{"id":61779,"date":"2019-01-08T15:08:21","date_gmt":"2019-01-08T20:08:21","guid":{"rendered":"https:\/\/www.cyberark.com\/cyberark-guided-tour\/"},"modified":"2024-08-07T03:06:05","modified_gmt":"2024-08-07T07:06:05","slug":"cyberark-guided-tour","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/es\/cyberark-guided-tour\/","title":{"rendered":"Recorrido guiado de CyberArk"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbtop\u00bb css=\u00bb.vc_custom_1546976240527{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/01\/demo-hero.jpg?id=32008) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbcyb-hero-section\u00bb][vc_column][vc_row_inner content_placement=\u00bbbottom\u00bb el_class=\u00bbcyb-hero-header\u00bb][vc_column_inner el_class=\u00bbcyb-hero-header-text\u00bb][vc_custom_heading text=\u00bbRECORRIDO GUIADO DE CYBERARK\u00bb font_container=\u00bbtag:h1|text_align:left\u00bb use_theme_fonts=\u00bbyes\u00bb][vc_custom_heading text=\u00bbD\u00e9 el primer paso hacia una posici\u00f3n m\u00e1s fuerte en materia de seguridad.\u00bb font_container=\u00bbtag:h3|text_align:left\u00bb use_theme_fonts=\u00bbyes\u00bb][vc_btn title=\u00bbEMPIECE EL RECORRIDO\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb#ffffff\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fcyberark-guided-tour%2F%23demo|\u00bb el_class=\u00bbcyb-button event-click\u00bb el_id=\u00bbGuided Tour Page: Request Access\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb css=\u00bb.vc_custom_1545925511532{padding-top: 1.875rem !important;padding-bottom: 1.25rem !important;background-color: #f1f2f2 !important;}\u00bb][vc_column width=\u00bb5\/6&#8243; offset=\u00bbvc_col-sm-offset-1&#8243;][vc_custom_heading text=\u00bbGESTI\u00d3N DEL ACCESO CON PRIVILEGIOS: INTRODUCCI\u00d3N\u00bb font_container=\u00bbtag:h2|text_align:center\u00bb use_theme_fonts=\u00bbyes\u00bb el_class=\u00bbcyb-ltr-spc\u00bb][vc_custom_heading text=\u00bbEl recorrido guiado de CyberArk ofrece una introducci\u00f3n de alto nivel a la soluci\u00f3n de seguridad del acceso con privilegios de CyberArk, l\u00edder en la industria, con flujos de trabajo estandarizados para los usuarios con privilegios (por ejemplo, administradores de sistemas y almacenes). El recorrido proporciona una experiencia autoguiada muy intuitiva con procesos paso a paso que destacan caracter\u00edsticas y funcionalidades espec\u00edficas que son fundamentales para la soluci\u00f3n. Despu\u00e9s de realizar el recorrido, solicite una demostraci\u00f3n en vivo para obtener un an\u00e1lisis t\u00e9cnico en profundidad para abordar los casos de uso espec\u00edficos exclusivos de su negocio.\u00bb font_container=\u00bbtag:p|text_align:center\u00bb use_theme_fonts=\u00bbyes\u00bb][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1534188671338{padding-top: 2rem !important;padding-bottom: 1.6875rem !important;}\u00bb][vc_custom_heading text=\u00bbFLUJOS DE TRABAJO Y CASOS DE USO\u00bb font_container=\u00bbtag:h2|text_align:center\u00bb use_theme_fonts=\u00bbyes\u00bb el_class=\u00bbcyb-ltr-spc\u00bb][\/vc_column][\/vc_row][vc_row equal_height=\u00bbyes\u00bb el_class=\u00bbcyb-center\u00bb][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbcyb-center\u00bb css=\u00bb.vc_custom_1545926620153{padding-bottom: 1.25rem !important;}\u00bb][vc_single_image image=\u00bb31981&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbcenter\u00bb][vc_custom_heading text=\u00bbOPERACIONES EST\u00c1NDAR DELADMINISTRADOR DEL SISTEMA\u00bb font_container=\u00bbtag:h4|text_align:center\u00bb use_theme_fonts=\u00bbyes\u00bb css=\u00bb.vc_custom_1545926524119{padding-top: 1.875rem !important;}\u00bb el_class=\u00bbcyb-ltr-spc-7&#8243;][vc_custom_heading text=\u00bbNavegue por el portal Password Vault Web Access para revisar la actividad de las cuentas, comprobar credenciales con privilegios y mucho m\u00e1s.\u00bb font_container=\u00bbtag:p|text_align:center\u00bb use_theme_fonts=\u00bbyes\u00bb el_class=\u00bbcyb-cta-match\u00bb][\/vc_column][vc_column width=\u00bb1\/3&#8243; el_class=\u00bbcyb-center\u00bb css=\u00bb.vc_custom_1545926628927{padding-bottom: 1.25rem !important;}\u00bb][vc_single_image image=\u00bb31990&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbcenter\u00bb][vc_custom_heading text=\u00bbRESPONDA A LAACTIVIDAD DE ALTO RIESGO\u00bb font_container=\u00bbtag:h4|text_align:center\u00bb use_theme_fonts=\u00bbyes\u00bb css=\u00bb.vc_custom_1586184413601{padding-top: 1.875rem !important;}\u00bb][vc_custom_heading text=\u00bbRealice tareas con privilegios de alto riesgo, revise las funciones para automatizar la suspensi\u00f3n de sesiones y m\u00e1s.\u00bb font_container=\u00bbtag:p|text_align:center\u00bb use_theme_fonts=\u00bbyes\u00bb el_class=\u00bbcyb-cta-match\u00bb][\/vc_column][vc_column width=\u00bb1\/3&#8243; css=\u00bb.vc_custom_1545926639367{padding-bottom: 1.25rem !important;}\u00bb][vc_single_image image=\u00bb31999&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbcenter\u00bb][vc_custom_heading text=\u00bbRESUMEN DE LA DETECCI\u00d3NDE AMENAZAS CON PRIVILEGIOS\u00bb font_container=\u00bbtag:h4|text_align:center\u00bb use_theme_fonts=\u00bbyes\u00bb css=\u00bb.vc_custom_1545926542366{padding-top: 1.875rem !important;}\u00bb el_class=\u00bbcyb-ltr-spc-7&#8243;][vc_custom_heading text=\u00bbRevise las funciones de detecci\u00f3n y alerta de amenazas, consulte auditor\u00edas detalladas y asigne una puntuaci\u00f3n de riesgo a las sesiones con privilegios, entre otras.\u00bb font_container=\u00bbtag:p|text_align:center|line_height:1.375rem\u00bb use_theme_fonts=\u00bbyes\u00bb el_class=\u00bbcyb-cta-match\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb css=\u00bb.vc_custom_1545926087160{padding-top: 2.1875rem !important;background-color: #f1f2f2 !important;}\u00bb][vc_column el_class=\u00bbcyb-center\u00bb][vc_custom_heading text=\u00bbPRODUCTOS QUE APARECEN EN EL RECORRIDO GUIADO DE CYBERARK\u00bb font_container=\u00bbtag:h2|text_align:center\u00bb use_theme_fonts=\u00bbyes\u00bb el_class=\u00bbcyb-ltr-spc-6&#8243; css=\u00bb.vc_custom_1545926205747{padding-bottom: 1.25rem !important;}\u00bb][vc_single_image image=\u00bb32026&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbcenter\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb css=\u00bb.vc_custom_1545927037588{background-color: #f1f2f2 !important;}\u00bb el_class=\u00bbps-table\u00bb][vc_column width=\u00bb1\/4&#8243;][\/vc_column][vc_column width=\u00bb1\/2&#8243; el_class=\u00bbcyb-center\u00bb][vc_custom_heading text=\u00bbCREDENCIALES SEGURAS, AISLAMIENTO YCONTROL, DETECCI\u00d3N DE AMENAZAS Y RESPUESTA\u00bb font_container=\u00bbtag:h3|text_align:center|color:%234d8fcc\u00bb use_theme_fonts=\u00bbyes\u00bb css=\u00bb.vc_custom_1545927295506{margin-bottom: 1.5625rem !important;border-bottom-width: 1px !important;padding-top: 2.1875rem !important;padding-bottom: 1.5625rem !important;border-bottom-color: #d0d2d3 !important;border-bottom-style: solid !important;}\u00bb][vc_custom_heading text=\u00bbCORE PRIVILEGED ACCESS SECURITY\u00bb font_container=\u00bbtag:h3|text_align:center\u00bb use_theme_fonts=\u00bbyes\u00bb css=\u00bb.vc_custom_1545927906783{margin-bottom: 0px !important;}\u00bb][vc_row_inner content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1540568751682{margin-right: 0px !important;margin-left: 0px !important;}\u00bb el_class=\u00bbps-table-col\u00bb][vc_column_inner width=\u00bb1\/3&#8243; css=\u00bb.vc_custom_1545854058084{padding-right: 0px !important;padding-left: 0px !important;}\u00bb][vc_custom_heading text=\u00bbEnterprise<br \/>Password Vault\u00bb font_container=\u00bbtag:h3|font_size:1.5625rem|text_align:center\u00bb use_theme_fonts=\u00bbyes\u00bb el_class=\u00bbregular ps-table-brd\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb1\/3&#8243; css=\u00bb.vc_custom_1540312405002{padding-right: 0px !important;padding-left: 0px !important;}\u00bb][vc_custom_heading text=\u00bbPrivileged<br \/>Session Manager\u00bb font_container=\u00bbtag:h3|font_size:1.5625rem|text_align:center\u00bb use_theme_fonts=\u00bbyes\u00bb el_class=\u00bbregular ps-table-brd\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb1\/3&#8243; css=\u00bb.vc_custom_1540573906129{padding-right: 0px !important;padding-left: 0px !important;}\u00bb][vc_custom_heading text=\u00bbPrivileged<br \/>Threat Analytics\u00bb font_container=\u00bbtag:h3|font_size:1.5625rem|text_align:center\u00bb use_theme_fonts=\u00bbyes\u00bb el_class=\u00bbregular\u00bb css=\u00bb.vc_custom_1545928346070{margin-bottom: 0px !important;padding-top: 1.25rem !important;padding-bottom: 1.25rem !important;}\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=\u00bb1\/4&#8243;][\/vc_column][\/vc_row][vc_row css=\u00bb.vc_custom_1545928697364{padding-top: 2.1875rem !important;}\u00bb][vc_column el_class=\u00bbcyb-center\u00bb][vc_row_inner][vc_column_inner width=\u00bb1\/6&#8243;][\/vc_column_inner][vc_column_inner width=\u00bb2\/3&#8243;][vc_custom_heading text=\u00bbLAS GRANDES EMPRESAS CONF\u00cdAN EN NOSOTROS\u00bb font_container=\u00bbtag:h2|text_align:center\u00bb use_theme_fonts=\u00bbyes\u00bb el_class=\u00bbcyb-ltr-spc\u00bb css=\u00bb.vc_custom_1545928485029{margin-bottom: 0.3125rem !important;}\u00bb][vc_custom_heading text=\u00bbCyberArk es el l\u00edder de confianza en la gesti\u00f3n del acceso con privilegios, y m\u00e1s del 50\u00a0% de las empresas de la lista Fortune 500 conf\u00edan en nuestras soluciones para proteger sus activos cr\u00edticos y de mayor valor.\u00bb font_container=\u00bbtag:p|text_align:center\u00bb use_theme_fonts=\u00bbyes\u00bb css=\u00bb.vc_custom_1576597346939{padding-bottom: 1.25rem !important;}\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb el_class=\u00bbcyb-int-logos\u00bb][vc_column_inner width=\u00bb1\/6&#8243; css=\u00bb.vc_custom_1545934947084{padding-bottom: 2.5rem !important;}\u00bb][vc_single_image image=\u00bb138&#8243; img_size=\u00bbfull\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb3\/12&#8243; css=\u00bb.vc_custom_1545934953440{padding-bottom: 2.5rem !important;}\u00bb][vc_single_image image=\u00bb24500&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbcenter\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb1\/6&#8243; css=\u00bb.vc_custom_1545934959773{padding-bottom: 2.5rem !important;}\u00bb][vc_single_image image=\u00bb24501&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbcenter\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb3\/12&#8243; css=\u00bb.vc_custom_1545934966433{padding-bottom: 2.5rem !important;}\u00bb][vc_single_image image=\u00bb24502&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbcenter\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb1\/6&#8243; css=\u00bb.vc_custom_1545935212030{padding-bottom: 2.5rem !important;}\u00bb][vc_single_image image=\u00bb198&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbright\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb css=\u00bb.vc_custom_1546473375751{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;background-color: #f1f2f2 !important;}\u00bb][vc_column][vc_custom_heading text=\u00bbEMPIECE EL RECORRIDO\u00bb font_container=\u00bbtag:h2|text_align:center\u00bb use_theme_fonts=\u00bbyes\u00bb css=\u00bb.vc_custom_1547063832846{padding-bottom: 1.25rem !important;}\u00bb el_class=\u00bbanchor-demo\u00bb][vc_raw_html]PGEgbmFtZT0iZGVtbyIgY2xhc3M9ImFuY2hvci1kZW1vIj48L2E+DQpbbWFya2V0b19mb3JtIGlkPSI0NTMzIiBhc3NldF9uYW1lPSJEZW1vIiBwcm9ncmFtX25hbWU9IkRlbW8iIGFzc2V0X3R5cGU9Imd1aWRlZF90b3VyIiBkYXRhbGF5ZXJfZXZlbnQ9ImRlbW8iIGRhdGFsYXllcl92YXI9ImZvcm1fc3VibWl0IiBkYXRhbGF5ZXJfbGFiZWw9ImRlbW8iIHR5X3BhZ2VfdXJsPSIvY3liZXJhcmstZ3VpZGVkLXRvdXItdGhhbmsteW91LyJd[\/vc_raw_html][\/vc_column][\/vc_row][vc_row css=\u00bb.vc_custom_1546473341681{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;}\u00bb][vc_column el_class=\u00bbcyb-center\u00bb][vc_custom_heading text=\u00bbT\u00c9RMINOS Y CONDICIONES\u00bb font_container=\u00bbtag:h3|text_align:center\u00bb use_theme_fonts=\u00bbyes\u00bb][vc_column_text]Tenga en cuenta que CyberArk Software Ltd. no recopila ni almacena ning\u00fan dato de usuario proporcionado o generado por el Tour Guiado de CyberArk.<br \/>\n<a href=\"https:\/\/www.cyberark.com\/es\/terms-conditions\/\">Ver T\u00e9rminos y Condiciones<\/a> para m\u00e1s detalles.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbtop\u00bb css=\u00bb.vc_custom_1546976240527{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/01\/demo-hero.jpg?id=32008) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbcyb-hero-section\u00bb][vc_column][vc_row_inner content_placement=\u00bbbottom\u00bb el_class=\u00bbcyb-hero-header\u00bb][vc_column_inner el_class=\u00bbcyb-hero-header-text\u00bb][vc_custom_heading text=\u00bbRECORRIDO GUIADO DE CYBERARK\u00bb font_container=\u00bbtag:h1|text_align:left\u00bb use_theme_fonts=\u00bbyes\u00bb][vc_custom_heading text=\u00bbD\u00e9 el primer paso hacia una posici\u00f3n m\u00e1s fuerte en materia de seguridad.\u00bb&#8230;<\/p>\n","protected":false},"author":125,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-61779","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Recorrido guiado de CyberArk: Flujos de trabajo y casos de uso<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/cyberark-guided-tour\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Recorrido guiado de CyberArk\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbtop\u00bb css=\u00bb.vc_custom_1546976240527{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/01\/demo-hero.jpg?id=32008) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbcyb-hero-section\u00bb][vc_column][vc_row_inner content_placement=\u00bbbottom\u00bb el_class=\u00bbcyb-hero-header\u00bb][vc_column_inner el_class=\u00bbcyb-hero-header-text\u00bb][vc_custom_heading text=\u00bbRECORRIDO GUIADO DE CYBERARK\u00bb font_container=\u00bbtag:h1|text_align:left\u00bb use_theme_fonts=\u00bbyes\u00bb][vc_custom_heading text=\u00bbD\u00e9 el primer paso hacia una posici\u00f3n m\u00e1s fuerte en materia de seguridad.\u00bb...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/cyberark-guided-tour\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-07T07:06:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/cyberark-guided-tour\/\",\"url\":\"https:\/\/www.cyberark.com\/cyberark-guided-tour\/\",\"name\":\"Recorrido guiado de CyberArk: Flujos de trabajo y casos de uso\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"datePublished\":\"2019-01-08T20:08:21+00:00\",\"dateModified\":\"2024-08-07T07:06:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/cyberark-guided-tour\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/cyberark-guided-tour\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/cyberark-guided-tour\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Recorrido guiado de CyberArk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Recorrido guiado de CyberArk: Flujos de trabajo y casos de uso","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/cyberark-guided-tour\/","og_locale":"es_ES","og_type":"article","og_title":"Recorrido guiado de CyberArk","og_description":"[vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbtop\u00bb css=\u00bb.vc_custom_1546976240527{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/01\/demo-hero.jpg?id=32008) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbcyb-hero-section\u00bb][vc_column][vc_row_inner content_placement=\u00bbbottom\u00bb el_class=\u00bbcyb-hero-header\u00bb][vc_column_inner el_class=\u00bbcyb-hero-header-text\u00bb][vc_custom_heading text=\u00bbRECORRIDO GUIADO DE CYBERARK\u00bb font_container=\u00bbtag:h1|text_align:left\u00bb use_theme_fonts=\u00bbyes\u00bb][vc_custom_heading text=\u00bbD\u00e9 el primer paso hacia una posici\u00f3n m\u00e1s fuerte en materia de seguridad.\u00bb...","og_url":"https:\/\/www.cyberark.com\/cyberark-guided-tour\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2024-08-07T07:06:05+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tiempo de lectura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/cyberark-guided-tour\/","url":"https:\/\/www.cyberark.com\/cyberark-guided-tour\/","name":"Recorrido guiado de CyberArk: Flujos de trabajo y casos de uso","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"datePublished":"2019-01-08T20:08:21+00:00","dateModified":"2024-08-07T07:06:05+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/cyberark-guided-tour\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/cyberark-guided-tour\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/cyberark-guided-tour\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Recorrido guiado de CyberArk"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/61779","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/users\/125"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/comments?post=61779"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/61779\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/media?parent=61779"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/product_category?post=61779"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}