":"Vendor Privileged Access Manager"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/115270","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/users\/198"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/comments?post=115270"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/115270\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/53045"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/media?parent=115270"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/product_category?post=115270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}