DNS Records
A | 104.17.70.206 |
A | 104.17.71.206 |
A | 104.17.72.206 |
A | 104.17.73.206 |
A | 104.17.74.206 |
CNAME | cyberarksoftware.mktoweb.com |
JSON+LD
{
"@context": "https://schema.org",
"@graph": [
{
"@type": "WebPage",
"@id": "https://www.cyberark.com/",
"url": "https://www.cyberark.com/",
"name": "Identity Security and Access Management Leader | CyberArk",
"isPartOf": {
"@id": "https://www.cyberark.com/#website"
},
"about": {
"@id": "https://www.cyberark.com/#organization"
},
"primaryImageOfPage": {
"@id": "https://www.cyberark.com/#primaryimage"
},
"image": {
"@id": "https://www.cyberark.com/#primaryimage"
},
"thumbnailUrl": "https://www.cyberark.com/wp-content/uploads/2023/05/overview-img-1.svg",
"datePublished": "2017-01-05T16:04:41+00:00",
"dateModified": "2024-10-10T16:11:19+00:00",
"description": "Get the most complete Identity Security and Access Management Solutions that enable secure access across any device, anywhere, at just the right time.",
"breadcrumb": {
"@id": "https://www.cyberark.com/#breadcrumb"
},
"inLanguage": "en-US",
"potentialAction": [
{
"@type": "ReadAction",
"target": [
"https://www.cyberark.com/"
]
}
]
},
{
"@type": "ImageObject",
"inLanguage": "en-US",
"@id": "https://www.cyberark.com/#primaryimage",
"url": "https://www.cyberark.com/wp-content/uploads/2023/05/overview-img-1.svg",
"contentUrl": "https://www.cyberark.com/wp-content/uploads/2023/05/overview-img-1.svg",
"width": 45,
"height": 45
},
{
"@type": "BreadcrumbList",
"@id": "https://www.cyberark.com/#breadcrumb",
"itemListElement": [
{
"@type": "ListItem",
"position": 1,
"name": "Home"
}
]
},
{
"@type": "WebSite",
"@id": "https://www.cyberark.com/#website",
"url": "https://www.cyberark.com/",
"name": "CyberArk",
"description": "",
"publisher": {
"@id": "https://www.cyberark.com/#organization"
},
"potentialAction": [
{
"@type": "SearchAction",
"target": {
"@type": "EntryPoint",
"urlTemplate": "https://www.cyberark.com/?s={search_term_string}"
},
"query-input": "required name=search_term_string"
}
],
"inLanguage": "en-US"
},
{
"@type": "Organization",
"@id": "https://www.cyberark.com/#organization",
"name": "CyberArk Software",
"url": "https://www.cyberark.com/",
"logo": {
"@type": "ImageObject",
"inLanguage": "en-US",
"@id": "https://www.cyberark.com/#/schema/logo/image/",
"url": "https://www.cyberark.com/wp-content/uploads/2021/02/cyberark-logo-dark.svg",
"contentUrl": "https://www.cyberark.com/wp-content/uploads/2021/02/cyberark-logo-dark.svg",
"width": "1024",
"height": "1024",
"caption": "CyberArk Software"
},
"image": {
"@id": "https://www.cyberark.com/#/schema/logo/image/"
},
"sameAs": [
"https://www.facebook.com/CyberArk/",
"https://x.com/CyberArk",
"https://www.linkedin.com/company/cyber-ark-software/"
]
}
]
}