{"id":135424,"date":"2019-06-12T10:40:49","date_gmt":"2019-06-12T14:40:49","guid":{"rendered":"https:\/\/www.cyberark.com\/sub-processors\/"},"modified":"2026-03-24T00:47:38","modified_gmt":"2026-03-24T04:47:38","slug":"sub-processors","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/sub-processors\/","title":{"rendered":"CyberArk Sub-Processors"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-noimg dark\u00a0\u00bb][vc_column width=\u00a0\u00bb3\/4&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text]<\/p>\n<h1>CyberArk Sub-processors<\/h1>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row gap=\u00a0\u00bb10&Prime; el_class=\u00a0\u00bbcybv2 fullaccordion cybv2-pad-top acc1&Prime; css=\u00a0\u00bb.vc_custom_1683207443298{border-right-width: 20px !important;border-left-width: 20px !important;}\u00a0\u00bb][vc_column][vc_column_text css=\u00a0\u00bb.vc_custom_1770818409179{margin-right: 20px !important;margin-left: 20px !important;padding-top: 20px !important;padding-bottom: 20px !important;}\u00a0\u00bb]Like many companies, CyberArk\u00ae uses various affiliated and third-party sub-processors to assist in providing services to our customers. For more information, please refer to CyberArk\u2019s <a href=\"https:\/\/www.cyberark.com\/privacy-policy\/\">Privacy Policy<\/a> and <a href=\"https:\/\/www.cyberark.com\/CyberArk-Data-Processing-Addendum.pdf\" target=\"_blank\" rel=\"noopener\">Data Processing Addendum<\/a>. CyberArk is a Palo Alto Networks company; for information on Palo Alto Networks&rsquo; product sub-processors, visit <a href=\"https:\/\/www.paloaltonetworks.com\/content\/dam\/pan\/en_US\/assets\/pdf\/services\/list-of-sub-processors-sheet.pdf\">https:\/\/www.paloaltonetworks.com\/content\/dam\/pan\/en_US\/assets\/pdf\/services\/list-of-sub-processors-sheet.pdf<\/a>.<\/p>\n<p>CyberArk\u2019s current sub-processors are listed on this page and these entities may process personal data in order to provide the specific CyberArk services described below:[\/vc_column_text][\/vc_column][vc_column][vc_tta_accordion color=\u00a0\u00bbwhite\u00a0\u00bb c_icon=\u00a0\u00bb\u00a0\u00bb active_section=\u00a0\u00bb1&Prime; no_fill=\u00a0\u00bbtrue\u00a0\u00bb collapsible_all=\u00a0\u00bbtrue\u00a0\u00bb][vc_tta_section title=\u00a0\u00bbCyberArk Services&rsquo; Sub-processors\u00a0\u00bb tab_id=\u00a0\u00bb1706686388630-e24a2a5b-df87&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]CyberArk\u2019s current sub-processors are listed on this page and these entities may process personal data in order to provide the specific CyberArk services described below:<\/p>\n<p>&nbsp;<\/p>\n<table id=\"tableOne\" class=\"table table-bordered table-striped table-responsive-stack mb-3\" style=\"height: 100%;\" width=\"557\">\n<tbody>\n<tr>\n<th>Trading Name<\/th>\n<th>Corporate Name<\/th>\n<th>Description of Processing Activities<\/th>\n<th>Location<\/th>\n<th>CyberArk Services<\/th>\n<th>4th Parties<\/th>\n<\/tr>\n<tr>\n<td>Amazon Web Services*<\/td>\n<td>Amazon Web Services, Inc.; Amazon Web Services EMEA SARL<\/td>\n<td>Hosting provider.<\/p>\n<p>AWS Pinpoint for provision of one-time codes via SMS &amp; telephone for CyberArk Identity<\/p>\n<p>AWS SES for Account management via email, for example provision of one-time codes via email, password expiry emails, new tenant creation email for CyberArk Identity<\/p>\n<p>AWS Bedrock (in United States) for the provision of AI features within CyberArk Services<\/td>\n<td>United States, Germany, Australia, United Kingdom, Japan, Singapore, Israel, Ireland, Canada, India, Italy, Indonesia, United Arab Emirates, Brazil<\/td>\n<td>All CyberArk Services<\/td>\n<td><a href=\"https:\/\/aws.amazon.com\/compliance\/sub-processors\/\" target=\"_blank\" rel=\"noopener\">Link<\/a><\/td>\n<\/tr>\n<tr>\n<td>Microsoft<\/td>\n<td>Microsoft, Inc.<\/td>\n<td>Use of Microsoft\u2019s Azure Open AI for the provision of AI features within CyberArk Services<\/td>\n<td>United States<\/td>\n<td>All CyberArk Services<\/td>\n<td><a href=\"https:\/\/servicetrust.microsoft.com\/DocumentPage\/3a94127b-730e-42aa-a76d-40c97246da91\" target=\"_blank\" rel=\"noopener\">Link<\/a><\/td>\n<\/tr>\n<tr>\n<td>Datadog<\/td>\n<td>Datadog, Inc.<\/td>\n<td>Observability metrics on service performance and activity, based on CyberArk system logs<\/td>\n<td>United States, Germany<\/td>\n<td>All CyberArk Services<\/td>\n<td><a href=\"https:\/\/www.datadoghq.com\/legal\/subprocessors\/\" target=\"_blank\" rel=\"noopener\">Link<\/a><\/td>\n<\/tr>\n<tr>\n<td>Cloudflare*<\/td>\n<td>Cloudflare, Inc.<\/td>\n<td>Content Distribution Network (CDN), managing and protecting CyberArk services from DDoS with Web App Firewall (WAF)<\/td>\n<td>Closest available <a href=\"https:\/\/www.cloudflare.com\/en-gb\/network\/\" target=\"_blank\" rel=\"noopener\">Cloudflare data center<\/a><\/td>\n<td>CyberArk Endpoint Privilege Manager, CyberArk Privilege Cloud (standalone)<\/td>\n<td><a href=\"https:\/\/www.cloudflare.com\/en-gb\/network\/\" target=\"_blank\" rel=\"noopener\">Link<\/a><\/td>\n<\/tr>\n<tr>\n<td>IBM SoftLayer<\/td>\n<td>IBM Cloud Corp.<\/td>\n<td>Delivery of operational and account management emails through IBM Cloud SendGrid<\/td>\n<td>United States<\/td>\n<td>CyberArk Endpoint Privilege Manager<\/td>\n<td><a href=\"https:\/\/www.ibm.com\/us-en\/privacy\/privacy-shield\" target=\"_blank\" rel=\"noopener\">Link<\/a><\/td>\n<\/tr>\n<tr>\n<td>Google<\/td>\n<td>Google LLC<\/td>\n<td>Firebase Cloud Messaging in order to send push notifications for CyberArk Identity<\/p>\n<p>Use of Google Cloud Vertex AI for the provision of AI Features within CyberArk Secure Infrastructure Access<\/p>\n<p>Use of Google reCAPTCHA for CyberArk Certificate Manager<\/td>\n<td>United States<\/td>\n<td>CyberArk Identity, CyberArk Secure Infrastructure Access, CyberArk Certificate Manager, SaaS; CyberArk Certificate Manager for Kubernetes<\/td>\n<td><a href=\"https:\/\/cloud.google.com\/terms\/subprocessors\" target=\"_blank\" rel=\"noopener\">Link<\/a><\/td>\n<\/tr>\n<tr>\n<td>Twilio<\/td>\n<td>Twilio Inc.<\/td>\n<td>Provision of one-time codes via SMS &amp; telephone.<\/p>\n<p>Twilio SendGrid: Account management via email, such as provision of one-time codes via email, password expiry emails, new tenant creation email<\/td>\n<td>United States<\/td>\n<td>CyberArk Identity,<br \/>\nCyberArk Remote Access<\/td>\n<td><a href=\"https:\/\/www.twilio.com\/en-us\/legal\/sub-processors\" target=\"_blank\" rel=\"noopener\">Link<\/a><\/td>\n<\/tr>\n<tr>\n<td>Intercom<\/td>\n<td>Intercom, Inc.<\/td>\n<td>Customer messaging platform providing tools for engaging with users<\/td>\n<td>United States<\/td>\n<td>All CyberArk services<\/td>\n<td><a href=\"https:\/\/www.intercom.com\/legal\/subprocessors-list\" target=\"_blank\" rel=\"noopener\">Link<\/a><\/td>\n<\/tr>\n<tr>\n<td>Pendo<\/td>\n<td>Pendo.io, Inc.<\/td>\n<td>Usage analytics, surveys, and product notifications<\/td>\n<td>United States<\/td>\n<td>CyberArk Certificate Manager, SaaS; CyberArk Certificate Manager for Kubernetes; CyberArk IGA<\/td>\n<td><a href=\"https:\/\/trust.pendo.io\/subprocessors\" target=\"_blank\" rel=\"noopener\">Link<\/a><\/td>\n<\/tr>\n<tr>\n<td>Adobe Marketo Engage<\/td>\n<td>Adobe Inc.<\/td>\n<td>Customer notification platform<\/td>\n<td>United States<\/td>\n<td>CyberArk Certificate Manager, SaaS; CyberArk Certificate Manager for Kubernetes<\/td>\n<td><a href=\"https:\/\/www.adobe.com\/privacy\/sub-processors.html\" target=\"_blank\" rel=\"noopener\">Link<\/a><\/td>\n<\/tr>\n<tr>\n<td>LaunchDarkly<\/td>\n<td>Catamorphic Co. dba LaunchDarkly<\/td>\n<td>Feature manager<\/td>\n<td>United States<\/td>\n<td>CyberArk Certificate Manager, SaaS; CyberArk Certificate Manager for Kubernetes<\/td>\n<td><a href=\"https:\/\/launchdarkly.com\/policies\/subprocessors\/\" target=\"_blank\" rel=\"noopener\">Link<\/a><\/td>\n<\/tr>\n<tr>\n<td>HID Global*<\/td>\n<td>HID Global Corporation<\/td>\n<td>Operations and hosting services provider; customer support<\/td>\n<td>Australia,<br \/>\nUnited States, Germany, Ireland, Netherlands<\/td>\n<td>CyberArk Zero Touch PKI<\/td>\n<td><a href=\"https:\/\/www.hidglobal.com\/legal\/saas-data-processing-specs\" target=\"_blank\" rel=\"noopener\">Link<\/a><\/td>\n<\/tr>\n<tr>\n<td>MongoDB*<\/td>\n<td>MongoDB, Inc.<\/td>\n<td>Hosting and infrastructure provider<\/td>\n<td>Australia, Ireland, United States, United Kingdom<\/td>\n<td>CyberArk IGA<\/td>\n<td><a href=\"https:\/\/www.mongodb.com\/products\/platform\/trust\/subprocessors\" target=\"_blank\" rel=\"noopener\">Link<\/a><\/td>\n<\/tr>\n<tr>\n<td>TeleSign<\/td>\n<td>TeleSign Corporation<\/td>\n<td>SMS Verification Services<\/td>\n<td>United States, Germany, Netherlands<\/td>\n<td>All CyberArk Services<\/td>\n<td><a href=\"https:\/\/www.telesign.com\/dpa#list-of-sub-processors\" target=\"_blank\" rel=\"noopener\">Link<\/a><\/td>\n<\/tr>\n<tr>\n<td>Mailgun<\/td>\n<td>Mailgun Technologies, Inc.<\/td>\n<td>Email delivery platform<\/td>\n<td>United States<\/td>\n<td>CyberArk IGA<\/td>\n<td><a href=\"https:\/\/sinch.com\/legal\/data-protection-agreement-sub-processors\/\" target=\"_blank\" rel=\"noopener\">Link<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbCyberArk Technical Support Providers\u00a0\u00bb tab_id=\u00a0\u00bb1706686377681-00875f82-d7f5&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<table id=\"tableOne\" class=\"table table-bordered table-striped table-responsive-stack mb-3\" style=\"height: 100%;\" width=\"557\">\n<tbody>\n<tr>\n<th>Trading Name<\/th>\n<th>Corporate Name<\/th>\n<th>Description of Processing Activities<\/th>\n<th>Location<\/th>\n<\/tr>\n<tr>\n<td>Five9<\/td>\n<td>Five 9, Inc.<\/td>\n<td>Cloud-based support operations<\/td>\n<td>United States<\/td>\n<\/tr>\n<tr>\n<td>Grazitti Interactive<\/td>\n<td>Grazitti Interactive, LLP<\/td>\n<td>Search Unify \u2013 search functionality<\/td>\n<td>India<\/td>\n<\/tr>\n<tr>\n<td>Helpware<\/td>\n<td>Helpware, Inc.<\/td>\n<td>Handling of Level 1 and Level 2 support<\/td>\n<td>Mexico<\/td>\n<\/tr>\n<tr>\n<td>Microsoft<\/td>\n<td>Microsoft Ireland Operations, Ltd<\/td>\n<td>Storage\/processing of support tickets submitted via email<\/td>\n<td>Europe (Austria, Finland, France, Ireland, Italy, Netherlands, Poland, Spain, Sweden)<\/td>\n<\/tr>\n<tr>\n<td>PagerDuty<\/td>\n<td>PagerDuty, Inc.<\/td>\n<td>Escalation of support tickets and support cases for troubleshooting and improving customer experience<\/td>\n<td>United States<\/td>\n<\/tr>\n<tr>\n<td>Salesforce<\/td>\n<td>Salesforce.com, Inc.; SFDC Ireland Limited<\/td>\n<td>Storage\/processing\/tracking of support tickets and support cases.<\/p>\n<p>Own by Salesforce: Backup storage services for support cases<\/td>\n<td>United States; Germany<\/td>\n<\/tr>\n<tr>\n<td>Solugenix<\/td>\n<td>Solugenix Corporation<\/td>\n<td>Handling of Level 1 and Level 2 Support<\/td>\n<td>Indonesia, India<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbCyberArk Affiliated Entities\u00a0\u00bb tab_id=\u00a0\u00bb1727730773747-9ab9f749-58d3&Prime;][vc_column_text css=\u00a0\u00bb.vc_custom_1665496794669{padding-top: 20px !important;padding-bottom: 20px !important;}\u00a0\u00bb]In addition to the sub-processors listed above, the following entities are affiliated entities of CyberArk, and may also function as sub-processors:[\/vc_column_text][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<table class=\"table table-bordered table-striped\" width=\"100%\">\n<thead>\n<tr>\n<th scope=\"col\" width=\"50%\">Affiliate<\/th>\n<th scope=\"col\" width=\"50%\">Location<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>CyberArk Software (Australia) Pty. Ltd.<\/td>\n<td>Australia<\/td>\n<\/tr>\n<tr>\n<td>CyberArk Bulgaria (Venafi EOOD)<\/td>\n<td>Bulgaria<\/td>\n<\/tr>\n<tr>\n<td>CyberArk Software Canada Inc.<\/td>\n<td>Canada<\/td>\n<\/tr>\n<tr>\n<td>CyberArk Software (DACH) GmbH<\/td>\n<td>Germany<\/td>\n<\/tr>\n<tr>\n<td>CyberArk Software (France) SARL<\/td>\n<td>France<\/td>\n<\/tr>\n<tr>\n<td>CyberArk Software (India) Private Limited<\/td>\n<td>India<\/td>\n<\/tr>\n<tr>\n<td>C3M India Private LTD.<\/td>\n<td>India<\/td>\n<\/tr>\n<tr>\n<td>CyberArk Software Ltd.<\/td>\n<td>Israel<\/td>\n<\/tr>\n<tr>\n<td>CyberArk Software Italy S.r.l.<\/td>\n<td>Italy<\/td>\n<\/tr>\n<tr>\n<td>CyberArk Software (Japan) K.K.<\/td>\n<td>Japan<\/td>\n<\/tr>\n<tr>\n<td>CyberArk Software (Netherlands) B.V.<\/td>\n<td>Netherlands<\/td>\n<\/tr>\n<tr>\n<td>CyberArk Software (Singapore) PTE. LTD.<\/td>\n<td>Singapore<\/td>\n<\/tr>\n<tr>\n<td>CyberArk Software (Spain), S.L.<\/td>\n<td>Spain<\/td>\n<\/tr>\n<tr>\n<td>CyberArk Turkey Siber G\u00fcvenlik Yaz\u0131l\u0131m\u0131 A.\u015e.<\/td>\n<td>Turkey<\/td>\n<\/tr>\n<tr>\n<td>Cyber-Ark Software (UK) Limited<\/td>\n<td>United Kingdom<\/td>\n<\/tr>\n<tr>\n<td>Venafi Ltd.<\/td>\n<td>United Kingdom<\/td>\n<\/tr>\n<tr>\n<td>CyberArk Software, Inc.<\/td>\n<td>United States<\/td>\n<\/tr>\n<tr>\n<td>CyberArk USA Engineering GP, LLC<\/td>\n<td>United States<\/td>\n<\/tr>\n<tr>\n<td>CyberArk Software USA, LP<\/td>\n<td>United States<\/td>\n<\/tr>\n<tr>\n<td>Zilla Security, Inc.<\/td>\n<td>United States<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00a0\u00bbCyberArk Third-party Contractors\u00a0\u00bb tab_id=\u00a0\u00bb1682490609677-56a322bc-3a76&Prime; el_class=\u00a0\u00bbd-none\u00a0\u00bb][vc_column_text css=\u00a0\u00bb.vc_custom_1689750629206{padding-top: 20px !important;padding-bottom: 20px !important;}\u00a0\u00bb]In addition to our sub-processors and affiliates, the following third-parties employ CyberArk contractors who may provide customer support:[\/vc_column_text][vc_column_text]<\/p>\n<table class=\"table table-bordered table-striped\" width=\"100%\">\n<thead>\n<tr>\n<th scope=\"col\" width=\"50%\">Third-party contractor<\/th>\n<th scope=\"col\" width=\"50%\">Location<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>123 Completed Ltd.<\/td>\n<td>Israel<\/td>\n<\/tr>\n<tr>\n<td>Appsforce Ltd.<\/td>\n<td>Israel<\/td>\n<\/tr>\n<tr>\n<td>Bernstein Software Ltd.<\/td>\n<td>Israel<\/td>\n<\/tr>\n<tr>\n<td>Cloud Easy, Inc.<\/td>\n<td>United States<\/td>\n<\/tr>\n<tr>\n<td>Planet Equity Group LLC.<\/td>\n<td>United States<\/td>\n<\/tr>\n<tr>\n<td>Tata Consultancy Services Limited<\/td>\n<td>India<\/td>\n<\/tr>\n<tr>\n<td>Tesnet Software Testing Ltd.<\/td>\n<td>Israel<\/td>\n<\/tr>\n<tr>\n<td>Transition Technologies PSC S.A<\/td>\n<td>Poland<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][vc_column][vc_column_text css=\u00a0\u00bb.vc_custom_1774327615503{margin-bottom: 20px !important;border-bottom-width: 20px !important;padding-top: 20px !important;}\u00a0\u00bb]* Where CyberArk acts as an ICT service provider for Financial Entities, as defined under Regulation (EU) 2022\/2554 (the \u201cDigital Operational Resilience Act\u201d), these subcontractors are ICT service providers that may be supporting a critical or important function of CyberArk\u2019s services, or material parts thereof.<\/p>\n<p>Last Updated: March 24<sup>th<\/sup>, 2026[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb equal_height=\u00a0\u00bbyes\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1609868130755{background-color: #f7f7f7 !important;}\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top hv-cta\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbleft-clmn\u00a0\u00bb][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]<\/p>\n<h4>To subscribe to updates to our list of sub-processors, please complete the below form:<\/h4>\n<p>[\/vc_column_text][vc_single_image image=\u00a0\u00bb106862&Prime; img_size=\u00a0\u00bbfull\u00a0\u00bb el_class=\u00a0\u00bbd-none d-md-block\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/12&Prime; css=\u00a0\u00bb.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb1\/3&Prime; el_class=\u00a0\u00bbright-clmn cybv2-form\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbbold\u00a0\u00bb]<\/p>\n<h4>Subscribe<\/h4>\n<p>[\/vc_column_text][vc_raw_html]JTVCbWFya2V0b19mb3JtJTIwaWQlM0QlMjI3MzU1JTIyJTIwdHlfbWVzc2FnZSUzRCUyMlRoYW5rJTIweW91JTIwZm9yJTIwc2lnbmluZyUyMHVwLiUyMFlvdSUyMHdpbGwlMjBub3clMjByZWNlaXZlJTIwZW1haWwlMjBub3RpZmljYXRpb25zJTIwb2YlMjBjaGFuZ2VzJTIwdG8lMjBDeWJlckFyayVFMiU4MCU5OXMlMjBsaXN0JTIwb2YlMjBzdWItcHJvY2Vzc29ycy4lMjIlNUQ=[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-noimg dark\u00a0\u00bb][vc_column width=\u00a0\u00bb3\/4&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text] CyberArk Sub-processors [\/vc_column_text][\/vc_column][\/vc_row][vc_row gap=\u00a0\u00bb10&Prime; el_class=\u00a0\u00bbcybv2 fullaccordion cybv2-pad-top acc1&Prime; css=\u00a0\u00bb.vc_custom_1683207443298{border-right-width: 20px !important;border-left-width: 20px !important;}\u00a0\u00bb][vc_column][vc_column_text css=\u00a0\u00bb.vc_custom_1770818409179{margin-right: 20px !important;margin-left: 20px !important;padding-top: 20px !important;padding-bottom: 20px !important;}\u00a0\u00bb]Like many companies, CyberArk\u00ae uses various affiliated&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-135424","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CyberArk Sub-Processors | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/fr\/sub-processors\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CyberArk Sub-Processors\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-noimg dark\u00a0\u00bb][vc_column width=\u00a0\u00bb3\/4&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text] CyberArk Sub-processors [\/vc_column_text][\/vc_column][\/vc_row][vc_row gap=\u00a0\u00bb10&Prime; el_class=\u00a0\u00bbcybv2 fullaccordion cybv2-pad-top acc1&Prime; css=\u00a0\u00bb.vc_custom_1683207443298{border-right-width: 20px !important;border-left-width: 20px !important;}\u00a0\u00bb][vc_column][vc_column_text css=\u00a0\u00bb.vc_custom_1770818409179{margin-right: 20px !important;margin-left: 20px !important;padding-top: 20px !important;padding-bottom: 20px !important;}\u00a0\u00bb]Like many companies, CyberArk\u00ae uses various affiliated...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/fr\/sub-processors\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-24T04:47:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/sub-processors\/\",\"url\":\"https:\/\/www.cyberark.com\/fr\/sub-processors\/\",\"name\":\"CyberArk Sub-Processors | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"datePublished\":\"2019-06-12T14:40:49+00:00\",\"dateModified\":\"2026-03-24T04:47:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/sub-processors\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/fr\/sub-processors\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/sub-processors\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CyberArk Sub-Processors\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CyberArk Sub-Processors | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/fr\/sub-processors\/","og_locale":"fr_FR","og_type":"article","og_title":"CyberArk Sub-Processors","og_description":"[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-noimg dark\u00a0\u00bb][vc_column width=\u00a0\u00bb3\/4&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text] CyberArk Sub-processors [\/vc_column_text][\/vc_column][\/vc_row][vc_row gap=\u00a0\u00bb10&Prime; el_class=\u00a0\u00bbcybv2 fullaccordion cybv2-pad-top acc1&Prime; css=\u00a0\u00bb.vc_custom_1683207443298{border-right-width: 20px !important;border-left-width: 20px !important;}\u00a0\u00bb][vc_column][vc_column_text css=\u00a0\u00bb.vc_custom_1770818409179{margin-right: 20px !important;margin-left: 20px !important;padding-top: 20px !important;padding-bottom: 20px !important;}\u00a0\u00bb]Like many companies, CyberArk\u00ae uses various affiliated...","og_url":"https:\/\/www.cyberark.com\/fr\/sub-processors\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-03-24T04:47:38+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/fr\/sub-processors\/","url":"https:\/\/www.cyberark.com\/fr\/sub-processors\/","name":"CyberArk Sub-Processors | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"datePublished":"2019-06-12T14:40:49+00:00","dateModified":"2026-03-24T04:47:38+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/fr\/sub-processors\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/fr\/sub-processors\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/fr\/sub-processors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"CyberArk Sub-Processors"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/135424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=135424"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/135424\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=135424"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=135424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}