{"id":198124,"date":"2024-10-07T04:05:52","date_gmt":"2024-10-07T08:05:52","guid":{"rendered":"https:\/\/www.cyberark.com\/solutions\/servicios-financieros\/"},"modified":"2025-12-04T04:12:47","modified_gmt":"2025-12-04T09:12:47","slug":"financial-services","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/es\/solutions\/financial-services\/","title":{"rendered":"Servicios financieros"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcybv2 hero dark\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-1&#8243; offset=\u00bbvc_col-md-6&#8243;][vc_column_text css=\u00bb\u00bb]<\/p>\n<h1>Seguridad de identidades de CyberArk para servicios financieros<\/h1>\n<p><\/p>\n<h2>Seguridad en la que puede confiar para garantizar el \u00e9xito.<\/h2>\n<p>\n[\/vc_column_text][vc_btn title=\u00bbVea el webinar\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb css=\u00bb\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwebinars%2Fidentity-security-trailblazer-automating-identity-security-in-finance-with-erste-digital|title:Ver%20ahora|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/global-financial-services-firm\/\">Lea la historia del cliente<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-2&#8243;][vc_single_image image=\u00bb183554&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbcenter\u00bb css=\u00bb\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 v3 cybv2-pad overview-vt\u00bb][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbhead-box\u00bb][vc_column_text]<\/p>\n<h3>Prepare para el futuro la protecci\u00f3n financiera de su empresa gracias a la seguridad de la identidad\u200b<\/h3>\n<p>Proteja el acceso de todas las identidades en toda su organizaci\u00f3n y en las aplicaciones de los clientes para luchar contra el creciente n\u00famero de amenazas a los datos personales y de propiedad, a la vez que acelera la innovaci\u00f3n digital para seguir el ritmo de las necesidades en constante evoluci\u00f3n de los consumidores y clientes.\u200b[\/vc_column_text][\/vc_column][vc_column width=\u00bb5\/12&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text css=\u00bb\u00bb]<img decoding=\"async\" class=\"alignnone wp-image-129798 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/secure-desktop-credential-icon.svg\" alt=\"La integraci\u00f3n entre Endpoint Privilege Manager y CyberArk Identity Adaptive MFA ayuda a reforzar la postura de seguridad en el endpoint\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Mitigue el robo de credenciales y evite los ataques<\/h4>\n<p>Utilice una s\u00f3lida seguridad de la identidad e implemente una gesti\u00f3n del acceso con privilegios para protegerse de las amenazas a la informaci\u00f3n personal y de propiedad exclusiva.\u200b[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text css=\u00bb\u00bb]<img decoding=\"async\" class=\"alignnone wp-image-126434 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/partner-handshake-icon.svg\" alt=\"Conexiones comunitarias\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Desarrolle y garantice la confianza del cliente\u200b<\/h4>\n<p>Reduzca el riesgo de p\u00e9rdida de datos y el impacto en las experiencias satisfactorias de los clientes al tiempo que utiliza las herramientas de DevOps para integrar f\u00e1cilmente la seguridad en las aplicaciones de los clientes, fundamental para la transformaci\u00f3n digital.\u200b[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=\u00bbcta-box\u00bb][vc_column_text css=\u00bb\u00bb]<img decoding=\"async\" class=\"alignnone wp-image-118792 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Satisfy-Audit-and-Compliance-icon.svg\" alt=\"\u00cdcono Satisfaga los requisitos de auditor\u00eda y conformidad\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Conformidad normativa\u200b<\/h4>\n<p>Cumpla con normativas clave, como la ley Sarbanes-Oxley, PCI-DSS, MAS TRM, NAIC, IFRS, IDD, GDPR y m\u00e1s.\u200b[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 cybv2-pad-top overview-more-col\u00bb][vc_column width=\u00bb5\/6&#8243; el_class=\u00bbtext-md-center heading\u00bb offset=\u00bbvc_col-md-offset-1 vc_col-sm-offset-1&#8243;][vc_column_text css=\u00bb\u00bb]<\/p>\n<h2>Transacciones seguras en un mundo digital\u200b<\/h2>\n<p><\/p>\n<h5>He aqu\u00ed algunas formas en las que podemos ayudarle a avanzar sin miedo.\u200b<\/h5>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text css=\u00bb\u00bb el_class=\u00bbpb-6&#8243;]<img decoding=\"async\" class=\"alignnone wp-image-129945 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/3_MachineIdentitiesIcon-01.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4>Habilitar el negocio digital<\/h4>\n<p>Proteja el acceso a las aplicaciones empresariales para identidades humanas y de m\u00e1quinas.<br \/><a href=\"https:\/\/www.cyberark.com\/es\/solutions\/digital-business-transformation\/\"><br \/>\nStart Today<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text css=\u00bb\u00bb el_class=\u00bbpb-6&#8243;]<img decoding=\"async\" class=\"alignnone wp-image-118800 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg\" alt=\"Ciberseguridad\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4>Prot\u00e9jase del ransomware\u200b<\/h4>\n<p>Defi\u00e9ndase con confianza de los ataques, entre ellos el ransomware y el robo de credenciales, al tiempo que mantiene la eficiencia operativa.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/es\/solutions\/defend-against-attacks\/\">Descubra c\u00f3mo<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text css=\u00bb\u00bb el_class=\u00bbpb-6&#8243;]<img decoding=\"async\" class=\"alignnone wp-image-125619 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/remote-work-icon.svg\" alt=\"\u00edcono de teletrabajo\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4>Trabajo remoto seguro<\/h4>\n<p>Conecte a su personal remoto con aquello que necesita de forma r\u00e1pida y eficiente.\u200b <a href=\"https:\/\/www.cyberark.com\/es\/solutions\/secure-your-workforce\/\"> Inf\u00f3rmese<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text css=\u00bb\u00bb el_class=\u00bbpb-6&#8243;]<img decoding=\"async\" class=\"alignnone wp-image-130803 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/05\/cv-unmatchedexpertise-icon.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4>Satisfaga los requisitos de auditor\u00eda y conformidad\u200b<\/h4>\n<p>Mant\u00e9ngase informado de una gran variedad de reglamentos, marcos y est\u00e1ndares.\u200b <a href=\"https:\/\/www.cyberark.com\/es\/solutions\/audit-compliance\/\"> Descubra c\u00f3mo<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 cybv2-pad text-md-center\u00bb][vc_column el_class=\u00bbpb-4&#8243;][vc_column_text]<\/p>\n<h2>Tendencias en materia de seguridad de la identidad en los servicios financieros\u200b<\/h2>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 seesaw cyb-reverse\u00bb][vc_column width=\u00bb7\/12&#8243; el_class=\u00bbbelow-left\u00bb][vc_column_text el_class=\u00bbdark\u00bb]<\/p>\n<h4>EP 51 &#8211; Encontrar el equilibrio entre innovaci\u00f3n y seguridad en la tecnolog\u00eda financiera\u200b<\/h4>\n<p>En este episodio de Trust Issues, David Puner entrevista a Eric Hussey, Vicepresidente Senior y Director de Seguridad de la Informaci\u00f3n (CISO) de Finastra, proveedor l\u00edder de soluciones y servicios de software financiero. Hussey comparte sus conocimientos sobre la funci\u00f3n en constante evoluci\u00f3n que desempe\u00f1an los CISO, los desaf\u00edos que plantea mantenerse actualizado sobre las nuevas y cambiantes normativas en materia de ciberseguridad, y la importancia de encontrar el equilibrio entre innovaci\u00f3n y seguridad en el \u00e1mbito de las fintech. \u200b[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1721310959841{margin-top: 20px !important;}\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/podcasts\/ep-51-balancing-innovation-and-security-in-fintech\/\">Escuchar ahora\u200b<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbabove\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-114312 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1.jpg\" alt=\"Gesti\u00f3n del acceso\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 seesaw\u00bb][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbabove wistia_embed\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-112224 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/EnableDigital-Business-HV_CTA-770x550-1.jpg\" alt=\"CTA de alto valor Habilite el negocio digital\" width=\"770\" height=\"550\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/EnableDigital-Business-HV_CTA-770x550-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/EnableDigital-Business-HV_CTA-770x550-1-300x214.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/EnableDigital-Business-HV_CTA-770x550-1-768x549.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/EnableDigital-Business-HV_CTA-770x550-1-150x107.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00bb7\/12&#8243; el_class=\u00bbbelow-right\u00bb][vc_column_text el_class=\u00bbdark\u00bb]<\/p>\n<h4>En la cuerda floja financiera: el papel fundamental de la seguridad de la identidad en las finanzas\u200b<\/h4>\n<p>En el espect\u00e1culo de cuerda floja que representa el sector de los servicios financieros, la seguridad de la identidad funciona como la red de seguridad b\u00e1sica, dise\u00f1ada meticulosamente para interceptar cualquier paso err\u00f3neo antes de precipitarse al suelo.\u200b[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1721311145485{margin-top: 20px !important;}\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/blog\/financial-highwire-the-critical-role-of-identity-security-in-finance\">M\u00e1s informaci\u00f3n<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 customer-stories cybv2-pad-top\u00bb][vc_column width=\u00bb2\/3&#8243; offset=\u00bbvc_col-md-offset-2&#8243; el_class=\u00bbtext-center\u00bb][vc_column_text el_class=\u00bbpb-4&#8243;]<\/p>\n<h3>Historias de clientes de servicios financieros\u200b<\/h3>\n<p><\/p>\n<h6>M\u00e1s de 8000 organizaciones de todo el mundo conf\u00edan en CyberArk.\u200b<\/h6>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 cybv2_customer_stories vc_tta-o-non-responsive\u00bb css=\u00bb.vc_custom_1686775642430{background-color: #ffffff !important;}\u00bb][vc_column][vc_tta_tabs style=\u00bbflat\u00bb shape=\u00bbsquare\u00bb color=\u00bbwhite\u00bb spacing=\u00bb\u00bb gap=\u00bb20&#8243; alignment=\u00bbcenter\u00bb active_section=\u00bb\u00bb el_class=\u00bbcybv2_customer_stories_tabs\u00bb css=\u00bb.vc_custom_1608676900675{background-color: #ffffff !important;}\u00bb][vc_tta_section title=\u00bbRabobank Internacional\u00bb tab_id=\u00bbrabobank-international\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_icon vc_active\u00bb][vc_row_inner equal_height=\u00bbyes\u00bb el_class=\u00bbnew_hpstyle_section6_maintab_row\u00bb][vc_column_inner el_class=\u00bbimage-column\u00bb width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1607653503563{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_single_image image=\u00bb191689&#8243; img_size=\u00bb590X560&#8243; alignment=\u00bbright\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_left_image\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00bb width=\u00bb1\/2&#8243;][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text1 text\u00bb]\u00bbDesde que implementamos CyberArk, podemos gestionar cinco veces m\u00e1s cuentas que las que ten\u00edamos almacenadas al principio\u00bb.[\/vc_column_text][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text2&#8243;]Alexa Glynn, Directora de Integraci\u00f3n y Herramientas de Seguridad Globales de <strong>Rabobank International\u200b<\/strong>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/rabobank\/\">Consultar experiencia de cliente<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00bbNational Australia Bank\u00bb tab_id=\u00bbnational-australia-bank\u00bb el_class=\u00bbnew_hpstyle_section6_tab2_icon\u00bb][vc_row_inner equal_height=\u00bbyes\u00bb el_class=\u00bbnew_hpstyle_section6_maintab_row\u00bb][vc_column_inner el_class=\u00bbimage-column\u00bb width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1687286224685{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_single_image image=\u00bb128574&#8243; img_size=\u00bb590X560&#8243; alignment=\u00bbright\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_left_image\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00bb width=\u00bb1\/2&#8243;][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text1 text\u00bb]\u00bbLa soluci\u00f3n de gesti\u00f3n de las identidades con privilegios automatizada y lista para empresas de CyberArk, as\u00ed como su equipo especializado, fueron fundamentales para el \u00e9xito de nuestra compleja implementaci\u00f3n a escala mundial. Fueron capaces de afrontar el tama\u00f1o y la complejidad del proyecto, al tiempo que supieron satisfacer nuestros requisitos relativos a un aumento de la productividad y la responsabilidad\u00bb.[\/vc_column_text][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text2&#8243;]Director de Seguridad de <strong>National Australia Bank_<\/strong>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1724047013074{margin-top: 20px !important;}\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/national-australia-bank\/\">Read Customer Story\u200b<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00bbTIAA\u00bb tab_id=\u00bbtiaa\u00bb el_class=\u00bbnew_hpstyle_section6_tab3_icon\u00bb][vc_row_inner equal_height=\u00bbyes\u00bb el_class=\u00bbnew_hpstyle_section6_maintab_row\u00bb][vc_column_inner el_class=\u00bbimage-column\u00bb width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_single_image image=\u00bb129822&#8243; img_size=\u00bb590X560&#8243; alignment=\u00bbright\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_left_image\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00bb width=\u00bb1\/2&#8243;][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text1 text\u00bb]\u00bbFue incre\u00edble. Comparamos el n\u00famero de aplicaciones y secretos que CyberArk Conjur pod\u00eda gestionar hoy en d\u00eda frente a las soluciones de la competencia, y la diferencia de costos era muy convincente\u00bb.[\/vc_column_text][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text2&#8243;]Adam Powers, Director Principal de ingenier\u00eda de seguridad de la informaci\u00f3n, <strong>TIAA_<\/strong>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/tiaa\/\">Read Customer Story\u200b<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=\u00bbEmpresa de servicios financieros\u00bb tab_id=\u00bbfinancial-services-firm\u00bb el_class=\u00bbnew_hpstyle_section6_tab4_icon\u00bb][vc_row_inner equal_height=\u00bbyes\u00bb el_class=\u00bbnew_hpstyle_section6_maintab_row\u00bb][vc_column_inner el_class=\u00bbimage-column\u00bb width=\u00bb1\/2&#8243; css=\u00bb.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_single_image image=\u00bb35775&#8243; img_size=\u00bb590X560&#8243; alignment=\u00bbright\u00bb el_class=\u00bbnew_hpstyle_section6_tab1_left_image\u00bb][\/vc_column_inner][vc_column_inner el_class=\u00bbnew_hpstyle_section6_tab1_right_bckgrd\u00bb width=\u00bb1\/2&#8243;][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text1 text\u00bb]\u00bbEn general, nuestro equipo se ha beneficiado enormemente de la facilidad de uso y las eficiencias relacionadas que ofrece la soluci\u00f3n CyberArk Privileged Access Manager. Al poder consultar r\u00e1pidamente las cuentas y automatizar muchos de los procesos relacionados, hemos podido eliminar los pasos manuales que sol\u00edan ser un obst\u00e1culo a la productividad\u00bb.[\/vc_column_text][vc_column_text el_class=\u00bbnew_hpstyle_section6_tab1_text2&#8243;]Director de seguridad de <strong>empresa de servicios financieros_<\/strong>[\/vc_column_text][vc_column_text css=\u00bb\u00bb el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/global-financial-services-firm\/\">Read Customer Story\u200b<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2_resources\u00bb css=\u00bb.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}\u00bb][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbno-break\u00bb][vc_column_text el_class=\u00bbno-break\u00bb]<\/p>\n<h3>Explorar<br \/>\nrecursos<br \/>\nrelacionados<\/h3>\n<p>\n[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<a href=\"https:\/\/www.cyberark.com\/resources\/all-blog-posts\/securing-a-lifeline-why-identity-security-is-paramount-in-healthcare\">Ver todos los recursos<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column\u00bb][vc_column el_class=\u00bbnew_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=\u00bb.vc_custom_1721310776257{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbnew_hpstyle_section8_uberflip\u00bb]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00bbstretch_row\u00bb equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcybv2 hero dark\u00bb][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcolumn-1&#8243; offset=\u00bbvc_col-md-6&#8243;][vc_column_text css=\u00bb\u00bb] Seguridad de identidades de CyberArk para servicios financieros Seguridad en la que puede confiar para garantizar el \u00e9xito. [\/vc_column_text][vc_btn title=\u00bbVea el webinar\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb&#8230;<\/p>\n","protected":false},"author":255,"featured_media":0,"parent":53044,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-198124","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Soluciones de Seguridad de la Identidad de CyberArk para servicios financieros\u200b<\/title>\n<meta name=\"description\" content=\"Estamos combinando las p\u00e1ginas web de banca y seguros para crear una nueva p\u00e1gina web de servicios financieros con nuestra nueva marca.\u200b\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/es\/solutions\/financial-services\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Servicios financieros\" \/>\n<meta property=\"og:description\" content=\"Estamos combinando las p\u00e1ginas web de banca y seguros para crear una nueva p\u00e1gina web de servicios financieros con nuestra nueva marca.\u200b\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/es\/solutions\/financial-services\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-04T09:12:47+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"14 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/es\/solutions\/financial-services\/\",\"url\":\"https:\/\/www.cyberark.com\/es\/solutions\/financial-services\/\",\"name\":\"Soluciones de Seguridad de la Identidad de CyberArk para servicios financieros\u200b\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/solutions\/financial-services\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/solutions\/financial-services\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/secure-desktop-credential-icon.svg\",\"datePublished\":\"2024-10-07T08:05:52+00:00\",\"dateModified\":\"2025-12-04T09:12:47+00:00\",\"description\":\"Estamos combinando las p\u00e1ginas web de banca y seguros para crear una nueva p\u00e1gina web de servicios financieros con nuestra nueva marca.\u200b\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/solutions\/financial-services\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/es\/solutions\/financial-services\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/es\/solutions\/financial-services\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/secure-desktop-credential-icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/secure-desktop-credential-icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/es\/solutions\/financial-services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Soluciones de Seguridad de la Identidad\",\"item\":\"https:\/\/www.cyberark.com\/es\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Servicios financieros\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/es\/#website\",\"url\":\"https:\/\/www.cyberark.com\/es\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/es\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Soluciones de Seguridad de la Identidad de CyberArk para servicios financieros\u200b","description":"Estamos combinando las p\u00e1ginas web de banca y seguros para crear una nueva p\u00e1gina web de servicios financieros con nuestra nueva marca.\u200b","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/es\/solutions\/financial-services\/","og_locale":"es_ES","og_type":"article","og_title":"Servicios financieros","og_description":"Estamos combinando las p\u00e1ginas web de banca y seguros para crear una nueva p\u00e1gina web de servicios financieros con nuestra nueva marca.\u200b","og_url":"https:\/\/www.cyberark.com\/es\/solutions\/financial-services\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-12-04T09:12:47+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tiempo de lectura":"14 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/es\/solutions\/financial-services\/","url":"https:\/\/www.cyberark.com\/es\/solutions\/financial-services\/","name":"Soluciones de Seguridad de la Identidad de CyberArk para servicios financieros\u200b","isPartOf":{"@id":"https:\/\/www.cyberark.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/es\/solutions\/financial-services\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/es\/solutions\/financial-services\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/secure-desktop-credential-icon.svg","datePublished":"2024-10-07T08:05:52+00:00","dateModified":"2025-12-04T09:12:47+00:00","description":"Estamos combinando las p\u00e1ginas web de banca y seguros para crear una nueva p\u00e1gina web de servicios financieros con nuestra nueva marca.\u200b","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/es\/solutions\/financial-services\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/es\/solutions\/financial-services\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/es\/solutions\/financial-services\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/secure-desktop-credential-icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/secure-desktop-credential-icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/es\/solutions\/financial-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/es\/"},{"@type":"ListItem","position":2,"name":"Soluciones de Seguridad de la Identidad","item":"https:\/\/www.cyberark.com\/es\/solutions\/"},{"@type":"ListItem","position":3,"name":"Servicios financieros"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/es\/#website","url":"https:\/\/www.cyberark.com\/es\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/es\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/198124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/users\/255"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/comments?post=198124"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/198124\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/53044"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/media?parent=198124"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/product_category?post=198124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}