{"id":209862,"date":"2025-05-15T12:10:27","date_gmt":"2025-05-15T16:10:27","guid":{"rendered":"https:\/\/www.cyberark.com\/?page_id=209862"},"modified":"2026-01-21T01:25:37","modified_gmt":"2026-01-21T06:25:37","slug":"become-a-tech-partner","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/zh-hant\/partners\/alliance-partners\/become-a-tech-partner\/","title":{"rendered":"Become A Tech Partner"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero dark&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;cyb-breadcrumb&#8221;]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/zh-hant\/partners\/alliance-partners\/\">Back to Alliances<\/a>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h1>Join the CyberArk Technology Alliance Program<\/h1>\n<h2>Rapidly integrate with the leader in Identity Security to make customers more secure, compliant and efficient.<\/h2>\n<p>[\/vc_column_text][vc_btn title=&#8221;Visit Marketplace&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fcyberark-customers.force.com%2Fmplace%2Fs%2F|target:_blank&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-2&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_3sygreea2c videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top overview-vt&#8221; css=&#8221;.vc_custom_1611617874123{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;head-box&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Why partner with CyberArk<\/h3>\n<p>Partnering with CyberArk provides companies with access to a robust identity security solution that addresses customer challenges. CyberArk&#8217;s comprehensive partner program offers extensive resources, support, and a strong association with the leading identity security solution.[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_1ungsgo7aa videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-193322\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/06\/satisfy-audit-compliance-icon.svg\" alt=\"checkmark icon\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>Complete Partner Agreement<\/h4>\n<p>The first step to becoming a CyberArk Technology Alliance Partner is to execute the Partner Agreement, which formalizes the partnership and sets the foundation for collaboration and mutual success \u2013 included is a Mutual NDA, development environments, integration certification, document sharing, and Go-To-Market activities. Click below to access the Partner Application Form. When completing the form, please be sure to select &#8220;Technology Alliance&#8221; as the partner type and review and accept the CyberArk Partner Agreement to proceed.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/zh-hant\/partners\/become-a-partner\/\">CyberArk Partner Application<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"94\" height=\"81\" class=\"alignnone size-full wp-image-106379\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/icon-plus-cta-2.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>Build &amp; Certify Integration<\/h4>\n<p>As a CyberArk Tech Partner, you will have access to development environments, development kits, and the CyberArk tech community. These resources are designed to help you efficiently build, test, and certify your integration.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-193313\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/06\/remote-work-icon.svg\" alt=\"global\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>Go to Market<\/h4>\n<p>Expand market presence, associate with the leader in Identity Security, and access our global community including 10,000 customers and channel partners. Promote certified integrations on the CyberArk Marketplace, and gain access to relevant brand guidelines and logos to use in blog posts and social media outreach.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;mt-10 mb-10&#8243;][vc_column][vc_column_text css=&#8221;&#8221;]<\/p>\n<h2>Use cases to integrate with CyberArk<\/h2>\n<p>With over 350 technology partners and more than 1,000 certified and trusted integrations, customers have access to Identity Security solutions for many use cases such as&#8230;.[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/zh-hant\/customer-stories\/\">View More<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 impact-cards&#8221;][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;single-card mb-8 d-none&#8221; column_link=&#8221;url:https%3A%2F%2Fcommunity.cyberark.com%2Fmarketplace%2Fs%2F%23&#8212;CyberArk_Solution__c-Multi-Factor%2520Authentication%2520(MFA)~CyberArk_Solution__c-Single%2520Sign-On%2520(SSO)|title:read&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-208270 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/shield-magnifying-glass_alt.jpg\" alt=\"SSO and MFA\" width=\"640\" height=\"328\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;location&#8221;]<\/p>\n<h4>Single Sign-On &amp; MFA<\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]Users can securely log in using their existing credentials, reducing the risk of unauthorized access and enhances security for your customers by leveraging CyberArk Vault to protect access with username\/password.[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]<a href=\"https:\/\/community.cyberark.com\/marketplace\/s\/#---CyberArk_Solution__c-Multi-Factor%20Authentication%20(MFA)~CyberArk_Solution__c-Single%20Sign-On%20(SSO)\" target=\"_blank\" rel=\"noopener\">Single Sing-On &amp; MFA<\/a>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;single-card mb-8&#8243; column_link=&#8221;url:https%3A%2F%2Fcommunity.cyberark.com%2Fmarketplace%2Fs%2F%23&#8212;CyberArk_Solution__c-Lifecycle%2520Management%2520(LCM)|title:Register%20Now|target:_blank&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-207392\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/shield-check_alt.jpg\" alt=\"shield\" width=\"640\" height=\"328\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;location&#8221;]<\/p>\n<h4>Identity Lifecycle Management<\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]User accounts are created, updated, and deactivated automatically, reducing administrative overhead and ensuring that only authorized users have access to your application.[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]<a href=\"https:\/\/community.cyberark.com\/marketplace\/s\/#---CyberArk_Solution__c-Lifecycle%20Management%20(LCM)\" target=\"_blank\" rel=\"noopener\">Identity Lifecycle Management<\/a>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;single-card mb-8&#8243; column_link=&#8221;url:https%3A%2F%2Fcommunity.cyberark.com%2Fmarketplace%2Fs%2F%23&#8212;CyberArk_Solution__c-PrivilegedCredentialsManagement|title:Register%20Now|target:_blank&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-207401\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/people_alt.jpg\" alt=\"People\" width=\"640\" height=\"328\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;location&#8221;]<\/p>\n<h4>Credential Rotation of Privileged Accounts<\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]Privileged accounts are managed and automatically rotated, in accordance with company guidelines ensuring security and compliance.[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]<a href=\"https:\/\/community.cyberark.com\/marketplace\/s\/#---CyberArk_Solution__c-PrivilegedCredentialsManagement\" target=\"_blank\" rel=\"noopener\">Privileged Credentials Management<\/a>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;single-card mb-8&#8243; column_link=&#8221;url:https%3A%2F%2Fcommunity.cyberark.com%2Fmarketplace%2Fs%2F%23&#8212;CyberArk_Solution__c-ApplicationCredentialsSecurity|title:Link|target:_blank&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-207447 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/password_alt.jpg\" alt=\"Password\" width=\"640\" height=\"328\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;location&#8221;]<\/p>\n<h4>Secure Secrets for Machine Identities<\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]Ensure machines have just-in-time access to secrets secured in CyberArk, removing the need for hard-coded credentials.[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]<a href=\"https:\/\/community.cyberark.com\/marketplace\/s\/#---CyberArk_Solution__c-ApplicationCredentialsSecurity\" target=\"_blank\" rel=\"noopener\">Secure Secrets for Machine Identities<\/a>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;single-card mb-8&#8243; column_link=&#8221;url:https%3A%2F%2Fcommunity.cyberark.com%2Fmarketplace%2Fs%2F%23&#8212;CyberArk_Solution__c-AnalyticsAndThreatDetection|title:Link|target:_blank&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-207410\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/password_alt-1.jpg\" alt=\"Password\" width=\"640\" height=\"328\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;location&#8221;]<\/p>\n<h4>Data &amp; Analytics<\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]Pull audit trails for activities, events, and sessions to incorporate them into external solutions, enabling anomaly detection, regulatory compliance, and incident-response investigation.[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]<a href=\"https:\/\/community.cyberark.com\/marketplace\/s\/#---CyberArk_Solution__c-AnalyticsAndThreatDetection\" target=\"_blank\" rel=\"noopener\">Data &amp; Analytics<\/a>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;single-card mb-8&#8243; column_link=&#8221;url:https%3A%2F%2Fcommunity.cyberark.com%2Fmarketplace%2Fs%2F%23&#8212;CyberArk_Solution__c-DiscoveryTools|title:link|target:_blank&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-207456\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/padlock.jpg\" alt=\"padlock\" width=\"640\" height=\"328\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;location&#8221;]<\/p>\n<h4>Discovery of Identities<\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]Enforce identity security controls by discovering human and machine identities for on-premise and cloud.[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]<a href=\"https:\/\/community.cyberark.com\/marketplace\/s\/#---CyberArk_Solution__c-DiscoveryTools\" target=\"_blank\" rel=\"noopener\">Discovery of Identities<\/a>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;single-card mb-8&#8243; column_link=&#8221;url:https%3A%2F%2Fcommunity.cyberark.com%2Fmarketplace%2Fs%2F%23&#8212;CyberArk_Solution__c-Certificate%2520Lifecycle%2520Management|title:link|target:_blank&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-207465\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/key.jpg\" alt=\"key\" width=\"640\" height=\"328\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;location&#8221;]<\/p>\n<h4>Certificate Lifecycle Management<\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]Automates the discovery, issuance, renewal, and revocation of TLS\/SSL certificates to prevent outages and security risks.[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]<a href=\"https:\/\/community.cyberark.com\/marketplace\/s\/#---CyberArk_Solution__c-Certificate%20Lifecycle%20Management\" target=\"_blank\" rel=\"noopener\">Certificate Lifecycle Management<\/a>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;single-card mb-8&#8243;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-207474\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/fact-check_alt.jpg\" alt=\"check\" width=\"640\" height=\"328\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;location&#8221;]<\/p>\n<h4>Workload Identity Management<\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]Secures machine-to-machine communication by issuing and managing identities for cloud workloads, containers, and microservices.[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]<a href=\"https:\/\/community.cyberark.com\/marketplace\/s\/#---CyberArk_Solution__c-Workload%20Identity%20Management\" target=\"_blank\" rel=\"noopener\">Workload Identity Management<\/a>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;single-card mb-8&#8243; column_link=&#8221;url:https%3A%2F%2Fcommunity.cyberark.com%2Fmarketplace%2Fs%2F%23&#8212;CyberArk_Solution__c-Secure%2520Code%2520Signing|title:Link|target:_blank&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-207483\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/cloud_alt.jpg\" alt=\"cloud\" width=\"640\" height=\"328\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;location&#8221;]<\/p>\n<h4>Secure Code Signing<\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]Protects software integrity by ensuring only authenticated and authorized code is signed and distributed, reducing the risk of supply chain attacks.[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]<a href=\"https:\/\/community.cyberark.com\/marketplace\/s\/#---CyberArk_Solution__c-Secure%20Code%20Signing\" target=\"_blank\" rel=\"noopener\">Secure Code Signing<\/a>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;single-card mb-8&#8243; column_link=&#8221;url:https%3A%2F%2Fcommunity.cyberark.com%2Fmarketplace%2Fs%2F%23&#8212;CyberArk_Solution__c-SSH%2520Key%2FCertificate%2520Management|title:Link|target:_blank&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-207383 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/badge_alt.jpg\" alt=\"badge\" width=\"640\" height=\"328\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;location&#8221;]<\/p>\n<h4>SSH Key\/Certificate Management<\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]Manages and rotates SSH keys and certificates to prevent unauthorized access and ensure compliance with security policies.[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]<a href=\"https:\/\/community.cyberark.com\/marketplace\/s\/#---CyberArk_Solution__c-SSH%20Key\/Certificate%20Management\" target=\"_blank\" rel=\"noopener\">SSH Key\/Certificate Management<\/a>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;single-card mb-8&#8243; column_link=&#8221;url:https%3A%2F%2Freg.rainfocus.com%2Fflow%2Fcyberevents%2Fiwtamsterdam25%2Flandingpage%2Fpage%2Fpage|title:Register%20Now|target:_blank&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-207082\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/analytics_alt.jpg\" alt=\"analytics\" width=\"640\" height=\"328\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;location&#8221;]<\/p>\n<h4>PKI as a Service<\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]Provides a scalable, cloud-based public key infrastructure (PKI) solution to automate certificate issuance and management without on-premise complexity.[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]<a href=\"https:\/\/community.cyberark.com\/marketplace\/s\/#---CyberArk_Solution__c-SSH%20Key\/Certificate%20Management\" target=\"_blank\" rel=\"noopener\">PKI as a Service<\/a>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;single-card mb-8&#8243;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-207082\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/analytics_alt.jpg\" alt=\"analytics\" width=\"640\" height=\"328\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;location&#8221;]<\/p>\n<h4>Discovery of AI Agents<\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]Automatically find AI agents across SaaS, cloud and developer environments. Centralize them in a single inventory with owner and access context to surface risks and kick off remediation.[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;description&#8221;]<a href=\"https:\/\/community.cyberark.com\/marketplace\/s\/#---Category__c-Agentic%20Security\" target=\"_blank\" rel=\"noopener\">Agentic Security<\/a>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_logos&#8221; css=&#8221;.vc_custom_1608676943917{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/section7-bckgrd-1.jpg?id=105472) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section7_carou_text extra-space link-arrow-right&#8221;]<\/p>\n<h4 style=\"text-align: center;\">C<sup>3<\/sup>\u202fAlliance partners<\/h4>\n<p style=\"text-align: center; font-weight: 300; padding-bottom: 0px;\">Our network is made up of more than 200 certified providers of enterprise software, infrastructure, and security solutions.<br \/>\n<a style=\"display: inline-block; margin-top: 15px;\" href=\"https:\/\/community.cyberark.com\/marketplace\/s\/\" target=\"_blank\" rel=\"noopener noreferrer\">Visit Marketplace<i class=\"fas fa-external-link-alt\"><\/i><\/a><\/p>\n<p><style>\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d285de5707c .sp-lcp-item img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d285de5707c .sp-lcp-item:hover img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv#sp-logo-carousel-pro69d285de5707c.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69d285de5707c.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\tpadding: 0px;\n\t\t\t\tbackground: rgba(10,10,10,0.01);\n\t\t\t}\n\t\t\tdiv#sp-logo-carousel-pro69d285de5707c.sp-logo-carousel-pro-area .sp-lcp-item:hover .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69d285de5707c.sp-logo-carousel-pro-area .sp-lcp-item:hover.sp-lcp-item-border{\n\t\t\t\tbackground: rgba(0,0,0,0.01);\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section.layout-carousel div#sp-logo-carousel-pro69d285de5707c .slick-slide {\n\t\t\t\tfloat: none !important;\n\t\t\t\tdisplay: inline-block;\n\t\t\t\tvertical-align: middle;\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d285de5707c [class*=\"lcp-col\"]{\n\t\t\t\tvertical-align: middle;\n\t\t\t\tmargin: 0;\n\t\t\t\tbox-shadow: none;\n\t\t\t}.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d285de5707c .sp-lcpro-readmore-area{\n\t\t\t\t\ttext-align: center;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d285de5707c .sp-lcpro-readmore-area .sp-lcpro-readmore{\n\t\t\t\t\tbackground: transparent;\n\t\t\t\t\tcolor: #05b3c6;\n\t\t\t\t\tpadding: 5px 13px;\n\t\t\t\t\tmargin-bottom: 18px;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tborder-radius: 2px;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t\tfont-size: 14px;font-family: Ubuntu;\n\t\t\t\t\t\tfont-style: normal; font-weight: 400;line-height:20px;\n\t\t\t\t\tletter-spacing: ;\n\t\t\t\t\ttext-transform: none;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d285de5707c .sp-lcpro-readmore-area .sp-lcpro-readmore:hover{\n\t\t\t\t\tbackground: #05b3c6;\n\t\t\t\t\tcolor: #ffffff;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t}div.sp-logo-section-id-69d285de5707c .bx-viewport.bx-viewport { height: auto !important; }\n\t\t\t\tdiv#sp-logo-carousel-pro69d285de5707c.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69d285de5707c.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\t\tborder-radius: 100%;\n\t\t\t\t\tz-index: 1;\n\t\t\t\t\toverflow: hidden;\n\t\t\t\t}\n\t\t\t\t\tdiv#sp-logo-carousel-pro69d285de5707c.sp-logo-carousel-pro-area .sp-lcp-item{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tfloat: none !important;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tvertical-align: middle;}div.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d285de5707c [class*=\"lcp-col\"]{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tbox-shadow: none;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69d285de5707c.sp-logo-carousel-pro-area [class*=\"lcp-col\"],\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69d285de5707c.sp-logo-carousel-pro-area [class*=\"lcp-col\"]{\n\t\t\t\t\tpadding-left: 10px;\n\t\t\t\t\tpadding-right: 10px;\n\t\t\t\t\tpadding-bottom: 20px;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69d285de5707c.sp-logo-carousel-pro-area.lcp-container,\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69d285de5707c.sp-logo-carousel-pro-area.lcp-container{\n\t\t\t\t\tmargin-left: -10px;\n\t\t\t\t\tmargin-right: -10px;\n\t\t\t\t\tmargin-bottom: -20px;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\t.sp-logo-carousel-pro-section.sp-lcpro-id-209970{\n\t\t\t\t\tposition: relative;\n\t\t\t\t}\n\t\t\t\t#lcp-preloader-209970{\n\t\t\t\t\tposition: absolute;\n\t\t\t\t\tleft: 0;\n\t\t\t\t\ttop: 0;\n\t\t\t\t\theight: 100%;\n\t\t\t\t\twidth: 100%;\n\t\t\t\t\ttext-align: center;\n\t\t\t\t\tdisplay: flex;\n\t\t\t\t\talign-items: center;\n\t\t\t\t\tjustify-content: center;\n\t\t\t\t\tbackground: #fff;\n\t\t\t\t\tz-index: 9999;\n\t\t\t\t}\n\t\t\t\t<\/style><div class=\"sp-logo-carousel-pro-section layout-carousel sp-lcpro-id-209970 sp-logo-section-id-69d285de5707c nav_position_top_right title_position_bottom sp-lcpro-clear lcp_horizontal\"><div id=\"lcp-preloader-209970\" class=\"sp-logo-carousel-pro-preloader\"><img decoding=\"async\" src=\" https:\/\/www.cyberark.com\/wp-content\/plugins\/logo-carousel-pro\/public\/assets\/css\/images\/bx_loader.gif \"\/><\/div><div id=\"sp-logo-carousel-pro69d285de5707c\" class=\"sp-logo-carousel-pro-area lcp-preloader mode_ticker \" data-minslide=\"1\" data-maxslide=\"1\" data-slidewidth=\"\" data-slidemargin=\"20\" data-speed=\"30000\" data-mode=\"horizontal\" data-direction=\"next\" data-tickerhover=\"false\"><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Tenable.png\" alt=\"Tenable\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/UIPath.png\" alt=\"UiPath\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/automation.png\" alt=\"automation-anywhere-logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/cisco.png\" alt=\"Cisco\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Strata.png\" alt=\"Strata\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/phosphorus.png\" alt=\"Phosphorus\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/git-guard.png\" alt=\"GitGuardian\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/ge.png\" alt=\"GE\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/eaton.png\" alt=\"Eaton\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/device.png\" alt=\"Device Authority\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Rapid7.png\" alt=\"Rapid7 logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Thales.png\" alt=\"Thales logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/05\/sphereco.png\" alt=\"sphereco Logo\" ><\/div><\/div><\/div><\/div><\/div><br \/>\n<style>\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d285de6064a .sp-lcp-item img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d285de6064a .sp-lcp-item:hover img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv#sp-logo-carousel-pro69d285de6064a.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69d285de6064a.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\tpadding: 0px;\n\t\t\t\tbackground: rgba(10,10,10,0.01);\n\t\t\t}\n\t\t\tdiv#sp-logo-carousel-pro69d285de6064a.sp-logo-carousel-pro-area .sp-lcp-item:hover .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69d285de6064a.sp-logo-carousel-pro-area .sp-lcp-item:hover.sp-lcp-item-border{\n\t\t\t\tbackground: rgba(0,0,0,0.01);\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section.layout-carousel div#sp-logo-carousel-pro69d285de6064a .slick-slide {\n\t\t\t\tfloat: none !important;\n\t\t\t\tdisplay: inline-block;\n\t\t\t\tvertical-align: middle;\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d285de6064a [class*=\"lcp-col\"]{\n\t\t\t\tvertical-align: middle;\n\t\t\t\tmargin: 0;\n\t\t\t\tbox-shadow: none;\n\t\t\t}.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d285de6064a .sp-lcpro-readmore-area{\n\t\t\t\t\ttext-align: center;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d285de6064a .sp-lcpro-readmore-area .sp-lcpro-readmore{\n\t\t\t\t\tbackground: transparent;\n\t\t\t\t\tcolor: #05b3c6;\n\t\t\t\t\tpadding: 5px 13px;\n\t\t\t\t\tmargin-bottom: 18px;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tborder-radius: 2px;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t\tfont-size: 14px;font-family: Ubuntu;\n\t\t\t\t\t\tfont-style: normal; font-weight: 400;line-height:20px;\n\t\t\t\t\tletter-spacing: ;\n\t\t\t\t\ttext-transform: none;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d285de6064a .sp-lcpro-readmore-area .sp-lcpro-readmore:hover{\n\t\t\t\t\tbackground: #05b3c6;\n\t\t\t\t\tcolor: #ffffff;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t}div.sp-logo-section-id-69d285de6064a .bx-viewport.bx-viewport { height: auto !important; }\n\t\t\t\tdiv#sp-logo-carousel-pro69d285de6064a.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69d285de6064a.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\t\tborder-radius: 100%;\n\t\t\t\t\tz-index: 1;\n\t\t\t\t\toverflow: hidden;\n\t\t\t\t}\n\t\t\t\t\tdiv#sp-logo-carousel-pro69d285de6064a.sp-logo-carousel-pro-area .sp-lcp-item{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tfloat: none !important;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tvertical-align: middle;}\n\t\t\t\tdiv#sp-logo-carousel-pro69d285de6064a.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69d285de6064a.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\t\t-webkit-box-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\t-moz-box-shadow:: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tbox-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tmargin-top: 6px;\n\t\t\t\t\tmargin-bottom:6px;\n\t\t\t\t}\n\t\t\t\tdiv#sp-logo-carousel-pro69d285de6064a.sp-logo-carousel-pro-area .sp-lcp-item:hover .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69d285de6064a.sp-logo-carousel-pro-area .sp-lcp-item:hover.sp-lcp-item-border{\n\t\t\t\t\t-webkit-box-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\t-moz-box-shadow:: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tbox-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-carousel.lcp_horizontal div#sp-logo-carousel-pro69d285de6064a.sp-logo-carousel-pro-area .slick-list{\n\t\t\t\t\tmargin-left: 0;\n\t\t\t\t\tmargin-right: 0;\n\t\t\t\t}\n\t\t\t\tdiv#sp-logo-carousel-pro69d285de6064a.sp-logo-carousel-pro-area [class*=\"lcp-col-\"]{\n\t\t\t\t\tmargin-bottom: 6px;\n\t\t\t\t}div.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d285de6064a [class*=\"lcp-col\"]{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tbox-shadow: none;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69d285de6064a.sp-logo-carousel-pro-area [class*=\"lcp-col\"],\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69d285de6064a.sp-logo-carousel-pro-area [class*=\"lcp-col\"]{\n\t\t\t\t\tpadding-left: 10px;\n\t\t\t\t\tpadding-right: 10px;\n\t\t\t\t\tpadding-bottom: 20px;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69d285de6064a.sp-logo-carousel-pro-area.lcp-container,\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69d285de6064a.sp-logo-carousel-pro-area.lcp-container{\n\t\t\t\t\tmargin-left: -10px;\n\t\t\t\t\tmargin-right: -10px;\n\t\t\t\t\tmargin-bottom: -20px;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\t.sp-logo-carousel-pro-section.sp-lcpro-id-209990{\n\t\t\t\t\tposition: relative;\n\t\t\t\t}\n\t\t\t\t#lcp-preloader-209990{\n\t\t\t\t\tposition: absolute;\n\t\t\t\t\tleft: 0;\n\t\t\t\t\ttop: 0;\n\t\t\t\t\theight: 100%;\n\t\t\t\t\twidth: 100%;\n\t\t\t\t\ttext-align: center;\n\t\t\t\t\tdisplay: flex;\n\t\t\t\t\talign-items: center;\n\t\t\t\t\tjustify-content: center;\n\t\t\t\t\tbackground: #fff;\n\t\t\t\t\tz-index: 9999;\n\t\t\t\t}\n\t\t\t\t<\/style><div class=\"sp-logo-carousel-pro-section layout-carousel sp-lcpro-id-209990 sp-logo-section-id-69d285de6064a nav_position_top_right title_position_bottom sp-lcpro-clear lcp_horizontal\"><div id=\"sp-logo-carousel-pro69d285de6064a\" class=\"sp-logo-carousel-pro-area lcp-preloader mode_ticker \" data-minslide=\"1\" data-maxslide=\"1\" data-slidewidth=\"\" data-slidemargin=\"20\" data-speed=\"30000\" data-mode=\"horizontal\" data-direction=\"next\" data-tickerhover=\"false\"><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/aws.png\" alt=\"aws logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Google.png\" alt=\"Google logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/microsoft-logo.png\" alt=\"Microsoft logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/paloalto.png\" alt=\"paloalto logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Proofpoint.png\" alt=\"Proofpoint logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/RedHat.png\" alt=\"RedHat Logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Sailpoint.png\" alt=\"Sailpoint logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Servicenow.png\" alt=\"Servicenow logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Workday.png\" alt=\"Workday logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/dell.png\" alt=\"Dell\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Transmit.png\" alt=\"Transmit Security logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/SentinelOne.png\" alt=\"SentinelOne Logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Wiz.png\" alt=\"Wiz Logo\" ><\/div><\/div><\/div><\/div><\/div>[\/vc_column_text]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1611095281474{background-color: #061a2c !important;}&#8221;][vc_column][vc_raw_html]JTNDc3R5bGUlM0UlMEEucGFnZS1pZC0xMDUzMzglMjAlMjNoZXJvLWxvZ28tY29udGFpbmVyJTdCJTBBJTIwJTIwJTIwJTIwZGlzcGxheSUzQSUyMG5vbmUlM0IlMEElN0QlMEElMkYlMkElMjBHZW5lcmFsJTIwJTJBJTJGJTBBLmN5YnYyJTIwLmxpbmstYXJyb3ctcmlnaHQlMjBhJTIwJTdCJTBBJTA5bWFyZ2luLXJpZ2h0JTNBJTIwNnB4JTNCJTBBJTdEJTBBLmN5YnYyJTIwaDQlMjAlN0IlMEElMDlsaW5lLWhlaWdodCUzQSUyMDEuM2VtJTNCJTBBJTdEJTBBLmN5YnYyJTIwYS5iaWdfbGluayUyMCU3QiUwQSUwOW1hcmdpbiUzQSUyMDAlM0IlMEElN0QlMEElNDBtZWRpYSUyMG9ubHklMjBzY3JlZW4lMjBhbmQlMjAlMjhtYXgtZGV2aWNlLXdpZHRoJTNBJTIwNzY3cHglMjklMjAlN0IlMEEuY3lidjIlMjBoMiUyMCU3QiUwQSUwOWZvbnQtc2l6ZSUzQSUyMDQwcHglM0IlMEElN0QlMEElN0QlMEEucGFnZS1pZC0xMDUzMzglMjAudmNfYnRuMy1jb2xvci1ncmV5JTdCJTBBJTIwJTIwJTIwJTIwZm9udC13ZWlnaHQlM0ElMjA2MDAlMjAlMjFpbXBvcnRhbnQlM0IlMEElN0QlMEElMkYlMkElMjBFbmQlMjBHZW5lcmFsJTIwJTJBJTJGJTBBJTBBJTJGJTJBJTIwU2VjdGlvbiUyMDclMjAlMkElMkYlMEEuY3lidjIuY3lidjJfbG9nb3MlMjBoNCUyMCU3QiUwQSUwOWNvbG9yJTNBJTIwJTIzZmZmZmZmJTIwJTIxaW1wb3J0YW50JTNCJTBBJTdEJTBBLmN5YnYyLmN5YnYyX2xvZ29zJTIwLmV4dHJhLXNwYWNlJTIwJTdCJTBBJTA5bWFyZ2luLWJvdHRvbSUzQSUyMDUwcHglM0IlMEElN0QlMEEuY3lidjJfbG9nb3MlMjAlN0IlMEElMjAlMjAlMjAlMjBwYWRkaW5nJTNBJTIwNzVweCUyMDEwMHB4JTIwOTBweCUyMDEwMHB4JTNCJTBBJTdEJTBBLm5ld19ocHN0eWxlX3NlY3Rpb243X2Nhcm91X3RleHQlMjBwJTIwJTdCJTBBJTIwJTIwJTIwJTIwZm9udC1zaXplJTNBJTIwMjBweCUzQiUwQSUyMCUyMCUyMCUyMGNvbG9yJTNBJTIwJTIzZmZmJTNCJTBBJTIwJTIwJTIwJTIwcGFkZGluZy1ib3R0b20lM0ElMjA2MHB4JTNCJTBBJTdEJTBBLm5ld19ocHN0eWxlX3NlY3Rpb243X2Nhcm91c2VsMSUyMCU3QiUwQSUyMCUyMCUyMCUyMHBhZGRpbmclM0ElMjA1MHB4JTIwMCUyMDMwcHglMjA1MDBweCUzQiUwQSU3RCUwQS5uZXdfaHBzdHlsZV9zZWN0aW9uN19jYXJvdXNlbDIlMjAlN0IlMEElMjAlMjAlMjAlMjBwYWRkaW5nJTNBJTIwMjBweCUyMDUwMHB4JTIwMzBweCUyMDAlM0IlMEElN0QlMEEuY3lidjJfbG9nb3MlMjAuc3AtbG9nby1jYXJvdXNlbC1wcm8tc2VjdGlvbi5zcC1sY3Byby1pZC0xMDU2ODUlN0IlMEElMjAlMjAlMjAlMjBtYXJnaW4tYm90dG9tJTNBJTIwMjBweCUzQiUwQSU3RCUwQS5jeWJ2Ml9sb2dvcyUyMC5saW5rLWFycm93LXJpZ2h0JTIwLndwYl93cmFwcGVyJTNBaG92ZXIlMjBwJTIwYSUyQyUwQS5jeWJ2Ml9sb2dvcyUyMC5saW5rLWFycm93LXJpZ2h0JTIwLndwYl93cmFwcGVyJTNBaG92ZXIlMjBwJTIwaSU3QiUwQSUyMCUyMCUyMCUyMGNvbG9yJTNBJTIwJTIzMDA5NUE5JTIwJTIxaW1wb3J0YW50JTNCJTBBJTIwJTIwJTIwJTIwYm9yZGVyLWJvdHRvbS1jb2xvciUzQSUyMCUyMzAwOTVBOSUyMCUyMWltcG9ydGFudCUzQiUwQSU3RCUwQS5jeWJ2Ml9sb2dvcyUyMC5saW5rLWFycm93LXJpZ2h0JTIwLndwYl93cmFwcGVyJTIwcCUyMGElM0Fob3ZlciUyQyUwQS5jeWJ2Ml9sb2dvcyUyMC5saW5rLWFycm93LXJpZ2h0JTIwLndwYl93cmFwcGVyJTIwcCUyMGElM0Fob3ZlciUyMGklN0IlMEElMjAlMjAlMjAlMjBjb2xvciUzQSUyMCUyMzBFNkY4NSUyMCUyMWltcG9ydGFudCUzQiUwQSUyMCUyMCUyMCUyMGJvcmRlci1ib3R0b20tY29sb3IlM0ElMjAlMjMwRTZGODUlMjAlMjFpbXBvcnRhbnQlM0IlMEElN0QlMEElNDBtZWRpYSUyMG9ubHklMjBzY3JlZW4lMjBhbmQlMjAlMjhtYXgtd2lkdGglM0ElMjAxMDI0cHglMjklMjAlN0IlMEEubmV3X2hwc3R5bGVfc2VjdGlvbjdfY2Fyb3VzZWwxJTIwJTdCJTBBJTIwJTIwJTIwJTIwcGFkZGluZyUzQSUyMDUwcHglMjAwJTIwMzBweCUyMDMwMHB4JTNCJTBBJTdEJTBBLm5ld19ocHN0eWxlX3NlY3Rpb243X2Nhcm91c2VsMiUyMCU3QiUwQSUyMCUyMCUyMCUyMHBhZGRpbmclM0ElMjAyMHB4JTIwMzAwcHglMjAzMHB4JTIwMCUzQiUwQSU3RCUwQSU3RCUwQSU0MG1lZGlhJTIwb25seSUyMHNjcmVlbiUyMGFuZCUyMCUyOG1heC13aWR0aCUzQSUyMDc2N3B4JTI5JTIwJTdCJTBBLmN5YnYyLmN5YnYyX2xvZ29zJTIwLmV4dHJhLXNwYWNlJTIwJTdCJTBBJTA5bWFyZ2luLWJvdHRvbSUzQSUyMDMwcHglM0IlMEElN0QlMEEuY3lidjJfbG9nb3MlMjAuc3AtbG9nby1jYXJvdXNlbC1wcm8tYXJlYSUyMC5zcC1sY3AtaXRlbSUyMCU3QiUwQSUwOW1heC13aWR0aCUzQSUyMDgycHglM0IlMEElMDltYXJnaW4tcmlnaHQlM0ElMjAxMHB4JTIwJTIxaW1wb3J0YW50JTNCJTBBJTdEJTBBLmN5YnYyX2xvZ29zJTIwJTdCJTBBJTA5cGFkZGluZyUzQSUyMDQwcHglMjAxMDBweCUyMDUwcHglMjAxMDBweCUzQiUwQSU3RCUwQSU3RCUwQSUyRiUyQSUyMEVuZCUyMHNlY3Rpb24lMjA3JTIwJTJBJTJGJTBBJTBBJTNDJTJGc3R5bGUlM0U=[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero dark&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;cyb-breadcrumb&#8221;]Back to Alliances[\/vc_column_tex&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":73623,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-209862","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Become A Tech Partner | CyberArk<\/title>\n<meta name=\"description\" content=\"Rapidly integrate with the leader in Identity Security to make customers more secure, compliant and efficient.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/zh-hant\/partners\/alliance-partners\/become-a-tech-partner\/\" \/>\n<meta property=\"og:locale\" content=\"zh_TW\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Become A Tech Partner\" \/>\n<meta property=\"og:description\" content=\"Rapidly integrate with the leader in Identity Security to make customers more secure, compliant and efficient.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/zh-hant\/partners\/alliance-partners\/become-a-tech-partner\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-21T06:25:37+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"\u9810\u4f30\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/zh-hant\/partners\/alliance-partners\/become-a-tech-partner\/\",\"url\":\"https:\/\/www.cyberark.com\/zh-hant\/partners\/alliance-partners\/become-a-tech-partner\/\",\"name\":\"Become A Tech Partner | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/zh-hant\/partners\/alliance-partners\/become-a-tech-partner\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/zh-hant\/partners\/alliance-partners\/become-a-tech-partner\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/06\/satisfy-audit-compliance-icon.svg\",\"datePublished\":\"2025-05-15T16:10:27+00:00\",\"dateModified\":\"2026-01-21T06:25:37+00:00\",\"description\":\"Rapidly integrate with the leader in Identity Security to make customers more secure, compliant and efficient.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/zh-hant\/partners\/alliance-partners\/become-a-tech-partner\/#breadcrumb\"},\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/zh-hant\/partners\/alliance-partners\/become-a-tech-partner\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\/\/www.cyberark.com\/zh-hant\/partners\/alliance-partners\/become-a-tech-partner\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/06\/satisfy-audit-compliance-icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/06\/satisfy-audit-compliance-icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/zh-hant\/partners\/alliance-partners\/become-a-tech-partner\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u5408\u4f5c\u5925\u4f34\",\"item\":\"https:\/\/www.cyberark.com\/zh-hant\/partners\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u806f\u76df\u5408\u4f5c\u5925\u4f34\",\"item\":\"https:\/\/www.cyberark.com\/partners\/alliance-partners\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Become A Tech Partner\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-TW\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Become A Tech Partner | CyberArk","description":"Rapidly integrate with the leader in Identity Security to make customers more secure, compliant and efficient.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/zh-hant\/partners\/alliance-partners\/become-a-tech-partner\/","og_locale":"zh_TW","og_type":"article","og_title":"Become A Tech Partner","og_description":"Rapidly integrate with the leader in Identity Security to make customers more secure, compliant and efficient.","og_url":"https:\/\/www.cyberark.com\/zh-hant\/partners\/alliance-partners\/become-a-tech-partner\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-01-21T06:25:37+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"\u9810\u4f30\u95b1\u8b80\u6642\u9593":"7 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/zh-hant\/partners\/alliance-partners\/become-a-tech-partner\/","url":"https:\/\/www.cyberark.com\/zh-hant\/partners\/alliance-partners\/become-a-tech-partner\/","name":"Become A Tech Partner | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/zh-hant\/partners\/alliance-partners\/become-a-tech-partner\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/zh-hant\/partners\/alliance-partners\/become-a-tech-partner\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/06\/satisfy-audit-compliance-icon.svg","datePublished":"2025-05-15T16:10:27+00:00","dateModified":"2026-01-21T06:25:37+00:00","description":"Rapidly integrate with the leader in Identity Security to make customers more secure, compliant and efficient.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/zh-hant\/partners\/alliance-partners\/become-a-tech-partner\/#breadcrumb"},"inLanguage":"zh-TW","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/zh-hant\/partners\/alliance-partners\/become-a-tech-partner\/"]}]},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/www.cyberark.com\/zh-hant\/partners\/alliance-partners\/become-a-tech-partner\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/06\/satisfy-audit-compliance-icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/06\/satisfy-audit-compliance-icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/zh-hant\/partners\/alliance-partners\/become-a-tech-partner\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"\u5408\u4f5c\u5925\u4f34","item":"https:\/\/www.cyberark.com\/zh-hant\/partners\/"},{"@type":"ListItem","position":3,"name":"\u806f\u76df\u5408\u4f5c\u5925\u4f34","item":"https:\/\/www.cyberark.com\/partners\/alliance-partners\/"},{"@type":"ListItem","position":4,"name":"Become A Tech Partner"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-TW"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/pages\/209862","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/comments?post=209862"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/pages\/209862\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/pages\/73623"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/media?parent=209862"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/product_category?post=209862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}