{"id":17882,"date":"2017-01-05T16:04:41","date_gmt":"2017-01-05T16:04:41","guid":{"rendered":"https:\/\/www.cyberark.com\/homepage\/"},"modified":"2026-02-11T07:27:13","modified_gmt":"2026-02-11T12:27:13","slug":"homepage-3","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/es\/","title":{"rendered":"Inicio"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00bbstretch_row_content_no_spaces\u00bb][vc_column][vc_raw_html css=\u00bb\u00bb]W2N5YmVyX25vdGlmaWNhdGlvbl9iYXIgbWVzc2FnZT0iUGFsbyBBbHRvIE5ldHdvcmtzIENvbXBsZXRlcyBBY3F1aXNpdGlvbiBvZiBDeWJlckFyayB0byBTZWN1cmUgdGhlIEFJIEVyYS4gPGEgaHJlZj0naGh0dHBzOi8vd3d3LnBhbG9hbHRvbmV0d29ya3MuY29tL2NvbXBhbnkvcHJlc3MvMjAyNi9wYWxvLWFsdG8tbmV0d29ya3MtY29tcGxldGVzLWFjcXVpc2l0aW9uLW9mLWN5YmVyYXJrLXRvLXNlY3VyZS10aGUtYWktZXJhJyB0YXJnZXQ9J19ibGFuayc+UmVhZCBwcmVzcyByZWxlYXNlPC9hPi4iXQ==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb css=\u00bb.vc_custom_1770812187465{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2026\/02\/HP-PANW-bg_2000x680.jpg?id=224105) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbnew-hero\u00bb][vc_column][vc_row_inner el_class=\u00bbcybv2 cybv2-pad-top\u00bb][vc_column_inner el_class=\u00bbmb-2&#8243; offset=\u00bbvc_col-lg-8 vc_col-sm-offset-0&#8243;][vc_column_text css=\u00bb\u00bb]<\/p>\n<h1>CyberArk is now a Palo Alto Networks company.<\/h1>\n<p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner offset=\u00bbvc_col-lg-8&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbpb-8&#8243;]Together, we are building the next generation identity security platform for the AI era.[\/vc_column_text][vc_btn title=\u00bbLearn why we are better together\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb css=\u00bb\u00bb link=\u00bburl:https%3A%2F%2Fwww.paloaltonetworks.com%2Fidentity-security|title:M%C3%A1s%20informaci%C3%B3n|target:_blank|\u00bb el_class=\u00bbcybv2-button-solid-chartreuse\u00bb][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=\u00bbyes\u00bb el_class=\u00bbhp-hero-row\u00bb][vc_column_inner el_class=\u00bbhp-hero-tile\u00bb width=\u00bb1\/2&#8243; offset=\u00bbvc_col-lg-4&#8243; column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fpress%2Fcyberark-announces-record-fourth-quarter-and-full-year-2025-results%2F|title:Reg%C3%ADstrate%20ahora|target:_blank|\u00bb][vc_single_image image=\u00bb223788&#8243; img_size=\u00bbfull\u00bb css=\u00bb\u00bb][vc_column_text css=\u00bb\u00bb]CyberArk Announces Record Q4\/FY25 Results[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<span class=\"link-style\">Leer comunicado de prensa <i class=\"fa fa-long-arrow-right\"><\/i><\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbhp-hero-tile\u00bb width=\u00bb1\/2&#8243; offset=\u00bbvc_col-lg-4&#8243; column_link=\u00bburl:https%3A%2F%2Flp.cyberark.com%2Fgartner-mq-pam-2025-es.html|title:M%C3%A1s%20informaci%C3%B3n|target:_blank|\u00bb][vc_single_image image=\u00bb218463&#8243; img_size=\u00bbfull\u00bb css=\u00bb\u00bb][vc_column_text css=\u00bb\u00bb]7 veces l\u00edder del MQ de Gartner 2025 para PAM[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<span class=\"link-style\">Descargar copia gratuita <i class=\"fa fa-long-arrow-right\"><\/i><\/span><br \/>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbhp-hero-tile\u00bb width=\u00bb1\/2&#8243; offset=\u00bbvc_col-lg-4&#8243; column_link=\u00bburl:https%3A%2F%2Freg.impact.cyberark.com%2Fflow%2Fcyberevents%2Fisu26%2Fmainevent%2Fpage%2Fimpacthomepage|title:Reg%C3%ADstrate%20ahora|target:_blank|\u00bb][vc_single_image image=\u00bb216904&#8243; img_size=\u00bbfull\u00bb css=\u00bb\u00bb][vc_column_text css=\u00bb\u00bb]\u00a1Incripci\u00f3n abierta para IMPACT 2026![\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<span class=\"link-style\">Inscr\u00edbase ahora y ahorre <i class=\"fa fa-long-arrow-right\"><\/i><\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb disable_element=\u00bbyes\u00bb css=\u00bb.vc_custom_1762263140413{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/10\/hp-hero-bg.jpg?id=217785) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbnew-hero\u00bb][vc_column][vc_row_inner el_class=\u00bbcybv2 cybv2-pad-top\u00bb][vc_column_inner el_class=\u00bbcolumn-1 mb-2&#8243; width=\u00bb2\/3&#8243; offset=\u00bbvc_col-sm-offset-0&#8243;][vc_single_image image=\u00bb217681&#8243; img_size=\u00bbfull\u00bb css=\u00bb\u00bb el_class=\u00bbpb-6&#8243;][vc_column_text css=\u00bb\u00bb]<\/p>\n<h1><span class=\"ice\">7 veces l\u00edder<\/span><br \/>\nLa visi\u00f3n m\u00e1s avanzada<\/h1>\n<p>\n[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbpb-8&#8243;]2025 Gartner\u00ae Magic Quadrant\u2122\u00a0para la gesti\u00f3n del acceso con privilegios[\/vc_column_text][vc_btn title=\u00bbObtener informe\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb css=\u00bb\u00bb link=\u00bburl:https%3A%2F%2Flp.cyberark.com%2Fgartner-mq-pam-2025-es.html|title:Obtener%20informe|\u00bb el_class=\u00bbcybv2-button-solid-chartreuse\u00bb data_tracking=\u00bbButton Test\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbcolumn-2 d-none d-sm-block\u00bb width=\u00bb1\/3&#8243;][vc_column_text css=\u00bb\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-217772 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/10\/gartner-chart.png\" alt=\"Gartner image\" width=\"444\" height=\"457\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/10\/gartner-chart.png 444w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/10\/gartner-chart-291x300.png 291w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/10\/gartner-chart-150x154.png 150w\" sizes=\"auto, (max-width: 444px) 100vw, 444px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=\u00bbyes\u00bb el_class=\u00bbhp-hero-row\u00bb][vc_column_inner el_class=\u00bbhp-hero-tile\u00bb width=\u00bb1\/2&#8243; offset=\u00bbvc_col-lg-4&#8243; column_link=\u00bburl:https%3A%2F%2Flp.cyberark.com%2Fsecuring-the-new-frontier-of-agentic-ai.html%3Futm_source%3Dcyberark_website%26amp%3Butm_medium%3Dreferral%26amp%3Butm_content%3Dai_agents_summit%26amp%3Butm_campaign%3Dsecuring_agentic_ai%26amp%3Bcq_plac%3D%257bplacement%257d%26amp%3Bcq_net%3D%257bnetwork%257d%26amp%3Bcq_plt%3Dgp|title:Reg%C3%ADstrate%20ahora|target:_blank|\u00bb data_tracking=\u00bbColumn Test\u00bb][vc_single_image image=\u00bb216251&#8243; img_size=\u00bbfull\u00bb css=\u00bb\u00bb][vc_column_text css=\u00bb\u00bb]Protege la nueva frontera de la IA[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<span class=\"link-style\">Reg\u00edstrese al evento virtual<br \/>\n <i class=\"fa fa-long-arrow-right\"><\/i><\/span> [\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbhp-hero-tile\u00bb width=\u00bb1\/2&#8243; offset=\u00bbvc_col-lg-4&#8243; column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fcyber-unit%2F|title:M%C3%A1s%20informaci%C3%B3n|\u00bb][vc_single_image image=\u00bb216260&#8243; img_size=\u00bbfull\u00bb css=\u00bb\u00bb][vc_column_text css=\u00bb\u00bb]CYBR Unit Servicios de Seguridad de la Identidad[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<span class=\"link-style\">M\u00e1s informaci\u00f3n <i class=\"fa fa-long-arrow-right\"><\/i><\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbhp-hero-tile\u00bb width=\u00bb1\/2&#8243; offset=\u00bbvc_col-lg-4&#8243; column_link=\u00bburl:https%3A%2F%2Freg.impact.cyberark.com%2Fflow%2Fcyberevents%2Fisu26%2Fmainevent%2Fpage%2Fimpacthomepage|title:Reg%C3%ADstrate%20ahora|target:_blank|\u00bb][vc_single_image image=\u00bb216904&#8243; img_size=\u00bbfull\u00bb css=\u00bb\u00bb][vc_column_text css=\u00bb\u00bb]\u00a1Incripci\u00f3n abierta para IMPACT 2026![\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<span class=\"link-style\">Inscr\u00edbase ahora y ahorre <i class=\"fa fa-long-arrow-right\"><\/i><\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb disable_element=\u00bbyes\u00bb css=\u00bb.vc_custom_1763067654610{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/AI-hero-homepage-revised.jpg?id=216684) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbnew-hero\u00bb][vc_column][vc_row_inner el_class=\u00bbcybv2 cybv2-pad-top\u00bb][vc_column_inner el_class=\u00bbtext-md-center mb-2&#8243; offset=\u00bbvc_col-md-offset-1 vc_col-md-10 vc_col-sm-offset-0&#8243;][vc_column_text css=\u00bb\u00bb]<\/p>\n<h1><span class=\"ice\">Anunciamos los primeros controles de privilegios del sector para agentes de IA<\/span><\/h1>\n<p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbtext-md-center\u00bb offset=\u00bbvc_col-md-offset-1 vc_col-md-10&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbpb-8&#8243;]Sobre la base de una seguridad de la identidad probada, la soluci\u00f3n CyberArk Secure AI Agents ofrece supervisi\u00f3n continua y aplicaci\u00f3n del m\u00ednimo privilegio para proteger a todos los agentes de IA.[\/vc_column_text][vc_btn title=\u00bbM\u00e1s informaci\u00f3n\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb css=\u00bb\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fpress%2Fcyberark-introduces-first-identity-security-solution-purpose-built-to-protect-ai-agents-with-privilege-controls%2F|title:M%C3%A1s%20informaci%C3%B3n|\u00bb el_class=\u00bbcybv2-button-solid-chartreuse\u00bb][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=\u00bbyes\u00bb el_class=\u00bbhp-hero-row\u00bb][vc_column_inner el_class=\u00bbhp-hero-tile\u00bb width=\u00bb1\/2&#8243; offset=\u00bbvc_col-lg-4&#8243; column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fpress%2Fcyberark-announces-strong-third-quarter-2025-results%2F|title:Reg%C3%ADstrate%20ahora|\u00bb data_tracking=\u00bbColumn Test\u00bb][vc_single_image image=\u00bb218864&#8243; img_size=\u00bbfull\u00bb css=\u00bb\u00bb][vc_column_text css=\u00bb\u00bb]CyberArk anuncia s\u00f3lidos resultados trimestrales[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<span class=\"link-style\">Leer comunicado de prensa <i class=\"fa fa-long-arrow-right\"><\/i><\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbhp-hero-tile\u00bb width=\u00bb1\/2&#8243; offset=\u00bbvc_col-lg-4&#8243; column_link=\u00bburl:https%3A%2F%2Flp.cyberark.com%2Fgartner-mq-pam-2025-es.html|title:M%C3%A1s%20informaci%C3%B3n|target:_blank|\u00bb][vc_single_image image=\u00bb218463&#8243; img_size=\u00bbfull\u00bb css=\u00bb\u00bb][vc_column_text css=\u00bb\u00bb]7 veces l\u00edder del MQ de Gartner 2025 para PAM[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<span class=\"link-style\">Descargar copia gratuita <i class=\"fa fa-long-arrow-right\"><\/i><\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbhp-hero-tile\u00bb width=\u00bb1\/2&#8243; offset=\u00bbvc_col-lg-4&#8243; column_link=\u00bburl:https%3A%2F%2Freg.impact.cyberark.com%2Fflow%2Fcyberevents%2Fisu26%2Fmainevent%2Fpage%2Fimpacthomepage|title:Reg%C3%ADstrate%20ahora|target:_blank|\u00bb][vc_single_image image=\u00bb216904&#8243; img_size=\u00bbfull\u00bb css=\u00bb\u00bb][vc_column_text css=\u00bb\u00bb]\u00a1Incripci\u00f3n abierta para IMPACT 2026![\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<span class=\"link-style\">Inscr\u00edbase ahora y ahorre <i class=\"fa fa-long-arrow-right\"><\/i><\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 split-cta bg-gray cyb-reverse\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbleft-column ca-border bg-blue copy-column\u00bb css=\u00bb.vc_custom_1706306299964{background-color: #212930 !important;}\u00bb][vc_column_text css=\u00bb\u00bb el_class=\u00bbmb-8&#8243;]<\/p>\n<h3><span style=\"color: #fff;\">Asegure cada identidad, humana y de m\u00e1quina, con el<\/span> <span style=\"color: #d4eb33;\">nivel adecuado de controles de privilegios.<\/span><\/h3>\n<p>[\/vc_column_text][vc_raw_html css=\u00bb.vc_custom_1715959369965{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb]PGRpdiBjbGFzcz0iZmlyc3QgdmNfYnRuMy1jb250YWluZXIgY3lidjItYnV0dG9uLWdyZWVuIHZjX2J0bjMtaW5saW5lIj48YSBjbGFzcz0idmNfYnRuMy1jb2xvci1ncmV5IiB0aXRsZT0iIj5WZXIgZWwgdsOtZGVvPC9hPjwvZGl2Pjxicj48c2NyaXB0Pg0KalF1ZXJ5KCIuZmlyc3QiKS5jbGljayhmdW5jdGlvbigpew0KICAgIGpRdWVyeSgiLnNlY29uZCIpLmNsaWNrKCk7IA0KICAgIHJldHVybiBmYWxzZTsNCn0pOw0KPC9zY3JpcHQ+[\/vc_raw_html][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbright-column ca-border image-column inner-flex-center\u00bb css=\u00bb.vc_custom_1706306910421{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/01\/second-component-hero.jpg?id=186921) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 v3 cybv2-pad overview-vt\u00bb][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbhead-box\u00bb][vc_single_image image=\u00bb187224&#8243; img_size=\u00bbfull\u00bb el_class=\u00bbpb-4 rounded-6&#8243;][vc_column_text el_class=\u00bbpb-4&#8243;]<\/p>\n<h3>Proteja las identidades.<br \/>\nBloquee a los atacantes.<\/h3>\n<p>Proteja a la perfecci\u00f3n las identidades a lo largo del ciclo de acceso a cualquier recurso en cualquier infraestructura, incluidos los sistemas h\u00edbridos, SaaS y multinube. La plataforma de Seguridad de la Identidad de CyberArk es la primera l\u00ednea de defensa contra ciberdelincuentes y accesos no autorizados para proteger lo que m\u00e1s importa.[\/vc_column_text][vc_btn title=\u00bbSolicite una demo\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Frequest-demo%2F|title:Solicite%20una%20demo|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][vc_column width=\u00bb5\/12&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-144043\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-1.svg\" alt=\"\" width=\"45\" height=\"45\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Acceso seguro y fluido para todas las identidades<\/h4>\n<p>Al combinar un SSO seguro, una MFA adaptativa, la gesti\u00f3n del ciclo de vida, los servicios de directorio y el an\u00e1lisis del comportamiento de los usuarios, le ayudamos a agilizar las operaciones y a ofrecer a los usuarios un acceso sencillo y seguro a los recursos (locales, en la nube o h\u00edbridos) desde cualquier lugar y con cualquier dispositivo.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-144051\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-2.svg\" alt=\"\" width=\"45\" height=\"45\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Controles inteligentes de privilegios<\/h4>\n<p>Aplique controles inteligentes de privilegios de primera clase en toda la infraestructura de TI, as\u00ed como controles espec\u00edficos para proteger las necesidades exclusivas de los usuarios, proveedores externos, endpoints e identidades de m\u00e1quina cuando acceden a datos confidenciales.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-144059\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-3.svg\" alt=\"\" width=\"45\" height=\"45\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Automatizaci\u00f3n y orquestaci\u00f3n flexibles de la identidad<\/h4>\n<p>Agilice los procesos de RR. HH., garantice que los usuarios tengan el acceso adecuado a los recursos adecuados, permita la conformidad con las normativas sectoriales o gubernamentales y mejore la eficiencia en todos los \u00e1mbitos con la orquestaci\u00f3n y la gesti\u00f3n del ciclo de vida, permisos y derechos, y servicios de directorio y federaci\u00f3n.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2-pad cyan-gradient font-white cyb-br cybv2 info-graphic sub2 cybv2-margin-btm-120&#8243; css=\u00bb.vc_custom_1755617397407{margin-bottom: 50px !important;}\u00bb][vc_column width=\u00bb2\/3&#8243; offset=\u00bbvc_col-sm-offset-2&#8243; el_class=\u00bbtext-center\u00bb][vc_column_text css=\u00bb\u00bb el_class=\u00bbtext-md-center head-box\u00bb]<\/p>\n<h3>Definici\u00f3n de seguridad de la identidad<\/h3>\n<p>Centrada en los controles inteligentes de privilegios, la seguridad de la identidad protege a la perfecci\u00f3n el acceso para todas las identidades y automatiza de forma flexible el ciclo de vida de la identidad con la detecci\u00f3n y prevenci\u00f3n continuas de amenazas, todo ello con un enfoque unificado.[\/vc_column_text][vc_btn title=\u00bbDescubra la plataforma\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb css=\u00bb.vc_custom_1711632716423{margin-bottom: 80px !important;}\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fproducts%2F|title:Descubra%20la%20plataforma|\u00bb el_class=\u00bbcybv2-button-transp-green\u00bb][vc_column_text css=\u00bb.vc_custom_1755617343657{border-bottom-width: 50px !important;}\u00bb el_class=\u00bbtext-center\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-195168 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/PG-final-2025.svg\" alt=\"CyberArk Platform Graphic\" width=\"1680\" height=\"1691\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 v3 products cybv2-pad box-row\u00bb][vc_column][vc_row_inner el_class=\u00bbd-flex justify-content-center\u00bb][vc_column_inner el_class=\u00bbcyb-center\u00bb width=\u00bb5\/6&#8243;][vc_column_text]<\/p>\n<h2>Aplique <span class=\"chartreuse\">controles inteligentes de privilegios<\/span> en todo el ciclo de vida de la identidad<\/h2>\n<p><\/p>\n<h5>Ampl\u00ede los controles inteligentes de privilegios dise\u00f1ados para el usuario con m\u00e1s privilegios, como un administrador, a una gama m\u00e1s amplia de identidades humanas y de m\u00e1quina, siempre que se requiera un acceso permanente o just-in-time.<\/h5>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 cyb-pad-top\u00bb][vc_column_inner el_class=\u00bbicon-box\u00bb width=\u00bb1\/3&#8243; column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fproducts%2Faccess-management%2F|title:M%C3%A1s%20informaci%C3%B3n|\u00bb][vc_column_text css=\u00bb\u00bb]<img decoding=\"async\" class=\"alignnone size-full wp-image-144075\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/card-icon-1.svg\" alt=\"\" width=\"32px\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Acceso del personal y de los clientes<\/h4>\n<p>Aseg\u00farese de que los usuarios adecuados tengan acceso seguro a los recursos adecuados en el momento adecuado, protegiendo las credenciales de los empleados y los clientes y controlando estrictamente el acceso a las aplicaciones, los servicios y la infraestructura de TI locales y en la nube.[\/vc_column_text][vc_column_text el_class=\u00bbchartreuse link-arrow-right pt-5&#8243;]<a href=\"https:\/\/www.cyberark.com\/es\/products\/access-management\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbicon-box\u00bb width=\u00bb1\/3&#8243; column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fproducts%2Fendpoint-privilege-security%2F|title:M%C3%A1s%20informaci%C3%B3n|\u00bb][vc_column_text css=\u00bb\u00bb]<img decoding=\"async\" class=\"alignnone size-full wp-image-144083\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/card-icon-2.svg\" alt=\"\" width=\"32px\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Endpoint Privilege Security<\/h4>\n<p>Controle los privilegios no gestionados en los endpoints para reducir significativamente el \u00e1rea de ataque y defenderse de las amenazas eliminando los derechos de administrador local, aplicando el m\u00ednimo privilegio espec\u00edfico de cada rol y mejorando la preparaci\u00f3n para las auditor\u00edas.[\/vc_column_text][vc_column_text el_class=\u00bbchartreuse link-arrow-right pt-5&#8243;]<a href=\"https:\/\/www.cyberark.com\/es\/products\/endpoint-privilege-security\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbicon-box\u00bb width=\u00bb1\/3&#8243; column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fproducts%2Fprivileged-access%2F|title:M%C3%A1s%20informaci%C3%B3n|\u00bb][vc_column_text css=\u00bb\u00bb]<img decoding=\"async\" class=\"alignnone size-full wp-image-144091\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/card-icon-3.svg\" alt=\"\" width=\"32px\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Privileged Access Management<\/h4>\n<p>Proteja las credenciales y los secretos con privilegios con funcionalidades completas para sistemas operativos, endpoints, infraestructuras y cargas de trabajo en la nube, servidores, bases de datos, aplicaciones, hipervisores, dispositivos de red, dispositivos de seguridad y mucho m\u00e1s.[\/vc_column_text][vc_column_text el_class=\u00bbchartreuse link-arrow-right pt-5&#8243;]<a href=\"https:\/\/www.cyberark.com\/es\/products\/privileged-access\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=\u00bbyes\u00bb][vc_column_inner el_class=\u00bbicon-box\u00bb width=\u00bb1\/3&#8243; column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fproducts%2Fsecrets-management%2F|title:M%C3%A1s%20informaci%C3%B3n|\u00bb][vc_column_text css=\u00bb\u00bb]<img decoding=\"async\" class=\"alignnone size-full wp-image-144099\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/card-icon-4.svg\" alt=\"\" width=\"32px\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Secrets Management<\/h4>\n<p>Proteja y gestione los secretos y las credenciales utilizados por las aplicaciones, las m\u00e1quinas y otras identidades no humanas para acceder a TI y otros recursos sensibles en los entornos de TI empresariales y externos.[\/vc_column_text][vc_column_text el_class=\u00bbchartreuse link-arrow-right pt-5&#8243;]<a href=\"https:\/\/www.cyberark.com\/es\/products\/secrets-management\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbicon-box\u00bb width=\u00bb1\/3&#8243; column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fproducts%2Fcloud-security%2F|title:M%C3%A1s%20informaci%C3%B3n|\u00bb][vc_column_text css=\u00bb\u00bb]<img decoding=\"async\" class=\"alignnone size-full wp-image-144107\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/card-icon-5.svg\" alt=\"\" width=\"32px\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Cloud Security<\/h4>\n<p>Ampl\u00ede los controles de privilegios a los entornos en la nube analizando, protegiendo y supervisando el acceso. Descubra y elimine el exceso de permisos al visualizar el acceso para las identidades humanas, de m\u00e1quina y federadas.[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbchartreuse link-arrow-right pt-5&#8243;]<a href=\"https:\/\/www.cyberark.com\/es\/products\/secure-cloud-access\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbicon-box\u00bb width=\u00bb1\/3&#8243; column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fproducts%2Fidentity-management%2F|title:M%C3%A1s%20informaci%C3%B3n|\u00bb][vc_column_text css=\u00bb\u00bb]<img decoding=\"async\" class=\"alignnone size-full wp-image-144115\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/card-icon-6.svg\" alt=\"\" width=\"32px\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Identity Management<\/h4>\n<p>Automatice la gesti\u00f3n de identidades digitales en todos los entornos de TI empresariales y cree, mantenga y analice de forma centralizada el acceso para dimensionar correctamente los permisos en el camino hacia el m\u00ednimo privilegio.[\/vc_column_text][vc_column_text el_class=\u00bbchartreuse link-arrow-right pt-5&#8243;]<a href=\"https:\/\/www.cyberark.com\/es\/products\/identity-management\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2-pad labs v3 dark\u00bb css=\u00bb.vc_custom_1684521475737{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_column width=\u00bb3\/4&#8243;][vc_column_text el_class=\u00bbpb-4&#8243;]<\/p>\n<h3>Investigaci\u00f3n e innovaci\u00f3n en materia de amenazas: <span class=\"chartreuse\">CyberArk Labs<\/span><\/h3>\n<p><\/p>\n<h6 class=\"cybv2-white\">Un equipo de investigadores dedicado a examinar las nuevas t\u00e9cnicas de ataque para que las organizaciones de todo el mundo puedan reforzar su postura de seguridad.<\/h6>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243; offset=\u00bbvc_col-sm-offset-0&#8243;][vc_raw_html]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0idGhyZWF0X3Jlc2VhcmNoX2Jsb2ciIHBvc3RzX3Blcl9wYWdlPSIxIiBjb2x1bW5zX2xhcmdlPSIxMiIgY29sdW1uc19zbWFsbD0iMTIiIHNob3dfYXV0aG9yPSJmYWxzZSIgZmVhdHVyZWRfcm93PSJ0cnVlIl0=[\/vc_raw_html][\/vc_column][vc_column width=\u00bb1\/3&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_raw_html]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0idGhyZWF0X3Jlc2VhcmNoX2Jsb2ciIHZlcnRpY2FsX3Jvdz0idHJ1ZSIgcG9zdHNfcGVyX3BhZ2U9IjQiIHNob3dfYXV0aG9yPSJmYWxzZSIgb2Zmc2V0PSIxIl0=[\/vc_raw_html][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 customer-stories cybv2-pad\u00bb][vc_column width=\u00bb5\/6&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbpb-4&#8243;]<\/p>\n<h3>Protegemos miles de millones de identidades en todo el mundo<\/h3>\n<p><\/p>\n<h6>Casi 10,000 organizaciones de todo el mundo conf\u00edan en CyberArk para proteger sus activos m\u00e1s valiosos y hacer avanzar a sus organizaciones sin miedo.<\/h6>\n<p>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/customer-stories\/\">Ver m\u00e1s clientes<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cyb-pad-btm\u00bb css=\u00bb.vc_custom_1724858791288{background-color: #ffffff !important;}\u00bb][vc_column width=\u00bb1\/2&#8243;][vc_raw_html css=\u00bb\u00bb]PGRpdiBjbGFzcz0idmlkZW8td2luZG93Ij5bd2lzdGlhX3ZpZGVvIGlkPSJvbzRnc2VrdXRnIl08L2Rpdj4=[\/vc_raw_html][\/vc_column][vc_column width=\u00bb5\/12&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_column_text el_class=\u00bbpb-4&#8243;]<span class=\"large-quote\">\u201cSi podemos controlar la identidad, podemos detener la mayor\u00eda de los ataques modernos. Esto es lo que yo llamo un aut\u00e9ntico enfoque Zero Trust y por eso utilizamos CyberArk. Es lo que me ayuda a dormir tranquilo\u201d.<\/span><br \/><strong><span style=\"color: #061b2b;\">Brian Miller,<\/span> CISO, HealthFirst<\/strong>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/healthfirst-applies-an-identity-security-first-approach-to-implement-zero-trust\/\">Consulte el caso pr\u00e1ctico<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 cybv2-pad-btm\u00bb][vc_column][vc_raw_html]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0iY3VzdG9tZXJfc3RvcnkiIHBvc3RzX3Blcl9wYWdlPSI0IiBjb2x1bW5zX2xhcmdlPSIzIiBzaG93X2F1dGhvcj0iZmFsc2UiIHNob3dfZXhjZXJwdD0iZmFsc2UiXQ==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 partners cybv2-pad-btm box-row cyb-background-lt bgimg-hide-mobile\u00bb css=\u00bb.vc_custom_1684416783387{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_column][vc_row_inner el_class=\u00bbd-flex justify-content-center division-line-top cybv2-pad-top\u00bb][vc_column_inner el_class=\u00bbcyb-center\u00bb width=\u00bb3\/4&#8243;][vc_column_text el_class=\u00bbcyb-center pb-4&#8243;]<\/p>\n<h2>La mayor red de socios de seguridad de la identidad<\/h2>\n<p><\/p>\n<h5>Con m\u00e1s de 200 socios de la alianza y 300 integraciones listas para usar, nuestra red de socios est\u00e1 preparada para ayudarle a liberar el poder de CyberArk en toda su empresa.<\/h5>\n<p>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.cyberark.com\/es\/partners\/\">Ver m\u00e1s socios<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcybv2 cybv2-pad-top\u00bb][vc_column_inner el_class=\u00bbpartner-box\u00bb width=\u00bb1\/6&#8243; offset=\u00bbvc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=\u00bb137624&#8243; alignment=\u00bbcenter\u00bb el_class=\u00bbpartner-logo\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbpartner-box\u00bb width=\u00bb1\/6&#8243; offset=\u00bbvc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=\u00bb137544&#8243; alignment=\u00bbcenter\u00bb el_class=\u00bbpartner-logo\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbpartner-box\u00bb width=\u00bb1\/6&#8243; offset=\u00bbvc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=\u00bb137600&#8243; alignment=\u00bbcenter\u00bb el_class=\u00bbpartner-logo\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbpartner-box\u00bb width=\u00bb1\/6&#8243; offset=\u00bbvc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=\u00bb137552&#8243; el_class=\u00bbpartner-logo\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbpartner-box\u00bb width=\u00bb1\/6&#8243; offset=\u00bbvc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=\u00bb137632&#8243; el_class=\u00bbpartner-logo\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbpartner-box\u00bb width=\u00bb1\/6&#8243; offset=\u00bbvc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=\u00bb137576&#8243; el_class=\u00bbpartner-logo\u00bb][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcybv2 mt-4&#8243;][vc_column_inner el_class=\u00bbpartner-box\u00bb width=\u00bb1\/6&#8243; offset=\u00bbvc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=\u00bb137608&#8243;][\/vc_column_inner][vc_column_inner el_class=\u00bbpartner-box\u00bb width=\u00bb1\/6&#8243; offset=\u00bbvc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=\u00bb137616&#8243;][\/vc_column_inner][vc_column_inner el_class=\u00bbpartner-box\u00bb width=\u00bb1\/6&#8243; offset=\u00bbvc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=\u00bb137568&#8243;][\/vc_column_inner][vc_column_inner el_class=\u00bbpartner-box\u00bb width=\u00bb1\/6&#8243; offset=\u00bbvc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=\u00bb137592&#8243;][\/vc_column_inner][vc_column_inner el_class=\u00bbpartner-box\u00bb width=\u00bb1\/6&#8243; offset=\u00bbvc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=\u00bb137560&#8243;][\/vc_column_inner][vc_column_inner el_class=\u00bbpartner-box\u00bb width=\u00bb1\/6&#8243; offset=\u00bbvc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=\u00bb137584&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 news cybv2-pad v3 box-row\u00bb css=\u00bb.vc_custom_1706640036731{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_column][vc_row_inner el_class=\u00bbcybv2&#8243;][vc_column_inner width=\u00bb3\/4&#8243;][vc_column_text el_class=\u00bbpb-4&#8243;]<\/p>\n<h3>Novedades de CyberArk<\/h3>\n<p><\/p>\n<h6>Consulte nuestras \u00faltimas noticias, contenido, eventos y mucho m\u00e1s.<\/h6>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner][vc_raw_html]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0icG9zdCIgcG9zdHNfcGVyX3BhZ2U9IjEiIGNvbHVtbnNfbGFyZ2U9IjEyIiBwb3MxX2lkIjEzMjE0MyIgaG9yaXpvbnRhbF9jb2x1bW49InRydWUiIHNob3dfYXV0aG9yPSJmYWxzZSJd[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=\u00bb1\/2&#8243;][vc_raw_html]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0icHJlc3MiIHBvc3RzX3Blcl9wYWdlPSIyIiBjb2x1bW5zX2xhcmdlPSI2IiBzaG93X2F1dGhvcj0iZmFsc2UiIHNob3dfZXhjZXJwdD0iZmFsc2UiXQ==[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=\u00bb1\/2&#8243;][vc_raw_html]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0icG9zdCIgcG9zdHNfcGVyX3BhZ2U9IjIiIGNvbHVtbnNfbGFyZ2U9IjYiIHNob3dfYXV0aG9yPSJmYWxzZSIgb2Zmc2V0PSIxIiBzaG93X2V4Y2VycHQ9ImZhbHNlIl0=[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 get-started cybv2-pad dark\u00bb css=\u00bb.vc_custom_1706302169617{margin-top: 80px !important;margin-bottom: 80px !important;}\u00bb][vc_column width=\u00bb2\/3&#8243; el_class=\u00bbstat-column text-center\u00bb offset=\u00bbvc_col-md-offset-2&#8243;][vc_column_text el_class=\u00bbextra-space chartreuse\u00bb]<\/p>\n<h3 style=\"color: #d4eb33 !important;\">Empecemos.<\/h3>\n<p>\n[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1706301837478{padding-top: 20px !important;padding-bottom: 20px !important;}\u00bb el_class=\u00bbnew_hpstyle_section9_text\u00bb]<\/p>\n<h6>Es hora de descubrir c\u00f3mo la Seguridad de la Identidad puede ayudar a que su organizaci\u00f3n sea m\u00e1s segura y ciberresiliente.<\/h6>\n<p><\/p>\n<h6>P\u00f3ngase en contacto con nosotros hoy mismo para solicitar una demostraci\u00f3n o una reuni\u00f3n con uno de nuestros expertos.<\/h6>\n<p>[\/vc_column_text][vc_btn title=\u00bbContacto\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fcontact%2F|title:Contacto|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00bbstretch_row_content_no_spaces\u00bb][vc_column][vc_raw_html css=\u00bb\u00bb]W2N5YmVyX25vdGlmaWNhdGlvbl9iYXIgbWVzc2FnZT0iUGFsbyBBbHRvIE5ldHdvcmtzIENvbXBsZXRlcyBBY3F1aXNpdGlvbiBvZiBDeWJlckFyayB0byBTZWN1cmUgdGhlIEFJIEVyYS4gPGEgaHJlZj0naGh0dHBzOi8vd3d3LnBhbG9hbHRvbmV0d29ya3MuY29tL2NvbXBhbnkvcHJlc3MvMjAyNi9wYWxvLWFsdG8tbmV0d29ya3MtY29tcGxldGVzLWFjcXVpc2l0aW9uLW9mLWN5YmVyYXJrLXRvLXNlY3VyZS10aGUtYWktZXJhJyB0YXJnZXQ9J19ibGFuayc+UmVhZCBwcmVzcyByZWxlYXNlPC9hPi4iXQ==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb css=\u00bb.vc_custom_1770812187465{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2026\/02\/HP-PANW-bg_2000x680.jpg?id=224105) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbnew-hero\u00bb][vc_column][vc_row_inner el_class=\u00bbcybv2 cybv2-pad-top\u00bb][vc_column_inner el_class=\u00bbmb-2&#8243; offset=\u00bbvc_col-lg-8 vc_col-sm-offset-0&#8243;][vc_column_text css=\u00bb\u00bb] CyberArk is now a Palo Alto Networks company. [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner offset=\u00bbvc_col-lg-8&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bbpb-8&#8243;]Together, we are building&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27776],"class_list":["post-17882","page","type-page","status-publish","hentry","product_category-identity-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>L\u00edder en seguridad de la identidad y gesti\u00f3n del acceso | CyberArk<\/title>\n<meta name=\"description\" content=\"Obtenga las soluciones m\u00e1s completas de gesti\u00f3n de seguridad de la identidad y el acceso, que permiten un acceso seguro a trav\u00e9s de cualquier dispositivo, en cualquier lugar y en el momento adecuado.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Inicio\" \/>\n<meta property=\"og:description\" content=\"Obtenga las soluciones m\u00e1s completas de gesti\u00f3n de seguridad de la identidad y el acceso, que permiten un acceso seguro a trav\u00e9s de cualquier dispositivo, en cualquier lugar y en el momento adecuado.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-11T12:27:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"L\u00edder en seguridad de la identidad y gesti\u00f3n del acceso | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/10\/gartner-chart.png\",\"datePublished\":\"2017-01-05T16:04:41+00:00\",\"dateModified\":\"2026-02-11T12:27:13+00:00\",\"description\":\"Obtenga las soluciones m\u00e1s completas de gesti\u00f3n de seguridad de la identidad y el acceso, que permiten un acceso seguro a trav\u00e9s de cualquier dispositivo, en cualquier lugar y en el momento adecuado.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/10\/gartner-chart.png\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/10\/gartner-chart.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Inicio\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"L\u00edder en seguridad de la identidad y gesti\u00f3n del acceso | CyberArk","description":"Obtenga las soluciones m\u00e1s completas de gesti\u00f3n de seguridad de la identidad y el acceso, que permiten un acceso seguro a trav\u00e9s de cualquier dispositivo, en cualquier lugar y en el momento adecuado.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/","og_locale":"es_ES","og_type":"article","og_title":"Inicio","og_description":"Obtenga las soluciones m\u00e1s completas de gesti\u00f3n de seguridad de la identidad y el acceso, que permiten un acceso seguro a trav\u00e9s de cualquier dispositivo, en cualquier lugar y en el momento adecuado.","og_url":"https:\/\/www.cyberark.com\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-02-11T12:27:13+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tiempo de lectura":"9 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/","url":"https:\/\/www.cyberark.com\/","name":"L\u00edder en seguridad de la identidad y gesti\u00f3n del acceso | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/10\/gartner-chart.png","datePublished":"2017-01-05T16:04:41+00:00","dateModified":"2026-02-11T12:27:13+00:00","description":"Obtenga las soluciones m\u00e1s completas de gesti\u00f3n de seguridad de la identidad y el acceso, que permiten un acceso seguro a trav\u00e9s de cualquier dispositivo, en cualquier lugar y en el momento adecuado.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/10\/gartner-chart.png","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/10\/gartner-chart.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Inicio"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/17882","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/comments?post=17882"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/17882\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/media?parent=17882"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/product_category?post=17882"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}