{"id":115289,"date":"2021-02-03T16:28:23","date_gmt":"2021-02-03T21:28:23","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/"},"modified":"2025-10-07T14:35:51","modified_gmt":"2025-10-07T18:35:51","slug":"endpoint-privilege-manager","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/it\/products\/endpoint-privilege-manager\/","title":{"rendered":"Endpoint Privilege Manager"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 hero dark&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;cyb-breadcrumb&#8221;]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/it\/products\/endpoint-identity-security\/\"> Torna a Endpoint Identity Security<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>Endpoint Privilege Manager<\/h1>\n<p><\/p>\n<h2>Rimuovi i diritti di amministratore locali, applica il privilegio minimo e implementa i controlli di sicurezza fondamentali per endpoint su tutti gli endpoint Windows, macOS e Linux, in ambienti ibridi e cloud.<\/h2>\n<p>\n[\/vc_column_text][vc_btn title=&#8221;Scarica la guida&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; css=&#8221;&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Febooks%2Fthe-gorilla-guide-to-practical-endpoint-privilege-security|title:scarica%20ora|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/ebooks\/buyers-guide-managing-endpoint-privileges\/\">Guida all&#8217;acquisto EPM<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-2&#8243;][vc_single_image image=&#8221;217503&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2-pad-top&#8221; css=&#8221;.vc_custom_1749662691240{margin-top: 120px !important;}&#8221;][vc_column el_class=&#8221;text-center&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h2>Implementa controlli proattivi e preventivi<\/h2>\n<p><\/p>\n<p class=\"p1\">Proteggi tutti gli endpoint: gestiti e non, e i server<\/p>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 cybv2-pad cr-culture&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;cybv2_peace_of_mind_left_col&#8221; css=&#8221;.vc_custom_1718259579410{border-left-width: 2px !important;}&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section4_h5&#8243;]<\/p>\n<h4>Rimuovi i diritti di local admin\u200b<\/h4>\n<p>\n[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section4__text2&#8243;]Riduci la superficie di attacco degli endpoint rimuovendo i diritti di local admin<\/p>\n<p>Endpoint Privilege Manager aiuta a rimuovere i diritti amministrativi locali migliorando l&#8217;esperienza dell&#8217;utente e ottimizzando le operazioni IT.\u200b La gestione flessibile basata su policy semplifica l&#8217;orchestrazione dei privilegi e permette sessioni di manutenzione controllate in modalit\u00e0 Just-In-Time.\u200b[\/vc_column_text][vc_row_inner el_class=&#8221;resource-button-sand&#8221;][vc_column_inner column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Flocal-admin-rights-your-biggest-cyber-vulnerability|title:Leggi%20il%20whitepaper|&#8221; offset=&#8221;vc_col-lg-10 vc_col-md-12 vc_col-xs-11&#8243;][vc_column_text css=&#8221;&#8221;]WHITE PAPER[\/vc_column_text][vc_column_text css=&#8221;&#8221;]La tua pi\u00f9 grande vulnerabilit\u00e0 informatica: gli account local admin <i class=\"fa-solid fa-circle-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;cybv2_peace_of_mind_right_col&#8221;][vc_single_image image=&#8221;205046&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section4_img1&#8243;][\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 cybv2-pad cr-culture&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;cybv2_peace_of_mind_right_col&#8221; css=&#8221;.vc_custom_1718259599430{border-left-width: 2px !important;}&#8221;][vc_single_image image=&#8221;209736&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section4_img1&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;cybv2_peace_of_mind_left_col&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section4_h5&#8243;]<\/p>\n<h4>Applicare il privilegio minimo\u200b<\/h4>\n<p>\n[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section4__text2&#8243;]<\/p>\n<p class=\"p1\">Estendi sicurezza delle identit\u00e0 e Zero Trust agli endpoint<\/p>\n<p>Il controllo completo delle applicazioni basato su policy condizionali ti supporta nella creazione di scenari per ogni gruppo di utenti, dalle risorse umane a DevOps. Il contesto, i parametri e gli attributi dell&#8217;applicazione vengono presi in considerazione per autorizzare o bloccare script, applicazioni od operazioni.\u200b[\/vc_column_text][vc_row_inner el_class=&#8221;resource-button-sand&#8221;][vc_column_inner column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fenhance-your-security-by-extending-zero-trust-and-identity-security|title:Leggi%20il%20whitepaper|&#8221; offset=&#8221;vc_col-lg-10 vc_col-md-12 vc_col-xs-11&#8243;][vc_column_text css=&#8221;&#8221;]WHITE PAPER[\/vc_column_text][vc_column_text css=&#8221;&#8221;]Rafforza la sicurezza degli endpoint con Identity Security e Zero Trust <i class=\"fa-solid fa-circle-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 cybv2-pad cr-culture&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;cybv2_peace_of_mind_left_col&#8221; css=&#8221;.vc_custom_1718259579410{border-left-width: 2px !important;}&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section4_h5&#8243;]<\/p>\n<h4>Difenditi dal ransomware\u200b<\/h4>\n<p>\n[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section4__text2&#8243;]<\/p>\n<p class=\"p1\">Protezione da ransomware out-of-the-box\u200b<\/p>\n<p><\/p>\n<p class=\"p1\">Sicurezza multi-livello completa, basata su identit\u00e0 e privilegi, neutralizza le TTP su cui si basa la maggior parte degli attacchi cyber.<\/p>\n<p>\n[\/vc_column_text][vc_row_inner el_class=&#8221;resource-button-sand&#8221;][vc_column_inner column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fwhy-edr-isn-t-enough-to-stop-cyberattacks|title:Leggi%20il%20whitepaper|&#8221; offset=&#8221;vc_col-lg-10 vc_col-md-12 vc_col-xs-11&#8243;][vc_column_text css=&#8221;&#8221;]WHITE PAPER[\/vc_column_text][vc_column_text css=&#8221;&#8221;]Perch\u00e9 i tool EDR non bastano a bloccare i cyber attacchi <i class=\"fa-solid fa-circle-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;cybv2_peace_of_mind_right_col&#8221;][vc_single_image image=&#8221;209718&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section4_img1&#8243;][\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 cybv2-pad cr-culture&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;cybv2_peace_of_mind_right_col&#8221; css=&#8221;.vc_custom_1718259599430{border-left-width: 2px !important;}&#8221;][vc_single_image image=&#8221;209727&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section4_img1&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;cybv2_peace_of_mind_left_col&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section4_h5&#8243;]<\/p>\n<h4>Aumenta la visibilit\u00e0 con Policy Audit<\/h4>\n<p>\n[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section4__text2&#8243;]Soddisfa i requisiti di conformit\u00e0 e audit\u200b<\/p>\n<p>Soddisfa i requisiti di audit e conformit\u00e0 sugli endpoint, migliorando la visibilit\u00e0 grazie alle funzionalit\u00e0 di Policy Audit, che consente di creare audit trail per monitorare e analizzare i tentativi di elevare i privilegi.\u200b[\/vc_column_text][vc_row_inner el_class=&#8221;resource-button-sand&#8221;][vc_column_inner column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fhow-endpoint-privilege-management-fulfills-federal-mandates|title:Leggi%20il%20whitepaper|&#8221; offset=&#8221;vc_col-lg-10 vc_col-md-12 vc_col-xs-11&#8243;][vc_column_text css=&#8221;&#8221;]eBook[\/vc_column_text][vc_column_text css=&#8221;&#8221;]Come Endpoint Privilege Manager \u00e8 conforme ai mandati federali <i class=\"fa-solid fa-circle-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2-pad-top overview-more-col dark&#8221;][vc_column width=&#8221;2\/3&#8243; el_class=&#8221;text-md-center heading&#8221; offset=&#8221;vc_col-md-offset-2 vc_col-sm-offset-1&#8243;][vc_column_text css=&#8221;.vc_custom_1750108848859{margin-bottom: 40px !important;}&#8221;]<\/p>\n<h3>Sicurezza degli endpoint proattiva<\/h3>\n<p>Gli attacchi agli endpoint sono una minaccia in crescita e i metodi tradizionali di protezione reattiva non sono sufficienti a ridurne la quantit\u00e0.\u200b<br \/>\u200b<br \/>Endpoint Privilege Manager \u00e8 una soluzione proattiva che facilita l&#8217;applicazione del principio del privilegio minimo e permette alle organizzazioni di bloccare e contenere gli attacchi sugli endpoint, per difendersi da un cybercriminale con privilegi.\u200b[\/vc_column_text][vc_btn title=&#8221;Leggi il Datasheet&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; css=&#8221;&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fproduct-datasheets%2Fcyberark-endpoint-privilege-manager-datasheet|title:Leggi%20subito|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box text-center&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-209745\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/camera-shutter__primary.svg\" alt=\"icona otturatore fotocamera\" width=\"39\" height=\"46\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>Estendi sicurezza delle identit\u00e0 e Zero Trust a tutti gli endpoint<\/h4>\n<p>Previeni le violazioni prima che si verifichino,\u00a0con rimozione dei diritti di local admin, controlli del minimo privilegio e rilevamento delle minacce alle identit\u00e0.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box text-center&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-209754\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/touch-btn__primary.svg\" alt=\"icona pulsante touch\" width=\"39\" height=\"46\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>Aumenta efficienza e automazione della sicurezza IT\u200b<\/h4>\n<p>Riduci i costi di sicurezza IT e operativi, senza compromettere la produttivit\u00e0, grazie a elevazione JIT, automazione delle approvazioni e blocco delle applicazioni dannose note.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box text-center&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-209763\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/fact-check__alt.svg\" alt=\"icona fact check\" width=\"39\" height=\"46\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>Riduci la superficie di attacco degli endpoint\u200b<\/h4>\n<p><\/p>\n<p class=\"p1\">Rafforza le difese da ransomware e altre minacce con controlli e isolamento granulare delle applicazioni.<\/p>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box text-center&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-209772\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/swords__alt.svg\" alt=\"icona spade\" width=\"39\" height=\"46\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>Soddisfa gli standard di audit e conformit\u00e0<\/h4>\n<p>con logging dettagliato e insight su utilizzo delle applicazioni, diritti di accesso e azioni privilegiate.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top text-center video-wide&#8221; css=&#8221;.vc_custom_1749504414290{background-color: #E8E8E3 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-sm-offset-3&#8243; el_class=&#8221;head-box&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Gestione centralizzata di identit\u00e0 e accessi per server Linux<\/h3>\n<p>La funzionalit\u00e0 Identity Bridge di Endpoint Privilege Manager aiuta a modernizzare la gestione delle identit\u00e0 Linux.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad video-wide&#8221; css=&#8221;.vc_custom_1749662750475{background-color: #E8E8E3 !important;}&#8221;][vc_column width=&#8221;5\/6&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_raw_html css=&#8221;&#8221;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2_customer_stories vc_tta-o-non-responsive cyb-pad-top&#8221; css=&#8221;.vc_custom_1701205658071{background-color: #ffffff !important;}&#8221;][vc_column][vc_tta_tabs style=&#8221;flat&#8221; shape=&#8221;square&#8221; color=&#8221;white&#8221; spacing=&#8221;&#8221; gap=&#8221;20&#8243; alignment=&#8221;center&#8221; active_section=&#8221;&#8221; el_class=&#8221;cybv2_customer_stories_tabs&#8221; css=&#8221;.vc_custom_1703194752377{background-color: #ffffff !important;}&#8221;][vc_tta_section title=&#8221;Quanta Services&#8221; tab_id=&#8221;quanta-services&#8221; el_class=&#8221;new_hpstyle_section6_tab3&#8243;][vc_row_inner equal_height=&#8221;yes&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;211506&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221; css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]&#8221;Ho implementato CyberArk sia in piccole aziende da 150 utenti, sia in aziende da 16.000 endpoint e con numerosi account individuali come Quanta. Ogni volta, il mio approccio \u00e8 stato lo stesso. L&#8217;implementazione con CyberArk \u00e8 efficace indipendentemente dalla dimensione dell&#8217;azienda.&#8221;[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]Richard Breaux, Senior Manager, IT Security,\u200b <strong>Quanta Services<\/strong>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/it\/customer-stories\/quanta-services\/\">Leggi il case study<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Pacific Dental Services&#8221; tab_id=&#8221;pacific-dental-services&#8221; el_class=&#8221;new_hpstyle_section6_tab3&#8243;][vc_row_inner equal_height=&#8221;yes&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;185509&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221; css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]&#8221;Sapere di poter gestire privilegi e password in modo scalabile senza creare problemi alla nostra operativit\u00e0 \u00e8 uno dei maggiori vantaggi offerti da CyberArk.&#8221;[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]Nemi George, VP &amp; CISO, Information Security, <strong>Pacific Dental Services<\/strong>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/it\/customer-stories\/pacific-dental-services-secures-access-to-clinical-resources-for-over-900-dental-practices\/\">Leggi il case study<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;TIAA&#8221; tab_id=&#8221;tiaa&#8221; el_class=&#8221;new_hpstyle_section6_tab1_icon vc_active&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;185409&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221; css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]&#8221;\u00c8 stato sorprendente: abbiamo confrontato il numero di applicazioni e secret che CyberArk Conjur [now known as CyberArk Secrets Manager] pu\u00f2 gestire contemporaneamente rispetto alle soluzioni concorrenti, e la differenza di costo \u00e8 stata assolutamente convincente.&#8221;[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]Adam Powers, Lead Info Security Engineering Manager, <strong>TIAA<\/strong>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/tiaa\/\">Leggi i racconti dei clienti<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Healthfirst&#8221; tab_id=&#8221;healthfirst&#8221; el_class=&#8221;new_hpstyle_section6_tab2_icon&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;211625&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221; css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]\u201cRiuscire a controllare le identit\u00e0 significa poter bloccare la maggior parte degli attacchi moderni. E se controlli le identit\u00e0 controlli ogni perimetro, ogni applicazione e ogni container, ovvero ogni parte dell&#8217;ambiente. Questo \u00e8 ci\u00f2 che definisco Zero Trust, ed \u00e8 per questo che utilizziamo CyberArk. Questo \u00e8 ci\u00f2 che mi permette di dormire sonni tranquilli.&#8221;[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]Brian Miller, CISO, <strong>Healthfirst<\/strong><\/p>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/it\/customer-stories\/o9-solutions\/\">Leggi il case study<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Persistent&#8221; tab_id=&#8221;persistent&#8221; el_class=&#8221;new_hpstyle_section6_tab3_icon&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;211497&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221; css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]&#8221;La sfida pi\u00f9 grande nella cybersecurity \u00e8 la dipendenza dal fattore umano. E grazie all\u2019automazione, il vantaggio pi\u00f9 grande di CyberArk \u00e8 la serenit\u00e0. L&#8217;errore umano \u00e8 sempre possibile, ma il controllo \u00e8 quasi perfetto se si \u00e8 in grado di mitigarlo.&#8221;[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]Debashis Singh, CIO <strong>Persistent<\/strong>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/persistent-systems\/\">Leggi il case study<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][vc_raw_js]JTNDc2NyaXB0JTNFJTBBalF1ZXJ5JTI4ZG9jdW1lbnQlMjkucmVhZHklMjhmdW5jdGlvbiUyOCUyOSU3QiUwQSUyMCUyMCUyMCUyMCUyRiUyRkFkZCUyMEFjdGl2ZSUyMHRvJTIwdGFiJTIwb24lMjBwYWdlJTIwbG9hZCUwQSUyMCUyMCUyMCUyMCUyNHBhbmVscyUyMCUzRCUyMGpRdWVyeSUyOCUyNy5jeWJ2Ml9jdXN0b21lcl9zdG9yaWVzX3RhYnMlMjAudmNfdHRhLXBhbmVscyUyMC52Y190dGEtcGFuZWwlMjclMjklM0IlMEElMjAlMjAlMjAlMjAlMjR0YWJzJTIwJTNEJTIwalF1ZXJ5JTI4JTI3LmN5YnYyX2N1c3RvbWVyX3N0b3JpZXNfdGFicyUyMC52Y190dGEtdGFicy1saXN0JTIwLnZjX3R0YS10YWIlMjclMjklM0IlMEElMjAlMjAlMjAlMjB2YXIlMjBpbmRleCUyMCUzRCUyMDAlM0IlMEElMEElMjAlMjAlMjAlMjAlMkYlMkZBbGlnbiUyMFRhYnMlMjB3aXRoJTIwcGFuZWxzJTBBJTIwJTIwJTIwJTIwJTI0cGFuZWxzLmVhY2glMjhmdW5jdGlvbiUyOCUyOSU3QiUwQSUyMCUyMCUyMCUyMCUyMCUyMCUyMCUyMGpRdWVyeSUyOHRoaXMlMjkuaGFzQ2xhc3MlMjglMjd2Y19hY3RpdmUlMjclMjklM0IlMEElMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjByZXR1cm4lMjBmYWxzZSUzQiUwQSUyMCUyMCUyMCUyMCUyMCUyMCUyMCUyMGluZGV4JTJCJTJCJTNCJTBBJTIwJTIwJTIwJTIwJTdEJTI5JTBBJTIwJTIwJTIwJTIwdmFyJTIwbmV3SW5kZXglMjAlM0QlMjAwJTNCJTBBJTIwJTIwJTIwJTIwJTI0dGFicy5lYWNoJTI4ZnVuY3Rpb24lMjglMjklN0IlMEElMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjBpZiUyOGluZGV4JTIwJTNEJTNEJTIwbmV3SW5kZXglMjklN0IlMEElMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjBqUXVlcnklMjh0aGlzJTI5LmFkZENsYXNzJTI4JTI3dmNfYWN0aXZlJTI3JTI5JTNCJTBBJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTdEJTBBJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTIwbmV3SW5kZXglMkIlMkIlM0IlMEElMjAlMjAlMjAlMjAlN0QlMjklMEElN0QlMjklM0IlMEElM0MlMkZzY3JpcHQlM0U=[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad info-graphic&#8221; css=&#8221;.vc_custom_1749504324678{background-color: #FFFFFF !important;}&#8221;][vc_column width=&#8221;2\/3&#8243; offset=&#8221;vc_col-sm-offset-2&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;text-md-center head-box&#8221;]<\/p>\n<h3>Proteggere le identit\u00e0 sugli endpoint\u200b<\/h3>\n<p>Scopri di pi\u00f9 sulla soluzione completa Endpoint Identity Security, parte della CyberArk Identity Security Platform.[\/vc_column_text][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-129427\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/03\/infograhic-epm-diagram.svg\" alt=\"Endpoint Privilege Manager si basa su un'architettura SaaS completa e scalabile\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources sub-5&#8243; css=&#8221;.vc_custom_1649443021235{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8221;][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;no-break&#8221;][vc_column_text el_class=&#8221;no-break&#8221;]<\/p>\n<h3>Ottieni ulteriori risorse<\/h3>\n<p>\n[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/endpoint-privilege-manager\">Visualizza tutte le risorse<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column&#8221;][vc_column el_class=&#8221;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8221;.vc_custom_1649437390854{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;new_hpstyle_section8_uberflip&#8221;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1749503615816{background-color: #E8E8E3 !important;}&#8221; el_class=&#8221;cybv2 cybv2-pad-top hv-cta&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;left-clmn&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h1>Tour interattivo di Endpoint Privilege Manager<\/h1>\n<p><\/p>\n<h5>Scopri come Endpoint Privilege Manager pu\u00f2 aiutare la tua organizzazione a ridurre il rischio di attacchi basati sull\u2019identit\u00e0 sugli endpoint, grazie a funzionalit\u00e0 quali:<\/h5>\n<p>\n[\/vc_column_text][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;head-box-text&#8221;]Rilevazione e rimozione dei diritti di local admin e gestione  flessibile delle policy per proteggere l&#8217;azienda, ottimizzando le operazioni IT[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;head-box-text&#8221;]Applicazione del principio del privilegio minimo per estendere sicurezza delle identit\u00e0 e Zero Trust agli endpoint[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;head-box-text&#8221;]Protezione dagli attacchi ransomware con policy predefinite per una difesa immediata<br \/>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;head-box-text&#8221;]Reportistica per una migliore visibilit\u00e0 e per soddisfare gli standard di audit e conformit\u00e0[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_column_text css=&#8221;&#8221;]Con il nostro tour interattivo, potrai scoprire direttamente come EPM, parte della strategia Endpoint Identity Security, possa aiutare la tua azienda a proteggere endpoint e server senza compromettere la produttivit\u00e0.<\/p>\n<p><strong>Registrati ora per accedere immediatamente al nostro tour interattivo di EPM!<\/strong>[\/vc_column_text][vc_single_image image=&#8221;205230&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221; el_class=&#8221;d-none d-md-block&#8221;][\/vc_column][vc_column width=&#8221;1\/12&#8243; css=&#8221;.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;right-clmn cybv2-form&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;bold&#8221;]<\/p>\n<h4>Registrati qui per accedere alla demo del tour interattivo di Endpoint Privilege Manager<\/h4>\n<p>\n[\/vc_column_text][vc_raw_html css=&#8221;&#8221;]W21hcmtldG9fZm9ybSBpZD0iMTMyODQiIHR5X3BhZ2VfdXJsPSJodHRwczovL3d3dy5jeWJlcmFyay5jb20vdHJ5LWJ1eS90aGFuay15b3UtZXBtLWludGVyYWN0aXZlLXRvdXIvIl0=[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 hero dark&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;cyb-breadcrumb&#8221;] Torna a Endpoint Identity Security[\/vc_column_text][vc_column_text] Endpoint Privilege Manager Rimuovi i diritti di amministratore locali, applica il privilegio minimo e implementa i controlli di sicurezza fondamentali&#8230;<\/p>\n","protected":false},"author":198,"featured_media":0,"parent":42105,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27775],"class_list":["post-115289","page","type-page","status-publish","hentry","product_category-epm"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Endpoint Privilege Manager - Protezione degli endpoint | CyberArk<\/title>\n<meta name=\"description\" content=\"CyberArk Endpoint Privilege Manager assicura una protezione olistica di tutti gli endpoint applicando il principio del privilegio minimo, senza interrompere l&#039;attivit\u00e0 aziendale.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Endpoint Privilege Manager\" \/>\n<meta property=\"og:description\" content=\"CyberArk Endpoint Privilege Manager assicura una protezione olistica di tutti gli endpoint applicando il principio del privilegio minimo, senza interrompere l&#039;attivit\u00e0 aziendale.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-07T18:35:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/camera-shutter__primary.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/\",\"url\":\"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/\",\"name\":\"Endpoint Privilege Manager - Protezione degli endpoint | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/camera-shutter__primary.svg\",\"datePublished\":\"2021-02-03T21:28:23+00:00\",\"dateModified\":\"2025-10-07T18:35:51+00:00\",\"description\":\"CyberArk Endpoint Privilege Manager assicura una protezione olistica di tutti gli endpoint applicando il principio del privilegio minimo, senza interrompere l'attivit\u00e0 aziendale.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/camera-shutter__primary.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/camera-shutter__primary.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prodotti\",\"item\":\"https:\/\/www.cyberark.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Endpoint Privilege Manager\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Endpoint Privilege Manager - Protezione degli endpoint | CyberArk","description":"CyberArk Endpoint Privilege Manager assicura una protezione olistica di tutti gli endpoint applicando il principio del privilegio minimo, senza interrompere l'attivit\u00e0 aziendale.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/","og_locale":"it_IT","og_type":"article","og_title":"Endpoint Privilege Manager","og_description":"CyberArk Endpoint Privilege Manager assicura una protezione olistica di tutti gli endpoint applicando il principio del privilegio minimo, senza interrompere l'attivit\u00e0 aziendale.","og_url":"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-10-07T18:35:51+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/camera-shutter__primary.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tempo di lettura stimato":"6 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/","url":"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/","name":"Endpoint Privilege Manager - Protezione degli endpoint | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/camera-shutter__primary.svg","datePublished":"2021-02-03T21:28:23+00:00","dateModified":"2025-10-07T18:35:51+00:00","description":"CyberArk Endpoint Privilege Manager assicura una protezione olistica di tutti gli endpoint applicando il principio del privilegio minimo, senza interrompere l'attivit\u00e0 aziendale.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/camera-shutter__primary.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/camera-shutter__primary.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/products\/endpoint-privilege-manager\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Prodotti","item":"https:\/\/www.cyberark.com\/products\/"},{"@type":"ListItem","position":3,"name":"Endpoint Privilege Manager"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/115289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/users\/198"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/comments?post=115289"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/115289\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/42105"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/media?parent=115289"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/product_category?post=115289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}