{"id":115277,"date":"2021-02-03T16:03:39","date_gmt":"2021-02-03T21:03:39","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/"},"modified":"2025-11-03T01:13:44","modified_gmt":"2025-11-03T06:13:44","slug":"privileged-access-manager","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/it\/products\/privileged-access-manager\/","title":{"rendered":"Privileged Access Manager"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text el_class=&#8221;cyb-breadcrumb&#8221;]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/it\/products\/privileged-access\/\"> Torna a Privileged Access<\/a>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h1>Privileged Access Manager<\/h1>\n<p><\/p>\n<h2>Modernizza il tuo programma PAM e assicurati una difesa in profondit\u00e0 in tutti i tuoi ambienti IT, sia ibridi che multi-cloud. Scopri nuovi processi, policy e controlli per ridurre al meglio i rischi degli accessi privilegiati.<\/h2>\n<p>\n[\/vc_column_text][vc_btn title=&#8221;Richiedi una demo&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; css=&#8221;&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Ftry-buy%2Fprivileged-access-manager-demo%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/lp.cyberark.com\/gartner-mq-pam-2025.html\">Gartner PAM Magic Quadrant<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-2&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_9rxkv5ry8y videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 cybv2_sticky_nav&#8221; css=&#8221;.vc_custom_1614201964540{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][vc_column_text el_class=&#8221;sticky-nav-title&#8221;]<\/p>\n<h3><i class=\"fas fa-long-arrow-alt-up\"><\/i>Privileged Access Manager<\/h3>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_raw_html el_class=&#8221;sticky-nav-buttons&#8221;]PCEtLSBBZGQgbGkgZm9yIHNlY3Rpb24gZGF0YS1zY3JvbGwtY2xhc3MgaXMgd2hlcmUgeW91IHB1dCB0aGUgc2VjdGlvbiBjbGFzcyB5b3Ugd2FudCB0byBzY3JvbGwgdG8gLS0+PGJyPjx1bD4NCjxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTEiPlZhbnRhZ2dpPC9saT4NCjxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTIiPkZ1bnppb25hbGl0w6A8L2xpPg0KPGxpIGRhdGEtc2Nyb2xsLWNsYXNzPSJzdWItMyI+Q29tZSBmdW56aW9uYTwvbGk+DQo8bGkgZGF0YS1zY3JvbGwtY2xhc3M9InN1Yi00Ij5SaXNvcnNlPC9saT4NCjwvdWw+[\/vc_raw_html][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_btn title=&#8221;Richiedi una demo&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Ftry-buy%2Fprivileged-access-manager-demo%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;subnav-dropdown&#8221;][vc_column_text el_class=&#8221;sticky-nav-title&#8221;]<\/p>\n<h5 style=\"text-align: right;\">Vai a<i class=\"fas fa-chevron-circle-down\"><\/i><\/h5>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top overview-vt sub-1&#8243; css=&#8221;.vc_custom_1616705395082{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;head-box&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Modernizza il tuo programma di gestione degli accessi privilegiati<\/h3>\n<p>Implementa la miglior soluzione PAM della categoria da un&#8217;unica piattaforma unificata.[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-118800\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg\" alt=\"Difenditi dagli attacchi\" \/><\/a>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>Riduzione misurabile dei rischi informatici<\/h4>\n<p>Gestisci in sicurezza gli accessi a rischio elevato nel tuo ambiente IT, con zero privilegi permanenti o credenziali vaulted in ambienti ibridi e multi-cloud.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Satisfy-Audit-and-Compliance-icon.svg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-118792\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Satisfy-Audit-and-Compliance-icon.svg\" alt=\"Icona Soddisfazione audit e compliance\" \/><\/a>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>Soddisfa audit e compliance<\/h4>\n<p>Dimostra a revisori, autorit\u00e0 di regolamentazione e cyber assicurazioni piena responsabilit\u00e0 e giustificazione di tutti gli accessi admin.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-118784\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Strong-Authentication.svg\" alt=\"Enable the Digital Business Icon\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>Abilitare efficienza operativa<\/h4>\n<p>Adozione scalabile e riduzione massimizzata dei rischi, con la modernizzazione del tuo programma PAM, e contenimento dei costi di infrastruttura e delle spese generali operative.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-118800\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg\" alt=\"Difenditi dagli attacchi\" \/><\/a>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>Proteggere la tua trasformazione digitale<\/h4>\n<p>Salvaguarda gli accessi privilegiati in modo centralizzato e nativo per i team IT e cloud operations.\u200b[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2-pad cybv2-oval-left-background hv-cta-stats sub-2&#8243; css=&#8221;.vc_custom_1623075128105{background-color: #ff7600 !important;}&#8221;][vc_column el_class=&#8221;text-md-center head-box&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Modernizza il tuo programma PAM per un mondo multi-cloud\u200b<\/h3>\n<p><\/p>\n<h5>Proteggi gli accessi ad alto rischio in azienda. Ovunque si trovino.<\/h5>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;img-box&#8221; css=&#8221;.vc_custom_1728385551415{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/PAM-program.jpg?id=198222) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;stat-column&#8221;][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]Tieni alla larga gli utenti non autorizzati[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]Rileva e blocca le minacce in tempo reale[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]Implementa con facilit\u00e0 una soluzione PAM as-a-Service o gestiscila nel tuo ambiente[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;stat-row&#8221;][vc_column_inner el_class=&#8221;stat&#8221; width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-10&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>Il 63%<\/h4>\n<p>delle aziende dichiara di non riuscire a proteggere adeguatamente gli accessi privilegiati ad alto rischio.*[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;stat&#8221; width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-0 vc_col-xs-offset-1 vc_col-xs-10&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>Il 58%<\/h4>\n<p>prevede un incidente di sicurezza legato all&#8217;identit\u00e0 nell&#8217;ambito di un\u2019iniziativa di trasformazione digitale o di migrazione delle app legacy*<\/p>\n<p><em>*Report CyberArk Threat Landscape 2024.<\/em><br \/>\u200b[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2-pad cybv2 cybv2-background-oval tour sub-3&#8243;][vc_column][vc_row_inner el_class=&#8221;cyb-center&#8221;][vc_column_inner el_class=&#8221;cyb-pad-btm&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>La miglior soluzione di privileged access management, da un&#8217;unica piattaforma unificata.<\/h3>\n<p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=&#8221;square&#8221; active_section=&#8221;1&#8243; css_animation=&#8221;none&#8221;][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;Gestisci accessi e credenziali privilegiati&#8221; tab_id=&#8221;manage&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>Gestisci accessi e credenziali privilegiati\u200b<\/h4>\n<p>Individua automaticamente account, credenziali, ruoli IAM e secret con accessi privilegiati su endpoint e infrastrutture in ambienti on-premise, multi-cloud e OT\/ICS. Integra tutte le credenziali e gli account per una gestione sicura e basata su policy in un vault digitale a prova di manomissione. La rotazione automatica delle credenziali basata su policy incrementa la sicurezza ed elimina i processi manuali lunghi e soggetti a errori. \u200b[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&#8243;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-198159 size-full cyb-br\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/manage-privileged-access-and-credentials\u200b.jpg\" alt=\"Privileged Access Manager\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/manage-privileged-access-and-credentials\u200b.jpg 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/manage-privileged-access-and-credentials\u200b-300x203.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/manage-privileged-access-and-credentials\u200b-150x102.jpg 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;Accesso con zero privilegi permanenti&#8221; tab_id=&#8221;isolate&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>Accesso con zero privilegi permanenti<\/h4>\n<p>Fornisci accesso a sistemi di lunga durata, workload elastici  cloud e servizi cloud nativi su base just-in-time, senza necessit\u00e0 di credenziali permanenti. Adotta in modo completo l\u2019approccio ZSP, creando autorizzazioni al volo e rimuovendole dopo l&#8217;uso, con un controllo granulare di durata, diritti e impostazioni di approvazione (TEA).[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-198168 size-full cyb-br\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/zero-standing-privileges.jpg \" alt=\"Zero privilegi permanenti\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/zero-standing-privileges.jpg 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/zero-standing-privileges-300x203.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/zero-standing-privileges-150x102.jpg 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;Isolare e monitorare le sessioni&#8221; tab_id=&#8221;threat&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>Isolare e monitorare le sessioni \u200b<\/h4>\n<p>Offrire sessioni privilegiate isolate e monitorate, senza sacrificare l&#8217;esperienza utente nativa. Applicare criteri coerenti di isolamento delle sessioni, sia a quelle vaulted che con zero privilegi permanenti. Monitorare a livello centrale tutti i comportamenti degli utenti per analisi forensi, audit e compliance.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-198177 size-full cyb-br\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/monitor-sessions-\u200b.jpg\" alt=\"monitorare le sessioni\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/monitor-sessions-\u200b.jpg 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/monitor-sessions-\u200b-300x203.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/monitor-sessions-\u200b-150x102.jpg 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;Rilevamento e risposta alle minacce&#8221; tab_id=&#8221;nomadic&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>Rilevamento e risposta alle minacce<\/h4>\n<p>Monitorare a livello centrale tutti i comportamenti degli utenti per analisi forensi, audit e compliance &#8211; da un unico punto di controllo. Analizzare le attivit\u00e0 degli utenti nella piattaforma CyberArk Identity Security, identificare le attivit\u00e0 di sessione rischiose e rispondere alle raccomandazioni.\u200b[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-198186 size-full cyb-br\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/threat-detection.jpg\" alt=\"rilevamento delle minacce\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/threat-detection.jpg 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/threat-detection-300x203.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/threat-detection-150x102.jpg 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-up&#8221; add_icon=&#8221;true&#8221; title=&#8221;Gestire i dispositivi non connessi&#8221; tab_id=&#8221;remote&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>Gestire i dispositivi non connessi\u200b<\/h4>\n<p>Rimuovere i diritti di local admin e applicare il privilegio minimo basato su policy e specifico per ruolo sugli endpoint.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-198195 size-full cyb-br\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/connected-devices\u200b.jpg\" alt=\"dispositivi connessi\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/connected-devices\u200b.jpg 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/connected-devices\u200b-300x203.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/connected-devices\u200b-150x102.jpg 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Accesso remoto e di terze parti a PAM&#8221; tab_id=&#8221;adaptive&#8221;][vc_row_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>Accesso remoto e di terze parti a PAM\u200b<\/h4>\n<p>Offrire accesso remoto sicuro a CyberArk PAM a dipendenti e terze parti con accesso just-in-time senza password, n\u00e9 VPN o agent. \u200b[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-198204 size-full cyb-br\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/third-party-access-to-PAM\u200b.jpg\" alt=\"accesso di terzi\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/third-party-access-to-PAM\u200b.jpg 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/third-party-access-to-PAM\u200b-300x203.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/third-party-access-to-PAM\u200b-150x102.jpg 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Gestione del ciclo di vita, certificazione degli accessi e autenticazione&#8221; tab_id=&#8221;certification&#8221;][vc_row_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>Gestione del ciclo di vita, certificazione degli accessi e autenticazione\u200b\u200b<\/h4>\n<p>Creare processi intelligenti e automatizzati per il provisioning degli accessi privilegiati.\u200bCertificare l&#8217;accesso alle risorse in modo automatico o su richiesta per gli auditor. Applicare un&#8217;autenticazione multi-fattore adattiva e robusta per convalidare tutti gli accessi degli utenti come parte di un framework zero trust e proteggere l&#8217;accesso alle risorse con Single Sign-On.\u200b[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-198213 size-full cyb-br\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Lifecycle-management.jpg\" alt=\"gestione del ciclo di vita\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Lifecycle-management.jpg 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Lifecycle-management-300x203.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Lifecycle-management-150x102.jpg 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1622729877519{background-color: #f7f7f7 !important;}&#8221; el_class=&#8221;cybv2 cybv2-pad-paragraph&#8221;][vc_column width=&#8221;5\/6&#8243; offset=&#8221;vc_col-lg-offset-2 vc_col-lg-8&#8243; el_class=&#8221;text-md-center&#8221;][vc_column_text el_class=&#8221;text-md-center&#8221;]<\/p>\n<h3>Modalit\u00e0 SaaS o Self-Hosted<\/h3>\n<p>Implementare ed estendere la gestione degli accessi privilegiati con fiducia. CyberArk Blueprint protegge con successo migliaia di ambienti dei clienti, in continua crescita.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 paragraph-cta-list&#8221; css=&#8221;.vc_custom_1622730232307{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;stat-column&#8221; css=&#8221;.vc_custom_1622733658584{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221; offset=&#8221;vc_col-sm-offset-0&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-118866\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/cloud.svg\" alt=\"Cloud\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>SaaS<\/h4>\n<p>Proteggi e gestisci facilmente account, credenziali e segreti con privilegi tramite la nostra soluzione PAM in modalit\u00e0 SaaS.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; offset=&#8221;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]Automatizza gli upgrade e le patch per ridurre il costo totale di propriet\u00e0[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; offset=&#8221;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]Servizi sicuri e conformi a SOC 2 Type 2, con uno SLA certificato al 99,95% per l&#8217;uptime.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; offset=&#8221;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]Guida rapida con CyberArk Jump Start[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; offset=&#8221;vc_col-sm-offset-0&#8243;][vc_btn title=&#8221;Per saperne di pi\u00f9&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fsolution-briefs%2Fjump-start-solution-brief|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;stat-column border-col&#8221;][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-118858\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/on-prem.svg\" alt=\"On-Premise \" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Self-Hosted<\/h4>\n<p>Proteggi, monitora e controlla gli accessi privilegiati con un&#8217;implementazione in loco.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; offset=&#8221;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]L&#8217;implementazione \u00e8 possibile nel tuo data center oppure sul cloud pubblico o privato, per soddisfare le esigenze di conformit\u00e0 normativa od organizzative[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; offset=&#8221;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]Migrazione sicura alla versione SaaS con il supporto dell&#8217;esperienza comprovata di CyberArk[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; offset=&#8221;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]Distribuzione multiregionale su misura[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2_customer_stories vc_tta-o-non-responsive mt-12&#8243; css=&#8221;.vc_custom_1714763180252{background-color: #ffffff !important;}&#8221;][vc_column][vc_tta_tabs style=&#8221;flat&#8221; shape=&#8221;square&#8221; color=&#8221;white&#8221; spacing=&#8221;&#8221; gap=&#8221;20&#8243; alignment=&#8221;center&#8221; active_section=&#8221;&#8221; el_class=&#8221;cybv2_customer_stories_tabs&#8221; css=&#8221;.vc_custom_1608676900675{background-color: #ffffff !important;}&#8221;][vc_tta_section i_icon_fontawesome=&#8221;fas fa-piggy-bank&#8221; add_icon=&#8221;true&#8221; title=&#8221;Finanziario&#8221; tab_id=&#8221;1714765172150-a555e50f-a6c725de-5f58&#8243; el_class=&#8221;new_hpstyle_section6_tab1_icon vc_active&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;108205&#8243; img_size=&#8221;590&#215;500&#8243; alignment=&#8221;right&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]&#8221;CyberArk \u00e8 il miglior vendor con cui abbia lavorato nel corso della mia carriera ventennale nel settore IT. CyberArk offre prodotti eccellenti che guidano il settore per la gestione degli accessi privilegiati.&#8221;[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]<strong>Responsabile della sicurezza IT,<\/strong> Gestione della sicurezza e dei rischi[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/it\/customer-stories\/\">Leggi altri racconti dei clienti<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=&#8221;fas fa-gavel&#8221; add_icon=&#8221;true&#8221; title=&#8221;Pubblica amministrazione&#8221; tab_id=&#8221;1607742493330-265de97c-f2d9eb66-6bf825de-5f58&#8243; el_class=&#8221;new_hpstyle_section6_tab2_icon&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;190453&#8243; img_size=&#8221;590X560&#8243; alignment=&#8221;right&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]&#8221;La piattaforma CyberArk Identity Security \u00e8 un ottimo strumento per garantire al nostro personale un accesso semplice e sicuro. Eliminare l&#8217;obbligo di creare e ricordare le password tramite l\u2019accesso in un solo clic ci consente di migliorare la produttivit\u00e0 e potenziare la nostra postura di sicurezza.&#8221;[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]<strong>John Vincent<\/strong>, Director of Technology, Chico Unified School District [\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/chico-unified-school-district\/\">Leggi il case study<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=&#8221;fas fa-satellite-dish&#8221; add_icon=&#8221;true&#8221; title=&#8221;Telco&#8221; tab_id=&#8221;1607742494008-8c0fb98b-2b6beb66-6bf825de-5f58&#8243; el_class=&#8221;new_hpstyle_section6_tab3_icon&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607653503563{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;108213&#8243; img_size=&#8221;590&#215;500&#8243; alignment=&#8221;right&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]\u201cCon CyberArk abbiamo la certezza di aver implementato una tecnologia che lavorer\u00e0 con noi, man mano che la nostra azienda crescer\u00e0 e si svilupper\u00e0.&#8221;[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]<strong>Jean-Pierre Blanc,<\/strong> Bouygues Telecom[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/bouygues-telecom\/\">Leggi il Case Study<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=&#8221;fas fa-industry&#8221; add_icon=&#8221;true&#8221; title=&#8221;Produzione&#8221; tab_id=&#8221;1607742495229-255d985e-6d0ceb66-6bf825de-5f58&#8243; el_class=&#8221;new_hpstyle_section6_tab5_icon&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607653496575{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;110300&#8243; img_size=&#8221;590&#215;500&#8243; alignment=&#8221;right&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]\u201cCyberArk ci ha dato la visibilit\u00e0 e il controllo granulare di cui avevamo bisogno per implementare sia il principio del privilegio minimo che il controllo delle applicazioni con \u2018diniego predefinito&#8217;, riducendo al minimo le interruzioni per l&#8217;organizzazione.&#8221;[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]<strong>Ken Brown,<\/strong> CISO[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/milliken\/\">Leggi il Case Study<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=&#8221;fas fa-university&#8221; add_icon=&#8221;true&#8221; title=&#8221;Assicurazioni&#8221; tab_id=&#8221;1607742495902-f2d9a00d-8e74eb66-6bf825de-5f58&#8243; el_class=&#8221;new_hpstyle_section6_tab6_icon&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607653492933{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;108238&#8243; img_size=&#8221;590&#215;500&#8243; alignment=&#8221;right&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]\u201cCon le migrazioni RPA e Cloud, le credenziali si stanno diffondendo sempre pi\u00f9 e sono sempre meno gestibili tramite controlli \u2018 normali\u2019. CyberArk pu\u00f2 diffondersi per coprire tutti gli scenari come standard.&#8221;[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]<strong>Consulente per la sicurezza delle informazioni,<\/strong> Enterprise Cybersecurity Solutions Technologies[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/it\/customer-stories\/\">Leggi altri racconti dei clienti<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources sub-4&#8243; css=&#8221;.vc_custom_1623075448667{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h3>Esplora le risorse correlate<\/h3>\n<p>\n[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/it\/resources\/\">Visualizza tutte le risorse<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column&#8221;][vc_column el_class=&#8221;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8221;.vc_custom_1698226957904{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;new_hpstyle_section8_uberflip&#8221;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1616705788368{background-color: #f7f7f7 !important;}&#8221; el_class=&#8221;cybv2 cybv2-pad-top hv-cta sub-5&#8243;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;left-clmn&#8221;][vc_column_text]<\/p>\n<h2>Richiedi una demo<\/h2>\n<p>\n[\/vc_column_text][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]Previeni l&#8217;esposizione delle credenziali, isola le risorse critiche[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]Monitora e controlla le sessioni per rilevare attivit\u00e0 sospette[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]Correggi automaticamente i comportamenti rischiosi[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]Gestisci e ruota le credenziali continuamente[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]Proteggi l&#8217;accesso remoto al PAM[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]Accesso sicuro e senza problemi alle risorse aziendali[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/12&#8243; css=&#8221;.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;right-clmn cybv2-form&#8221;][vc_column_text el_class=&#8221;bold&#8221;]<\/p>\n<h4>Registrati qui per una demo personalizzata<\/h4>\n<p>\n[\/vc_column_text][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iODIzMyIgdHlfcGFnZV91cmw9Imh0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS90cnktYnV5L3RoYW5rLXlvdS1wcml2aWxlZ2VkLWFjY2Vzcy1tYW5hZ2VyLyJd[\/vc_raw_html][\/vc_column][\/vc_row][vc_row el_class=&#8221;cyb-pad cybv2&#8243;][vc_column][vc_column_text css=&#8221;&#8221; el_class=&#8221;tiny&#8221;]CyberArk Has Patent Rights Relating To This Technology &#8211; <a href=\"https:\/\/www.cyberark.com\/it\/patents\/\">https:\/\/www.cyberark.com\/patents<\/a>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":198,"featured_media":0,"parent":42105,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27777],"class_list":["post-115277","page","type-page","status-publish","hentry","product_category-privilege"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Gestione degli accessi privilegiati (PAM - Privileged Access Management) | CyberArk<\/title>\n<meta name=\"description\" content=\"Applica la soluzione di gestione degli accessi privilegiati leader del settore per mantenere al sicuro gli asset della tua organizzazione, rilevare le minacce e bloccare gli attacchi in tempo reale.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privileged Access Manager\" \/>\n<meta property=\"og:description\" content=\"Applica la soluzione di gestione degli accessi privilegiati leader del settore per mantenere al sicuro gli asset della tua organizzazione, rilevare le minacce e bloccare gli attacchi in tempo reale.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-03T06:13:44+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/\",\"url\":\"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/\",\"name\":\"Gestione degli accessi privilegiati (PAM - Privileged Access Management) | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg\",\"datePublished\":\"2021-02-03T21:03:39+00:00\",\"dateModified\":\"2025-11-03T06:13:44+00:00\",\"description\":\"Applica la soluzione di gestione degli accessi privilegiati leader del settore per mantenere al sicuro gli asset della tua organizzazione, rilevare le minacce e bloccare gli attacchi in tempo reale.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prodotti\",\"item\":\"https:\/\/www.cyberark.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Privileged Access Manager\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Gestione degli accessi privilegiati (PAM - Privileged Access Management) | CyberArk","description":"Applica la soluzione di gestione degli accessi privilegiati leader del settore per mantenere al sicuro gli asset della tua organizzazione, rilevare le minacce e bloccare gli attacchi in tempo reale.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/","og_locale":"it_IT","og_type":"article","og_title":"Privileged Access Manager","og_description":"Applica la soluzione di gestione degli accessi privilegiati leader del settore per mantenere al sicuro gli asset della tua organizzazione, rilevare le minacce e bloccare gli attacchi in tempo reale.","og_url":"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-11-03T06:13:44+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tempo di lettura stimato":"11 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/","url":"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/","name":"Gestione degli accessi privilegiati (PAM - Privileged Access Management) | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg","datePublished":"2021-02-03T21:03:39+00:00","dateModified":"2025-11-03T06:13:44+00:00","description":"Applica la soluzione di gestione degli accessi privilegiati leader del settore per mantenere al sicuro gli asset della tua organizzazione, rilevare le minacce e bloccare gli attacchi in tempo reale.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/products\/privileged-access-manager\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Prodotti","item":"https:\/\/www.cyberark.com\/products\/"},{"@type":"ListItem","position":3,"name":"Privileged Access Manager"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/115277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/users\/198"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/comments?post=115277"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/115277\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/42105"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/media?parent=115277"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/product_category?post=115277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}