{"id":187032,"date":"2023-12-06T16:22:30","date_gmt":"2023-12-06T21:22:30","guid":{"rendered":"https:\/\/www.cyberark.com\/solutions\/government\/"},"modified":"2025-09-22T14:32:39","modified_gmt":"2025-09-22T18:32:39","slug":"government","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/es\/solutions\/government\/","title":{"rendered":"Gobierno"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcybv2 int-hero-noimg blue-gradient\u00bb][vc_column width=\u00bb5\/6&#8243; el_class=\u00bbcolumn-1&#8243;][vc_column_text css=\u00bb\u00bb]<\/p>\n<h1>Protecci\u00f3n de las identidades en todos los niveles de gobierno<\/h1>\n<h2>Garantice un acceso seguro y autom\u00e1tico de las identidades en cualquier dispositivo y lugar, en el momento adecuado. Proteja los datos sensibles y la infraestructura cr\u00edtica en todos los niveles del gobierno con un enfoque Zero Trust que prioriza la eficiencia y la conformidad normativa.<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00bbSolicitar una demostraci\u00f3n\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb custom_onclick=\u00bbtrue\u00bb link=\u00bburl:%23form|\u00bb el_class=\u00bbcybv2-button-transp-green\u00bb custom_onclick_code=\u00bbdata-scroll-class\u00bb][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/addressing-zero-trust-for-government-the-role-of-identity-security\">Consultar el monogr\u00e1fico<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2-pad-top overview-vt\u00bb css=\u00bb.vc_custom_1611617874123{background-color: #f7f7f7 !important;}\u00bb][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbhead-box\u00bb][vc_column_text css=\u00bb\u00bb]<\/p>\n<h3>Seguridad de la Identidad: La piedra angular de una implementaci\u00f3n Zero Trust eficiente<\/h3>\n<p>\u00abNunca conf\u00ede, siempre verifique\u00bb es un principio respaldado de manera crucial por la automatizaci\u00f3n en la gesti\u00f3n de las vulnerabilidades introducidas por numerosos puntos de entrada. La completa <a href=\"https:\/\/www.cyberark.com\/es\/products\/\">plataforma de Seguridad de la Identidad<\/a> de CyberArk mejora las arquitecturas <a href=\"https:\/\/www.cyberark.com\/es\/solutions\/zero-trust\/\">Zero Trust<\/a> fortaleciendo la postura de seguridad y agilizando el proceso de verificaci\u00f3n, lo que aumenta la productividad y reduce los errores en las operaciones gubernamentales.[\/vc_column_text][\/vc_column][vc_column width=\u00bb5\/12&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-143134\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg\" alt=\"riesgo\" width=\"300\" height=\"259\" \/><\/a>[\/vc_column_text][vc_column_text css=\u00bb\u00bb]<\/p>\n<h4>Reduzca los riesgos con una automatizaci\u00f3n proactiva de la seguridad<\/h4>\n<p>Las medidas de seguridad autom\u00e1ticas minimizan los riesgos y mejoran la eficiencia operativa en los sectores gubernamentales.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-129953\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/4_Secretsicon-01.svg\" alt=\"compromiso\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb]<\/p>\n<h4>Contenga los ataques con controles de identidad optimizados<\/h4>\n<p>Los controles estrat\u00e9gicos de privilegios evitan los ataques y minimizan las interrupciones operativas a trav\u00e9s de la automatizaci\u00f3n.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-143628\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/Compliance_test-01.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb]<\/p>\n<h4>Garantice una conformidad agilizada<\/h4>\n<p>Cumpla sin esfuerzo con normas esenciales como NIST, NERC y FIPS con procesos agilizados que reducen los gastos generales manuales.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text css=\u00bb\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-199824 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/digital-health.svg\" alt=\"\u00edcono de salud digital\" width=\"40\" height=\"46\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb]<\/p>\n<h4>Impulse la modernizaci\u00f3n<\/h4>\n<p>Las tecnolog\u00edas de seguridad avanzadas facilitan un ahorro significativo de costos y eficiencias operativas, impulsando la modernizaci\u00f3n de TI en el gobierno.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2_talk_to_an_expert\u00bb css=\u00bb.vc_custom_1608677118624{background-color: #061b2b !important;}\u00bb][vc_column el_class=\u00bbtext-center\u00bb][vc_column_text el_class=\u00bbextra-space\u00bb]<\/p>\n<h2>C\u00f3mo abordar el enfoque Zero Trust en el caso de las agencias federales<\/h2>\n<p>[\/vc_column_text][vc_column_text el_class=\u00bbnew_hpstyle_section9_text\u00bb]Proteja el acceso de todas las identidades en cualquier dispositivo, y proteja tambi\u00e9n los datos e infraestructuras gubernamentales sensibles de las agencias federales.[\/vc_column_text][vc_btn title=\u00bbM\u00e1s informaci\u00f3n\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb align=\u00bbcenter\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fsolutions%2Ffederal%2F|\u00bb el_class=\u00bbcybv2-button-solid cyb-button-hpstyle_section5&#8243;][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 cybv2-pad-top\u00bb][vc_column width=\u00bb2\/3&#8243; offset=\u00bbvc_col-sm-offset-2&#8243;][vc_column_text el_class=\u00bbtext-md-center head-box\u00bb]<\/p>\n<h3>Ad\u00e1ptese a las normativas y los est\u00e1ndares de conformidad con CyberArk<\/h3>\n<p>CyberArk es la empresa l\u00edder mundial en Seguridad de la Identidad en la que conf\u00edan m\u00e1s de 8000 clientes de todo el mundo. Tambi\u00e9n es proveedor certificado por NIAP, parte de la \u00abUnified Capabilities Approved Product List\u00bb (UC APL) del Departamento de Defensa (DoD) de los EE. UU. y titular de un Certificado de Networthiness (CoN) concedido por el Ej\u00e9rcito de los EE. UU. Siga el marco de <a href=\"https:\/\/www.cyberark.com\/es\/blueprint\/\">CyberArk Blueprint<\/a> para dise\u00f1ar una hoja de ruta eficaz en materia de Seguridad de la Identidad y cumplir con las principales normativas.[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 cybv2-pad-top featured-integrations\u00bb][vc_column width=\u00bb1\/5&#8243; el_class=\u00bbcta-box\u00bb column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fpublic-sector-government%2Faddressing-the-australian-essential-eight-cyber-security-maturity-model|\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143175\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/acsc-featured-grey.jpg\" alt=\"ACSC\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/acsc-featured-grey.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/acsc-featured-grey-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/acsc-featured-grey-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbtiny\u00bb]<\/p>\n<h4>Australia &#8211; Ocho estrategias esenciales del ACSC<\/h4>\n<p>Descubra de qu\u00e9 manera la plataforma de Seguridad de la Identidad de CyberArk contribuye a las Ocho estrategias esenciales de gesti\u00f3n de riesgos.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/public-sector-government\/addressing-the-australian-essential-eight-cyber-security-maturity-model\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/5&#8243; el_class=\u00bbcta-box\u00bb column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fgetting-ready-for-nis2|\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-180886 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-star.jpg\" alt=\"Logotipo de FED\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-star.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-star-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-star-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbtiny\u00bb]<\/p>\n<h4>UE &#8211; Directiva NIS2<\/h4>\n<p>Descubra de qu\u00e9 manera la NIS2 podr\u00eda afectar a su negocio y c\u00f3mo puede prepararse.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/getting-ready-for-nis2\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/5&#8243; el_class=\u00bbcta-box\u00bb column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fpublic-sector-government%2Fcybersecurity-in-a-digitalised-world|\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-143183 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/ncsc-featured.jpg\" alt=\"nscs\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/ncsc-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/ncsc-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/ncsc-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbtiny\u00bb]<\/p>\n<h4>Reino Unido &#8211; NCSC CAF<\/h4>\n<p>Obtenga m\u00e1s informaci\u00f3n sobre c\u00f3mo cumplir los objetivos de la estrategia de ciberseguridad del Gobierno del Reino Unido con CyberArk.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/public-sector-government\/cybersecurity-in-a-digitalised-world\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/5&#8243; el_class=\u00bbcta-box\u00bb column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fblog%2Fcisa-cpg-report-ids-top-cybersecurity-steps-for-smb-critical-infrastructure-entities|\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143231\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cisa-featured-grey.jpg\" alt=\"CISA\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cisa-featured-grey.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cisa-featured-grey-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cisa-featured-grey-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbtiny\u00bb]<\/p>\n<h4>EE. UU. &#8211; CISA CPG<\/h4>\n<p>Descubra de qu\u00e9 manera las funcionalidades de Seguridad de la Identidad pueden ayudar a cumplir los objetivos de rendimiento de ciberseguridad intersectorial (CPG) del marco CISA.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/blog\/cisa-cpg-report-ids-top-cybersecurity-steps-for-smb-critical-infrastructure-entities\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/5&#8243; el_class=\u00bbcta-box\u00bb column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fsolution-briefs%2Fdepartment-of-homeland-security-s-continuous-diagnostics-and-mitigation-cdm-phase-2-privilege-management-requirements|\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143191\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/dhs-featured.jpg\" alt=\"dhs\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/dhs-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/dhs-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/dhs-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbtiny\u00bb]<\/p>\n<h4>EE. UU. &#8211; DHS CDM<\/h4>\n<p>Obtenga m\u00e1s informaci\u00f3n sobre el papel de la gesti\u00f3n de acceso con privilegios en las agencias federales y de qu\u00e9 manera le ayuda a superar las dos fases del programa CDM.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\" https:\/\/www.cyberark.com\/resources\/solution-briefs\/department-of-homeland-security-s-continuous-diagnostics-and-mitigation-cdm-phase-2-privilege-management-requirements \">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/5&#8243; el_class=\u00bbcta-box\u00bb column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fpress%2Fcyberark-achieves-fedramp-high-authorization%2F%20|\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-180895 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-ramp.jpg\" alt=\"Logotipo de FedRAMP\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-ramp.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-ramp-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-ramp-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbtiny\u00bb]<\/p>\n<h4>Autorizaci\u00f3n FedRAMP\u00ae High<\/h4>\n<p>Inf\u00f3rmese sobre las principales ofertas de SaaS de CyberArk, CyberArk Endpoint Privilege Manager y CyberArk Workforce Identity, que ayudan a obtener la autorizaci\u00f3n FedRAMP High, con lo que se mejora la seguridad para las agencias federales de acuerdo con los principios de Zero Trust.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/press\/cyberark-achieves-fedramp-high-authorization\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/5&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-180868 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fips-140-2.jpg\" alt=\"Logotipo de Fips 140\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fips-140-2.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fips-140-2-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fips-140-2-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbtiny\u00bb]<\/p>\n<h4>EE. UU. &#8211; FIPS 140 \u2013 2<\/h4>\n<p>CyberArk PAM \u2013 Cumplimiento de FIPS y detecci\u00f3n mejorada.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/product-announcements-blog\/cyberark-privileged-access-manager-self-hosted-v13-0-release-fips-compliance-and-improved-discovery\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/5&#8243; el_class=\u00bbcta-box\u00bb column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fprotecting-the-grid-addressing-nerc-cip-requirements-for-securing-privileged-access|\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143199\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nerc-featured.jpg\" alt=\"NERC\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nerc-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nerc-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nerc-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbtiny\u00bb]<\/p>\n<h4>EE. UU. &#8211; NERC CIP<\/h4>\n<p>Descubra de qu\u00e9 manera las soluciones Cyberark se adaptan a estos requisitos espec\u00edficos de NERC CIP.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/protecting-the-grid-addressing-nerc-cip-requirements-for-securing-privileged-access\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/5&#8243; el_class=\u00bbcta-box\u00bb column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Faddressing-the-department-of-defenses-zero-trust-framework-with-the-cyberark-identity-security-platform%20|\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-180859 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/us-fed-3-recovered.jpg\" alt=\"Logotipo del Departamento de Defensa\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/us-fed-3-recovered.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/us-fed-3-recovered-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/us-fed-3-recovered-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbtiny\u00bb]<\/p>\n<h4>Directrices de Zero Trust del Departamento de Defensa de los EE. UU.<\/h4>\n<p>Una revisi\u00f3n t\u00e9cnica de c\u00f3mo las agencias federales pueden aprovechar las soluciones de Seguridad de la Identidad de CyberArk para alinearse con la arquitectura de referencia de Zero Trust del Departamento de Defensa de los EE. UU.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/addressing-the-department-of-defenses-zero-trust-framework-with-the-cyberark-identity-security-platform\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/5&#8243; el_class=\u00bbcta-box\u00bb column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Faddressing-zero-trust-for-government-the-role-of-identity-security%20|\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143215\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured.jpg\" alt=\"NIST\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbtiny\u00bb]<\/p>\n<h4>EE. UU. &#8211; NIST SP 800-171<\/h4>\n<p>Incluye a los contratistas federales mediante asesoramiento sobre c\u00f3mo proteger la informaci\u00f3n no clasificada controlada y aborda los requisitos del NIST 800-171 relacionados con la seguridad del acceso con privilegios.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/addressing-the-nist-sp-800-171-cui-requirements-with-cyberark\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/5&#8243; el_class=\u00bbcta-box\u00bb column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fhome%2Fput-privileged-access-management-at-the-core-of-nist-zero-trust-architecture|\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143215\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured.jpg\" alt=\"NIST\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbtiny\u00bb]<\/p>\n<h4>EE. UU. &#8211; NIST SP 800-207<\/h4>\n<p>Ponga la gesti\u00f3n de acceso con privilegios en el centro de la arquitectura de Zero Trust del NIST.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\" https:\/\/www.cyberark.com\/resources\/home\/put-privileged-access-management-at-the-core-of-nist-zero-trust-architecture\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/5&#8243; el_class=\u00bbcta-box\u00bb column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fpublic-sector-government%2Fmapping-cyberark-solutions-to-ksa-nca-ecc|\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143207\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nca-featured.jpg\" alt=\"NCA\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nca-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nca-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nca-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbtiny\u00bb]<\/p>\n<h4>Arabia Saudita &#8211; NCA ECC<\/h4>\n<p>Descubra c\u00f3mo CyberArk puede ayudarle a cumplir con los controles esenciales de ciberseguridad de la Autoridad Nacional de Ciberseguridad del Reino de Arabia Saudita.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/public-sector-government\/mapping-cyberark-solutions-to-ksa-nca-ecc\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/5&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-181863 size-medium\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso-27017-big-300x122.jpg\" alt=\"iso-27017\" width=\"300\" height=\"122\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso-27017-big-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso-27017-big-150x61.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso-27017-big.jpg 742w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbtiny\u00bb]<\/p>\n<h4>ISO 27018<\/h4>\n<p>Esta norma reconocida internacionalmente se centra en la protecci\u00f3n de la informaci\u00f3n de identificaci\u00f3n personal (PII) en entornos inform\u00e1ticos en la nube y demuestra la prioridad de CyberArk en relaci\u00f3n con la privacidad de datos y el mantenimiento de la transparencia y la responsabilidad.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/trust\/compliance\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/5&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-189789 size-medium\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-300x122.png\" alt=\"DORA\" width=\"300\" height=\"122\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-300x122.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-150x61.png 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora.png 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbtiny\u00bb]<\/p>\n<h4>DORA<\/h4>\n<p>El Reglamento sobre la resiliencia operativa digital (DORA) tiene por objetivo ayudar a las organizaciones del sector financiero de la UE a mejorar la resiliencia frente a los ciberataques. En general, el DORA hace especial hincapi\u00e9 en la seguridad de las tecnolog\u00edas de la informaci\u00f3n y la comunicaci\u00f3n (TIC). El Reglamento se aplica no solo a las empresas financieras, sino tambi\u00e9n a los terceros que les proporcionan sistemas y servicios de TIC.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/hybrid-and-multi-cloud-security\/dora-compliance-an-identity-security-guidebook\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/5&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-189780 size-medium\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-eu-1-300x122.png\" alt=\"\" width=\"300\" height=\"122\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-eu-1-300x122.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-eu-1-150x61.png 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-eu-1.png 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbtiny\u00bb]<\/p>\n<h4>DoDIN APL<\/h4>\n<p>CyberArk Privileged Access Manager Self-Hosted ha sido catalogada oficialmente como soluci\u00f3n de confianza para los clientes del Departamento de Defensa (DoD). CyberArk PAM Self-Hosted puede encontrarse en la lista de productos aprobados de la red de informaci\u00f3n del DoD (DoDIN APL), ya que cumple las especificaciones para el DoD.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/trust\/compliance\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/5&#8243; column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fpress%2Fcyberark-achieves-qc1-certification-from-italian-national-cybersecurity-agency%2F%20|title:M%C3%A1s%20informaci%C3%B3n|\u00bb el_class=\u00bbcta-box\u00bb][vc_column_text css=\u00bb\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215804\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/acn-logo.jpg\" alt=\"acn logo\" width=\"300\" height=\"122\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/acn-logo.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/acn-logo-150x61.jpg 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbtiny\u00bb]<\/p>\n<h4>Italy: QC1 Certification from Italian National Cybersecurity Agency (ACN)<\/h4>\n<p>CyberArk SaaS products are now available in the ACN marketplace to any government organization in Italy looking to consume or deploy cloud-based services.[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/press\/cyberark-achieves-qc1-certification-from-italian-national-cybersecurity-agency\/\">Learn More<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/5&#8243; column_link=\u00bburl:https%3A%2F%2Finvestors.cyberark.com%2Fnews%2Fnews-details%2F2025%2FCyberArk-Achieves-Cloud-Service-Provider-Security-Standard-Certification-From-Dubai-Electronic-Security-Center%2Fdefault.aspx|title:M%C3%A1s%20informaci%C3%B3n|\u00bb el_class=\u00bbcta-box\u00bb][vc_column_text css=\u00bb\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215822\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/DESC-Logo.jpg\" alt=\"dubai logo\" width=\"300\" height=\"122\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbtiny\u00bb]<\/p>\n<h4>UAE &#8211; CSP Security Standard Certification from DESC<\/h4>\n<p>CyberArk receives Cloud Service Provider certification from Dubai Electronic Security Center (DESC).[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/investors.cyberark.com\/news\/news-details\/2025\/CyberArk-Achieves-Cloud-Service-Provider-Security-Standard-Certification-From-Dubai-Electronic-Security-Center\/default.aspx\" target=\"_blank\" rel=\"noopener\">Learn More<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2_talk_to_an_expert\u00bb css=\u00bb.vc_custom_1608677118624{background-color: #061b2b !important;}\u00bb][vc_column el_class=\u00bbtext-center\u00bb][vc_column_text el_class=\u00bbextra-space\u00bb]<\/p>\n<h2>Protecci\u00f3n de la infraestructura cr\u00edtica australiana en el pasado, en el presente y en el futuro<\/h2>\n<p>[\/vc_column_text][vc_column_text el_class=\u00bbnew_hpstyle_section9_text\u00bb]<span class=\"TextRun SCXW70713111 BCX0\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW70713111 BCX0\">Obtenga m\u00e1s informaci\u00f3n sobre c\u00f3mo gestionar los riesgos de seguridad nacional que suponen el sabotaje, <\/span><span class=\"NormalTextRun SCXW70713111 BCX0\">el espionaje<\/span><span class=\"NormalTextRun SCXW70713111 BCX0\"> y la extorsi\u00f3n de la infraestructura cr\u00edtica de Australia.<\/span><\/span>[\/vc_column_text][vc_btn title=\u00bbM\u00e1s informaci\u00f3n\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb align=\u00bbcenter\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fcritical-infrastructure-australia%2F|\u00bb el_class=\u00bbcybv2-button-solid cyb-button-hpstyle_section5&#8243;][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2-pad cybv2 cybv2-background-oval tour\u00bb][vc_column][vc_row_inner el_class=\u00bbcyb-center\u00bb][vc_column_inner el_class=\u00bbcyb-pad-btm\u00bb][vc_column_text el_class=\u00bbleft-mobile\u00bb]<\/p>\n<h3>Implemente una estrategia de Seguridad de la Identidad por capas<\/h3>\n<p>Refuerce su postura de seguridad y reduzca la exposici\u00f3n a amenazas din\u00e1micas.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=\u00bbsquare\u00bb active_section=\u00bb1&#8243; css_animation=\u00bbnone\u00bb][vc_tta_section i_position=\u00bbright\u00bb i_icon_fontawesome=\u00bbfas fa-chevron-circle-down\u00bb add_icon=\u00bbtrue\u00bb title=\u00bbProteja el acceso con privilegios\u00bb tab_id=\u00bbprivileged-access\u00bb][vc_row_inner el_class=\u00bbcybv2&#8243;][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Proteja el acceso con privilegios<\/h4>\n<p>Cambie de los altos niveles de acceso con privilegios del pasado a un m\u00e9todo m\u00e1s din\u00e1mico y just-in-time para el acceso de los administradores. El acceso al personal y los contratistas debe concederse con permisos m\u00ednimos para reducir la superficie de ataque y el radio de acci\u00f3n, en caso de que una cuenta con privilegios sea objetivo de los ciberdelincuentes.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/products\/privileged-access\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119610\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-1.png\" alt=\"Proteja Amazon WorkSpaces\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00bbright\u00bb i_icon_fontawesome=\u00bbfas fa-chevron-circle-down\u00bb add_icon=\u00bbtrue\u00bb title=\u00bbProteja los endpoints\u00bb tab_id=\u00bbsecure-endpoints\u00bb][vc_row_inner el_class=\u00bbcybv2&#8243;][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Proteja los endpoints<\/h4>\n<p>Los atacantes pueden utilizar los endpoints comprometidos para eludir una autenticaci\u00f3n s\u00f3lida. Por lo tanto, es esencial implementar controles que garanticen que solo los procesos aprobados puedan acceder a los almacenes de credenciales. Esto se basa en la higiene b\u00e1sica de la implementaci\u00f3n del m\u00ednimo privilegio y la eliminaci\u00f3n de los derechos de administrador local en el endpoint.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/products\/endpoint-privilege-security\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119618\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-2.png\" alt=\"Aplicar el m\u00ednimo privilegio\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-2.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-2-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-2-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00bbright\u00bb i_icon_fontawesome=\u00bbfas fa-chevron-circle-down\u00bb add_icon=\u00bbtrue\u00bb title=\u00bbProteja el acceso a las aplicaciones\u00bb tab_id=\u00bbsecure-application-access\u00bb][vc_row_inner el_class=\u00bbcybv2&#8243;][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Proteja el acceso a las aplicaciones<\/h4>\n<p>Una autenticaci\u00f3n s\u00f3lida y adaptativa y una aprobaci\u00f3n y autorizaci\u00f3n continuas proporcionan la base para proteger el acceso del personal a las aplicaciones. Este cambio de los controles de red a los controles de identidad crea una mejor experiencia del usuario e impulsa la productividad. Capacite a los miembros del personal a la vez que mantiene alejados a los delincuentes.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/products\/access-management\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119626\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3.png\" alt=\"Habilite una autenticaci\u00f3n s\u00f3lida\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=\u00bbright\u00bb i_icon_fontawesome=\u00bbfas fa-chevron-circle-down\u00bb add_icon=\u00bbtrue\u00bb title=\u00bbProteja las solicitudes de acceso no humano\u00bb tab_id=\u00bbsecure-non-human-access-requests\u00bb][vc_row_inner el_class=\u00bbcybv2&#8243;][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Proteja las solicitudes de acceso no humano<\/h4>\n<p>El mantra \u00abNunca conf\u00ede, siempre verifique\u00bb del enfoque Zero Trust tambi\u00e9n debe abarcar identidades no humanas (entidades no personales). Deben protegerse todas las solicitudes de dichas identidades de m\u00e1quina que pretendan acceder a los recursos de red, as\u00ed como gestionarse adecuadamente los secretos de todo el proceso de DevOps.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/es\/products\/secrets-management\/\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=\u00bbvc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119733\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecureBotsandVirtualAgents-1.png\" alt=\"Acceso no humano\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecureBotsandVirtualAgents-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecureBotsandVirtualAgents-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecureBotsandVirtualAgents-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 cyb-pad-btm\u00bb][vc_column width=\u00bb2\/3&#8243; el_class=\u00bbtext-center\u00bb offset=\u00bbvc_col-sm-offset-2&#8243;][vc_column_text]<\/p>\n<h2>Experiencias de clientes<\/h2>\n<p>Sepa c\u00f3mo algunas empresas y agencias gubernamentales l\u00edderes han obtenido excelentes resultados en materia de Seguridad de la Identidad gracias a CyberArk.[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00bbcyb-pad-btm\u00bb][vc_column][vc_raw_html]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0iY3VzdG9tZXJfc3RvcnkiIHBvc3RzX3Blcl9wYWdlPSI0IiBjb2x1bW5zX2xhcmdlPSIzIiBzaG93X2F1dGhvcj0iZmFsc2UiIHNob3dfZXhjZXJwdD0iZmFsc2UiIHBvczFfaWQ9IjEzMTA4NiIgcG9zMl9pZD0iMTI4MzE0IiBwb3MzX2lkPSIxMjg0NTAiIHBvczRfaWQ9IjEzNTYyMSJd[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2_resources\u00bb css=\u00bb.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}\u00bb][vc_column width=\u00bb1\/3&#8243;][vc_column_text el_class=\u00bbno-break\u00bb]<\/p>\n<h3>Explorar recursos relacionados<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/public-sector-government\">Ver todos los recursos<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column\u00bb][vc_column el_class=\u00bbnew_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=\u00bb.vc_custom_1691480099229{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbnew_hpstyle_section8_uberflip\u00bb]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_id=\u00bbformulario\u00bb][vc_column][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb css=\u00bb.vc_custom_1690896313684{background-color: #f7f7f7 !important;}\u00bb el_class=\u00bbcybv2 cybv2-pad-top hv-cta\u00bb][vc_column width=\u00bb7\/12&#8243; el_class=\u00bbleft-clmn\u00bb][vc_column_text]<\/p>\n<h2>Comience el recorrido hacia Zero Trust<\/h2>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner el_class=\u00bbhead-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbhead-box-text\u00bb]Aplique Zero Trust y el m\u00ednimo privilegio, y proteja sin problemas el acceso para humanos y m\u00e1quinas en todos los dispositivos y entornos.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbhead-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbhead-box-text\u00bb]Implemente controles inteligentes de privilegios a todas las formas de identidad para ayudar a aislar y detener los ataques, proteger los activos m\u00e1s valiosos y conceder acceso durante el tiempo adecuado.<br \/>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbhead-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbhead-box-text\u00bb]Automatice la gesti\u00f3n del ciclo de vida de la identidad a trav\u00e9s de integraciones de aplicaciones y flujos de trabajo continuos y sin c\u00f3digo, lo que permite tomar el control de los permisos excesivos. [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbhead-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbhead-box-text\u00bb]Supervise continuamente las amenazas con informaci\u00f3n de Seguridad de la Identidad en tiempo real, ajuste los controles en funci\u00f3n del riesgo y aproveche las opciones de correcci\u00f3n en tiempo real.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_single_image image=\u00bb106859&#8243; img_size=\u00bbfull\u00bb el_class=\u00bbd-none d-md-block\u00bb][\/vc_column][vc_column width=\u00bb1\/12&#8243; css=\u00bb.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}\u00bb][\/vc_column][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbright-clmn cybv2-form\u00bb][vc_column_text el_class=\u00bbbold\u00bb]<\/p>\n<h4>Solicitar demostraci\u00f3n<\/h4>\n<p>[\/vc_column_text][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iNDUzMyIgdHlfcGFnZV91cmw9Imh0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS90aGFuay15b3UtcmVxdWVzdC1kZW1vLyJd[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":53044,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-187032","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Gobierno | CyberArk<\/title>\n<meta name=\"description\" content=\"Proteja el acceso de las identidades en cualquier dispositivo y lugar, en el momento adecuado. Proteja los datos sensibles y la infraestructura cr\u00edtica, en todos los niveles de gobierno con un enfoque Zero Trust.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/government\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gobierno\" \/>\n<meta property=\"og:description\" content=\"Proteja el acceso de las identidades en cualquier dispositivo y lugar, en el momento adecuado. Proteja los datos sensibles y la infraestructura cr\u00edtica, en todos los niveles de gobierno con un enfoque Zero Trust.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/government\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-22T18:32:39+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/government\/\",\"name\":\"Gobierno | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg\",\"datePublished\":\"2023-12-06T21:22:30+00:00\",\"dateModified\":\"2025-09-22T18:32:39+00:00\",\"description\":\"Proteja el acceso de las identidades en cualquier dispositivo y lugar, en el momento adecuado. Proteja los datos sensibles y la infraestructura cr\u00edtica, en todos los niveles de gobierno con un enfoque Zero Trust.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/government\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Soluciones de Seguridad de la Identidad\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Gobierno\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Gobierno | CyberArk","description":"Proteja el acceso de las identidades en cualquier dispositivo y lugar, en el momento adecuado. Proteja los datos sensibles y la infraestructura cr\u00edtica, en todos los niveles de gobierno con un enfoque Zero Trust.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/government\/","og_locale":"es_ES","og_type":"article","og_title":"Gobierno","og_description":"Proteja el acceso de las identidades en cualquier dispositivo y lugar, en el momento adecuado. Proteja los datos sensibles y la infraestructura cr\u00edtica, en todos los niveles de gobierno con un enfoque Zero Trust.","og_url":"https:\/\/www.cyberark.com\/solutions\/government\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-09-22T18:32:39+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tiempo de lectura":"11 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/government\/","url":"https:\/\/www.cyberark.com\/solutions\/government\/","name":"Gobierno | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg","datePublished":"2023-12-06T21:22:30+00:00","dateModified":"2025-09-22T18:32:39+00:00","description":"Proteja el acceso de las identidades en cualquier dispositivo y lugar, en el momento adecuado. Proteja los datos sensibles y la infraestructura cr\u00edtica, en todos los niveles de gobierno con un enfoque Zero Trust.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/government\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/government\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/government\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Soluciones de Seguridad de la Identidad","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Gobierno"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/187032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/comments?post=187032"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/187032\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/53044"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/media?parent=187032"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/product_category?post=187032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}