{"id":188011,"date":"2022-05-11T18:51:12","date_gmt":"2022-05-11T22:51:12","guid":{"rendered":"https:\/\/www.cyberark.com\/cyberark-ventures\/"},"modified":"2025-07-22T09:54:27","modified_gmt":"2025-07-22T13:54:27","slug":"cyberark-ventures","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/es\/cyberark-ventures\/","title":{"rendered":"Cybersecurity Startup Ventures"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcybv2 hero dark\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-1&#8243;][vc_column_text css=\u00bb\u00bb]<\/p>\n<h1>CyberArk ventures<\/h1>\n<h2>Empowering the next generation of cybersecurity innovators.<\/h2>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-2&#8243;][vc_raw_html]JTVCd2lzdGlhX3ZpZGVvJTIwaWQlM0QlMjIxejJ0M210aHhzJTIyJTVE[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb disable_element=\u00bbyes\u00bb el_class=\u00bbcybv2 cybv2_sticky_nav\u00bb css=\u00bb.vc_custom_1652125312417{background-color: #f7f7f7 !important;}\u00bb][vc_column width=\u00bb1\/4&#8243;][vc_column_text el_class=\u00bbsticky-nav-title\u00bb]<\/p>\n<h3><i class=\"fas fa-long-arrow-alt-up\"><\/i>CYBERARK VENTURES<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243;][vc_raw_html el_class=\u00bbsticky-nav-buttons\u00bb]JTNDJTIxLS0lMjBBZGQlMjBsaSUyMGZvciUyMHNlY3Rpb24lMjBkYXRhLXNjcm9sbC1jbGFzcyUyMGlzJTIwd2hlcmUlMjB5b3UlMjBwdXQlMjB0aGUlMjBzZWN0aW9uJTIwY2xhc3MlMjB5b3UlMjB3YW50JTIwdG8lMjBzY3JvbGwlMjB0byUyMC0tJTNFJTBBJTNDdWwlM0UlMEElM0NsaSUyMGRhdGEtc2Nyb2xsLWNsYXNzJTNEJTIyc3ViLTElMjIlM0VPdmVydmlldyUzQyUyRmxpJTNFJTBBJTNDbGklMjBkYXRhLXNjcm9sbC1jbGFzcyUzRCUyMnN1Yi0yJTIyJTNFQmVuZWZpdHMlM0MlMkZsaSUzRSUwQSUzQ2xpJTIwZGF0YS1zY3JvbGwtY2xhc3MlM0QlMjJzdWItMyUyMiUzRVBvcnRmb2xpbyUzQyUyRmxpJTNFJTBBJTNDJTJGdWwlM0U=[\/vc_raw_html][\/vc_column][vc_column width=\u00bb1\/4&#8243;][vc_btn title=\u00bbContact Us!\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:%23contact\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbsubnav-dropdown\u00bb][vc_column_text el_class=\u00bbsticky-nav-title\u00bb]<\/p>\n<h5 style=\"text-align: right;\">Jump to<i class=\"fas fa-chevron-circle-down\"><\/i><\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 cybv2-pad hv-cta-list\u00bb][vc_column width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1710266239816{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/05\/cv-benefitstat.jpg?id=130891) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbimg-box\u00bb][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbstat-column\u00bb][vc_row_inner][vc_column_inner el_class=\u00bbhead-box\u00bb width=\u00bb11\/12&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text css=\u00bb\u00bb el_class=\u00bblist-text\u00bb]<\/p>\n<h2>How we\u2019re fueling startup innovation<\/h2>\n<p>We\u2019re helping startups accelerate contributions to the cybersecurity community.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bblist-box\u00bb width=\u00bb11\/12&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=\u00bbbenefits-content-icon\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblist-text\u00bb]Powering the next generation of industry leaders to bring groundbreaking technologies to market[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bblist-box\u00bb width=\u00bb11\/12&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=\u00bbbenefits-content-icon\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblist-text\u00bb]Leveraging CyberArk\u2019s leadership, experience, threat research and track record of innovation[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bblist-box\u00bb width=\u00bb11\/12&#8243; offset=\u00bbvc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=\u00bbbenefits-content-icon\u00bb]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblist-text\u00bb]Guiding new product design for enterprise-ready implementation[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2-pad-top overview-hz sub-1&#8243;][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbhead-box\u00bb][vc_column_text css=\u00bb\u00bb]<\/p>\n<h3>Overview<\/h3>\n<p>Your startup holds the key to cybersecurity innovation. CyberArk offers the funding, expertise and ecosystem to help you thrive.[\/vc_column_text][\/vc_column][vc_column width=\u00bb2\/3&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_row_inner equal_height=\u00bbyes\u00bb][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb5\/12&#8243;][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/05\/cv-seedfund-icon.svg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-130795\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/05\/cv-seedfund-icon.svg\" alt=\"\" width=\"640\" height=\"640\" \/><\/a>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1732007726296{padding-bottom: 20px !important;}\u00bb]<\/p>\n<h4>$30 Million fund<\/h4>\n<p>Support for cybersecurity startups seeking Seed, Series A and B investments[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb5\/12&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/05\/cv-unmatchedexpertise-icon.svg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-130803\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/05\/cv-unmatchedexpertise-icon.svg\" alt=\"\" width=\"640\" height=\"640\" \/><\/a>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1732007737952{padding-bottom: 20px !important;}\u00bb]<\/p>\n<h4>Unmatched expertise<\/h4>\n<p>Deep knowledge and experience from an innovative industry leader[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb5\/12&#8243;][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/05\/cv-valuableecosystem-icon.svg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-130811\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/05\/cv-valuableecosystem-icon.svg\" alt=\"\" width=\"640\" height=\"640\" \/><\/a>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1732007752281{padding-bottom: 20px !important;}\u00bb]<\/p>\n<h4>Valuable ecosystem<\/h4>\n<p>Product integration with CyberArk\u2019s leading Identity Security solutions[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=\u00bbcta-box\u00bb width=\u00bb5\/12&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/05\/cv-globalconnections-icon.svg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-130819\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/05\/cv-globalconnections-icon.svg\" alt=\"\" width=\"640\" height=\"640\" \/><\/a>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1732007773791{padding-bottom: 20px !important;}\u00bb]<\/p>\n<h4>Global connections<\/h4>\n<p>Networking opportunities to support the go-to-market strategy[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 cybv2-pad-top featured-integrations sub-2&#8243; css=\u00bb.vc_custom_1652125420451{background-color: #f7f7f7 !important;}\u00bb][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbbox-heading\u00bb][vc_column_text css=\u00bb\u00bb]<\/p>\n<h3>Our growing portfolio<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbcta-box\u00bb column_link=\u00bburl:https%3A%2F%2Fwww.dig.security%2F|target:_blank\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-188021\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/dig-security.svg\" alt=\"Dig Security logo\" width=\"743\" height=\"302\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbtiny\u00bb]<\/p>\n<h4>Dig Security<\/h4>\n<p>Provider of real-time threat detection solutions for data assets hosted in public clouds[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.dig.security\/\" target=\"_blank\" rel=\"noopener\">Learn More<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbcta-box\u00bb column_link=\u00bburl:https%3A%2F%2Fwww.enso.security%2F|target:_blank\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-179850 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/06\/enso-tile-logo.jpg\" alt=\"Enso company logo\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/06\/enso-tile-logo.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/06\/enso-tile-logo-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/06\/enso-tile-logo-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbtiny\u00bb]<\/p>\n<h4>Enso Security<\/h4>\n<p>Provider of application security posture management[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.enso.security\/\" target=\"_blank\" rel=\"noopener\">Learn More<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/3&#8243; offset=\u00bbvc_col-lg-offset-4 vc_col-md-offset-4 vc_col-sm-offset-4 vc_col-xs-12&#8243; column_link=\u00bburl:https%3A%2F%2Fzeronetworks.com%2F|target:_blank\u00bb el_class=\u00bbcta-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-130843\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/05\/cv-zeronetworks-integrations.jpg\" alt=\"\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/05\/cv-zeronetworks-integrations.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/05\/cv-zeronetworks-integrations-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/05\/cv-zeronetworks-integrations-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbtiny\u00bb]<\/p>\n<h4>Zero Networks<\/h4>\n<p>Leading provider of identity-based micro-segmentation[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/zeronetworks.com\/\" target=\"_blank\" rel=\"noopener\">Learn More<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-188301 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/sweet-logo.png\" alt=\"sweet logo\" width=\"740\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/sweet-logo.png 740w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/sweet-logo-300x122.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/sweet-logo-150x61.png 150w\" sizes=\"auto, (max-width: 740px) 100vw, 740px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbtiny\u00bb]<\/p>\n<h4>Sweet Security<\/h4>\n<p>Provider of runtime insights to cut through cloud security&#8217;s noise[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.sweet.security\/\" target=\"_blank\" rel=\"noopener\">Learn More<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbcta-box\u00bb offset=\u00bbvc_col-lg-offset-4 vc_col-md-offset-4 vc_col-sm-offset-4&#8243;][vc_column_text css=\u00bb\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"wp-image-202638 size-medium aligncenter\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/02\/device-authority-300x150.png\" alt=\"Device Authority\" width=\"300\" height=\"150\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/02\/device-authority-300x150.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/02\/device-authority-768x384.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/02\/device-authority-150x75.png 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/02\/device-authority.png 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbtiny\u00bb]<\/p>\n<h4>Device Authority<\/h4>\n<p>Automating Zero Trust For IoT[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/deviceauthority.com\/\" target=\"_blank\" rel=\"noopener\">Learn More<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text css=\u00bb\u00bb]<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-213424 size-medium\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/07\/lasso-logo-2-300x150.png\" alt=\"Lasso Logo\" width=\"300\" height=\"150\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/07\/lasso-logo-2-300x150.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/07\/lasso-logo-2-768x384.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/07\/lasso-logo-2-150x75.png 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/07\/lasso-logo-2.png 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbtiny\u00bb]<\/p>\n<h4>Lasso Security<\/h4>\n<p>Provider of an advanced cybersecurity solution designed to safeguard Generative AI and Large Language Models (LLMs).[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.lasso.security\/\" target=\"_blank\" rel=\"noopener\">Learn More<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 cybv2_customer_stories vc_tta-o-non-responsive sub-3&#8243;][vc_column][vc_tta_tabs style=\u00bbflat\u00bb shape=\u00bbsquare\u00bb color=\u00bbwhite\u00bb spacing=\u00bb\u00bb gap=\u00bb20&#8243; alignment=\u00bbcenter\u00bb active_section=\u00bb\u00bb el_class=\u00bbcybv2_customer_stories_tabs cybv2_customer_stories_tabs_no_links\u00bb][vc_tta_section title=\u00bbMerlin Ventures\u00bb tab_id=\u00bb1607742493330-265de97c-f2d9eb66-6bf8d012-2589&#8243; el_class=\u00bbnew_hpstyle_section6_tab1_icon vc_active\u00bb][vc_row_inner equal_height=\u00bbyes\u00bb el_class=\u00bbnew_hpstyle_section6_maintab_row\u00bb][vc_column_inner el_class=\u00bbimage-column\u00bb width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_single_image image=\u00bb130851&#8243; img_size=\u00bb590&#215;500&#8243; alignment=\u00bbright\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_left_image\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00bb width=\u00bb1\/2&#8243;][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text1 text\u00bb]\u00bbMerlin&#8217;s work with CyberArk began as a channel partner, so we have confidence that this relationship with CyberArk Ventures will be a strong fit. As security subject matter experts, we understand how enterprise sales work and how to execute successful go-to-market strategies that create value for startups looking to rapidly penetrate and scale in the U.S. market.\u00bb[\/vc_column_text][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text2&#8243;]<strong>Seth Spergel,<\/strong> Managing Partner[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00bbTeam8 Capital\u00bb tab_id=\u00bb1607742494008-8c0fb98b-2b6beb66-6bf8d012-2589&#8243; el_class=\u00bbnew_hpstyle_section6_tab2_icon\u00bb][vc_row_inner equal_height=\u00bbyes\u00bb el_class=\u00bbnew_hpstyle_section6_maintab_row\u00bb][vc_column_inner el_class=\u00bbimage-column\u00bb width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1607653503563{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_single_image image=\u00bb130867&#8243; img_size=\u00bb590&#215;500&#8243; alignment=\u00bbright\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_left_image\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00bb width=\u00bb1\/2&#8243;][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text1 text\u00bb]\u00bbToo often, entrepreneurs face limited reach to end customers and lack access to resources and specialized talent. These are challenges that capital alone can\u2019t solve. Our relationship and partnership with CyberArk will help support technology companies for predictable, long-term success. Working with CyberArk on both product and go-to-market puts companies on the fast track to become category leaders.\u00bb[\/vc_column_text][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text2&#8243;]<strong>Liran Grinberg,<\/strong> Co-Founder and Managing Partner[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00bbYL Ventures\u00bb tab_id=\u00bb1607742494616-60a6dced-32cfeb66-6bf8d012-2589&#8243; el_class=\u00bbnew_hpstyle_section6_tab3_icon\u00bb][vc_row_inner equal_height=\u00bbyes\u00bb el_class=\u00bbnew_hpstyle_section6_maintab_row\u00bb][vc_column_inner el_class=\u00bbimage-column\u00bb width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1607653481888{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_single_image image=\u00bb130883&#8243; img_size=\u00bb590&#215;500&#8243; alignment=\u00bbright\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_left_image\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00bb width=\u00bb1\/2&#8243;][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text1 text\u00bb]\u201cAs singular cybersecurity investors ourselves, our collaborative relationship with CyberArk comes naturally. We both have extensive experience with guiding cybersecurity innovators with go-to-market in their startup journey and helping them grow into tomorrow\u2019s global industry leaders, much like CyberArk did as a cybersecurity trailblazer.\u201d[\/vc_column_text][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text2&#8243;]<strong>Ofer Schreiber,<\/strong> Partner[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 cybv2-pad featured-integrations sub-2&#8243; css=\u00bb.vc_custom_1652360837421{background-color: #f7f7f7 !important;}\u00bb][vc_column el_class=\u00bbbox-heading\u00bb][vc_column_text css=\u00bb\u00bb el_class=\u00bbmb-8&#8243;]<\/p>\n<h3 style=\"text-align: center;\">Related posts<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcta-box\u00bb column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fpress%2Fcyberark-ventures-launches-with-30-million-fund-to-fuel-innovative-cybersecurity-technologies%2F\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-28900 size-large\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/why-cyberark-hero-1024x475.jpg\" alt=\"\" width=\"640\" height=\"297\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/why-cyberark-hero-1024x475.jpg 1024w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/why-cyberark-hero-300x139.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/why-cyberark-hero-768x356.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/why-cyberark-hero-150x70.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/why-cyberark-hero.jpg 1440w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbtiny\u00bb]<\/p>\n<h4>CyberArk ventures launches<\/h4>\n<p>CyberArk, announced the launch of CyberArk Ventures \u2013 a $30 million global investment fund designed to empower the next generation of disruptors solving complex security challenges with innovative technology.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/press\/cyberark-ventures-launches-with-30-million-fund-to-fuel-innovative-cybersecurity-technologies\/\">Learn More<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcta-box\u00bb column_link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fall-blog-posts%2Fcyberark-ventures-bringing-security-first-innovators-together-to-amplify-impact-2&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-130969 size-large\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/05\/CyberArk-Ventures-1024x439.png\" alt=\"Introducing CyberArk Ventures\" width=\"640\" height=\"274\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/05\/CyberArk-Ventures-1024x439.png 1024w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/05\/CyberArk-Ventures-300x129.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/05\/CyberArk-Ventures-768x329.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/05\/CyberArk-Ventures-1536x658.png 1536w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/05\/CyberArk-Ventures-150x64.png 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/05\/CyberArk-Ventures.png 1750w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bbtiny\u00bb]<\/p>\n<h4>CyberArk ventures: bringing security-first innovators together to amplify impact<\/h4>\n<p>CyberArk has devoted $30 million to the CyberArk Ventures fund, which is actively deploying capital.[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/all-blog-posts\/cyberark-ventures-bringing-security-first-innovators-together-to-amplify-impact-2\">Learn More<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb css=\u00bb.vc_custom_1652121968027{background-color: #f7f7f7 !important;}\u00bb el_class=\u00bbcybv2 cybv2-pad-top hv-cta sub-4&#8243; el_id=\u00bbcontact\u00bb][vc_column width=\u00bb7\/12&#8243; el_class=\u00bbleft-clmn\u00bb][vc_column_text css=\u00bb\u00bb]<\/p>\n<h1>Connect with CyberArk ventures<\/h1>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner el_class=\u00bbhead-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbhead-box-text\u00bb]Leverage deep knowledge and experience from a cybersecurity leader[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbhead-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbhead-box-text\u00bb]Receive guidance from subject-matter experts to deliver an enterprise-ready product[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbhead-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=\u00bbhead-box-text\u00bb]Develop networking opportunities to support go-to-market strategy[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_single_image image=\u00bb130899&#8243; img_size=\u00bbfull\u00bb el_class=\u00bbd-none d-md-block\u00bb][\/vc_column][vc_column width=\u00bb1\/12&#8243; css=\u00bb.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}\u00bb][\/vc_column][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbright-clmn cybv2-form\u00bb][vc_column_text css=\u00bb\u00bb el_class=\u00bbbold\u00bb]<\/p>\n<h4>Connect with us<\/h4>\n<p>[\/vc_column_text][vc_raw_html]JTVCbWFya2V0b19mb3JtJTIwaWQlM0QlMjI4ODg1JTIyJTIwdHlfcGFnZV91cmwlM0QlMjJodHRwcyUzQSUyRiUyRnd3dy5jeWJlcmFyay5jb20lMkZ0cnktYnV5JTJGdGhhbmsteW91LWVuZHBvaW50LXByaXZpbGVnZS1tYW5hZ2VyJTJGJTIyJTVE[\/vc_raw_html][vc_column_text el_class=\u00bbmore-tiny form-notice\u00bb]Every submission is subject to review. Registrants must provide business contact information to be eligible. To better help trial participants, please provide which use cases that are of interest to validate in the \u201cGoals for Trial\u201d field.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcybv2 hero dark\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-1&#8243;][vc_column_text css=\u00bb\u00bb] CyberArk ventures Empowering the next generation of cybersecurity innovators. [\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-2&#8243;][vc_raw_html]JTVCd2lzdGlhX3ZpZGVvJTIwaWQlM0QlMjIxejJ0M210aHhzJTIyJTVE[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb disable_element=\u00bbyes\u00bb el_class=\u00bbcybv2 cybv2_sticky_nav\u00bb css=\u00bb.vc_custom_1652125312417{background-color: #f7f7f7 !important;}\u00bb][vc_column width=\u00bb1\/4&#8243;][vc_column_text el_class=\u00bbsticky-nav-title\u00bb] CYBERARK VENTURES [\/vc_column_text][\/vc_column][vc_column&#8230;<\/p>\n","protected":false},"author":233,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-188011","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity Startup Ventures | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/es\/cyberark-ventures\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Startup Ventures\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcybv2 hero dark\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-1&#8243;][vc_column_text css=\u00bb\u00bb] CyberArk ventures Empowering the next generation of cybersecurity innovators. [\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-2&#8243;][vc_raw_html]JTVCd2lzdGlhX3ZpZGVvJTIwaWQlM0QlMjIxejJ0M210aHhzJTIyJTVE[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb disable_element=\u00bbyes\u00bb el_class=\u00bbcybv2 cybv2_sticky_nav\u00bb css=\u00bb.vc_custom_1652125312417{background-color: #f7f7f7 !important;}\u00bb][vc_column width=\u00bb1\/4&#8243;][vc_column_text el_class=\u00bbsticky-nav-title\u00bb] CYBERARK VENTURES [\/vc_column_text][\/vc_column][vc_column...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/es\/cyberark-ventures\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-22T13:54:27+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/es\/cyberark-ventures\/\",\"url\":\"https:\/\/www.cyberark.com\/es\/cyberark-ventures\/\",\"name\":\"Cybersecurity Startup Ventures | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/cyberark-ventures\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/cyberark-ventures\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\",\"datePublished\":\"2022-05-11T22:51:12+00:00\",\"dateModified\":\"2025-07-22T13:54:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/cyberark-ventures\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/es\/cyberark-ventures\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/es\/cyberark-ventures\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/es\/cyberark-ventures\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Startup Ventures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Startup Ventures | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/es\/cyberark-ventures\/","og_locale":"es_ES","og_type":"article","og_title":"Cybersecurity Startup Ventures","og_description":"[vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcybv2 hero dark\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-1&#8243;][vc_column_text css=\u00bb\u00bb] CyberArk ventures Empowering the next generation of cybersecurity innovators. [\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-2&#8243;][vc_raw_html]JTVCd2lzdGlhX3ZpZGVvJTIwaWQlM0QlMjIxejJ0M210aHhzJTIyJTVE[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb disable_element=\u00bbyes\u00bb el_class=\u00bbcybv2 cybv2_sticky_nav\u00bb css=\u00bb.vc_custom_1652125312417{background-color: #f7f7f7 !important;}\u00bb][vc_column width=\u00bb1\/4&#8243;][vc_column_text el_class=\u00bbsticky-nav-title\u00bb] CYBERARK VENTURES [\/vc_column_text][\/vc_column][vc_column...","og_url":"https:\/\/www.cyberark.com\/es\/cyberark-ventures\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-07-22T13:54:27+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tiempo de lectura":"8 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/es\/cyberark-ventures\/","url":"https:\/\/www.cyberark.com\/es\/cyberark-ventures\/","name":"Cybersecurity Startup Ventures | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/es\/cyberark-ventures\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/es\/cyberark-ventures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg","datePublished":"2022-05-11T22:51:12+00:00","dateModified":"2025-07-22T13:54:27+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/es\/cyberark-ventures\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/es\/cyberark-ventures\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/es\/cyberark-ventures\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/es\/cyberark-ventures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Startup Ventures"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/188011","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/users\/233"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/comments?post=188011"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/188011\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/media?parent=188011"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/product_category?post=188011"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}