CyberArk | Security for the Heart of the Enterprise

Perché CyberArk

CyberArk è leader riconosciuto in ambito Privileged Account Security, con oltre metà delle società Fortune 100 che fanno affidamento sulle nostre soluzioni per proteggere gli asset più strategici e preziosi

Pensa come un hacker

Gli hacker trascorrono in media 99 giorni all’interno dei sistemi senza essere scoperti.

– Il loro obiettivo –

sono gli account privilegiati non protetti, grazie ai quali possono accedere agli asset e ai dati più preziosi.

Con la soluzione più competa del settore, solo CyberArk è in grado di proteggere l’azienda dalla superficie di attacco in continua espansione, bloccando gli account privilegiati ovunque risiedano: in locale, nel cloud o in ambienti ibridi.

Notizie su CyberArk



The CyberArk Blog
Threat Research Blog

One Key and Five Minutes Can Leak Millions of Records

An explosion in the number of applications and machines throughout IT environments has made IT automation and configuration tools such as Ansible a necessity. This trend is related to the increased adoption of DevOps practices where the line between development and operations has been erased. DevOps automates the software delivery pipeline and utilizes innovative, robust […]

15 Cyber Security Stats At-a-Glance

Last year, the world witnessed a barrage of crippling cyber attacks—from the unprecedented breach of a Credit Bureau that compromised personal data of 145 million consumers, to leaked government tools belonging to the NSA, to major ransomware campaigns including WannaCry, Bad Rabbit and NotPetya, to revelations that Yahoo’s breach included 3 billion accounts. Many of […]

What do Cyber Professionals Teach Children about Security?

Winter break is over, and children have returned to school armed with new phones, laptops and other devices. I witnessed the excitement of a pair of fifth graders receiving laptops for Christmas. I can’t recall what I wanted at that age—probably games or a bike—but surely a laptop wasn’t on my list. I watched one […]

Detecting Pass-The-Hash with Windows Event Viewer

Overview In this article, we explain how to detect a Pass-The-Hash (PTH) attack using the Windows event viewer and introduce a new open source tool to aid in this detection. PTH is an attack technique that allows an attacker to start lateral movement in the network over the NTLM protocol, without the need for the […]

CyberArk Labs: Evolution of Credential Theft Techniques Will Be the Cyber Security Battleground of 2018

In the past year, organizations continued to struggle to address cyber security risks created in the wake of rapid technology adoption. Technology adoption needs to be aligned with effective risk management strategies, and the challenge most organizations face is that today’s technologies often lack the security of more mature technologies. This has opened organizations to […]

Golden SAML: Newly Discovered Attack Technique Forges Authentication to Cloud Apps

In this blog post, we introduce a new attack vector discovered by CyberArk Labs and dubbed “golden SAML.” The vector enables an attacker to create a golden SAML, which is basically a forged SAML “authentication object,” and authenticate across every service that uses SAML 2.0 protocol as an SSO mechanism. In a golden SAML attack, […]



CyberArk ha dato vita a un ecosistema partner in espansione di fornitori di tecnologie, integratori di soluzioni e partner di canale per aiutare la tua azienda a fronteggiare le sfide di sicurezza più complesse


C3 Alliance Global Technology Partner Program: l’importanza della sicurezza degli account privilegiati per proteggere meglio i clienti dalle cyber-minacce.

Altre informazioni


CyberArk ha costruito un’invidiabile community di Partner di canale per aiutare i clienti in tutto il mondo a proteggere e gestire i propri account privilegiati.

Altre informazioni


Approfondisci le tue competenze nella sicurezza consultando la nostra raccolta di risorse che include ebook, webinar e video su una vasta gamma di argomenti legati alla sicurezza

Altre risorse