{"id":139606,"date":"2023-01-30T12:14:16","date_gmt":"2023-01-30T17:14:16","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/gestion-de-secretos\/"},"modified":"2025-10-20T03:20:51","modified_gmt":"2025-10-20T07:20:51","slug":"secrets-management","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/es\/products\/secrets-management\/","title":{"rendered":"Gesti\u00f3n de secretos"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 int-hero dark\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-1&#8243;][vc_column_text]<\/p>\n<h1>Gesti\u00f3n de secretos<\/h1>\n<p><\/p>\n<h2>Simplifique la protecci\u00f3n de las identidades no humanas en todas las aplicaciones, procesos de DevOps y cargas de trabajo en la nube.<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00bbSolicitar una demostraci\u00f3n\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Ftry-buy%2Fsecrets-manager-enterprise-demo%2F|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-2&#8243;][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_fxr5ooh7ak videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2-pad-top overview-vt\u00bb css=\u00bb.vc_custom_1756222421494{background-color: #FFFFFF !important;}\u00bb][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbhead-box\u00bb][vc_column_text]<\/p>\n<h3>Gestione de forma centralizada los secretos de todas las identidades de las aplicaciones<\/h3>\n<p>Cada vez m\u00e1s, las credenciales del c\u00f3digo de las aplicaciones y de toda la cadena de suministro de software son blanco de ciberataques. Con CyberArk, puede rotar y gestionar credenciales de forma centralizada, eliminar la dispersi\u00f3n de b\u00f3vedas y no tener que cambiar los flujos de trabajo de los desarrolladores. \u200b<\/p>\n<p>Las soluciones de gesti\u00f3n de secretos SaaS simplifican las operaciones y ayudan a acelerar la protecci\u00f3n de todo tipo de aplicaciones en la empresa.[\/vc_column_text][\/vc_column][vc_column width=\u00bb5\/12&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-109203\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Enable-the-Digital-Business-icon.svg\" alt=\"\u00cdcono Habilite el negocio digital\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Blinde la transformaci\u00f3n digital<\/h4>\n<p>Proteja las herramientas de aplicaci\u00f3n y automatizaci\u00f3n sin ralentizar el trabajo de los desarrolladores.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-109195\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Defend-Against-Attacks-icon.svg\" alt=\"\u00cdcono Defi\u00e9ndase de los ataques \" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Reduzca los ciberriesgos<\/h4>\n<p>Permita que las aplicaciones puedan acceder f\u00e1cilmente a las credenciales necesarias, y mantenga los secretos fuera del alcance de los atacantes.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-109211\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Drive-Operational-Efficiency-icon.svg\" alt=\"\u00cdcono Impulse la eficiencia operativa\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Mejore la eficiencia operativa<\/h4>\n<p>Reduzca la complejidad y la carga de trabajo de los desarrolladores a la vez que mejora la agilidad y la protecci\u00f3n del negocio.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 cybv2-pad info-graphic\u00bb][vc_column el_class=\u00bbtext-center\u00bb][vc_column_text css=\u00bb\u00bb el_class=\u00bbhead-box\u00bb]<\/p>\n<h3>CyberArk es l\u00edder global en el informe Leadership Compass 2025 de KuppingerCole Analysts en la categor\u00eda gesti\u00f3n de secretos empresariales<\/h3>\n<p>[\/vc_column_text][vc_btn title=\u00bbLeer el art\u00edculo completo\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb css=\u00bb\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fanalyst-reports%2F2025-kuppingercole-leadership-compass-for-enterprise-secrets-management|title:Leer%20ahora|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][vc_column_text css=\u00bb\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215672\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Combined-Leadership-1.png\" alt=\"Liderazgo combinado\" width=\"1533\" height=\"569\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Combined-Leadership-1.png 1533w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Combined-Leadership-1-300x111.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Combined-Leadership-1-1024x380.png 1024w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Combined-Leadership-1-768x285.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Combined-Leadership-1-150x56.png 150w\" sizes=\"auto, (max-width: 1533px) 100vw, 1533px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2-pad-top overview-hz dark\u00bb css=\u00bb.vc_custom_1756391981739{background-color: #082233 !important;}\u00bb][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbhead-box\u00bb][vc_column_text css=\u00bb.vc_custom_1756237673240{margin-bottom: 40px !important;}\u00bb]<\/p>\n<h3>Aplicaciones multinube, de CI\/CD y de contenedor<\/h3>\n<p>Soluciones SaaS y autoalojadas que ofrecen la flexibilidad necesaria para proteger secretos en cualquier entorno en la nube, local, de contenedor, de canalizaciones CI\/CD o de DevOps.[\/vc_column_text][\/vc_column][vc_column width=\u00bb2\/3&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_row_inner equal_height=\u00bbyes\u00bb][vc_column_inner width=\u00bb5\/12&#8243;][vc_column_text css=\u00bb.vc_custom_1756240819783{margin-bottom: 30px !important;}\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215691\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group.png\" alt=\"mujer\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group.png 200w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-150x150.png 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb]<\/p>\n<h4>Secrets Manager, SaaS\u200b<\/h4>\n<p>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbalt-cta\u00bb]<a style=\"color: #d6f77a !important;\" href=\"https:\/\/www.cyberark.com\/es\/product-name-updates\/\">Conjur Cloud Secrets Manager es ahora Secrets Manager, SaaS.<\/a><i class=\"fa fa-long-arrow-right\" style=\"color: #d6f77a !important;\"><\/i>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbpt-4&#8243;]Gesti\u00f3n moderna de secretos basada en SaaS con una completa experiencia de interfaz de usuario y una r\u00e1pida rentabilidad impulsada por la plataforma de Seguridad de la Identidad de CyberArk. Gestiona el acceso no humano y la identidad de m\u00e1quina en entornos h\u00edbridos y multinube y permite una experiencia uniforme para el personal de seguridad y los desarrolladores, sin importar d\u00f3nde se encuentren sus secretos.[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right pt-4&#8243;]<a href=\"https:\/\/www.cyberark.com\/es\/products\/secrets-manager-saas\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00bb5\/12&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_column_text css=\u00bb.vc_custom_1756240852635{margin-bottom: 30px !important;}\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215700\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-1.png\" alt=\"hombre\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-1.png 200w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-1-150x150.png 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb]<\/p>\n<h4>Secrets Manager, Self-Hosted\u200b<\/h4>\n<p>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbalt-cta\u00bb]<a style=\"color: #d6f77a !important;\" href=\"https:\/\/www.cyberark.com\/es\/product-name-updates\/\">Conjur Secrets Manager Enterprise es ahora Secrets Manager, Self-Hosted.<\/a><i class=\"fa fa-long-arrow-right\" style=\"color: #d6f77a !important;\"><\/i>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbpt-4&#8243;]Soluci\u00f3n autoalojada que permite autenticar de manera segura, controlar de forma centralizada y auditar el modo en que las aplicaciones, DevOps y las herramientas de automatizaci\u00f3n utilizan los secretos y las credenciales con privilegios para acceder a bases de datos, entornos en la nube y otros recursos confidenciales.[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right pt-4&#8243;]<a href=\"https:\/\/www.cyberark.com\/es\/products\/secrets-manager-self-hosted\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00bb5\/12&#8243; css=\u00bb.vc_custom_1736362437897{margin-top: 40px !important;}\u00bb][vc_column_text css=\u00bb.vc_custom_1756240878019{margin-bottom: 30px !important;}\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215709\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-2.png\" alt=\"hombre\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-2.png 200w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-2-150x150.png 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb]<\/p>\n<h4>Conjur Secrets Manager Open Source<\/h4>\n<p>Una soluci\u00f3n de c\u00f3digo abierto y a libre disposici\u00f3n que permite autenticar de manera segura y controlar el modo en el que las aplicaciones y las herramientas DevOps utilizan los secretos y las credenciales con privilegios para acceder a bases de datos, entornos en la nube y otros recursos confidenciales.[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right pt-4&#8243;]<a href=\"https:\/\/www.conjur.org\/\" target=\"_blank\" rel=\"noopener\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2-pad-top overview-hz dark\u00bb][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbhead-box\u00bb][vc_column_text css=\u00bb.vc_custom_1756238266827{margin-bottom: 40px !important;}\u00bb]<\/p>\n<h3>Para la gesti\u00f3n de secretos integrada en el proveedor de la nube<\/h3>\n<p>Soluciones SaaS que permiten a los equipos de seguridad gestionar los secretos de forma centralizada, mientras que los desarrolladores siguen utilizando las funciones de gesti\u00f3n de secretos integradas en el proveedor de la nube.[\/vc_column_text][\/vc_column][vc_column width=\u00bb2\/3&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_row_inner equal_height=\u00bbyes\u00bb][vc_column_inner width=\u00bb5\/12&#8243;][vc_column_text css=\u00bb.vc_custom_1756240906485{margin-bottom: 30px !important;}\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215718\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-3.png\" alt=\"mujer\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-3.png 200w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-3-150x150.png 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb]<\/p>\n<h4>Secrets Hub<\/h4>\n<p>Permite a las organizaciones que han adoptado AWS Secrets Manager y Azure Key Vault obtener todas las ventajas de la gesti\u00f3n de secretos centralizada de CyberArk sin afectar los flujos de trabajo de los desarrolladores.<\/p>\n<p><em>Gesti\u00f3n de secretos basada en SaaS impulsada por la plataforma de Seguridad de la Identidad de CyberArk<\/em>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right pt-4&#8243;]<a href=\"https:\/\/www.cyberark.com\/es\/products\/secrets-hub\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2-pad-top overview-hz dark\u00bb][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbhead-box\u00bb][vc_column_text css=\u00bb.vc_custom_1756238398075{margin-bottom: 40px !important;}\u00bb]<\/p>\n<h3>Para aplicaciones est\u00e1ticas<\/h3>\n<p>Soluciones que gestionan y rotan credenciales para una amplia gama de aplicaciones est\u00e1ticas y software de terceros.\u200b[\/vc_column_text][\/vc_column][vc_column width=\u00bb2\/3&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_row_inner equal_height=\u00bbyes\u00bb el_class=\u00bbpb-8&#8243;][vc_column_inner width=\u00bb5\/12&#8243;][vc_column_text css=\u00bb.vc_custom_1756240930372{margin-bottom: 30px !important;}\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215727\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-4.png\" alt=\"hombre\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-4.png 200w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-4-150x150.png 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb]<\/p>\n<h4>Credential Providers<\/h4>\n<p>Proteja las aplicaciones est\u00e1ticas, el software de terceros, la RPA, las herramientas de automatizaci\u00f3n y las plataformas de gesti\u00f3n de TI mediante la gesti\u00f3n de las credenciales no humanas necesarias para acceder de forma segura a los recursos. La amplia gama de integraciones de CyberArk simplifica la protecci\u00f3n de credenciales tanto para una sola aplicaci\u00f3n como para aplicaciones de misi\u00f3n cr\u00edtica que se ejecutan a escala masiva.[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right pt-4&#8243;]<a href=\"https:\/\/www.cyberark.com\/es\/products\/credential-providers\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 customer-stories cybv2-pad\u00bb][vc_column width=\u00bb2\/3&#8243;][vc_column_text el_class=\u00bbpb-4&#8243;]<\/p>\n<h3>Ayudamos a clientes de todo el mundo a proteger sus identidades de cargas de trabajo y apps en la nube<\/h3>\n<p><\/p>\n<h6>Los clientes de CyberArk utilizan CyberArk Secrets Manager y la plataforma de Seguridad de la Identidad para proteger todas sus identidades humanas y no humanas.<\/h6>\n<p>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/?post_type=customer_story&#038;p=128197\">Ver m\u00e1s clientes<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cyb-pad-btm featured-video-overflow\u00bb css=\u00bb.vc_custom_1671212795028{background-color: #ffffff !important;}\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbpb-6&#8243;][vc_column_text css=\u00bb\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215681\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/dz-bank-logo-block.jpg\" alt=\"logotipo de dz bank\" width=\"638\" height=\"622\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/dz-bank-logo-block.jpg 638w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/dz-bank-logo-block-300x292.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/dz-bank-logo-block-150x146.jpg 150w\" sizes=\"auto, (max-width: 638px) 100vw, 638px\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00bb5\/12&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbpb-4&#8243;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-201899\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/01\/double-quotes.svg\" alt=\"comillas dobles\" width=\"87\" height=\"64\" \/><\/p>\n<p><span class=\"large-quote\" style=\"font-size: 22px;\">\u00ab(con) la Seguridad de la Identidad y, especialmente, PAM, CyberArk es el servicio clave que DZ BANK utiliza para proteger nuestra infraestructura de TI. Desde que integramos CyberArk en nuestro entorno, la gesti\u00f3n de privilegios y la seguridad han mejorado claramente. En el fondo, siempre se trata de tener control de los privilegios y ser capaz de gestionar los secretos\u00bb.<\/span><\/p>\n<p><strong>Kurt Sand<\/strong>,\u00a0GM, Machine Identity Security de CyberArk[\/vc_column_text][vc_row_inner el_class=\u00bbresource-button-sand\u00bb][vc_column_inner column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-business-value-of-cyberark|title:Consultar%20el%20monogr%C3%A1fico|\u00bb offset=\u00bbvc_col-lg-10 vc_col-md-10 vc_col-xs-11&#8243;][vc_column_text css=\u00bb\u00bb]Monogr\u00e1fico[\/vc_column_text][vc_column_text css=\u00bb\u00bb]Informe sobre el estado de la Seguridad de la Identidad de m\u00e1quina en 2025 <i class=\"fa-solid fa-circle-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 cybv2-pad-btm\u00bb][vc_column][vc_raw_html]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0iY3VzdG9tZXJfc3RvcnkiIHBvc3RzX3Blcl9wYWdlPSI0IiBjb2x1bW5zX2xhcmdlPSIzIiBzaG93X2F1dGhvcj0iZmFsc2UiIHNob3dfZXhjZXJwdD0iZmFsc2UiIHBvczFfaWQ9IjEzODQzNCIgcG9zMl9pZD0iMTM1NDc2IiBwb3MzX2lkPSIxODIzNTMiIHBvczRfaWQ9IjEyODQ2MSJd[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 promo-image\u00bb css=\u00bb.vc_custom_1756391477950{background-color: #D6F77A !important;}\u00bb][vc_column][vc_row_inner][vc_column_inner width=\u00bb1\/12&#8243; offset=\u00bbvc_col-md-offset-2&#8243;][vc_single_image image=\u00bb213091&#8243; img_size=\u00bbfull\u00bb css=\u00bb\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb3\/4&#8243;][vc_column_text css=\u00bb\u00bb]<u>FUNDAMENTOS DE LA SEGURIDAD DE LA IDENTIDAD<\/u><\/p>\n<h3>Seguridad de la Identidad: Por qu\u00e9 es importante y por qu\u00e9 ahora<\/h3>\n<p>Priorice la Seguridad de la Identidad sin renunciar a la productividad.[\/vc_column_text][vc_btn title=\u00bbDescargar el libro electr\u00f3nico\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb align=\u00bbcenter\u00bb css=\u00bb\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Febooks%2Fidentity-security|title:Leer%20ahora|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 cybv2-pad-top content-callout-resource electric-cyan\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbimg-box\u00bb css=\u00bb.vc_custom_1747687180604{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/woman-reading-tablet-770&#215;530-1.jpg?id=208423) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcontent-column\u00bb][vc_row_inner][vc_column_inner el_class=\u00bbhead-box\u00bb width=\u00bb5\/6&#8243;][vc_column_text css=\u00bb\u00bb]<\/p>\n<h3>Solicitar una demostraci\u00f3n en directo<\/h3>\n<p><\/p>\n<ul>\n<li>Proteja y gestione el acceso de las aplicaciones y otras identidades no humanas<\/li>\n<li>Acelere las iniciativas empresariales digitales<\/li>\n<li>Mejore la confianza de los clientes mediante la minimizaci\u00f3n del riesgo de p\u00e9rdida de datos<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_btn title=\u00bbContacto\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb css=\u00bb.vc_custom_1738879063751{margin-left: 30px !important;}\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fcontact%2F|title:contacto|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2_resources\u00bb css=\u00bb.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}\u00bb][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbno-break\u00bb][vc_column_text el_class=\u00bbno-break\u00bb]<\/p>\n<h3>Explorar<br \/>\nrecursos<br \/>\nrelacionados<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/secure-devops-pipelines-and-cloud-native-apps\">Ver todos los recursos<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2_resources_uberflip\u00bb][vc_column el_class=\u00bbnew_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=\u00bb.vc_custom_1671461545553{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbnew_hpstyle_section8_uberflip\u00bb]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":53045,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27774],"class_list":["post-139606","page","type-page","status-publish","hentry","product_category-devsecops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Gesti\u00f3n de secretos | CyberArk<\/title>\n<meta name=\"description\" content=\"Simplifique el proceso de proteger las identidades no humanas en todos los tipos de aplicaciones y procesos de DevOps.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/products\/secrets-management\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gesti\u00f3n de secretos\" \/>\n<meta property=\"og:description\" content=\"Simplifique el proceso de proteger las identidades no humanas en todos los tipos de aplicaciones y procesos de DevOps.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/products\/secrets-management\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-20T07:20:51+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/products\/secrets-management\/\",\"url\":\"https:\/\/www.cyberark.com\/products\/secrets-management\/\",\"name\":\"Gesti\u00f3n de secretos | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/secrets-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/secrets-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Enable-the-Digital-Business-icon.svg\",\"datePublished\":\"2023-01-30T17:14:16+00:00\",\"dateModified\":\"2025-10-20T07:20:51+00:00\",\"description\":\"Simplifique el proceso de proteger las identidades no humanas en todos los tipos de aplicaciones y procesos de DevOps.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/secrets-management\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/products\/secrets-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/products\/secrets-management\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Enable-the-Digital-Business-icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Enable-the-Digital-Business-icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/products\/secrets-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Productos\",\"item\":\"https:\/\/www.cyberark.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Gesti\u00f3n de secretos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Gesti\u00f3n de secretos | CyberArk","description":"Simplifique el proceso de proteger las identidades no humanas en todos los tipos de aplicaciones y procesos de DevOps.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/products\/secrets-management\/","og_locale":"es_ES","og_type":"article","og_title":"Gesti\u00f3n de secretos","og_description":"Simplifique el proceso de proteger las identidades no humanas en todos los tipos de aplicaciones y procesos de DevOps.","og_url":"https:\/\/www.cyberark.com\/products\/secrets-management\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-10-20T07:20:51+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tiempo de lectura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/products\/secrets-management\/","url":"https:\/\/www.cyberark.com\/products\/secrets-management\/","name":"Gesti\u00f3n de secretos | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/products\/secrets-management\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/products\/secrets-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Enable-the-Digital-Business-icon.svg","datePublished":"2023-01-30T17:14:16+00:00","dateModified":"2025-10-20T07:20:51+00:00","description":"Simplifique el proceso de proteger las identidades no humanas en todos los tipos de aplicaciones y procesos de DevOps.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/products\/secrets-management\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/products\/secrets-management\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/products\/secrets-management\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Enable-the-Digital-Business-icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Enable-the-Digital-Business-icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/products\/secrets-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Productos","item":"https:\/\/www.cyberark.com\/products\/"},{"@type":"ListItem","position":3,"name":"Gesti\u00f3n de secretos"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/139606","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/comments?post=139606"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/139606\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/53045"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/media?parent=139606"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/product_category?post=139606"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}