{"id":104421,"date":"2020-11-04T16:00:05","date_gmt":"2020-11-04T21:00:05","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/privileged-account-security-solution\/cyberark-cloud-entitlements-manager\/"},"modified":"2020-12-23T17:25:30","modified_gmt":"2020-12-23T22:25:30","slug":"cyberark-cloud-entitlements-manager","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/it\/products\/cyberark-cloud-entitlements-manager\/","title":{"rendered":"CyberArk Cloud Entitlements Manager"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1602702717594{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Kubora_1920x520.jpg?id=103748) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-hero cyb-desktop&#8221;][vc_column el_class=&#8221;cyb-center&#8221;][vc_column_text css=&#8221;.vc_custom_1606325163419{margin-top: 5.3125rem !important;margin-bottom: 20px !important;}&#8221;]<\/p>\n<h1>CYBERARK CLOUD ENTITLEMENTS MANAGER<\/h1>\n<h3 class=\"regular\">Eliminazione delle autorizzazioni eccessive tramite IA.<\/h3>\n<p>[\/vc_column_text][vc_btn title=&#8221;SCARICA L&#8217;EBOOK&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#ffffff&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Febooks%2Ftake-control-of-cloud-permissions-sprawl-ebook|&#8221; el_class=&#8221;cyb-button solid-blue cyb-center-btn mgn-bottom&#8221; css=&#8221;.vc_custom_1604606514993{margin-right: 5px !important;}&#8221;][vc_btn title=&#8221;PROVA GRATUITA&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#ffffff&#8221; shape=&#8221;square&#8221; link=&#8221;url:%23form|&#8221; el_class=&#8221;cyb-button solid-green cyb-center-btn mgn-bottom&#8221; css=&#8221;.vc_custom_1602790752468{margin-left: 5px !important;}&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1602702742623{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Kubora_1920x520.jpg?id=103748) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-hero cyb-mobile&#8221;][vc_column el_class=&#8221;cyb-center cyb-white cyb-pad-btm&#8221;][vc_column_text css=&#8221;.vc_custom_1606325172501{margin-top: 5.3125rem !important;margin-bottom: 20px !important;}&#8221;]<\/p>\n<h1>CYBERARK CLOUD ENTITLEMENTS MANAGER<\/h1>\n<h3 class=\"regular\">Eliminazione delle autorizzazioni eccessive tramite IA.<\/h3>\n<p>[\/vc_column_text][vc_btn title=&#8221;SCARICA L&#8217;EBOOK&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#ffffff&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Febooks%2Ftake-control-of-cloud-permissions-sprawl-ebook|&#8221; el_class=&#8221;cyb-button solid-blue cyb-center-btn mgn-bottom&#8221; css=&#8221;.vc_custom_1604606536221{margin-bottom: 1.25rem !important;}&#8221;][vc_btn title=&#8221;PROVA GRATUITA&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#ffffff&#8221; shape=&#8221;square&#8221; link=&#8221;url:%23form|target:_blank|&#8221; el_class=&#8221;cyb-button solid-green cyb-center-btn mgn-bottom&#8221;][\/vc_column][\/vc_row][vc_row][vc_column el_class=&#8221;cyb-pad-btm cyb-center&#8221; offset=&#8221;vc_col-md-offset-2 vc_col-md-8&#8243;][vc_column_text]<\/p>\n<h2>PRIVILEGI MINIMI IN TUTTI GLI AMBIENTI CLOUD<\/h2>\n<p>CyberArk Cloud Entitlements Manager \u00e8 un servizio di sicurezza basato su IA che rileva e rimuove le autorizzazioni eccessive sul cloud da una dashboard centralizzata e intuitiva. In meno di un&#8217;ora, le organizzazioni possono implementare il servizio &#8220;zero-footprint&#8221; per rimediare ai rischi insiti negli ambienti cloud.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column offset=&#8221;vc_col-md-offset-2 vc_col-md-8&#8243; el_class=&#8221;cyb-center&#8221;][vc_column_text]<\/p>\n<h2>VANTAGGI<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cyb-card-hover&#8221;][vc_column width=&#8221;1\/3&#8243; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fproduct-datasheets%2Fcloud-entitlements-manager-data-sheet|&#8221;][vc_single_image image=&#8221;88986&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1606325212526{padding-bottom: 1.5625px !important;}&#8221;][vc_column_text]<\/p>\n<h4>PER LA SICUREZZA NEL CLOUD<\/h4>\n<p>Correzione delle autorizzazioni inutilizzate e configurate erroneamente per proteggere proattivamente contro le minacce interne ed esterne.[\/vc_column_text][vc_column_text]PER SAPERNE DI PI\u00d9 &gt;[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Finfographics%2Fthe-risks-of-excessive-cloud-permissions|&#8221;][vc_single_image image=&#8221;88995&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h4>PER LE OPERATION<\/h4>\n<p>Centralizzazione della visibilit\u00e0, applicazione di controlli coerenti e unificazione dell&#8217;intelligence sulla sicurezza attraverso l&#8217;integrazione con le soluzioni CyberArk.[\/vc_column_text][vc_column_text]PER SAPERNE DI PI\u00d9 &gt;[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Febooks%2Ftake-control-of-cloud-permissions-sprawl-ebook|&#8221;][vc_single_image image=&#8221;89004&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h4>PER LA CONFORMIT\u00c0<\/h4>\n<p>Soddisfazione degli audit interni e dei requisiti normativi e rispetto delle best practice del settore tramite la continua verifica del privilegio minimo.[\/vc_column_text][vc_column_text]PER SAPERNE DI PI\u00d9 &gt;[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1602702958862{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Kubora_1920x520_03.jpg?id=103764) !important;}&#8221;][vc_column offset=&#8221;vc_col-md-offset-2 vc_col-md-8&#8243; el_class=&#8221;cyb-cta-card&#8221;][vc_raw_html]PGEgY2xhc3M9ImFuY2hvciIgbmFtZT0idmlkZW8iPjwvYT4=[\/vc_raw_html][vc_column_text]<\/p>\n<h2>PANORAMICA SU CLOUD ENTITLEMENTS MANAGER<\/h2>\n<p>[\/vc_column_text][vc_column_text]    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_5p5bkdsutp videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        [\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-reverse cyb-pad-top&#8221;][vc_column width=&#8221;5\/12&#8243; css=&#8221;.vc_custom_1602704076995{padding-bottom: 2.5rem !important;}&#8221;][vc_column_text]<\/p>\n<h2>PRIVILEGIO MINIMO RAPIDO, SEMPLICE E COERENTE<\/h2>\n<p>Man mano che le aziende scalano le implementazioni sul cloud e proseguono nella loro digital transformation, la creazione di identit\u00e0 umane e non umane accelera. Ciascuna piattaforma offre migliaia di autorizzazioni di accesso che devono essere configurate in maniera sicura per impedire agli attaccanti di compromettere le risorse cloud critiche.<\/p>\n<p>Cloud Entitlements Manager riduce i rischi e migliora la visibilit\u00e0 attraverso il rilevamento continuo basato sull&#8217;IA e la correzione dei permessi nascosti, erroneamente configurati o inutilizzati negli ambienti cloud di un&#8217;azienda &#8211; il tutto da un&#8217;unica dashboard intuitiva \u2013 permettendo alle aziende di stabilire in modo rapido e sicuro i privilegi minimi sul cloud.[\/vc_column_text][vc_btn title=&#8221;SCARICA IL DATA SHEET&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#414042&#8243; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fproduct-datasheets%2Fcloud-entitlements-manager-data-sheet|&#8221; el_class=&#8221;cyb-button mgn-bottom cyb-submargin-top&#8221; css=&#8221;.vc_custom_1604436213140{margin-right: 5px !important;}&#8221;][\/vc_column][vc_column width=&#8221;7\/12&#8243; css=&#8221;.vc_custom_1602704198513{padding-bottom: 2.5rem !important;}&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-103772\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520.png\" alt=\"Cloud Least Privilege Service\" width=\"640\" height=\"520\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520.png 640w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520-300x244.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520-150x122.png 150w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cyb-center cyb-pad-top&#8221; css=&#8221;.vc_custom_1602704947463{background-color: #ffffff !important;}&#8221;][vc_column offset=&#8221;vc_col-md-offset-2 vc_col-md-8&#8243;][vc_column_text el_class=&#8221;cyb-ltr-spc&#8221;]<\/p>\n<h2>BREVI INFORMAZIONI SULLE AUTORIZZAZIONI PER IL CLOUD<\/h2>\n<p>Con l&#8217;implementazione di nuovi ambienti e servizi sul cloud, le organizzazioni introducono migliaia di autorizzazioni basate sull&#8217;identit\u00e0 che devono essere configurate e gestite in maniera sicura e continua.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cyb-card-no-hover&#8221;][vc_column width=&#8221;1\/4&#8243;][vc_column_text el_class=&#8221;cyb-icon-bottom&#8221;]<\/p>\n<h1 class=\"blue-header regular\">19%<\/h1>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;no-padding-top&#8221;]delle violazioni dei dati riguarda server cloud<br \/>\nconfigurati erroneamente.*[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_column_text el_class=&#8221;cyb-icon-bottom&#8221;]<\/p>\n<h1 class=\"blue-header regular\">Oltre 15.000<\/h1>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;no-padding-top&#8221;]autorizzazioni per l&#8217;accesso ai servizi su AWS, Azure e GCP**[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_column_text el_class=&#8221;cyb-icon-bottom&#8221;]<\/p>\n<h1 class=\"blue-header regular\">$4,4 MILIONI<\/h1>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;no-padding-top&#8221;]\u00e8 il costo medio di un caso di violazione dei dati<br \/>\ndi configurazione sul cloud. *[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_column_text el_class=&#8221;cyb-icon-bottom&#8221;]<\/p>\n<h1 class=\"blue-header regular\">#1<\/h1>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;no-padding-top&#8221;]\u201caccount e ruoli con autorizzazioni eccessive&#8221; \u00e8 la configurazione errata pi\u00f9 diffusa dei servizi su cloud.***[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cyb-pad-btm&#8221;][vc_column offset=&#8221;vc_col-md-offset-2 vc_col-md-8&#8243; el_class=&#8221;cyb-center&#8221;][vc_column_text el_class=&#8221;cyb-cta-item&#8221;]<sup>*2020 IBM Cost of a Data Breach Report<\/sup><br \/>\n<sup>**Secondo la documentazione CSP 9\/1\/2020<\/sup><br \/>\n<sup>***ESG Research &#8211; Trends in IAM: Identit\u00e0 basate sul cloud<\/sup>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; disable_element=&#8221;yes&#8221; css=&#8221;.vc_custom_1608761990476{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/kobura-hero.jpg?id=103843) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1603847378427{padding-top: 2.5rem !important;padding-right: 10% !important;padding-bottom: 2.5rem !important;padding-left: 10% !important;background-color: #1d4b73 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-opac-blue cyb-center-mobile&#8221; offset=&#8221;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8221;cyb-white&#8221; css=&#8221;.vc_custom_1607566677792{padding-bottom: 2.1875rem !important;}&#8221;]<\/p>\n<h3 class=\"cyb-white\">Expert Insights on How to Secure Identities in Cloud Environments<\/h3>\n<p>In this virtual event, you will gain cloud security insights from CyberArk threat researchers, customers and industry analysts. We also introduce our Cloud Entitlements Manager solution.<\/p>\n<p>The 30 minute showcase features technical demos, cloud attack scenarios, industry research and more! Learn how to secure human and machine identities in cloud environment.[\/vc_column_text][vc_btn title=&#8221;WATCH ON-DEMAND&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#ffffff&#8221; shape=&#8221;square&#8221; link=&#8221;url:%2F%3Fpage_id%3D104615|&#8221; el_class=&#8221;cyb-button white&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1603214432931{background-color: #f1f2f2 !important;}&#8221;][vc_column offset=&#8221;vc_col-md-offset-2 vc_col-md-8&#8243; el_class=&#8221;cyb-center cyb-pad-top&#8221;][vc_column_text]<\/p>\n<h2>CARATTERISTICHE PRINCIPALI<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-pad-top&#8221; css=&#8221;.vc_custom_1603214379926{background-color: #f1f2f2 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;cyb-submargin-btm&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-103965\" style=\"border: 2px solid #f1f2f2;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Visibility_cloud-1.jpg\" alt=\"Centralized Cloud Permissions Dashboard\" width=\"860\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Visibility_cloud-1.jpg 860w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Visibility_cloud-1-300x174.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Visibility_cloud-1-768x447.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Visibility_cloud-1-150x87.jpg 150w\" sizes=\"auto, (max-width: 860px) 100vw, 860px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1602694987343{padding-bottom: 2.5rem !important;}&#8221; offset=&#8221;vc_col-md-offset-1&#8243;][vc_column_text]<\/p>\n<h3 class=\"blue-header\">GRANDE VISIBILIT\u00c0<\/h3>\n<p>Analisi approfondite e indipendenti dal cloud da una dashboard centralizzata, per rilevare e controllare tutte le autorizzazioni di accesso alle risorse su AWS, AWS Elastic Kubernetes Service, Azure e GCP. Visualizzazione e interazione delle relazioni tra identit\u00e0 e risorse sul cloud. Misurazione della riduzione del rischio e correzione delle autorizzazioni eccessive. Tutto da un unico display.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-reverse cyb-pad-top&#8221;][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1602695005478{padding-bottom: 2.5rem !important;}&#8221; offset=&#8221;vc_col-md-offset-1&#8243;][vc_column_text]<\/p>\n<h3 class=\"blue-header\">CONSIGLI DETTAGLIATI BASATI SU IA<\/h3>\n<p>Implementazione sicura ed efficiente dei permessi cloud con il principio del privilegio minimo. Cloud Entitlements Manager utilizza l&#8217;IA per applicare correzioni dettagliate a livello di codice alle policy, sia per identit\u00e0 umane che non umane, senza alcun impatto sulle operazioni in corso. Ci\u00f2 consente ai team di sicurezza cloud di risparmiare tempo e standardizzare i processi su tutte le piattaforme.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-md-offset-1&#8243; el_class=&#8221;cyb-submargin-btm&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-103901\" style=\"border: solid 2px #f1f2f2;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/AI_860x500.jpg\" alt=\"AI-Powered Least Privilege Recommendations\" width=\"860\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/AI_860x500.jpg 860w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/AI_860x500-300x174.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/AI_860x500-768x447.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/AI_860x500-150x87.jpg 150w\" sizes=\"auto, (max-width: 860px) 100vw, 860px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-pad-top&#8221; css=&#8221;.vc_custom_1603214391377{background-color: #f1f2f2 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;cyb-submargin-btm&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-103893\" style=\"border: solid 2px #f1f2f2;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Exposure_860x500.jpg\" alt=\"Exposure Level Analysis for Cloud Least Privilege\" width=\"860\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Exposure_860x500.jpg 860w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Exposure_860x500-300x174.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Exposure_860x500-768x447.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Exposure_860x500-150x87.jpg 150w\" sizes=\"auto, (max-width: 860px) 100vw, 860px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_column_text]<\/p>\n<h3 class=\"blue-header\">ANALISI DEL LIVELLO DI ESPOSIZIONE<\/h3>\n<p>Riduci proattivamente i rischi e misura i progressi nel tempo con punteggi di livello di esposizione dinamici e quantificabili per tutte le identit\u00e0 e piattaforme. I livelli di esposizione valutano le autorizzazioni eccessive in base al rischio associato, individuando i percorsi pi\u00f9 rapidi verso la riduzione del rischio e consentendo una misura continua per audit e conformit\u00e0.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-reverse cyb-pad-top&#8221;][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1602695005478{padding-bottom: 2.5rem !important;}&#8221; offset=&#8221;vc_col-md-offset-1&#8243;][vc_column_text]<\/p>\n<h3 class=\"blue-header\">INTEGRAZIONE CON LE SOLUZIONI CYBERARK<\/h3>\n<p>Cloud Entitlements Manager fa parte di una soluzione globale di Identity Security di CyberArk che protegge l&#8217;accesso umano e non umano ad applicazioni e infrastrutture in ambienti ibridi e multi-cloud.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-md-offset-1&#8243; el_class=&#8221;cyb-submargin-btm&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-103973\" style=\"border: solid 2px #f1f2f2;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/860x500_04.jpg\" alt=\"Cloud Entitlements Management Part of Identity Security Solutions\" width=\"860\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/860x500_04.jpg 860w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/860x500_04-300x174.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/860x500_04-768x447.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/860x500_04-150x87.jpg 150w\" sizes=\"auto, (max-width: 860px) 100vw, 860px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221;][vc_column offset=&#8221;vc_col-md-offset-2 vc_col-md-8&#8243; el_class=&#8221;cyb-pad-top cyb-cta-card&#8221;][vc_column_text el_class=&#8221;cyb-ltr-spc&#8221;]<\/p>\n<h2>RISORSE<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221;][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1602707447265{padding-top: 2rem !important;}&#8221; el_class=&#8221;cyb-center&#8221;][vc_column css=&#8221;.vc_custom_1593651419004{padding-bottom: 1.25rem !important;}&#8221;][vc_raw_html]PGEgY2xhc3M9ImFuY2hvciIgbmFtZT0iZm9ybSI+PC9hPg==[\/vc_raw_html][vc_column_text]<\/p>\n<h2>RICHIEDI UNA PROVA GRATUITA<\/h2>\n<p>Ci siamo quasi, servono solo alcune informazioni. In cambio, avrai accesso a una prova gratuita di 30 giorni, che ti permetter\u00e0 di implementare Cloud Entitlements Manager come servizio a impatto zero e di iniziare ad eliminare i rischi legati alle autorizzazioni in meno di un&#8217;ora.[\/vc_column_text][vc_column_text el_class=&#8221;cyb-pad-top&#8221;]    <script type=\"text\/javascript\" src=\"https:\/\/lp.cyberark.com\/js\/forms2\/js\/forms2.min.js\" id=\"marketo-script-js\"><\/script>\n    <script src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/google-libphonenumber\/3.2.38\/libphonenumber.min.js\" integrity=\"sha512-2EBfDCqBiVPlov9vAT9w6xMEIFcg24K3arAldIIgHh1EGrNob66Mc1gGXa5J7LTG3W5sk\/liGFbJUkODW5A8NQ==\" crossorigin=\"anonymous\" referrerpolicy=\"no-referrer\"><\/script>\n    <form id=\"mktoForm_8081\"><\/form>\n    <script>\n        MktoForms2.loadForm(\"\/\/lp.cyberark.com\", \"316-CZP-275\", 8081, function (form) {\n            \n            var match_found;                            \n            \n                        \n            \/\/ Add hidden value with asset info\n            var ecid = decodeURIComponent(document.cookie).match(\/AMCV_.*?=.*?\\|MCMID\\|(.*?)\\|\/)[1];\n                        var utm_source = getParameterByName('utm_source') == undefined ? (jQuery.cookie('utm_source') == undefined ? '' : jQuery.cookie('utm_source')) : getParameterByName('utm_source');\n            var utm_campaign = getParameterByName('utm_campaign') == undefined ? (jQuery.cookie('utm_campaign') == undefined ? '' : jQuery.cookie('utm_campaign')) : getParameterByName('utm_campaign');\n            var utm_medium = getParameterByName('utm_medium') == undefined ? (jQuery.cookie('utm_medium') == undefined ? '' : jQuery.cookie('utm_medium')) : getParameterByName('utm_medium');\n            var utm_term = getParameterByName('utm_term') == undefined ? (jQuery.cookie('utm_term') == undefined ? '' : jQuery.cookie('utm_term')) : getParameterByName('utm_term');\n            var utm_content = getParameterByName('utm_content') == undefined ? (jQuery.cookie('utm_content') == undefined ? '' : jQuery.cookie('utm_content')) : getParameterByName('utm_content');\n            form.addHiddenFields({\n                'marketoAnalyticsID': \"\",\n                'adobecloudid': ecid,\n                'asset_name': \"\",\n                'program_name': \"\",\n                'Lead_Request__c': \"\",\n                'additional_email_content': \"\",\n                'Notes_Restrictions__c': \"\",\n                'utm_source': utm_source,\n                'utm_campaign': utm_campaign,\n                'utm_medium': utm_medium,\n                'utm_term': utm_term,\n                'utm_contact': utm_content,\n                'utmsource': utm_source,\n                'utmcampaign': utm_campaign,\n                'utmmedium': utm_medium,\n                'utmterm': utm_term,\n                'utmcontent': utm_content,\n                'showNotes': ''\n            });\n                            form.addHiddenFields({\n                    'MktoPersonNotes': \"\"\n                });\n                \n            \/***************************\n            Start event assigning for AA\n            ***************************\/\n                        \n            \/*************************\n            End event assigning for AA\n            *************************\/\n\n            \/***********************************************\n            Start event dispatching and email hashing for AA\n            ***********************************************\/\n\n            if( typeof formType !== 'undefined' ) { \/\/following AA dispatching will not run if formType has not been defined above\n\n                \n                \/\/Custom AT event for form view\n                let formViewEvent = new CustomEvent('launch-formView',{\n                    'detail':{\n                    'form_type': formType,\n                    'form_name': formName,\n                    'form_id': '8081'\n                    }\n                })\n                document.querySelector('body').dispatchEvent(formViewEvent);\n                console.log(formViewEvent);\n\n                form.onValidate(function() {\n                    if (jQuery(\"form.mktoForm .mktoInvalid\")[0]){\/\/only fire events if no error class is found\n                        \n                        \/\/Custom AT event for form validate\n                        let formErrorEvent = new CustomEvent('launch-formError',{\n                            'detail':{\n                                'form_type': formType,\n                                'form_name': formName,\n                                'form_id': '8081'\n                            }\n                        })\n                        document.querySelector('body').dispatchEvent(formErrorEvent);\n                        console.log(formErrorEvent);\n                        \n                                              \n                    }\n                    \/\/hash the email\n                    var eInput = jQuery('input[type=\"email\"]').val();\n                    var eHash = sha256(eInput);\n                    console.log(eHash);\n                    \/\/assign the cookie\n                    form.vals({\"marketoAnalyticsID\":eHash});\n                    _satellite.cookie.set('marketoAnalyticsID', eHash, {expires: 365});\n                });\n\n                form.onSuccess(function () {\n\n                    \/\/Custom AT event for form submit\n                    let formSubmitEvent = new CustomEvent('launch-formSubmit',{\n                        'detail':{\n                            'form_type': formType,\n                            'form_name': formName,\n                            'form_id': '8081'\n                        }\n                    })\n                    document.querySelector('body').dispatchEvent(formSubmitEvent);\n                    console.log(formSubmitEvent);\n                });               \n            }\n            \/*********************************************\n            End event dispatching and email hashing for AA\n            *********************************************\/\n            \n            \/\/ TY Message\n            form.onSuccess(function () {\n                dataLayer.push({\n                                    });\n                                    jQuery(\"#mktoForm_8081\").hide();\n                    jQuery(\".ty_message\").show();\n                    var iframe = jQuery(\"<iframe><\/iframe>\",{\n                        src: \"https:\/\/www.cyberark.com\/?reset_mkto=1\",\n                        style: 'position:absolute;top:-9999px;left:-999px;',\n                        width: '10',\n                        height: '10'\n                    });\n                    iframe.appendTo('body');\n                    jQuery.cookie('utm_source', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    jQuery.cookie('utm_medium', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    jQuery.cookie('utm_campaign', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    jQuery.cookie('utm_term', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    jQuery.cookie('utm_content', '', {path: '\/', expires: 365, domain: 'cyberark.com'});\n                    return false;\n                                });\n        });\n    <\/script>\n    <script>\n    \/\/ custom errorMessage + instruction text for embedded Marketo Forms\nMktoForms2.whenReady(function(form) {\n    \/\/ when a field is focused\n    jQuery(document).on('focus', 'input, select, textarea', function(){\n        jQuery(this).parent('.mktoFieldWrap').addClass('activeField');\n        \/\/ if this is a valid input\n        if(jQuery(this).is('.mktoValid')){\n            jQuery(this).parent('.mktoFieldWrap').addClass('fieldValid');\n        }\n        \/\/ if this is an invalid input\n        else if(jQuery(this).is('.mktoInvalid')){\n            jQuery(this).parent('.mktoFieldWrap').addClass('fieldInvalid');\n        }\n        \/\/ else this is not a valid nor invalid input\n        else {}\n    });\n\n    \/\/ when a field is blurred\n    jQuery(document).on('blur', 'input, select, textarea', function(){\n        jQuery(this).parent('.mktoFieldWrap').removeClass('activeField');\n        \/\/ if this is a valid input\n        if(jQuery(this).is('.mktoValid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldInvalid').addClass('fieldValid');\n        }\n        \/\/ if this is an invalid input\n        else if(jQuery(this).is('.mktoInvalid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldValid').addClass('fieldInvalid');\n        }\n        \/\/ else this is not a valid nor invalid input\n        else {}\n    });\n\n    \/\/ when a field is edited (keyup)\n    jQuery(document).on('keyup', 'input, select, textarea', function(e){\n        \/\/ if this is a valid input\n        if(jQuery(this).is('.mktoValid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldInvalid').addClass('fieldValid');\n            \/\/ replace instructions\n                    if(jQuery(this)[0].hasAttribute('title') == false) {\n                jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('');   \n            }\n            else {\n            jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html(jQuery(this).attr('title'));\n            }\n        }\n        \/\/ if this is an invalid input\n        else if(jQuery(this).is('.mktoInvalid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldValid').addClass('fieldInvalid');\n            \/\/ determine which key(s) \n            var code = e.keyCode || e.which;\n            \/\/ if this is 'tab' or 'shift + tab'\n            if (code == '9' || '16') {\n                \/\/ do nothing\n            }\n            \/\/ else this is not the tab or shift + tab key(s)\n            else{}\n        }\n        \/\/ else this is not a valid nor invalid input\n        else {}\n\n    });\n\n    \/\/ when a select field is changed, validate it\n    jQuery(document).on('change', 'select', function(e){\n        jQuery(this).blur().focus();    \n\n        \/\/ if this is a valid input\n        if(jQuery(this).is('.mktoValid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldInvalid').addClass('fieldValid');\n            \/\/ replace instructions\n            if(jQuery(this)[0].hasAttribute('title') == false) {\n                jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('');   \n            }\n            else {\n                jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html(jQuery(this).attr('title'));\n            }\n        }\n        \/\/ if this is an invalid input\n        else if(jQuery(this).is('.mktoInvalid')){\n            jQuery(this).parent('.mktoFieldWrap').removeClass('fieldValid').addClass('fieldInvalid');\n        }\n        \/\/ else this is not a valid nor invalid input\n        else {}\n    });\n\n    form.onValidate(function() {\n     jQuery('form.mktoForm').addClass('validated');\n     jQuery('.mktoInvalid').each(function(){\n        jQuery(this).parents('.mktoFieldWrap').addClass('fieldInvalid');   \n        if(jQuery(this).is('.mktoTelField')) {\n            jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('<span style=\"color:#c03d33; font-size: 9px; line-height: 1.2em; background-color: #F7F7FA;\">Phone number is required in numerical values only.<\/span>');\n        }\n        else if(jQuery(this).is('.mktoEmailField')) {\n            jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('<span style=\"color:#c03d33; font-size: 9px; line-height: 1.2em; background-color: #F7F7FA;\">Email address is required in this format: yourname@email.com.<\/span>');\n        }\n        else{ \n            jQuery(this).parents('.mktoFieldWrap').children('.mktoInstruction').html('<span style=\"color:#c03d33; font-size: 9px; line-height: 1.2em; background-color: #F7F7FA;\">This field is required.<\/span>'); \n        }\n     });\n    });\n});\n    <\/script>\n    <script src=\"https:\/\/www.google.com\/recaptcha\/api.js\" async defer><\/script>\n    <script src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/js-sha256\/0.9.0\/sha256.min.js\"><\/script>\n    <div class=\"ty_message\" style=\"display:none\"><strong>Grazie per il tuo interesse!<\/strong><br \/>\nTi contatteremo a breve in merito al tuo interesse per CyberArk.<\/div>\n    [\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1602702717594{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Kubora_1920x520.jpg?id=103748) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-hero cyb-desktop&#8221;][vc_column el_class=&#8221;cyb-center&#8221;][vc_column_text css=&#8221;.vc_custom_1606325163419{margin-top: 5.3125rem !important;margin-bottom: 20px !important;}&#8221;] CYBERARK CLOUD ENTITLEMENTS MANAGER Eliminazione delle autorizzazioni eccessive tramite IA. [\/vc_column_text][vc_btn title=&#8221;SCARICA L&#8217;EBOOK&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221;&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":42105,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-104421","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Least Privilege Across Cloud - Entitlement Management | CyberArk<\/title>\n<meta name=\"description\" content=\"Establish least privilege in the cloud with CyberArk Cloud Entitlements Manager. Detect and remove excessive cloud permissions from a centralized dashboard.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/it\/products\/cyberark-cloud-entitlements-manager\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CyberArk Cloud Entitlements Manager\" \/>\n<meta property=\"og:description\" content=\"Establish least privilege in the cloud with CyberArk Cloud Entitlements Manager. Detect and remove excessive cloud permissions from a centralized dashboard.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/it\/products\/cyberark-cloud-entitlements-manager\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-23T22:25:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/it\/products\/cyberark-cloud-entitlements-manager\/\",\"url\":\"https:\/\/www.cyberark.com\/it\/products\/cyberark-cloud-entitlements-manager\/\",\"name\":\"Least Privilege Across Cloud - Entitlement Management | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/products\/cyberark-cloud-entitlements-manager\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/products\/cyberark-cloud-entitlements-manager\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520.png\",\"datePublished\":\"2020-11-04T21:00:05+00:00\",\"dateModified\":\"2020-12-23T22:25:30+00:00\",\"description\":\"Establish least privilege in the cloud with CyberArk Cloud Entitlements Manager. Detect and remove excessive cloud permissions from a centralized dashboard.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/products\/cyberark-cloud-entitlements-manager\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/it\/products\/cyberark-cloud-entitlements-manager\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/it\/products\/cyberark-cloud-entitlements-manager\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520.png\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/it\/products\/cyberark-cloud-entitlements-manager\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prodotti\",\"item\":\"https:\/\/www.cyberark.com\/it\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"CyberArk Cloud Entitlements Manager\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/it\/#website\",\"url\":\"https:\/\/www.cyberark.com\/it\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/it\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Least Privilege Across Cloud - Entitlement Management | CyberArk","description":"Establish least privilege in the cloud with CyberArk Cloud Entitlements Manager. Detect and remove excessive cloud permissions from a centralized dashboard.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/it\/products\/cyberark-cloud-entitlements-manager\/","og_locale":"it_IT","og_type":"article","og_title":"CyberArk Cloud Entitlements Manager","og_description":"Establish least privilege in the cloud with CyberArk Cloud Entitlements Manager. Detect and remove excessive cloud permissions from a centralized dashboard.","og_url":"https:\/\/www.cyberark.com\/it\/products\/cyberark-cloud-entitlements-manager\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2020-12-23T22:25:30+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tempo di lettura stimato":"11 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/it\/products\/cyberark-cloud-entitlements-manager\/","url":"https:\/\/www.cyberark.com\/it\/products\/cyberark-cloud-entitlements-manager\/","name":"Least Privilege Across Cloud - Entitlement Management | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/it\/products\/cyberark-cloud-entitlements-manager\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/it\/products\/cyberark-cloud-entitlements-manager\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520.png","datePublished":"2020-11-04T21:00:05+00:00","dateModified":"2020-12-23T22:25:30+00:00","description":"Establish least privilege in the cloud with CyberArk Cloud Entitlements Manager. Detect and remove excessive cloud permissions from a centralized dashboard.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/it\/products\/cyberark-cloud-entitlements-manager\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/it\/products\/cyberark-cloud-entitlements-manager\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/it\/products\/cyberark-cloud-entitlements-manager\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520.png","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/10\/Cloud_Entitlements_bnr_640x520.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/it\/products\/cyberark-cloud-entitlements-manager\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/it\/"},{"@type":"ListItem","position":2,"name":"Prodotti","item":"https:\/\/www.cyberark.com\/it\/products\/"},{"@type":"ListItem","position":3,"name":"CyberArk Cloud Entitlements Manager"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/it\/#website","url":"https:\/\/www.cyberark.com\/it\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/it\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/104421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/comments?post=104421"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/104421\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/42105"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/media?parent=104421"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/product_category?post=104421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}