{"id":131031,"date":"2021-07-20T10:51:15","date_gmt":"2021-07-20T14:51:15","guid":{"rendered":"https:\/\/www.cyberark.com\/trust\/"},"modified":"2026-01-28T03:31:51","modified_gmt":"2026-01-28T08:31:51","slug":"trust","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/es\/trust\/","title":{"rendered":"Centro de confianza"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 int-hero-noimg dark\u00bb][vc_column width=\u00bb3\/4&#8243; el_class=\u00bbcolumn-1&#8243;][vc_column_text]<\/p>\n<h1>Conf\u00ede en CyberArk<\/h1>\n<h2>Organizaciones de todas las formas y tama\u00f1os conf\u00edan en CyberArk para proteger sus tesoros m\u00e1s preciados. \u00bfC\u00f3mo protegemos nuestros tesoros?<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00bbVisite nuestro portal de confianza\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb css=\u00bb\u00bb link=\u00bburl:https%3A%2F%2Ftrust.cyberark.com|title:Visitar|target:_blank|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/security-of-the-cyberark-corporate-network\">Descargar monogr\u00e1fico<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 cybv2-pad-top overview-icons\u00bb][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-120202\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/High-Performance.svg\" alt=\"\u00edcono de seguridad corporativa\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4>Seguridad corporativa<\/h4>\n<p>Seguimos una completa gama de pr\u00e1cticas administrativas, operativas y de configuraci\u00f3n para proteger su informaci\u00f3n a trav\u00e9s de un exhaustivo conjunto de controles de seguridad, pr\u00e1cticas y formaci\u00f3n. Nuestros equipos especializados en seguridad trabajan para mejorar continuamente nuestras pr\u00e1cticas de desarrollo seguro, operaciones de seguridad y mitigaci\u00f3n de amenazas para detectar y prevenir las amenazas a la seguridad, dise\u00f1adas para garantizar la protecci\u00f3n de sus datos.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/es\/trust\/corporate-security\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbcta-box\u00bb offset=\u00bbvc_col-sm-offset-1&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-120211\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/SaaS-Security.svg\" alt=\"\u00edcono de seguridad de SaaS\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4>Seguridad de SaaS<\/h4>\n<p>Las organizaciones implementan los productos y servicios de seguridad de CyberArk, l\u00edderes en el sector, a nivel mundial; por eso nos comprometemos a ofrecer productos y ofertas de SaaS que est\u00e9n dise\u00f1ados para ser altamente escalables, estables y seguros a escala. Nuestras ofertas de SaaS se basan en las mejores tecnolog\u00edas centrales de su clase y est\u00e1n dise\u00f1adas para ofrecer un alto rendimiento y disponibilidad para apoyar la continuidad del negocio.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/es\/trust\/saas-security\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 overview-icons\u00bb][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-120219\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Identity-Logon-Overview-Vertical-Directory-User-Management.svg\" alt=\"\u00edcono de fiabilidad\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4>Fiabilidad<\/h4>\n<p>Queremos que nuestros clientes se sientan tranquilos al utilizar nuestros servicios. Nuestros planes organizativos incluyen una rigurosa gesti\u00f3n de los activos y de la configuraci\u00f3n, una supervisi\u00f3n continua de la red y planes de continuidad del negocio, recuperaci\u00f3n de desastres y respuesta a incidentes.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/es\/trust\/reliability\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbcta-box\u00bb offset=\u00bbvc_col-sm-offset-1&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-120227\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/ContinuousCompliance-Overview-Vertical-Overview-Vertical.svg\" alt=\"\u00edcono de conformidad con los est\u00e1ndares del sector\" \/>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1747146453237{margin-bottom: 40px !important;}\u00bb el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4>Conformidad con los est\u00e1ndares del sector<\/h4>\n<p>En CyberArk, nuestros productos y sistemas de gesti\u00f3n de seguridad de la informaci\u00f3n se someten peri\u00f3dicamente a rigurosas revisiones y pruebas, incluidas auditor\u00edas y certificaciones como SOC 2 Tipo 2 e ISO 27001. Nuestros proveedores de servicios tecnol\u00f3gicos deben someterse a un riguroso proceso de calificaci\u00f3n de la seguridad para verificar sus pr\u00e1cticas, y los centros de datos de nuestro proveedor de la nube cumplen como m\u00ednimo con la norma SOC 2.[\/vc_column_text][vc_btn title=\u00bbVisite nuestro portal de confianza\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb css=\u00bb\u00bb link=\u00bburl:https%3A%2F%2Ftrust.cyberark.com|title:Visitar|target:_blank|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][vc_column_text css=\u00bb\u00bb el_class=\u00bbinline link-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/trust\/compliance\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 overview-icons\u00bb][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-120236\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Privacyandsinglesignon.svg\" alt=\"\u00edcono de privacidad y conformidad legal\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4>Privacidad y protecci\u00f3n de datos<\/h4>\n<p>Nos comprometemos a proteger sus datos del acceso no autorizado y a apoyar a su organizaci\u00f3n en el cumplimiento de la privacidad de los datos. Tambi\u00e9n hemos invertido mucho en estrictas medidas de protecci\u00f3n de datos para ayudar a blindar su informaci\u00f3n, lo que incluye nuestro programa en materia de GDPR y de privacidad internacional.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/es\/trust\/privacy\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbcta-box\u00bb offset=\u00bbvc_col-sm-offset-1&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-126797\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/esg-hammer-icon.svg\" alt=\"Pol\u00edticas\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4>Conformidad legal y c\u00f3digo de conducta<\/h4>\n<p>Nos comprometemos a llevar a cabo nuestra actividad empresarial de acuerdo con nuestras obligaciones legales y las normas \u00e9ticas establecidas. Somos conscientes de que nuestros empleados, nuestra cultura, nuestros valores y nuestra integridad son inseparables de nuestro \u00e9xito.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/es\/trust\/legal-compliance-and-code-of-conduct\/\" rel=\"noopener\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 overview-icons\u00bb][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text css=\u00bb\u00bb]<img decoding=\"async\" class=\"alignnone wp-image-133458 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/brain-icon.svg\" alt=\"\u00edcono de orientaci\u00f3n prescriptiva\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4>IA responsable<\/h4>\n<p>Nos comprometemos a desarrollar funciones de IA seguras, justas y precisas, y a proporcionarle herramientas dise\u00f1adas para mejorar la seguridad y experiencia de usuario.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/trust\/responsible-ai\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbcta-box\u00bb offset=\u00bbvc_col-sm-offset-1&#8243;][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2_full_width_resource\u00bb][vc_column][vc_row_inner el_class=\u00bbnew_hpstyle_section5_container\u00bb][vc_column_inner][vc_single_image image=\u00bb209401&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbcenter\u00bb css=\u00bb\u00bb el_class=\u00bbnew_hpstyle_section5_gart_img\u00bb][vc_column_text css=\u00bb.vc_custom_1747147298130{margin-bottom: 20px !important;}\u00bb el_class=\u00bbnew_hpstyle_section5_text1&#8243;]<\/p>\n<h4>Visite nuestro Portal de confianza para obtener m\u00e1s informaci\u00f3n sobre nuestras medidas de seguridad y privacidad, y para acceder a la documentaci\u00f3n correspondiente.<\/h4>\n<p>[\/vc_column_text][vc_btn title=\u00bbVisite nuestro portal de confianza\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb css=\u00bb\u00bb link=\u00bburl:https%3A%2F%2Ftrust.cyberark.com|title:Visitar|target:_blank|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb css=\u00bb.vc_custom_1615402724220{background-color: #f7f7f7 !important;}\u00bb el_class=\u00bbcybv2 cybv2-pad-top stckd-cllt flex-column-reverse flex-lg-row\u00bb][vc_column el_class=\u00bbleft-clmn\u00bb offset=\u00bbvc_col-md-5&#8243;][vc_column_text el_class=\u00bbhead-box\u00bb]<\/p>\n<h3>Mensaje de nuestro CIO<\/h3>\n<p class=\"cyb-quote\">\u00abComo empresa centrada en la protecci\u00f3n de los activos y sistemas m\u00e1s esenciales de sus clientes, nos apasiona la seguridad de la informaci\u00f3n y nos sujetamos a est\u00e1ndares de seguridad robustos y consolidados\u00bb.<\/p>\n<p>Omer Grossman, CIO de CyberArk[\/vc_column_text][\/vc_column][vc_column el_class=\u00bbright-clmn\u00bb offset=\u00bbvc_col-md-offset-1 vc_col-md-6&#8243;][vc_single_image image=\u00bb138115&#8243; img_size=\u00bbfull\u00bb el_class=\u00bb.border-shadow\u00bb][\/vc_column][\/vc_row][vc_row equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 cybv2-pad-top plp-overview-more-col\u00bb][vc_column width=\u00bb5\/6&#8243; el_class=\u00bbtext-center heading\u00bb offset=\u00bbvc_col-md-offset-1 vc_col-sm-offset-1&#8243;][vc_column_text]<\/p>\n<h3>Personas clave<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbcta-box\u00bb offset=\u00bbvc_col-md-offset-2 vc_col-sm-offset-2&#8243;][vc_column_text css=\u00bb\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-134548\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/peretz-regev-small.jpg\" alt=\"Peretz Regev\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/peretz-regev-small.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/peretz-regev-small-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/peretz-regev-small-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4>Peretz Regev<\/h4>\n<p>Chief Product Officer<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/company\/leadership\/peretz-regev\/\">Leer biograf\u00eda<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-138116\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/12\/omer-grossman-people.jpg\" alt=\"primer plano de omer grossman\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/12\/omer-grossman-people.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/12\/omer-grossman-people-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/12\/omer-grossman-people-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4>Omer Grossman<\/h4>\n<p>Chief Information Officer<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/es\/company\/leadership\/omer-grossman\/\">Leer biograf\u00eda<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2-pad-top overview-hz\u00bb css=\u00bb.vc_custom_1625753067539{background-color: #f7f7f7 !important;}\u00bb][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbhead-box\u00bb][vc_column_text]<\/p>\n<h3>Recursos clave<\/h3>\n<p>Obtenga m\u00e1s informaci\u00f3n con los recursos de apoyo.[\/vc_column_text][\/vc_column][vc_column width=\u00bb3\/4&#8243;][vc_row_inner equal_height=\u00bbyes\u00bb][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb1\/3&#8243; css=\u00bb.vc_custom_1756992973507{padding-bottom: 20px !important;}\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-118800\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg\" alt=\"Defi\u00e9ndase de los ataques\" \/>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1756992827893{padding-bottom: 20px !important;}\u00bb]<\/p>\n<h4>Resumen del incidente Salesloft Drift y respuesta de CyberArk<\/h4>\n<p>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/all-blog-posts\/salesloft-drift-incident-overview-and-cyberarks-response\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb1\/3&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-120227\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/ContinuousCompliance-Overview-Vertical-Overview-Vertical.svg\" alt=\"Monogr\u00e1fico de seguridad corporativa\" \/>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1700483092115{padding-bottom: 20px !important;}\u00bb]<\/p>\n<h4>Monogr\u00e1fico de seguridad corporativa Normas y pr\u00e1cticas<\/h4>\n<p>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/cyberark-corporate-security-white-paper-standards-and-practices\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb1\/3&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-118800\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg\" alt=\"Defi\u00e9ndase de los ataques\" \/>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1625751898228{padding-bottom: 20px !important;}\u00bb]<\/p>\n<h4>Centro de privacidad<\/h4>\n<p>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/privacy-center\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 get-started cybv2-pad dark\u00bb css=\u00bb.vc_custom_1706302169617{margin-top: 80px !important;margin-bottom: 80px !important;}\u00bb][vc_column width=\u00bb2\/3&#8243; el_class=\u00bbstat-column text-center\u00bb offset=\u00bbvc_col-md-offset-2&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbextra-space chartreuse\u00bb]<\/p>\n<h3 style=\"color: #d4eb33 !important;\">Documentos del centro de confianza<\/h3>\n<p>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1747146779520{margin-bottom: 40px !important;}\u00bb el_class=\u00bbnew_hpstyle_section9_text\u00bb]<\/p>\n<h5>Conozca nuestra postura de seguridad y conformidad normativa, as\u00ed como la documentaci\u00f3n de acceso para la seguridad, la conformidad normativa y la privacidad.<\/h5>\n<p>[\/vc_column_text][vc_btn title=\u00bbVisite nuestro portal de confianza\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb css=\u00bb\u00bb link=\u00bburl:https%3A%2F%2Ftrust.cyberark.com|title:Visitar|target:_blank|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 int-hero-noimg dark\u00bb][vc_column width=\u00bb3\/4&#8243; el_class=\u00bbcolumn-1&#8243;][vc_column_text] Conf\u00ede en CyberArk Organizaciones de todas las formas y tama\u00f1os conf\u00edan en CyberArk para proteger sus tesoros m\u00e1s preciados. \u00bfC\u00f3mo protegemos nuestros tesoros? [\/vc_column_text][vc_btn title=\u00bbVisite nuestro portal de&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-131031","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Centro de confianza para la seguridad corporativa | CyberArk<\/title>\n<meta name=\"description\" content=\"En CyberArk, la confianza comienza con la seguridad, pero tambi\u00e9n abarca la fiabilidad, la privacidad y la conformidad de los est\u00e1ndares del sector y las normativas legales. M\u00e1s informaci\u00f3n.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/trust\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Centro de confianza\" \/>\n<meta property=\"og:description\" content=\"En CyberArk, la confianza comienza con la seguridad, pero tambi\u00e9n abarca la fiabilidad, la privacidad y la conformidad de los est\u00e1ndares del sector y las normativas legales. M\u00e1s informaci\u00f3n.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/trust\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-28T08:31:51+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/trust\/\",\"url\":\"https:\/\/www.cyberark.com\/trust\/\",\"name\":\"Centro de confianza para la seguridad corporativa | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/trust\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/High-Performance.svg\",\"datePublished\":\"2021-07-20T14:51:15+00:00\",\"dateModified\":\"2026-01-28T08:31:51+00:00\",\"description\":\"En CyberArk, la confianza comienza con la seguridad, pero tambi\u00e9n abarca la fiabilidad, la privacidad y la conformidad de los est\u00e1ndares del sector y las normativas legales. M\u00e1s informaci\u00f3n.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/trust\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/trust\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/trust\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/High-Performance.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/High-Performance.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/trust\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Centro de confianza\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Centro de confianza para la seguridad corporativa | CyberArk","description":"En CyberArk, la confianza comienza con la seguridad, pero tambi\u00e9n abarca la fiabilidad, la privacidad y la conformidad de los est\u00e1ndares del sector y las normativas legales. M\u00e1s informaci\u00f3n.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/trust\/","og_locale":"es_ES","og_type":"article","og_title":"Centro de confianza","og_description":"En CyberArk, la confianza comienza con la seguridad, pero tambi\u00e9n abarca la fiabilidad, la privacidad y la conformidad de los est\u00e1ndares del sector y las normativas legales. M\u00e1s informaci\u00f3n.","og_url":"https:\/\/www.cyberark.com\/trust\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-01-28T08:31:51+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/trust\/","url":"https:\/\/www.cyberark.com\/trust\/","name":"Centro de confianza para la seguridad corporativa | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/trust\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/High-Performance.svg","datePublished":"2021-07-20T14:51:15+00:00","dateModified":"2026-01-28T08:31:51+00:00","description":"En CyberArk, la confianza comienza con la seguridad, pero tambi\u00e9n abarca la fiabilidad, la privacidad y la conformidad de los est\u00e1ndares del sector y las normativas legales. M\u00e1s informaci\u00f3n.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/trust\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/trust\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/trust\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/High-Performance.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/High-Performance.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Centro de confianza"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/131031","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/comments?post=131031"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/131031\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/media?parent=131031"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/product_category?post=131031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}