{"id":115268,"date":"2021-02-03T16:05:43","date_gmt":"2021-02-03T21:05:43","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/"},"modified":"2025-02-14T12:44:06","modified_gmt":"2025-02-14T17:44:06","slug":"vendor-privileged-access-manager","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/it\/products\/vendor-privileged-access-manager\/","title":{"rendered":"Vendor Privileged Access Manager"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row el_class=&#8221;cybv2 int-hero&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text el_class=&#8221;cyb-breadcrumb&#8221;]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/it\/products\/privileged-access\/\"> Torna a Privileged Access<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>Vendor Privileged Access Manager<\/h1>\n<h2>Proteggi l&#8217;accesso di terzi alle risorse critiche interne con funzionalit\u00e0 complete di isolamento, monitoraggio e audit delle sessioni, senza bisogno di VPN, password o agenti.<\/h2>\n<p>[\/vc_column_text][vc_btn title=&#8221;Ottieni una prova gratuita&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Ftry-buy%2Fvendor-privileged-access-manager%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/try-buy\/vendor-privileged-access-manager-demo\/\" target=\"_blank\" rel=\"noopener noreferrer\">Richiedi una demo<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-2&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-110200\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg\" alt=\"Gestione degli accessi privilegiati di terze parti\" width=\"770\" height=\"550\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1-300x214.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1-768x549.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1-150x107.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 cybv2_sticky_nav&#8221; css=&#8221;.vc_custom_1614201964540{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][vc_column_text el_class=&#8221;sticky-nav-title&#8221;]<\/p>\n<h3><i class=\"fas fa-long-arrow-alt-up\"><\/i>Vendor Privileged Access Manager<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_raw_html el_class=&#8221;sticky-nav-buttons&#8221;]PCEtLSBBZGQgbGkgZm9yIHNlY3Rpb24gZGF0YS1zY3JvbGwtY2xhc3MgaXMgd2hlcmUgeW91IHB1dCB0aGUgc2VjdGlvbiBjbGFzcyB5b3Ugd2FudCB0byBzY3JvbGwgdG8gLS0+DQo8dWw+DQogCTxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTEiPlZhbnRhZ2dpPC9saT4NCiAJPGxpIGRhdGEtc2Nyb2xsLWNsYXNzPSJzdWItMiI+RnVuemlvbmFsaXTDoDwvbGk+DQogCTxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTMiPkNvbWUgZnVuemlvbmE8L2xpPg0KIAk8bGkgZGF0YS1zY3JvbGwtY2xhc3M9InN1Yi00Ij5SaXNvcnNlPC9saT4NCjwvdWw+[\/vc_raw_html][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_btn title=&#8221;Inizia una prova gratuita&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Ftry-buy%2Fvendor-privileged-access-manager%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;subnav-dropdown&#8221;][vc_column_text el_class=&#8221;sticky-nav-title&#8221;]<\/p>\n<h5 style=\"text-align: right;\">Vai a<i class=\"fas fa-chevron-circle-down\"><\/i><\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top overview-vt sub-1&#8243; css=&#8221;.vc_custom_1616764259942{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;head-box&#8221;][vc_column_text]<\/p>\n<h3>Connetti I vendor, blocca le minacce<\/h3>\n<p>Garantisci un accesso privilegiato sicuro e facile per i vendor esterni.[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Enable-Digital-Business.svg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-119142\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Enable-Digital-Business-correct.svg\" alt=\"Enable Digital Business icon\" \/><\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Abilita l&#8217;attivit\u00e0 digitale<\/h4>\n<p>Senza password e senza VPN, per un accesso rapido e sicuro ai vendor tramite l&#8217;MFA biometrica.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks2.svg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-118884\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks2.svg\" alt=\"Defend Against Attacks Icon\" \/><\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Difenditi dagli attacchi<\/h4>\n<p>Proteggi gli accessi privilegiati dei vendor con sessioni monitorate e isolate automaticamente.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-118726\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Enhance-Operational-Efficiencies.svg\" alt=\"Migliora l\u2019efficienza operativa\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Migliora l\u2019efficienza operativa<\/h4>\n<p>Provisioning dell&#8217;accesso just-in-time per il vendor senza aggiungere le sue identit\u00e0 in AD.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2-pad cybv2-oval-left-background hv-cta-stats&#8221; css=&#8221;.vc_custom_1611886714437{background-color: #ff7600 !important;}&#8221;][vc_column el_class=&#8221;text-md-center head-box&#8221;][vc_column_text]<\/p>\n<h3>Proteggi l&#8217;accesso dei vendor<\/h3>\n<h5>Garantisci un accesso granulare ai vendor senza complessit\u00e0 o grattacapi.<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;img-box&#8221; css=&#8221;.vc_custom_1612236218569{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-Benefits-Stats-770&#215;550-1.jpg?id=110232) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;stat-column&#8221;][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]Semplifica l&#8217;accesso al provisioning per i vendor esterni[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]Ottimizza la sicurezza, senza VPN, agenti o password[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]Applica con facilit\u00e0 l&#8217;approccio PAM in modalit\u00e0 SaaS[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;stat-row&#8221;][vc_column_inner el_class=&#8221;stat&#8221; width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-10&#8243;][vc_column_text]<\/p>\n<h4>96%<\/h4>\n<p>delle organizzazioni si affida a vendor terzi per accedere a sistemi critici.*[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;stat&#8221; width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-0 vc_col-xs-offset-1 vc_col-xs-10&#8243;][vc_column_text]<\/p>\n<h4>70%<\/h4>\n<p>delle organizzazioni elenca il rischio derivante dall&#8217;accesso di terzi come uno dei 10 rischi principali.*[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2-pad-top cybv2 cybv2-background-oval tour sub-2&#8243;][vc_column][vc_row_inner el_class=&#8221;cyb-center&#8221;][vc_column_inner el_class=&#8221;cyb-pad-btm&#8221;][vc_column_text el_class=&#8221;left-mobile&#8221;]<\/p>\n<h3>Aperto per I vendor, chiuso alle cyber minacce<\/h3>\n<p>Connetti i partner alla tua azienda in modo intelligente.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=&#8221;square&#8221; active_section=&#8221;1&#8243; css_animation=&#8221;none&#8221;][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;Autenticazione multifattoriale biometrica&#8221; tab_id=&#8221;biometric&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Autenticazione multifattoriale biometrica<\/h4>\n<p>Verifica che i vendor esterni confermino la propria identit\u00e0 ogni volta che devono accedere a risorse critiche.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-110240\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-1.png\" alt=\"Autenticazione multifattoriale\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;Provisioning Just-in-Time&#8221; tab_id=&#8221;just-in-time&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Provisioning Just-in-Time<\/h4>\n<p>Esegui con facilit\u00e0 l&#8217;on-boarding e l&#8217;off-boarding dei vendor perch\u00e9 possano accedere facilmente a ci\u00f2 di cui hanno bisogno quando serve; include il supporto alla gestione autonoma degli inviti da parte dei vendor.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-110248\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-2.png\" alt=\"Provisioning Just-in-Time\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-2.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-2-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-2-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;Registra e monitora&#8221; tab_id=&#8221;record&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Registra e monitora<\/h4>\n<p>Ottieni una piena visibilit\u00e0 delle attivit\u00e0 dei vendor, con funzionalit\u00e0 complete di reportistica, audit e remediation.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-110256\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-3.png\" alt=\"Registra e monitora\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-3.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-3-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-Directory-VendorPrivilegeAccessManager-3-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Accesso offline&#8221; tab_id=&#8221;offline-access&#8221;][vc_row_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Accesso offline<\/h4>\n<p>Fornisci in modo sicuro le credenziali di accesso a terze parti autorizzate in ambienti air-gapped e altri ambienti offline. Registra l&#8217;utilizzo delle credenziali per le audit e la conformit\u00e0.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-127611\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/vendor-pam-tour.png\" alt=\"offline access tour\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/vendor-pam-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/vendor-pam-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/vendor-pam-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/vendor-pam-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad info-graphic sub-3&#8243;][vc_column width=&#8221;2\/3&#8243; offset=&#8221;vc_col-sm-offset-2&#8243;][vc_column_text el_class=&#8221;text-md-center head-box&#8221;]<\/p>\n<h3>Accesso privilegiato zero trust da parte di terzi<\/h3>\n<p>Offri ai vendor esterni l&#8217;accesso privilegiato crittografato, rapido, facile ed end-to-end ai sistemi interni critici.[\/vc_column_text][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-119171\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/PAM_EV_v3-4.svg\" alt=\"Vendor Privileged Access Manager\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1650997476933{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column]<div class=\"templatera_shortcode\"><div data-vc-full-width=\"true\" data-vc-full-width-temp=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_full_width_resource\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_title\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h5 style=\"text-align: center;\">Identity security: Incentrato Sui<br \/>\ncontrolli dei Privilegi<\/h5>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section5_container\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_center   new_hpstyle_section5_gart_img\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1.jpg\" class=\"vc_single_image-img attachment-full\" alt=\"Professional woman with glasses standing confidently against a dark background with a glowing triangular frame\" title=\"gartner-300x300\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1-100x100.jpg 100w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>CyberArk \u00e8 stato nominato leader nel Magic Quadrant\u2122 di Gartner<sup>\u00ae<\/sup> per il PAM.<\/h4>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_btn3-container  cybv2-button-solid cyb-button-hpstyle_section5 vc_btn3-inline\"  >\n\t<a class=\"vc_btn3-color-grey\" href=\"https:\/\/lp.cyberark.com\/gartner-mq-pam-2024-it\" title=\"\" target=\"_blank\">Leggi il report<\/a><\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/a><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/div>[\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2_customer_stories vc_tta-o-non-responsive&#8221; css=&#8221;.vc_custom_1608676874239{background-color: #ffffff !important;}&#8221;][vc_column][vc_raw_js]%3Clink%20rel%3D%22stylesheet%22%20type%3D%22text%2Fcss%22%20href%3D%22%2F%2Fcdn.jsdelivr.net%2Fnpm%2Fslick-carousel%401.8.1%2Fslick%2Fslick.css%22%2F%3E%0A%3Cscript%20type%3D%22text%2Fjavascript%22%20src%3D%22%2F%2Fcdn.jsdelivr.net%2Fnpm%2Fslick-carousel%401.8.1%2Fslick%2Fslick.min.js%22%3E%3C%2Fscript%3E%0A%3Cscript%3E%0AjQuery%28document%29.ready%28function%28%29%7B%0A%20%20%20%20%2F%2FAdd%20Active%20to%20tab%20on%20page%20load%0A%20%20%20%20%24panels%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-panels%20.vc_tta-panel%27%29%3B%0A%20%20%20%20%24tabs%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%20%20%20%20var%20index%20%3D%200%3B%0A%0A%20%20%20%20%2F%2FAlign%20Tabs%20with%20panels%0A%20%20%20%20%24panels.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20jQuery%28this%29.hasClass%28%27vc_active%27%29%3B%0A%20%20%20%20%20%20%20%20return%20false%3B%0A%20%20%20%20%20%20%20%20index%2B%2B%3B%0A%20%20%20%20%7D%29%0A%20%20%20%20var%20newIndex%20%3D%200%3B%0A%20%20%20%20%24tabs.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20if%28index%20%3D%3D%20newIndex%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20jQuery%28this%29.addClass%28%27vc_active%27%29%3B%0A%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20%20%20newIndex%2B%2B%3B%0A%20%20%20%20%7D%29%0A%0A%20%20%20%20%2F%2FAdd%20custom%20icon%20to%20tabs%0A%20%20%20%20var%20iconIndex%20%3D%201%3B%0A%20%20%20%20%24panels.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20%24this%20%3D%20jQuery%28this%29%3B%0A%20%20%20%20%20%20%20%20%24tab%20%3D%20%24this.find%28%27.tab-icon%27%29%3B%0A%20%20%20%20%20%20%20%20%24tab.find%28%27img%27%29.prependTo%28jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tab%3Anth-of-type%28%27%20%2B%20iconIndex%20%2B%20%27%29%20a%27%29%29%3B%0A%20%20%20%20%20%20%20%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tab%3Anth-of-type%28%27%20%2B%20iconIndex%20%2B%20%27%29%20a%20i%27%29.remove%28%29%0A%20%20%20%20%20%20%20%20%24tab.remove%28%29%3B%0A%20%20%20%20%20%20%20%20iconIndex%2B%2B%3B%0A%20%20%20%20%7D%29%0A%7D%29%3B%0AjQuery%28window%29.on%28%27load%20resize%20orientationchange%27%2C%20function%28%29%20%7B%0A%20%20%20%20var%20%24carousel%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%27%29%3B%0A%20%20%20%20var%20%24click%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%0A%20%20%20%20%2F%2FChange%20slide%20to%20selected%20panel%20for%20tabs%0A%20%20%20%20var%20slideGoTo%20%3D%20function%28%29%7B%0A%20%20%20%20%20%20%20%20if%20%28%24carousel.hasClass%28%27slick-initialized%27%29%29%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24carousel.slick%28%27slickGoTo%27%2C%20%2BjQuery%28this%29.attr%28%27data-slick-index%27%29%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20setTimeout%28function%28%29%7B%20%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%24click%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%24click.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20if%28jQuery%28this%29.hasClass%28%27vc_active%27%29%20%26%26%20%28%21jQuery%28this%29.hasClass%28%27slick-center%27%29%20%7C%7C%20%21jQuery%28this%29.hasClass%28%27slick-active%27%29%29%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jQuery%28this%29.removeClass%28%27vc_active%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%7D%29%0A%20%20%20%20%20%20%20%20%20%20%20%20%7D%2C%201000%29%3B%0A%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%7D%0A%0A%20%20%20%20%2F%2FUpdate%20panel%20for%20selected%20slide%20%28aka%20tab%29%0A%20%20%20%20var%20afterChangeFunction%20%3D%20function%28slick%2C%20currentSlide%29%7B%0A%20%20%20%20%20%20%20%20%24currentTab%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab.slick-center.slick-active%20a%27%29%3B%0A%20%20%20%20%20%20%20%20if%28%21%24currentTab.parent%28%29.hasClass%28%27vc_active%27%29%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24currentTab.trigger%28%27click%27%29%3B%0A%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20%20%20%2F%2AsetTimeout%28function%28%29%7B%20%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20if%28jQuery%28this%29.hasClass%28%27vc_active%27%29%20%26%26%20%28%21jQuery%28this%29.hasClass%28%27slick-center%27%29%20%7C%7C%20%21jQuery%28this%29.hasClass%28%27slick-active%27%29%29%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jQuery%28this%29.removeClass%28%27vc_active%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20%20%20%20%20%20%20%7D%29%0A%20%20%20%20%20%20%20%20%7D%2C%201000%29%3B%2A%2F%0A%20%20%20%20%7D%0A%0A%20%20%20%20%2F%2A%20Initializes%20a%20slick%20carousel%20only%20on%20mobile%20screens%20%2A%2F%0A%20%20%20%20%2F%2F%20slick%20on%20mobile%0A%20%20%20%20if%20%28jQuery%28window%29.width%28%29%20%3E%20768%29%20%7B%0A%20%20%20%20%20%20%20%20if%20%28%24carousel.hasClass%28%27slick-initialized%27%29%29%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24carousel.slick%28%27unslick%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click.unbind%28%27click%27%2C%20slideGoTo%29%0A%20%20%20%20%20%20%20%20%20%20%20%20%24carousel.unbind%28%27afterChange%27%2C%20afterChangeFunction%29%3B%0A%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%7D%0A%20%20%20%20else%7B%0A%20%20%20%20%20%20%20%20if%20%28%21%24carousel.hasClass%28%27slick-initialized%27%29%29%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24carousel.slick%28%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20slidesToShow%3A%203%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20slidesToScroll%3A%201%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mobileFirst%3A%20true%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20infinite%3A%20true%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20centerMode%3A%20true%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20centerPadding%3A%20%2750px%27%0A%20%20%20%20%20%20%20%20%20%20%20%20%7D%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click.bind%28%27click%27%2C%20slideGoTo%29%0A%20%20%20%20%20%20%20%20%20%20%20%20%24carousel.bind%28%27afterChange%27%2C%20afterChangeFunction%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20if%28jQuery%28this%29.hasClass%28%27vc_active%27%29%20%26%26%20%21jQuery%28this%29.hasClass%28%27slick-cloned%27%29%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jQuery%28this%29.trigger%28%27click%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20%20%20%20%20%20%20%7D%29%0A%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%7D%0A%7D%29%3B%0A%3C%2Fscript%3E[\/vc_raw_js][vc_tta_tabs style=&#8221;flat&#8221; shape=&#8221;square&#8221; color=&#8221;white&#8221; spacing=&#8221;&#8221; gap=&#8221;20&#8243; alignment=&#8221;center&#8221; active_section=&#8221;&#8221; el_class=&#8221;cybv2_customer_stories_tabs&#8221; css=&#8221;.vc_custom_1608676900675{background-color: #ffffff !important;}&#8221;][vc_tta_section i_icon_fontawesome=&#8221;fas fa-piggy-bank&#8221; add_icon=&#8221;true&#8221; title=&#8221;Clienti&#8221; tab_id=&#8221;1607742493330-265de97c-f2d9eb66-6bf8a95e-9371&#8243; el_class=&#8221;new_hpstyle_section6_tab1_icon vc_active&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;135854&#8243; img_size=&#8221;590&#215;500&#8243; alignment=&#8221;right&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;127960&#8243; img_size=&#8221;full&#8221; el_class=&#8221;tab-icon&#8221;][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]&#8221;Il portale di accesso dei fornitori ci ha molto colpito, cos\u00ec come l&#8217;integrazione con il nostro ambiente &#8211; che non crediamo di poter ottenere da altri &#8211; e il fatto che la soluzione fosse complessivamente molto intuitiva e facile da usare&#8221;.[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]<strong>Brent Wallace,<\/strong> IT Director, Contea di Norfolk[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/norfolk-county-meets-strict-insurance-guidelines-and-improves-third-party-access-management\/\">Leggi il Case Study<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=&#8221;fas fa-satellite-dish&#8221; add_icon=&#8221;true&#8221; title=&#8221;Telco&#8221; tab_id=&#8221;1607742494008-8c0fb98b-2b6beb66-6bf8a95e-9371&#8243; el_class=&#8221;new_hpstyle_section6_tab2_icon&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607653503563{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;108213&#8243; img_size=&#8221;590&#215;500&#8243; alignment=&#8221;right&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;108255&#8243; img_size=&#8221;full&#8221; el_class=&#8221;tab-icon&#8221;][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]\u201cCon CyberArk abbiamo la certezza di aver implementato una tecnologia che lavorer\u00e0 con noi, man mano che la nostra azienda crescer\u00e0 e si svilupper\u00e0.&#8221;[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]<strong>Jean-Pierre Blanc,<\/strong> Bouygues Telecom[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/case-studies\/bouygues-telecom-secures-critical-business-systems-and-maintains-high-levels-of-customer-service-with-cyberark-solutions\">Leggi il Case Study<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=&#8221;fas fa-piggy-bank&#8221; add_icon=&#8221;true&#8221; title=&#8221;Finanziario&#8221; tab_id=&#8221;1607742494616-60a6dced-32cfeb66-6bf8a95e-9371&#8243; el_class=&#8221;new_hpstyle_section6_tab3_icon&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607653481888{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;108222&#8243; img_size=&#8221;590&#215;500&#8243; alignment=&#8221;right&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;108247&#8243; img_size=&#8221;full&#8221; el_class=&#8221;tab-icon&#8221;][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]\u201cNon si tratta di una mero esercizio di verifica della conformit\u00e0: stiamo anche progettando e allineando attivamente i criteri alle best practice di cybersecurity, per rafforzare il nostro profilo generale di sicurezza e allineare i team interni.&#8221;[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]<strong>Joel Harris,<\/strong> Manager[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/case-studies\/national-australia-bank-implements-pam-across-multiple-operation-areas\">Leggi il Case Study<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=&#8221;fas fa-industry&#8221; add_icon=&#8221;true&#8221; title=&#8221;Produzione&#8221; tab_id=&#8221;1607742495229-255d985e-6d0ceb66-6bf8a95e-9371&#8243; el_class=&#8221;new_hpstyle_section6_tab4_icon&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607653496575{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;110300&#8243; img_size=&#8221;590&#215;500&#8243; alignment=&#8221;right&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;108271&#8243; img_size=&#8221;full&#8221; el_class=&#8221;tab-icon&#8221;][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]\u201cCyberArk ci ha dato la visibilit\u00e0 e il controllo granulare di cui avevamo bisogno per implementare sia il principio del privilegio minimo che il controllo delle applicazioni con \u2018diniego predefinito&#8217;, riducendo al minimo le interruzioni per l&#8217;organizzazione.&#8221;[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]<strong>Ken Brown,<\/strong> CISO[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/case-studies\/milliken-company-enhances-security-protocol-through-least-privilege-with-default-deny-application-control-to-protect-global-end-users\">Leggi il Case Study<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=&#8221;fas fa-university&#8221; add_icon=&#8221;true&#8221; title=&#8221;Assicurazioni&#8221; tab_id=&#8221;1607742495902-f2d9a00d-8e74eb66-6bf8a95e-9371&#8243; el_class=&#8221;new_hpstyle_section6_tab5_icon&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607653492933{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;108238&#8243; img_size=&#8221;590&#215;500&#8243; alignment=&#8221;right&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;108263&#8243; img_size=&#8221;full&#8221; el_class=&#8221;tab-icon&#8221;][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]\u201cCon le migrazioni RPA e Cloud, le credenziali si stanno diffondendo sempre pi\u00f9 e sono sempre meno gestibili tramite controlli \u2018 normali\u2019. CyberArk pu\u00f2 diffondersi per coprire tutti gli scenari come standard.&#8221;[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]<strong>Consulente per la sicurezza delle informazioni,<\/strong> Enterprise Cybersecurity Solutions Technologies[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/customer-stories\">Leggi altri racconti dei clienti<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=&#8221;fas fa-school&#8221; add_icon=&#8221;true&#8221; title=&#8221;Education&#8221; tab_id=&#8221;education&#8221; el_class=&#8221;new_hpstyle_section6_tab5_icon&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607653492933{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;183627&#8243; img_size=&#8221;590&#215;500&#8243; alignment=&#8221;right&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;183681&#8243; img_size=&#8221;full&#8221; el_class=&#8221;tab-icon&#8221;][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]\u201cNow we are starting to use CyberArk Vendor Privileged Access Manager to secure and streamline vendor access. It is a beautiful thing because now vendors enjoy a password-less and VPN-less experience to access their target systems, they authenticate in a seamless way and only have access to their product. We can also control and limit their access to certain hours, and we can rotate passwords as soon as they log off.\u201d[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]<strong>John Vincent, Director of Technology<\/strong>, Chico Unified School District[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/chico-unified-school-district\/\">Read the Case Study<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column]<div class=\"templatera_shortcode\"><div class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_customer_stories vc_tta-o-non-responsive vc_custom_1608676874239 vc_row-has-fill vc_row-o-equal-height vc_row-flex\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_js\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<link rel=\"stylesheet\" type=\"text\/css\" href=\"\/\/cdn.jsdelivr.net\/npm\/slick-carousel@1.8.1\/slick\/slick.css\"\/>\n<script type=\"text\/javascript\" src=\"\/\/cdn.jsdelivr.net\/npm\/slick-carousel@1.8.1\/slick\/slick.min.js\"><\/script>\n<script>\njQuery(document).ready(function(){\n    \/\/Add Active to tab on page load\n    $panels = jQuery('.cybv2_customer_stories_tabs .vc_tta-panels .vc_tta-panel');\n    $tabs = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-list .vc_tta-tab');\n    var index = 0;\n\n    \/\/Align Tabs with panels\n    $panels.each(function(){\n        jQuery(this).hasClass('vc_active');\n        return false;\n        index++;\n    })\n    var newIndex = 0;\n    $tabs.each(function(){\n        if(index == newIndex){\n            jQuery(this).addClass('vc_active');\n        }\n        newIndex++;\n    })\n\n    \/\/Add custom icon to tabs\n    var iconIndex = 1;\n    $panels.each(function(){\n        $this = jQuery(this);\n        $tab = $this.find('.tab-icon');\n        $tab.find('img').prependTo(jQuery('.cybv2_customer_stories_tabs .vc_tta-tab:nth-of-type(' + iconIndex + ') a'));\n        jQuery('.cybv2_customer_stories_tabs .vc_tta-tab:nth-of-type(' + iconIndex + ') a i').remove()\n        $tab.remove();\n        iconIndex++;\n    })\n});\njQuery(window).on('load resize orientationchange', function() {\n    var $carousel = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list');\n    var $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n\n    \/\/Change slide to selected panel for tabs\n    var slideGoTo = function(){\n        if ($carousel.hasClass('slick-initialized')) {\n            $carousel.slick('slickGoTo', +jQuery(this).attr('data-slick-index'));\n            setTimeout(function(){ \n                $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n                $click.each(function(){\n                    if(jQuery(this).hasClass('vc_active') && (!jQuery(this).hasClass('slick-center') || !jQuery(this).hasClass('slick-active'))){\n                        jQuery(this).removeClass('vc_active');\n                    }\n                })\n            }, 1000);\n        }\n    }\n\n    \/\/Update panel for selected slide (aka tab)\n    var afterChangeFunction = function(slick, currentSlide){\n        $currentTab = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab.slick-center.slick-active a');\n        if(!$currentTab.parent().hasClass('vc_active')){\n            $currentTab.trigger('click');\n        }\n        \/*setTimeout(function(){ \n            $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n            $click.each(function(){\n                if(jQuery(this).hasClass('vc_active') && (!jQuery(this).hasClass('slick-center') || !jQuery(this).hasClass('slick-active'))){\n                    jQuery(this).removeClass('vc_active');\n                }\n            })\n        }, 1000);*\/\n    }\n\n    \/* Initializes a slick carousel only on mobile screens *\/\n    \/\/ slick on mobile\n    if (jQuery(window).width() > 768) {\n        if ($carousel.hasClass('slick-initialized')) {\n            $carousel.slick('unslick');\n            $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n            $click.unbind('click', slideGoTo)\n            $carousel.unbind('afterChange', afterChangeFunction);\n        }\n    }\n    else{\n        if (!$carousel.hasClass('slick-initialized')) {\n            $carousel.slick({\n                slidesToShow: 3,\n                slidesToScroll: 1,\n                mobileFirst: true,\n                infinite: true,\n                centerMode: true,\n                centerPadding: '50px'\n            });\n            $click = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-container .vc_tta-tabs-list .vc_tta-tab');\n            $click.bind('click', slideGoTo)\n            $carousel.bind('afterChange', afterChangeFunction);\n            $click.each(function(){\n                if(jQuery(this).hasClass('vc_active') && !jQuery(this).hasClass('slick-cloned')){\n                    jQuery(this).trigger('click');\n                }\n            })\n        }\n    }\n});\n<\/script>\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_tta-container\" data-vc-action=\"collapse\"><div class=\"vc_general vc_tta vc_tta-tabs vc_tta-color-white vc_tta-style-flat vc_tta-shape-square vc_tta-o-shape-group vc_tta-gap-20  cybv2_customer_stories_tabs vc_tta-tabs-position-top vc_tta-controls-align-center vc_custom_1608676900675\"><div class=\"vc_tta-tabs-container\"><ul class=\"vc_tta-tabs-list\" role=\"tablist\"><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742493330-265de97c-f2d9eb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742493330-265de97c-f2d9eb66-6bf8\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Clienti<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742494008-8c0fb98b-2b6beb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742494008-8c0fb98b-2b6beb66-6bf8\"><i class=\"vc_tta-icon fas fa-satellite-dish\"><\/i><span class=\"vc_tta-title-text\">Telco<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742494616-60a6dced-32cfeb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742494616-60a6dced-32cfeb66-6bf8\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Finanziario<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742495229-255d985e-6d0ceb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742495229-255d985e-6d0ceb66-6bf8\"><i class=\"vc_tta-icon fas fa-industry\"><\/i><span class=\"vc_tta-title-text\">Produzione<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742495902-f2d9a00d-8e74eb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742495902-f2d9a00d-8e74eb66-6bf8\"><i class=\"vc_tta-icon fas fa-university\"><\/i><span class=\"vc_tta-title-text\">Assicurazioni<\/span><\/a><\/li><\/ul><\/div><div class=\"vc_tta-panels-container\"><div class=\"vc_tta-panels\"><div class=\"vc_tta-panel new_hpstyle_section6_tab1_icon vc_active\" id=\"1607742493330-265de97c-f2d9eb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742493330-265de97c-f2d9eb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Clienti<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653500231\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Finance-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Finance\" title=\"Finance-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/customers-icon.svg\" class=\"vc_single_image-img attachment-full\" alt=\"customer icon\" title=\"customers-icon\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\"CyberArk \u00e8 stato il miglior fornitore con cui ho lavorato nella mia carriera di oltre 20 anni nel settore IT. CyberArk offre prodotti eccellenti che guidano il settore per la gestione degli accessi privilegiati.\"<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Responsabile della sicurezza IT<\/strong>, Gestione della sicurezza e dei rischi<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/it\/customer-stories\/\">Leggi altri racconti dei clienti<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab2_icon\" id=\"1607742494008-8c0fb98b-2b6beb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742494008-8c0fb98b-2b6beb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-satellite-dish\"><\/i><span class=\"vc_tta-title-text\">Telco<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653503563\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Telecom-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Telecom\" title=\"Telecom-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Telecom-1.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"Telecom\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\"Con CyberArk abbiamo la certezza di aver implementato una tecnologia che lavorer\u00e0 con noi, man mano che la nostra azienda cresce e si sviluppa.\"<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Jean-Pierre Blanc<\/strong>, Bouygues Telecom<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/it\/customer-stories\/bouygues-telecom\/\">Leggi il Case Study<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab3_icon\" id=\"1607742494616-60a6dced-32cfeb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742494616-60a6dced-32cfeb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Finanziario<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653481888\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Finance-02-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Finance-02-590x500\" title=\"Finance-02-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Finance.svg\" class=\"vc_single_image-img attachment-full\" alt=\"Finance\" title=\"Finance\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\"Non si tratta di una mero esercizio di verifica della conformit\u00e0: stiamo anche progettando e allineando attivamente i criteri alle best practice di cybersecurity, per rafforzare il nostro profilo generale di sicurezza e allineare i team interni.\"<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Joel Harris<\/strong>, Manager<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/it\/customer-stories\/national-australia-bank\/\">Leggi il Case Study<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab4_icon\" id=\"1607742495229-255d985e-6d0ceb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742495229-255d985e-6d0ceb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-industry\"><\/i><span class=\"vc_tta-title-text\">Produzione<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653496575\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Customer-Identities-770x550-1-590x500.jpg\" width=\"590\" height=\"500\" alt=\"Customer-Identities----770x550\" title=\"Customer-Identities----770x550\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Manufactoring.svg\" class=\"vc_single_image-img attachment-full\" alt=\"Manufacturing\" title=\"Manufactoring\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\"CyberArk ci ha dato la visibilit\u00e0 e il controllo granulare di cui avevamo bisogno per implementare sia il principio del privilegio minimo che il controllo delle applicazioni con \u2018diniego predefinito', riducendo al minimo le interruzioni per l'organizzazione.\"<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Ken Brown<\/strong>, CISO<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/it\/customer-stories\/milliken\/\">Leggi il Case Study<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab5_icon\" id=\"1607742495902-f2d9a00d-8e74eb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742495902-f2d9a00d-8e74eb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-university\"><\/i><span class=\"vc_tta-title-text\">Assicurazioni<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653492933\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Insurance-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Insurance-590x500\" title=\"Insurance-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Insurance-1.svg\" class=\"vc_single_image-img attachment-full\" alt=\"insurance\" title=\"Insurance\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\"Con le migrazioni RPA e Cloud, le credenziali si stanno diffondendo sempre pi\u00f9 e sono sempre meno gestibili tramite controlli \u2018 normali\u2019. CyberArk pu\u00f2 diffondersi per coprire tutti gli scenari come standard.\"<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Consulente per la sicurezza delle informazioni<\/strong>, Enterprise Cybersecurity Solutions Technologies<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.cyberark.com\/it\/customer-stories\/\">Leggi altri racconti dei clienti<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/a><\/div><\/div><\/div><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources sub-4&#8243; css=&#8221;.vc_custom_1616764361087{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8221;][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;no-break&#8221;][vc_column_text el_class=&#8221;no-break&#8221;]<\/p>\n<h3>Esplora<br \/>\nle risorse<br \/>\ncorrelate<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/vendor-privileged-access-manager\">Visualizza tutte le risorse<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources_uberflip&#8221;][vc_column el_class=&#8221;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8221;.vc_custom_1611331958175{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;new_hpstyle_section8_uberflip&#8221;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1617028647965{background-color: #f7f7f7 !important;}&#8221; el_class=&#8221;cybv2 cybv2-pad-top hv-cta&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;left-clmn&#8221;][vc_column_text]<\/p>\n<h2>Ottieni una prova di 30 giorni<\/h2>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]Proteggi l&#8217;accesso per i vendor esterni[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]Implementa una soluzione senza agenti n\u00e9 VPN o password[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]Mantieni i partner produttivi e tieni alla larga gli attaccanti[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]Controlla e gestisci le sessioni in modo semplice[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_single_image image=&#8221;108760&#8243; img_size=&#8221;full&#8221; el_class=&#8221;d-none d-md-block&#8221;][\/vc_column][vc_column width=&#8221;1\/12&#8243; css=&#8221;.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;right-clmn cybv2-form&#8221;][vc_column_text el_class=&#8221;bold&#8221;]<\/p>\n<h4>Iscriviti ora<\/h4>\n<p>[\/vc_column_text][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iODUxMiIgdHlfcGFnZV91cmw9Imh0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS9pdC90cnktYnV5L3RoYW5rLXlvdS12ZW5kb3ItcHJpdmlsZWdlZC1hY2Nlc3MtbWFuYWdlci8iXQ==[\/vc_raw_html][vc_column_text el_class=&#8221;more-tiny form-notice&#8221;]<strong>Nota per gli attuali clienti<\/strong> CyberArk offre ai clienti CorePAS e\/o EPV\/PSM versioni legacy v10.3 e superiori l\u2019implementazione e l\u2019utilizzo di Alero per 30 giorni*, per gestire fino a 100 utenti di vendor terzi. CyberArk \u00e8 consapevole della situazione che tu e la tua azienda state attualmente vivendo e si impegna per mantenere protetti i suoi clienti in qualsiasi modo possibile.<\/p>\n<p><strong>*Termini e condizioni<\/strong> L\u2019abbonamento gratuito a CyberArk Vendor Privileged Access Manager \u00e8 disponibile solo per i clienti CyberArk CorePAS e\/o EPV\/PSM versioni legacy che soddisfino i requisiti di\u202fsistema per l\u2019esecuzione di Vendor Privileged Access Manager, ed esclusivamente a discrezione di CyberArk.<\/p>\n<p>Le tempistiche di implementazione di Vendor Privileged Access Manager \u00e8 soggetta alla disponibilit\u00e0 di servizi professionali e partner CyberArk competenti.[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cyb-pad cybv2&#8243;][vc_column][vc_column_text el_class=&#8221;tiny&#8221;]*FONTE: <a href=\"https:\/\/www.cyberark.com\/resources\/ebooks\/third-party-privileged-access-to-critical-systems-ebook\">CyberArk, &#8220;Accesso Privilegiato delle Terze Parti ai Sistemi Critici&#8221; 2020<\/a>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;tiny&#8221;]CyberArk Has Patent Rights Relating To This Technology &#8211; <a href=\"https:\/\/www.cyberark.com\/it\/patents\/\">https:\/\/www.cyberark.com\/patents<\/a>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":198,"featured_media":0,"parent":42105,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27777],"class_list":["post-115268","page","type-page","status-publish","hentry","product_category-privilege"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Vendor Access - Gestione degli accessi privilegiati di terze parti | CyberArk<\/title>\n<meta name=\"description\" content=\"Garantisci l&#039;accesso come vendor ai fornitori terzi di fiducia senza la necessit\u00e0 di VPN, agenti o password con CyberArk Vendor Privileged Access Manager.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vendor Privileged Access Manager\" \/>\n<meta property=\"og:description\" content=\"Garantisci l&#039;accesso come vendor ai fornitori terzi di fiducia senza la necessit\u00e0 di VPN, agenti o password con CyberArk Vendor Privileged Access Manager.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-14T17:44:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/\",\"url\":\"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/\",\"name\":\"Vendor Access - Gestione degli accessi privilegiati di terze parti | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg\",\"datePublished\":\"2021-02-03T21:05:43+00:00\",\"dateModified\":\"2025-02-14T17:44:06+00:00\",\"description\":\"Garantisci l'accesso come vendor ai fornitori terzi di fiducia senza la necessit\u00e0 di VPN, agenti o password con CyberArk Vendor Privileged Access Manager.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prodotti\",\"item\":\"https:\/\/www.cyberark.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Vendor Privileged Access Manager\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Vendor Access - Gestione degli accessi privilegiati di terze parti | CyberArk","description":"Garantisci l'accesso come vendor ai fornitori terzi di fiducia senza la necessit\u00e0 di VPN, agenti o password con CyberArk Vendor Privileged Access Manager.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/","og_locale":"it_IT","og_type":"article","og_title":"Vendor Privileged Access Manager","og_description":"Garantisci l'accesso come vendor ai fornitori terzi di fiducia senza la necessit\u00e0 di VPN, agenti o password con CyberArk Vendor Privileged Access Manager.","og_url":"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-02-14T17:44:06+00:00","og_image":[{"width":770,"height":550,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tempo di lettura stimato":"7 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/","url":"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/","name":"Vendor Access - Gestione degli accessi privilegiati di terze parti | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg","datePublished":"2021-02-03T21:05:43+00:00","dateModified":"2025-02-14T17:44:06+00:00","description":"Garantisci l'accesso come vendor ai fornitori terzi di fiducia senza la necessit\u00e0 di VPN, agenti o password con CyberArk Vendor Privileged Access Manager.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Vendor-Privilege-Access-Manager-770x550-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/products\/vendor-privileged-access-manager\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Prodotti","item":"https:\/\/www.cyberark.com\/products\/"},{"@type":"ListItem","position":3,"name":"Vendor Privileged Access Manager"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/115268","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/users\/198"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/comments?post=115268"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/115268\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/42105"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/media?parent=115268"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/product_category?post=115268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}