{"id":115291,"date":"2021-02-03T16:28:23","date_gmt":"2021-02-03T21:28:23","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/"},"modified":"2025-10-07T14:35:50","modified_gmt":"2025-10-07T18:35:50","slug":"endpoint-privilege-manager","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/es\/products\/endpoint-privilege-manager\/","title":{"rendered":"Endpoint Privilege Manager"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcybv2 hero dark\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-1&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbcyb-breadcrumb\u00bb]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/es\/products\/endpoint-identity-security\/\"> Volver a Endpoint Identity Security<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>Endpoint Privilege Manager<\/h1>\n<p><\/p>\n<h2>Elimine los derechos de administrador local, aplique el m\u00ednimo privilegio e implemente controles b\u00e1sicos de seguridad para endpoints en todos los endpoints Windows, macOS y Linux desde entornos h\u00edbridos hasta entornos en la nube.<\/h2>\n<p>\n[\/vc_column_text][vc_btn title=\u00bbDescargar la gu\u00eda\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb css=\u00bb\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Febooks%2Fthe-gorilla-guide-to-practical-endpoint-privilege-security|title:descargar%20ahora|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/ebooks\/buyers-guide-managing-endpoint-privileges\/\">Gu\u00eda para la adquisici\u00f3n de EPM<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-2&#8243;][vc_single_image image=\u00bb217503&#8243; img_size=\u00bbfull\u00bb css=\u00bb\u00bb][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2-pad-top\u00bb css=\u00bb.vc_custom_1749662691240{margin-top: 120px !important;}\u00bb][vc_column el_class=\u00bbtext-center\u00bb][vc_column_text css=\u00bb\u00bb]<\/p>\n<h2>Implemente controles proactivos y preventivos<\/h2>\n<p><\/p>\n<p class=\"p1\">Proteja todos los endpoints: administrados, no administrados y servidores<\/p>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb el_class=\u00bbcybv2 cybv2-pad cr-culture\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcybv2_peace_of_mind_left_col\u00bb css=\u00bb.vc_custom_1718259579410{border-left-width: 2px !important;}\u00bb][vc_column_text css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section4_h5&#8243;]<\/p>\n<h4>Elimine los derechos de administrador local\u200b<\/h4>\n<p>\n[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section4__text2&#8243;]Reduzca la superficie de ataque de los endpoints quitando los derechos de administrador local<\/p>\n<p>Endpoint Privilege Manager ayuda a eliminar los derechos de administrador local a la vez que mejora la experiencia del usuario y optimiza las operaciones de TI.\u200b La gesti\u00f3n flexible basada en pol\u00edticas simplifica la orquestaci\u00f3n de privilegios y permite sesiones de mantenimiento just-in-time controladas.\u200b[\/vc_column_text][vc_row_inner el_class=\u00bbresource-button-sand\u00bb][vc_column_inner column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Flocal-admin-rights-your-biggest-cyber-vulnerability|title:Consultar%20el%20monogr%C3%A1fico|\u00bb offset=\u00bbvc_col-lg-10 vc_col-md-12 vc_col-xs-11&#8243;][vc_column_text css=\u00bb\u00bb]MONOGR\u00c1FICO[\/vc_column_text][vc_column_text css=\u00bb\u00bb]Su mayor vulnerabilidad cibern\u00e9tica: las cuentas de administrador local <i class=\"fa-solid fa-circle-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcybv2_peace_of_mind_right_col\u00bb][vc_single_image image=\u00bb205046&#8243; img_size=\u00bbfull\u00bb css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section4_img1&#8243;][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb el_class=\u00bbcybv2 cybv2-pad cr-culture\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcybv2_peace_of_mind_right_col\u00bb css=\u00bb.vc_custom_1718259599430{border-left-width: 2px !important;}\u00bb][vc_single_image image=\u00bb209736&#8243; img_size=\u00bbfull\u00bb css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section4_img1&#8243;][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcybv2_peace_of_mind_left_col\u00bb][vc_column_text css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section4_h5&#8243;]<\/p>\n<h4>Aplique el principio del m\u00ednimo privilegio\u200b<\/h4>\n<p>\n[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section4__text2&#8243;]<\/p>\n<p class=\"p1\">Ampl\u00ede la seguridad de la identidad y el enfoque Zero Trust a los endpoints<\/p>\n<p>El control integral de aplicaciones basado en pol\u00edticas condicionales le ayuda a crear escenarios para cada grupo de usuarios, desde RR. HH. hasta DevOps. Se considera que el contexto, los par\u00e1metros y los atributos de la aplicaci\u00f3n permiten o bloquean determinados scripts, aplicaciones u operaciones.\u200b[\/vc_column_text][vc_row_inner el_class=\u00bbresource-button-sand\u00bb][vc_column_inner column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fenhance-your-security-by-extending-zero-trust-and-identity-security|title:Consultar%20el%20monogr%C3%A1fico|\u00bb offset=\u00bbvc_col-lg-10 vc_col-md-12 vc_col-xs-11&#8243;][vc_column_text css=\u00bb\u00bb]MONOGR\u00c1FICO[\/vc_column_text][vc_column_text css=\u00bb\u00bb]Mejore la seguridad en el endpoint con la Seguridad de la Identidad y el enfoque Zero Trust <i class=\"fa-solid fa-circle-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb el_class=\u00bbcybv2 cybv2-pad cr-culture\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcybv2_peace_of_mind_left_col\u00bb css=\u00bb.vc_custom_1718259579410{border-left-width: 2px !important;}\u00bb][vc_column_text css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section4_h5&#8243;]<\/p>\n<h4>Defi\u00e9ndase del ransomware\u200b<\/h4>\n<p>\n[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section4__text2&#8243;]<\/p>\n<p class=\"p1\">Protecci\u00f3n contra ransomware lista para usar\u200b<\/p>\n<p><\/p>\n<p class=\"p1\">La seguridad integral de m\u00faltiples capas basada en la identidad y los privilegios debilita los TTP en los que se basan la mayor\u00eda de los ciberataques.<\/p>\n<p>\n[\/vc_column_text][vc_row_inner el_class=\u00bbresource-button-sand\u00bb][vc_column_inner column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fwhy-edr-isn-t-enough-to-stop-cyberattacks|title:Consultar%20el%20monogr%C3%A1fico|\u00bb offset=\u00bbvc_col-lg-10 vc_col-md-12 vc_col-xs-11&#8243;][vc_column_text css=\u00bb\u00bb]MONOGR\u00c1FICO[\/vc_column_text][vc_column_text css=\u00bb\u00bb]Por qu\u00e9 EDR no es suficiente para detener los ciberataques <i class=\"fa-solid fa-circle-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcybv2_peace_of_mind_right_col\u00bb][vc_single_image image=\u00bb209718&#8243; img_size=\u00bbfull\u00bb css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section4_img1&#8243;][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb el_class=\u00bbcybv2 cybv2-pad cr-culture\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcybv2_peace_of_mind_right_col\u00bb css=\u00bb.vc_custom_1718259599430{border-left-width: 2px !important;}\u00bb][vc_single_image image=\u00bb209727&#8243; img_size=\u00bbfull\u00bb css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section4_img1&#8243;][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcybv2_peace_of_mind_left_col\u00bb][vc_column_text css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section4_h5&#8243;]<\/p>\n<h4>Aumente la visibilidad con la auditor\u00eda de pol\u00edticas<\/h4>\n<p>\n[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section4__text2&#8243;]Satisfaga los requisitos de auditor\u00eda y conformidad normativa\u200b<\/p>\n<p>Satisfaga los requisitos de auditor\u00eda y conformidad normativa en el endpoint a la vez que aumenta la visibilidad con capacidades de auditor\u00eda de pol\u00edticas que le permiten crear registros de auditor\u00eda para rastrear y analizar los intentos de aumento de privilegios.\u200b[\/vc_column_text][vc_row_inner el_class=\u00bbresource-button-sand\u00bb][vc_column_inner column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fhow-endpoint-privilege-management-fulfills-federal-mandates|title:Consultar%20el%20monogr%C3%A1fico|\u00bb offset=\u00bbvc_col-lg-10 vc_col-md-12 vc_col-xs-11&#8243;][vc_column_text css=\u00bb\u00bb]Libro electr\u00f3nico[\/vc_column_text][vc_column_text css=\u00bb\u00bb]C\u00f3mo Endpoint Privilege Manager cumple los mandatos federales <i class=\"fa-solid fa-circle-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 cybv2-pad-top overview-more-col dark\u00bb][vc_column width=\u00bb2\/3&#8243; el_class=\u00bbtext-md-center heading\u00bb offset=\u00bbvc_col-md-offset-2 vc_col-sm-offset-1&#8243;][vc_column_text css=\u00bb.vc_custom_1750108848859{margin-bottom: 40px !important;}\u00bb]<\/p>\n<h3>Seguridad proactiva en el endpoint<\/h3>\n<p>Los ataques a los endpoints son una amenaza creciente, y los m\u00e9todos tradicionales de seguridad reactiva para endpoints no son suficientes para reducir el n\u00famero de ataques.\u200b<br \/>\u200b<br \/>Endpoint Privilege Manager es una soluci\u00f3n proactiva que ayuda a eliminar las barreras para aplicar el m\u00ednimo privilegio y permite a las organizaciones bloquear y contener los ataques en el endpoint para defenderse de un atacante con privilegios.\u200b[\/vc_column_text][vc_btn title=\u00bbConsultar la ficha t\u00e9cnica\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb css=\u00bb\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fproduct-datasheets%2Fcyberark-endpoint-privilege-manager-datasheet|title:Leer%20ahora|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbcta-box text-center\u00bb][vc_column_text css=\u00bb\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-209745\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/camera-shutter__primary.svg\" alt=\"\u00edcono de obturador de c\u00e1mara\" width=\"39\" height=\"46\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4>Ampl\u00ede la seguridad de la identidad y el enfoque Zero Trust a todos los endpoints<\/h4>\n<p>Evite las filtraciones antes de que ocurran con la eliminaci\u00f3n de los derechos de administrador local, los controles del m\u00ednimo privilegio y la detecci\u00f3n de amenazas a la identidad.[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbcta-box text-center\u00bb][vc_column_text css=\u00bb\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-209754\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/touch-btn__primary.svg\" alt=\"\u00edcono de bot\u00f3n t\u00e1ctil\" width=\"39\" height=\"46\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4>Aumente la eficiencia y la automatizaci\u00f3n de seguridad de TI\u200b<\/h4>\n<p>Reduzca la seguridad de TI y los costos operativos, sin afectar la productividad con la elevaci\u00f3n JIT, la automatizaci\u00f3n de aprobaciones y el bloqueo de aplicaciones maliciosas conocidas.[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbcta-box text-center\u00bb][vc_column_text css=\u00bb\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-209763\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/fact-check__alt.svg\" alt=\"\u00edcono de verificaci\u00f3n de datos\" width=\"39\" height=\"46\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4>Reduzca la superficie de ataque en el endpoint\u200b<\/h4>\n<p><\/p>\n<p class=\"p1\">Fortalezca las defensas contra el ransomware y otras ciberamenazas con controles de aplicaciones y aislamiento granular de aplicaciones.<\/p>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbcta-box text-center\u00bb][vc_column_text css=\u00bb\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-209772\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/swords__alt.svg\" alt=\"\u00edcono de espadas\" width=\"39\" height=\"46\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4>Satisfaga las normas de auditor\u00eda y conformidad normativa<\/h4>\n<p>con registros detallados e informaci\u00f3n sobre el uso de aplicaciones, los derechos de acceso y las acciones con privilegios.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2-pad-top text-center video-wide\u00bb css=\u00bb.vc_custom_1749504414290{background-color: #E8E8E3 !important;}\u00bb][vc_column width=\u00bb1\/2&#8243; offset=\u00bbvc_col-sm-offset-3&#8243; el_class=\u00bbhead-box\u00bb][vc_column_text css=\u00bb\u00bb]<\/p>\n<h3>Gesti\u00f3n de acceso e identidades centralizada para servidores Linux<\/h3>\n<p>La funci\u00f3n Identity Bridge de Endpoint Privilege Manager ayuda a modernizar la gesti\u00f3n de la identidad de Linux.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2-pad video-wide\u00bb css=\u00bb.vc_custom_1749662750475{background-color: #E8E8E3 !important;}\u00bb][vc_column width=\u00bb5\/6&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_raw_html css=\u00bb\u00bb]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 cybv2_customer_stories vc_tta-o-non-responsive cyb-pad-top\u00bb css=\u00bb.vc_custom_1701205658071{background-color: #ffffff !important;}\u00bb][vc_column][vc_tta_tabs style=\u00bbflat\u00bb shape=\u00bbsquare\u00bb color=\u00bbwhite\u00bb spacing=\u00bb\u00bb gap=\u00bb20&#8243; alignment=\u00bbcenter\u00bb active_section=\u00bb\u00bb el_class=\u00bbcybv2_customer_stories_tabs\u00bb css=\u00bb.vc_custom_1703194752377{background-color: #ffffff !important;}\u00bb][vc_tta_section title=\u00bbQuanta Services\u00bb tab_id=\u00bbquanta-services\u00bb el_class=\u00bbnew_hpstyle_section6_tab3&#8243;][vc_row_inner equal_height=\u00bbyes\u00bb el_class=\u00bbnew_hpstyle_section6_maintab_row\u00bb][vc_column_inner el_class=\u00bbimage-column\u00bb width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_single_image image=\u00bb211506&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbright\u00bb css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_left_image\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00bb width=\u00bb1\/2&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_text1 text\u00bb]\u00bbHe implementado CyberArk en empresas de tan solo 150 usuarios, pero tambi\u00e9n en Quanta, con 16.000 endpoints y numerosas cuentas individuales. Cada vez, mi enfoque era id\u00e9ntico. La implementaci\u00f3n con CyberArk funciona sin importar el tama\u00f1o de la empresa\u201d.[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_text2&#8243;]Richard Breaux, Senior Manager, IT Security, <strong>Quanta Services<\/strong>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/customer-stories\/quanta-services\/\">Leer la experiencia del cliente<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00bbPacific Dental Services\u00bb tab_id=\u00bbpacific-dental-services\u00bb el_class=\u00bbnew_hpstyle_section6_tab3&#8243;][vc_row_inner equal_height=\u00bbyes\u00bb el_class=\u00bbnew_hpstyle_section6_maintab_row\u00bb][vc_column_inner el_class=\u00bbimage-column\u00bb width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_single_image image=\u00bb185509&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbright\u00bb css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_left_image\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00bb width=\u00bb1\/2&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_text1 text\u00bb]\u00bbSaber que puedo gestionar privilegios y contrase\u00f1as y hacerlo a escala sin afectar el negocio es una de las mayores ventajas que obtengo de CyberArk\u00bb.[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_text2&#8243;]Nemi George, VP y CISO, Information Security, <strong>Pacific Dental Services<\/strong>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/customer-stories\/pacific-dental-services-secures-access-to-clinical-resources-for-over-900-dental-practices\/\">Leer la experiencia del cliente<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00bbTIAA\u00bb tab_id=\u00bbtiaa\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_icon vc_active\u00bb][vc_row_inner equal_height=\u00bbyes\u00bb el_class=\u00bbnew_hpstyle_section6_maintab_row\u00bb][vc_column_inner el_class=\u00bbimage-column\u00bb width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_single_image image=\u00bb185409&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbright\u00bb css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_left_image\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00bb width=\u00bb1\/2&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_text1 text\u00bb]\u00bbFue incre\u00edble: comparamos el n\u00famero de aplicaciones y secretos que CyberArk Conjur [now known as CyberArk Secrets Manager] pod\u00eda gestionar simult\u00e1neamente frente a las soluciones de la competencia, y la diferencia de costos era muy convincente\u00bb.[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_text2&#8243;]Adam Powers, Lead Info Security Engineering Manager, <strong>TIAA<\/strong>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/tiaa\/\">Leer la experiencia del cliente<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00bbHealthfirst\u00bb tab_id=\u00bbhealthfirst\u00bb el_class=\u00bbnew_hpstyle_section6_tab2_icon\u00bb][vc_row_inner equal_height=\u00bbyes\u00bb el_class=\u00bbnew_hpstyle_section6_maintab_row\u00bb][vc_column_inner el_class=\u00bbimage-column\u00bb width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_single_image image=\u00bb211625&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbright\u00bb css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_left_image\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00bb width=\u00bb1\/2&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_text1 text\u00bb]\u00bbSi podemos controlar la identidad, podemos detener la mayor\u00eda de los ataques modernos. Y si se controla la identidad, se controlar\u00e1n todos los per\u00edmetros, aplicaciones y contenedores de forma eficaz en todas las partes del entorno. Esto es lo que yo llamo un aut\u00e9ntico enfoque Zero Trust y por eso utilizamos CyberArk. Es lo que me ayuda a dormir tranquilo\u00bb.[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_text2&#8243;]Brian Miller, CISO, <strong>Healthfirst<\/strong><\/p>\n<p>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/customer-stories\/o9-solutions\/\">Leer la experiencia del cliente<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00bbPersistent\u00bb tab_id=\u00bbpersistent\u00bb el_class=\u00bbnew_hpstyle_section6_tab3_icon\u00bb][vc_row_inner equal_height=\u00bbyes\u00bb el_class=\u00bbnew_hpstyle_section6_maintab_row\u00bb][vc_column_inner el_class=\u00bbimage-column\u00bb width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_single_image image=\u00bb211497&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbright\u00bb css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_left_image\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00bb width=\u00bb1\/2&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_text1 text\u00bb]\u00bbEl mayor reto en el entorno de ciberseguridad es la dependencia humana. Y debido a la automatizaci\u00f3n, la mayor ventaja de CyberArk es la tranquilidad. Siempre es posible que se produzcan errores humanos, pero el control es casi perfecto si se pueden mitigar\u00bb.[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_text2&#8243;]Debashis Singh, CIO, <strong>Persistent<\/strong>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/persistent-systems\/\">Leer la experiencia del cliente<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2-pad info-graphic\u00bb css=\u00bb.vc_custom_1749504324678{background-color: #FFFFFF !important;}\u00bb][vc_column width=\u00bb2\/3&#8243; offset=\u00bbvc_col-sm-offset-2&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbtext-md-center head-box\u00bb]<\/p>\n<h3>Identidades seguras en el endpoint\u200b<\/h3>\n<p>Obtenga m\u00e1s informaci\u00f3n sobre la soluci\u00f3n completa de Seguridad de la Identidad para endpoints, que forma parte de la Plataforma de Seguridad de la Identidad de CyberArk.[\/vc_column_text][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-129427\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/03\/infograhic-epm-diagram.svg\" alt=\"Endpoint Privilege Manager se basa en una arquitectura SaaS completa y ampliable\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2_resources sub-5&#8243; css=\u00bb.vc_custom_1649443021235{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}\u00bb][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbno-break\u00bb][vc_column_text el_class=\u00bbno-break\u00bb]<\/p>\n<h3>Explore recursos adicionales<\/h3>\n<p>\n[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/endpoint-privilege-manager\">Ver todos los recursos<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column\u00bb][vc_column el_class=\u00bbnew_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=\u00bb.vc_custom_1649437390854{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbnew_hpstyle_section8_uberflip\u00bb]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb css=\u00bb.vc_custom_1749503615816{background-color: #E8E8E3 !important;}\u00bb el_class=\u00bbcybv2 cybv2-pad-top hv-cta\u00bb][vc_column width=\u00bb7\/12&#8243; el_class=\u00bbleft-clmn\u00bb][vc_column_text css=\u00bb\u00bb]<\/p>\n<h1>Tour interactivo del producto Endpoint Privilege Manager<\/h1>\n<p><\/p>\n<h5>Descubra c\u00f3mo Endpoint Privilege Manager puede ayudar a su organizaci\u00f3n a reducir el riesgo de ataques basados en la identidad en el endpoint con funciones que incluyen:<\/h5>\n<p>\n[\/vc_column_text][vc_row_inner][vc_column_inner el_class=\u00bbhead-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbhead-box-text\u00bb]Detecci\u00f3n y eliminaci\u00f3n de derechos de administrador local y gesti\u00f3n flexible de pol\u00edticas para ayudar a proteger la organizaci\u00f3n a la vez que se optimizan las operaciones de TI[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbhead-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbhead-box-text\u00bb]Aplicaci\u00f3n de controles del m\u00ednimo privilegio para ampliar la seguridad de la identidad y el enfoque Zero Trust a los endpoints[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbhead-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbhead-box-text\u00bb]Defensas contra el ransomware con pol\u00edticas de protecci\u00f3n listas para usar<br \/>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbhead-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbhead-box-text\u00bb]Informes para una mejor visibilidad y para satisfacer los est\u00e1ndares de auditor\u00eda y conformidad normativa[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_column_text css=\u00bb\u00bb]Con nuestro tour interactivo del producto, puede experimentar de primera mano c\u00f3mo el EPM, como parte de la estrategia de seguridad de la identidad para endpoints, puede ayudar a su organizaci\u00f3n a proteger endpoints y servidores, sin interrumpir la productividad.<\/p>\n<p><strong>\u00a1Reg\u00edstrese ahora para obtener acceso inmediato a nuestro tour interactivo de EPM!<\/strong>[\/vc_column_text][vc_single_image image=\u00bb205230&#8243; img_size=\u00bbfull\u00bb css=\u00bb\u00bb el_class=\u00bbd-none d-md-block\u00bb][\/vc_column][vc_column width=\u00bb1\/12&#8243; css=\u00bb.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}\u00bb][\/vc_column][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbright-clmn cybv2-form\u00bb][vc_column_text css=\u00bb\u00bb el_class=\u00bbbold\u00bb]<\/p>\n<h4>Reg\u00edstrese aqu\u00ed para acceder a la demostraci\u00f3n del tour interactivo de Endpoint Privilege Manager<\/h4>\n<p>\n[\/vc_column_text][vc_raw_html css=\u00bb\u00bb]W21hcmtldG9fZm9ybSBpZD0iMTMyODQiIHR5X3BhZ2VfdXJsPSJodHRwczovL3d3dy5jeWJlcmFyay5jb20vdHJ5LWJ1eS90aGFuay15b3UtZXBtLWludGVyYWN0aXZlLXRvdXIvIl0=[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcybv2 hero dark\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-1&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbcyb-breadcrumb\u00bb] Volver a Endpoint Identity Security[\/vc_column_text][vc_column_text] Endpoint Privilege Manager Elimine los derechos de administrador local, aplique el m\u00ednimo privilegio e implemente controles b\u00e1sicos de seguridad para&#8230;<\/p>\n","protected":false},"author":198,"featured_media":0,"parent":53045,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27775],"class_list":["post-115291","page","type-page","status-publish","hentry","product_category-epm"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Endpoint Privilege Manager - Endpoint Protection | CyberArk<\/title>\n<meta name=\"description\" content=\"CyberArk Endpoint Privilege Manager proporciona una protecci\u00f3n integral que protege todos los endpoints y aplica el m\u00ednimo privilegio sin interrumpir las operaciones.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Endpoint Privilege Manager\" \/>\n<meta property=\"og:description\" content=\"CyberArk Endpoint Privilege Manager proporciona una protecci\u00f3n integral que protege todos los endpoints y aplica el m\u00ednimo privilegio sin interrumpir las operaciones.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-07T18:35:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/camera-shutter__primary.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/\",\"url\":\"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/\",\"name\":\"Endpoint Privilege Manager - Endpoint Protection | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/camera-shutter__primary.svg\",\"datePublished\":\"2021-02-03T21:28:23+00:00\",\"dateModified\":\"2025-10-07T18:35:50+00:00\",\"description\":\"CyberArk Endpoint Privilege Manager proporciona una protecci\u00f3n integral que protege todos los endpoints y aplica el m\u00ednimo privilegio sin interrumpir las operaciones.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/camera-shutter__primary.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/camera-shutter__primary.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Productos\",\"item\":\"https:\/\/www.cyberark.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Endpoint Privilege Manager\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Endpoint Privilege Manager - Endpoint Protection | CyberArk","description":"CyberArk Endpoint Privilege Manager proporciona una protecci\u00f3n integral que protege todos los endpoints y aplica el m\u00ednimo privilegio sin interrumpir las operaciones.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/","og_locale":"es_ES","og_type":"article","og_title":"Endpoint Privilege Manager","og_description":"CyberArk Endpoint Privilege Manager proporciona una protecci\u00f3n integral que protege todos los endpoints y aplica el m\u00ednimo privilegio sin interrumpir las operaciones.","og_url":"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-10-07T18:35:50+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/camera-shutter__primary.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tiempo de lectura":"11 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/","url":"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/","name":"Endpoint Privilege Manager - Endpoint Protection | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/camera-shutter__primary.svg","datePublished":"2021-02-03T21:28:23+00:00","dateModified":"2025-10-07T18:35:50+00:00","description":"CyberArk Endpoint Privilege Manager proporciona una protecci\u00f3n integral que protege todos los endpoints y aplica el m\u00ednimo privilegio sin interrumpir las operaciones.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/camera-shutter__primary.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/camera-shutter__primary.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Productos","item":"https:\/\/www.cyberark.com\/products\/"},{"@type":"ListItem","position":3,"name":"Endpoint Privilege Manager"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/115291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/users\/198"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/comments?post=115291"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/115291\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/53045"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/media?parent=115291"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/product_category?post=115291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}