{"id":77742,"date":"2025-09-05T10:17:43","date_gmt":"2025-09-05T09:17:43","guid":{"rendered":"https:\/\/www.wallix.com\/what-is-privileged-account-and-session-management-pasm\/"},"modified":"2025-09-05T13:37:08","modified_gmt":"2025-09-05T12:37:08","slug":"que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/","title":{"rendered":"\u00bfQu\u00e9 es la gesti\u00f3n de cuentas y sesiones privilegiadas (PASM)?"},"content":{"rendered":"<div class='flex_column_table av-m4gycypq-fb9e468fe802133cd1178d4038e45437 sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4gycypq-fb9e468fe802133cd1178d4038e45437\">\n#top .flex_column_table.av-equal-height-column-flextable.av-m4gycypq-fb9e468fe802133cd1178d4038e45437{\nmargin-top:0px;\nmargin-bottom:0;\n}\n.flex_column.av-m4gycypq-fb9e468fe802133cd1178d4038e45437{\npadding:0 0 0 0;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-m4gycypq-fb9e468fe802133cd1178d4038e45437{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-m4gycypq-fb9e468fe802133cd1178d4038e45437 av_two_third  avia-builder-el-0  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m9v5gqsg-ae5bd1b09de2ab8c1e439698e80b66bd\">\n#top .av_textblock_section.av-m9v5gqsg-ae5bd1b09de2ab8c1e439698e80b66bd .avia_textblock{\nfont-size:34px;\ncolor:#172542;\n}\n<\/style>\n<section  class='av_textblock_section av-m9v5gqsg-ae5bd1b09de2ab8c1e439698e80b66bd '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><h1>\u00bfQu\u00e9 es la gesti\u00f3n de cuentas y sesiones privilegiadas (PASM)?<\/h1>\n<\/div><\/section><br \/>\n<div  class='av-post-metadata-container av-m9v5qd0r-1e8192f24deb72e09cc10ede7394b570 av-metadata-container-align-left  avia-builder-el-2  el_after_av_textblock  el_before_av_hr  av-metadata-container-1'><div class='av-post-metadata-container-inner'><span class=\"av-post-metadata-content av-post-metadata-meta-content\"><span class=\"av-post-metadata-content av-post-metadata-author\"  itemprop=\"author\" ><span class=\"av-metadata-before av-metadata-before-author\">Written by<\/span><span class=\"av-post-metadata-author-link\" ><a href=\"https:\/\/www.wallix.com\/es\/author\/dquezadawallix-com\/\"  rel=\"author\">Diana QUEZADA<\/a><\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\"><\/span><span class=\"av-post-metadata-content av-post-metadata-published\"><span class=\"av-metadata-before av-metadata-before-published\">on<\/span><span class=\"av-post-metadata-published-date\" >septiembre 5, 2025<\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\"><\/span><span class=\"av-post-metadata-content av-post-metadata-modified\"><span class=\"av-metadata-before av-metadata-before-modified\">- Last updated on<\/span><span class=\"av-post-metadata-modified-date\" >septiembre 5, 2025<\/span><\/span><\/span><\/div><\/div><br \/>\n<div  class='hr av-p98hjw-c6c0f0438e7e475afac12af8cb336432 hr-default  avia-builder-el-3  el_after_av_post_metadata  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4gydqi6-87119aa0fcb443d60d83631d39900441\">\n#top .av_textblock_section.av-m4gydqi6-87119aa0fcb443d60d83631d39900441 .avia_textblock{\nfont-size:15px;\ncolor:#172542;\n}\n<\/style>\n<section  class='av_textblock_section av-m4gydqi6-87119aa0fcb443d60d83631d39900441 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><p>Proteger las credenciales privilegiadas es un objetivo prioritario de seguridad para cualquier organizaci\u00f3n. La <strong>Gesti\u00f3n de cuentas y sesiones privilegiadas<\/strong> (PASM, por sus siglas en ingl\u00e9s) es una medida de protecci\u00f3n clave para evitar que atacantes externos o usuarios internos con malas intenciones accedan a los puntos m\u00e1s vulnerables de una empresa.<\/p>\n<div id=\"attachment_72955\" style=\"width: 1040px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-72955\" class=\"wp-image-72955 size-large\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-1030x577.jpeg\" alt=\"pasm\" width=\"1030\" height=\"577\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-1030x577.jpeg 1030w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-300x168.jpeg 300w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-768x430.jpeg 768w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-1536x861.jpeg 1536w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-2048x1148.jpeg 2048w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-1500x841.jpeg 1500w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-705x395.jpeg 705w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-380x213.jpeg 380w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-760x426.jpeg 760w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-320x179.jpeg 320w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-640x359.jpeg 640w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-480x269.jpeg 480w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-960x538.jpeg 960w\" sizes=\"auto, (max-width: 1030px) 100vw, 1030px\" \/><p id=\"caption-attachment-72955\" class=\"wp-caption-text\">Workers can access cloud-based mining data via tablets to remotely view progress on site.<\/p><\/div>\n<h2>Qu\u00e9 significa PASM para la seguridad<\/h2>\n<p>PASM forma parte de la <strong>Gesti\u00f3n de accesos privilegiados<\/strong> (PAM). Aunque a veces se usan como sin\u00f3nimos, PASM se centra espec\u00edficamente en localizar, almacenar de forma segura, rotar y supervisar credenciales privilegiadas, as\u00ed como en controlar las sesiones que utilizan dichas credenciales. Esto incluye el uso de cuentas compartidas y la <strong>gesti\u00f3n de contrase\u00f1as entre aplicaciones<\/strong> (AAPM).<\/p>\n<p>Gracias a PASM, las empresas pueden tener una visibilidad y un control completos sobre las cuentas y credenciales que dan acceso a los sistemas m\u00e1s cr\u00edticos y a la informaci\u00f3n m\u00e1s sensible. Estas herramientas permiten guardar las credenciales en cofres digitales seguros, registrar las sesiones en detalle y controlar con precisi\u00f3n qui\u00e9n accede y qu\u00e9 hace.<\/p>\n<h3>Por qu\u00e9 las organizaciones necesitan PASM<\/h3>\n<p>Las credenciales privilegiadas son uno de los objetivos m\u00e1s codiciados por los atacantes. Cuando se roban, los hackers pueden mantener el acceso, moverse por la red sin ser detectados y robar datos sensibles. Los informes del sector muestran que la mayor\u00eda de las brechas de seguridad m\u00e1s graves est\u00e1n relacionadas con credenciales privilegiadas comprometidas.<\/p>\n<p>Las organizaciones que no cuentan con un sistema PASM se enfrentan a varios problemas:<\/p>\n<ul>\n<li>Poca visibilidad sobre el uso real de las cuentas privilegiadas.<\/li>\n<li>Detecci\u00f3n tard\u00eda de credenciales comprometidas.<\/li>\n<li>Incumplimiento de normativas y requisitos regulatorios.<\/li>\n<li>Mayor exposici\u00f3n a ataques de escalada de privilegios.<\/li>\n<\/ul>\n<p>La gesti\u00f3n manual de credenciales no funciona cuando se trata de un gran n\u00famero de cuentas. Este m\u00e9todo genera inconsistencias, no deja rastro de auditor\u00eda y abre puertas que los atacantes pueden aprovechar. Por eso, los equipos de seguridad necesitan soluciones automatizadas que resuelvan estos problemas de forma eficaz.<\/p>\n<h3>Funciones clave de PASM<\/h3>\n<ul>\n<li><strong>Descubrimiento de cuentas:<\/strong> localiza todas las cuentas privilegiadas en entornos locales y en la nube, incluidas aquellas olvidadas o sin uso que suponen un riesgo.<\/li>\n<li><strong>Gesti\u00f3n de credenciales:<\/strong> cambia autom\u00e1ticamente las contrase\u00f1as seg\u00fan la pol\u00edtica definida, evitando contrase\u00f1as fijas y reduciendo la superficie de ataque.<\/li>\n<li><strong>Acceso temporal:<\/strong> concede privilegios solo por un tiempo limitado y con un flujo de aprobaci\u00f3n, aplicando el principio de m\u00ednimo privilegio.<\/li>\n<li><strong>Supervisi\u00f3n de sesiones:<\/strong> registra y guarda la actividad de las sesiones privilegiadas, incluidos comandos y pulsaciones, para verificar la seguridad y cumplir con auditor\u00edas.<\/li>\n<li><strong>Detecci\u00f3n de amenazas:<\/strong> identifica comportamientos an\u00f3malos durante las sesiones y puede interrumpirlas de inmediato si detecta algo sospechoso.<\/li>\n<\/ul>\n<p>Las implementaciones m\u00e1s avanzadas integran PASM con plataformas de gobierno de identidades, sistemas de autenticaci\u00f3n multifactor o herramientas DevOps para proteger las cadenas de desarrollo. Antes de implantarlo, conviene evaluar c\u00f3mo encaja con la infraestructura y las necesidades de seguridad actuales.<\/p>\n<h3>Cumplimiento normativo<\/h3>\n<p>Las soluciones PASM ayudan a <a href=\"https:\/\/www.wallix.com\/es\/soluciones\/soluciones-por-caso-de-uso\/auditoria-y-conformidad\/\">cumplir normativas<\/a> como PCI DSS, NIS2, RGPD y otras, generando informes y registros detallados para auditor\u00edas.<\/p>\n<p>En el caso de PCI DSS, por ejemplo, se exige identificar de forma \u00fanica a cada usuario administrativo y poder vincular cualquier acceso a una persona concreta, algo que PASM cubre directamente. Para las empresas que manejan datos de tarjetas de pago, disponer de un PASM robusto no es una opci\u00f3n, sino una obligaci\u00f3n.<\/p>\n<h3>PASM en la nube<\/h3>\n<p>Las plataformas PASM en la nube ofrecen ventajas frente a las soluciones instaladas en los propios servidores: se despliegan mucho m\u00e1s r\u00e1pido, reciben actualizaciones autom\u00e1ticas, escalan sin l\u00edmite y requieren menos mantenimiento.<\/p>\n<p>Mientras que las soluciones tradicionales pueden tardar meses en implantarse, las versiones en la nube suelen estar operativas en cuesti\u00f3n de horas, con costes de infraestructura m\u00ednimos. Adem\u00e1s, ofrecen alta disponibilidad, recuperaci\u00f3n ante desastres y actualizaciones continuas para responder a nuevas amenazas.<\/p>\n<h3>Integraci\u00f3n con otras herramientas de seguridad<\/h3>\n<p>PASM alcanza su mayor valor cuando se conecta con otros sistemas:<\/p>\n<ul>\n<li><strong>Plataformas de gobierno de identidades:<\/strong> para revisiones y certificaciones de acceso.<\/li>\n<li><strong>Sistemas SIEM:<\/strong> para correlacionar la actividad de cuentas privilegiadas con otros eventos de seguridad.<\/li>\n<li><strong>Plataformas SOAR:<\/strong> para automatizar la respuesta ante incidentes.<\/li>\n<li><strong>Soluciones EDR:<\/strong> para supervisar el comportamiento de los dispositivos durante sesiones privilegiadas.<\/li>\n<\/ul>\n<p>Estas integraciones permiten crear flujos de seguridad m\u00e1s completos, detectar amenazas con mayor rapidez y responder mejor ante incidentes.<\/p>\n<h4>PASM y Zero Trust<\/h4>\n<p>Aunque PASM refuerza la seguridad, no es la \u00fanica medida. Forma parte de una arquitectura Zero Trust, y si se combina con la <strong>Gesti\u00f3n de elevaci\u00f3n y delegaci\u00f3n de privilegios<\/strong> (PEDM) ayuda a aplicar el principio de m\u00ednimo privilegio en toda la infraestructura.<\/p>\n<p>En los entornos m\u00e1s maduros, PASM verifica de forma continua cualquier acceso privilegiado, sin importar la identidad del usuario, el dispositivo o la ubicaci\u00f3n. Este enfoque sigue el principio de \u201casumir que ha habido una brecha\u201d y verificar siempre.<\/p>\n<p>Para implantarlo con \u00e9xito, conviene definir m\u00e9tricas claras, auditar de forma detallada los privilegios existentes y planificar el despliegue por fases, priorizando primero los sistemas y datos m\u00e1s cr\u00edticos. De este modo, se obtienen beneficios de seguridad inmediatos mientras se avanza hacia una protecci\u00f3n completa de las cuentas y sesiones privilegiadas.<\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409\">\n#top .flex_column_table.av-equal-height-column-flextable.av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409{\nmargin-top:0px;\nmargin-bottom:0;\n}\n.flex_column.av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409 av_one_third  avia-builder-el-5  el_after_av_two_third  el_before_av_two_third  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-eggfj0-52f75bbe1d3150e3c10e542cde64ad94 av-social-sharing-box-default  avia-builder-el-6  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Compartir esta entrada<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Compartir en X\" href='https:\/\/twitter.com\/share?text=%C2%BFQu%C3%A9%20es%20la%20gesti%C3%B3n%20de%20cuentas%20y%20sesiones%20privilegiadas%20%28PASM%29%3F&#038;url=https:\/\/www.wallix.com\/es\/?p=77742' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Compartir en X'><span class='avia_hidden_link_text'>Compartir en X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Compartir en LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=%C2%BFQu%C3%A9%20es%20la%20gesti%C3%B3n%20de%20cuentas%20y%20sesiones%20privilegiadas%20%28PASM%29%3F&#038;url=https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Compartir en LinkedIn'><span class='avia_hidden_link_text'>Compartir en LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Compartir por correo\" href='mailto:?subject=%C2%BFQu%C3%A9%20es%20la%20gesti%C3%B3n%20de%20cuentas%20y%20sesiones%20privilegiadas%20%28PASM%29%3F&#038;body=https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Compartir por correo'><span class='avia_hidden_link_text'>Compartir por correo<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3i1x7bw-f5b45a0f4afe1cd9bf86afe24c52a18a\">\n#top .hr.hr-invisible.av-3i1x7bw-f5b45a0f4afe1cd9bf86afe24c52a18a{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-3i1x7bw-f5b45a0f4afe1cd9bf86afe24c52a18a hr-invisible  avia-builder-el-7  el_after_av_social_share  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4gywq38-500db124898f0973bd3150d22d62c5a2\">\n#top .av_textblock_section.av-m4gywq38-500db124898f0973bd3150d22d62c5a2 .avia_textblock{\nfont-size:19px;\ncolor:#ec6707;\n}\n<\/style>\n<section  class='av_textblock_section av-m4gywq38-500db124898f0973bd3150d22d62c5a2 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><p><strong><span style=\"color: black;\">Recursos relacionados<\/span><\/strong><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2fklsyk-47345d08b4e405405f5336633191a3ed\">\n#top .hr.hr-invisible.av-2fklsyk-47345d08b4e405405f5336633191a3ed{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-2fklsyk-47345d08b4e405405f5336633191a3ed hr-invisible  avia-builder-el-9  el_after_av_textblock  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-1\"  class='av-magazine av-270hzek-e187254078c7a161a595fad6f3745f4a  avia-builder-el-10  el_after_av_hr  avia-builder-el-last   avia-builder-el-10  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-83673 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Eficiente y Seguro: C\u00f3mo mejorar las operaciones OT con acceso remoto\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-01-27T16:26:45+01:00\" >enero 27, 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/recursos\/webinars-es\/eficiente-y-seguro-como-mejorar-las-operaciones-ot-con-acceso-remoto\/' title='Enlace a: Eficiente y Seguro: C\u00f3mo mejorar las operaciones OT con acceso remoto'>Eficiente y Seguro: C\u00f3mo mejorar las operaciones OT con acceso remoto<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-83565 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: WALLIX One Console: Un punto de control para escalar PAM de forma segura y eficiente\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-01-27T15:07:56+01:00\" >enero 27, 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/recursos\/webinars-es\/wallix-one-console-un-punto-de-control-para-escalar-pam-de-forma-segura-y-eficiente\/' title='Enlace a: WALLIX One Console: Un punto de control para escalar PAM de forma segura y eficiente'>WALLIX One Console: Un punto de control para escalar PAM de forma segura y eficiente<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-65658 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Webinar | C\u00f3mo proteger la cadena de suministro industrial: Estrategias y casos de uso\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-11-15T12:20:08+01:00\" >noviembre 15, 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/recursos\/webinars-es\/ultimas-novedades-en-wallix-2\/' title='Enlace a: Webinar | C\u00f3mo proteger la cadena de suministro industrial: Estrategias y casos de uso'>Webinar | C\u00f3mo proteger la cadena de suministro industrial: Estrategias y casos de uso<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-65584 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: \u00daltimas novedades en WALLIX\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-11-15T09:35:58+01:00\" >noviembre 15, 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/recursos\/webinars-es\/ultimas-novedades-en-wallix\/' title='Enlace a: \u00daltimas novedades en WALLIX'>\u00daltimas novedades en WALLIX<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-46815 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Endpoint Privilege Management: El ant\u00eddoto contra sus infecciones de malware\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-02-07T12:09:51+01:00\" >febrero 7, 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/recursos\/webinars-es\/endpoint-privilege-management-el-antidoto-contra-sus-infecciones-de-malware\/' title='Enlace a: Endpoint Privilege Management: El ant\u00eddoto contra sus infecciones de malware'>Endpoint Privilege Management: El ant\u00eddoto contra sus infecciones de malware<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><\/p>\n<div  class='flex_column av-nok0rg-0413bcf117d44f341a48260f58b5064a av_two_third  avia-builder-el-11  el_after_av_one_third  avia-builder-el-last  first flex_column_div  column-top-margin'     ><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":30,"featured_media":72959,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1643,1795],"tags":[],"class_list":["post-77742","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","category-privileged-access-management-es"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u00bfQu\u00e9 es la gesti\u00f3n de cuentas y sesiones privilegiadas (PASM)? - WALLIX<\/title>\n<meta name=\"description\" content=\"Learn how Privileged Account and Session Management (PASM) protects organizations from cyber threats by securing privileged credentials, enabling compliance, and integrating with Zero Trust architecture.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfQu\u00e9 es la gesti\u00f3n de cuentas y sesiones privilegiadas (PASM)? - WALLIX\" \/>\n<meta property=\"og:description\" content=\"Learn how Privileged Account and Session Management (PASM) protects organizations from cyber threats by securing privileged credentials, enabling compliance, and integrating with Zero Trust architecture.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-05T09:17:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-05T12:37:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Diana QUEZADA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Diana QUEZADA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/\"},\"author\":{\"name\":\"Diana QUEZADA\",\"@id\":\"https:\/\/www.wallix.com\/es\/#\/schema\/person\/952c0daedff430f5869838263e5e2fc2\"},\"headline\":\"\u00bfQu\u00e9 es la gesti\u00f3n de cuentas y sesiones privilegiadas (PASM)?\",\"datePublished\":\"2025-09-05T09:17:43+00:00\",\"dateModified\":\"2025-09-05T12:37:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/\"},\"wordCount\":2630,\"publisher\":{\"@id\":\"https:\/\/www.wallix.com\/es\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-scaled.jpeg\",\"articleSection\":[\"BLOGPOST\",\"PRIVILEGED ACCESS MANAGEMENT\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/\",\"url\":\"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/\",\"name\":\"\u00bfQu\u00e9 es la gesti\u00f3n de cuentas y sesiones privilegiadas (PASM)? - WALLIX\",\"isPartOf\":{\"@id\":\"https:\/\/www.wallix.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-scaled.jpeg\",\"datePublished\":\"2025-09-05T09:17:43+00:00\",\"dateModified\":\"2025-09-05T12:37:08+00:00\",\"description\":\"Learn how Privileged Account and Session Management (PASM) protects organizations from cyber threats by securing privileged credentials, enabling compliance, and integrating with Zero Trust architecture.\",\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/#primaryimage\",\"url\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-scaled.jpeg\",\"width\":2560,\"height\":1435,\"caption\":\"Workers can access cloud-based mining data via tablets to remotely view progress on site.\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.wallix.com\/es\/#website\",\"url\":\"https:\/\/www.wallix.com\/es\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\/\/www.wallix.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.wallix.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.wallix.com\/es\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\/\/www.wallix.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.wallix.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\/\/www.wallix.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/wallixcom\",\"https:\/\/www.linkedin.com\/company\/wallix\/\",\"https:\/\/www.youtube.com\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.wallix.com\/es\/#\/schema\/person\/952c0daedff430f5869838263e5e2fc2\",\"name\":\"Diana QUEZADA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.wallix.com\/es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9758775515cb600b4f83db212b3c0b711ef645714725a3f76d6ab57f756ea576?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9758775515cb600b4f83db212b3c0b711ef645714725a3f76d6ab57f756ea576?s=96&d=mm&r=g\",\"caption\":\"Diana QUEZADA\"},\"description\":\"Diana Quezada is a Product Marketing Manager at WALLIX, specializing in making complex cybersecurity concepts accessible and valuable to business and technical audiences. Her focus spans IAM, IAG, and broader identity-centric security topics. She plays a key role in positioning WALLIX solutions to meet market needs, regulatory requirements, and user expectations.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/dianaquezadav\/\"],\"url\":\"https:\/\/www.wallix.com\/es\/author\/dquezadawallix-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfQu\u00e9 es la gesti\u00f3n de cuentas y sesiones privilegiadas (PASM)? - WALLIX","description":"Learn how Privileged Account and Session Management (PASM) protects organizations from cyber threats by securing privileged credentials, enabling compliance, and integrating with Zero Trust architecture.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/","og_locale":"es_ES","og_type":"article","og_title":"\u00bfQu\u00e9 es la gesti\u00f3n de cuentas y sesiones privilegiadas (PASM)? - WALLIX","og_description":"Learn how Privileged Account and Session Management (PASM) protects organizations from cyber threats by securing privileged credentials, enabling compliance, and integrating with Zero Trust architecture.","og_url":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/","og_site_name":"WALLIX","article_published_time":"2025-09-05T09:17:43+00:00","article_modified_time":"2025-09-05T12:37:08+00:00","og_image":[{"width":2560,"height":1435,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-scaled.jpeg","type":"image\/jpeg"}],"author":"Diana QUEZADA","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"Escrito por":"Diana QUEZADA","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/"},"author":{"name":"Diana QUEZADA","@id":"https:\/\/www.wallix.com\/es\/#\/schema\/person\/952c0daedff430f5869838263e5e2fc2"},"headline":"\u00bfQu\u00e9 es la gesti\u00f3n de cuentas y sesiones privilegiadas (PASM)?","datePublished":"2025-09-05T09:17:43+00:00","dateModified":"2025-09-05T12:37:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/"},"wordCount":2630,"publisher":{"@id":"https:\/\/www.wallix.com\/es\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-scaled.jpeg","articleSection":["BLOGPOST","PRIVILEGED ACCESS MANAGEMENT"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/","url":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/","name":"\u00bfQu\u00e9 es la gesti\u00f3n de cuentas y sesiones privilegiadas (PASM)? - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-scaled.jpeg","datePublished":"2025-09-05T09:17:43+00:00","dateModified":"2025-09-05T12:37:08+00:00","description":"Learn how Privileged Account and Session Management (PASM) protects organizations from cyber threats by securing privileged credentials, enabling compliance, and integrating with Zero Trust architecture.","inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.wallix.com\/es\/blogpost\/que-es-la-gestion-de-cuentas-y-sesiones-privilegiadas-pasm\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-scaled.jpeg","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-scaled.jpeg","width":2560,"height":1435,"caption":"Workers can access cloud-based mining data via tablets to remotely view progress on site."},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/es\/#website","url":"https:\/\/www.wallix.com\/es\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/es\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.wallix.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/es\/#\/schema\/person\/952c0daedff430f5869838263e5e2fc2","name":"Diana QUEZADA","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.wallix.com\/es\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9758775515cb600b4f83db212b3c0b711ef645714725a3f76d6ab57f756ea576?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9758775515cb600b4f83db212b3c0b711ef645714725a3f76d6ab57f756ea576?s=96&d=mm&r=g","caption":"Diana QUEZADA"},"description":"Diana Quezada is a Product Marketing Manager at WALLIX, specializing in making complex cybersecurity concepts accessible and valuable to business and technical audiences. Her focus spans IAM, IAG, and broader identity-centric security topics. She plays a key role in positioning WALLIX solutions to meet market needs, regulatory requirements, and user expectations.","sameAs":["https:\/\/www.linkedin.com\/in\/dianaquezadav\/"],"url":"https:\/\/www.wallix.com\/es\/author\/dquezadawallix-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts\/77742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/comments?post=77742"}],"version-history":[{"count":4,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts\/77742\/revisions"}],"predecessor-version":[{"id":80317,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts\/77742\/revisions\/80317"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/media\/72959"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/media?parent=77742"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/categories?post=77742"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/tags?post=77742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}