{"id":52934,"date":"2019-02-20T11:35:04","date_gmt":"2019-02-20T16:35:04","guid":{"rendered":"https:\/\/www.cyberark.com\/product-security\/"},"modified":"2023-12-08T08:09:04","modified_gmt":"2023-12-08T13:09:04","slug":"product-security","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/es\/product-security\/","title":{"rendered":"Seguridad del producto"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 int-hero-noimg dark\u00bb][vc_column width=\u00bb3\/4&#8243; el_class=\u00bbcolumn-1&#8243;][vc_column_text]<\/p>\n<h1>Boletines de seguridad de los productos de CyberArk<\/h1>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 cybv2-pad-top text-md-center\u00bb][vc_column][vc_column_text el_class=\u00bbcybv2-pad-btm\u00bb css=\u00bb.vc_custom_1701169393494{padding-bottom: 20px !important;}\u00bb]<\/p>\n<h3 class=\"vc_custom_heading cyb-ltr-spc-6 vc_custom_1550095646903\">Mant\u00e9ngase al d\u00eda<\/h3>\n<div class=\"wpb_text_column wpb_content_element vc_custom_1550871538546\">\n<div class=\"wpb_wrapper\">\n<p>Esta p\u00e1gina contiene informaci\u00f3n sobre las vulnerabilidades de seguridad que pueden afectar a los productos de CyberArk. CyberArk recomienda encarecidamente a los usuarios que se aseguren de actualizar o aplicar los parches relevantes de forma oportuna.<\/p>\n<p>CyberArk se toma muy en serio la seguridad del producto. Si cree que ha encontrado una vulnerabilidad en uno de nuestros productos, le pedimos que siga las directrices de divulgaci\u00f3n responsable y que se ponga en contacto con <a class=\"ext-url\" href=\"mailto:product_security@cyberark.com\">product_security@cyberark.com<\/a> y colabore con nosotros para conseguir una r\u00e1pida resoluci\u00f3n que proteja a nuestros clientes.<\/p>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][vc_btn title=\u00bbRevise nuestra pol\u00edtica\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fcyberark-security-vulinerability-policy.pdf|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2-pad text-center\u00bb][vc_column][vc_column_text css=\u00bb.vc_custom_1701169516508{padding-bottom: 20px !important;}\u00bb]<\/p>\n<h3 class=\"vc_custom_heading vc_custom_1550858186777\">\u00daltimos boletines de seguridad<\/h3>\n<div class=\"wpb_text_column wpb_content_element vc_custom_1550859075590\">\n<div class=\"wpb_wrapper\">\n<p>Para obtener m\u00e1s informaci\u00f3n sobre nuestros boletines de seguridad, <a class=\"ext-url\" href=\"https:\/\/cyberark.my.site.com\/s\/login\/\" target=\"_blank\" rel=\"noopener noreferrer\">inicie sesi\u00f3n o \u00fanase a<\/a> nuestra Comunidad T\u00e9cnica.<\/p>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=\u00bb1\/6&#8243; offset=\u00bbvc_col-sm-offset-4 vc_col-xs-6&#8243; css=\u00bb.vc_custom_1561728971210{padding-right: 0px !important;}\u00bb][vc_column_text css=\u00bb.vc_custom_1701169432891{padding-bottom: 20px !important;}\u00bb]<\/p>\n<h4 class=\"vc_custom_heading vc_custom_1550858186777\">Date<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00bb1\/6&#8243; css=\u00bb.vc_custom_1561728983798{padding-left: 0px !important;}\u00bb offset=\u00bbvc_col-xs-6&#8243;][vc_column_text css=\u00bb.vc_custom_1655316673613{padding-bottom: 20px !important;}\u00bb]<\/p>\n<h4 class=\"vc_custom_heading vc_custom_1550858186777\">ID<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=\u00bb1\/3&#8243; offset=\u00bbvc_col-sm-offset-4&#8243;][vc_basic_grid post_type=\u00bbsecurity_bulletin\u00bb max_items=\u00bb10&#8243; element_width=\u00bb12&#8243; gap=\u00bb1&#8243; item=\u00bb36838&#8243; initial_loading_animation=\u00bbnone\u00bb grid_id=\u00bbvc_gid:1701169469098-42e0d8be-29de-0&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2_talk_to_an_expert\u00bb css=\u00bb.vc_custom_1608677118624{background-color: #061b2b !important;}\u00bb][vc_column][vc_column_text el_class=\u00bbextra-space\u00bb]<\/p>\n<h2 style=\"text-align: center;\">Login or join our technical community<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00bbIniciar sesi\u00f3n\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb align=\u00bbcenter\u00bb link=\u00bburl:https%3A%2F%2Fcyberark.my.site.com%2Fs%2Flogin%2F|target:_blank|\u00bb el_class=\u00bbcybv2-button-solid cyb-button-hpstyle_section5&#8243;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 int-hero-noimg dark\u00bb][vc_column width=\u00bb3\/4&#8243; el_class=\u00bbcolumn-1&#8243;][vc_column_text] Boletines de seguridad de los productos de CyberArk [\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 cybv2-pad-top text-md-center\u00bb][vc_column][vc_column_text el_class=\u00bbcybv2-pad-btm\u00bb css=\u00bb.vc_custom_1701169393494{padding-bottom: 20px !important;}\u00bb] Mant\u00e9ngase al d\u00eda Esta p\u00e1gina contiene informaci\u00f3n sobre las vulnerabilidades de seguridad&#8230;<\/p>\n","protected":false},"author":125,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-52934","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Seguridad del producto | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/es\/product-security\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seguridad del producto\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 int-hero-noimg dark\u00bb][vc_column width=\u00bb3\/4&#8243; el_class=\u00bbcolumn-1&#8243;][vc_column_text] Boletines de seguridad de los productos de CyberArk [\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 cybv2-pad-top text-md-center\u00bb][vc_column][vc_column_text el_class=\u00bbcybv2-pad-btm\u00bb css=\u00bb.vc_custom_1701169393494{padding-bottom: 20px !important;}\u00bb] Mant\u00e9ngase al d\u00eda Esta p\u00e1gina contiene informaci\u00f3n sobre las vulnerabilidades de seguridad...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/es\/product-security\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-08T13:09:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/es\/product-security\/\",\"url\":\"https:\/\/www.cyberark.com\/es\/product-security\/\",\"name\":\"Seguridad del producto | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/#website\"},\"datePublished\":\"2019-02-20T16:35:04+00:00\",\"dateModified\":\"2023-12-08T13:09:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/product-security\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/es\/product-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/es\/product-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguridad del producto\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/es\/#website\",\"url\":\"https:\/\/www.cyberark.com\/es\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/es\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Seguridad del producto | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/es\/product-security\/","og_locale":"es_ES","og_type":"article","og_title":"Seguridad del producto","og_description":"[vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 int-hero-noimg dark\u00bb][vc_column width=\u00bb3\/4&#8243; el_class=\u00bbcolumn-1&#8243;][vc_column_text] Boletines de seguridad de los productos de CyberArk [\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 cybv2-pad-top text-md-center\u00bb][vc_column][vc_column_text el_class=\u00bbcybv2-pad-btm\u00bb css=\u00bb.vc_custom_1701169393494{padding-bottom: 20px !important;}\u00bb] Mant\u00e9ngase al d\u00eda Esta p\u00e1gina contiene informaci\u00f3n sobre las vulnerabilidades de seguridad...","og_url":"https:\/\/www.cyberark.com\/es\/product-security\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2023-12-08T13:09:04+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/es\/product-security\/","url":"https:\/\/www.cyberark.com\/es\/product-security\/","name":"Seguridad del producto | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/es\/#website"},"datePublished":"2019-02-20T16:35:04+00:00","dateModified":"2023-12-08T13:09:04+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/es\/product-security\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/es\/product-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/es\/product-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/es\/"},{"@type":"ListItem","position":2,"name":"Seguridad del producto"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/es\/#website","url":"https:\/\/www.cyberark.com\/es\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/es\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/52934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/users\/125"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/comments?post=52934"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/52934\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/media?parent=52934"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/product_category?post=52934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}