{"id":115366,"date":"2021-03-18T14:07:19","date_gmt":"2021-03-18T18:07:19","guid":{"rendered":"https:\/\/www.cyberark.com\/solutions\/banking\/"},"modified":"2024-04-17T06:17:09","modified_gmt":"2024-04-17T10:17:09","slug":"banking","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/it\/solutions\/banking\/","title":{"rendered":"Settore bancario"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 int-hero-full&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text]<\/p>\n<h1>Soluzioni per il settore bancario<\/h1>\n<h2>Proteggi l&#8217;accesso per tutte le identit\u00e0 del tuo istituto e delle tue app cliente e resta al passo con le aspettative in evoluzione dei consumatori.<\/h2>\n<p>[\/vc_column_text][vc_btn title=&#8221;Solution brief&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresource%2Fcyberark-banking-solution-brief-2018%2F%20|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1615995823484{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Banking-hero.jpg?id=114391) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221; el_class=&#8221;column-2&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top overview-vt&#8221; css=&#8221;.vc_custom_1611617874123{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;head-box&#8221;][vc_column_text]<\/p>\n<h3>Sicurezza su cui puoi contare<\/h3>\n<p>CyberArk gode della fiducia di 23 dei 25 principali istituti bancari e di oltre 6.770 clienti in tutto il mondo, grazie alla <a href=\"https:\/\/www.cyberark.com\/it\/products\/\">piattaforma Identity Security<\/a> pi\u00f9 completa del settore.[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114399\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/CredentialTheft.svg\" alt=\"Credential Theft Icon\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Mitiga il furto di credenziali<\/h4>\n<p>Impiega una sicurezza delle identit\u00e0 e una gestione degli accessi privilegiati di maggiore solidit\u00e0 per proteggerti dalle minacce alle informazioni personali e proprietarie.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114407\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/CustomerTrust.svg\" alt=\"Customer Trust Icon\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Costruisci la fiducia del cliente<\/h4>\n<p>Riduci il rischio di perdite di dati e l&#8217;impatto sul successo delle esperienze dei clienti, utilizzando tool DevOps per incorporare facilmente la sicurezza nelle applicazioni cliente.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114415\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Compliance.svg\" alt=\"Compliance Icon\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Conformit\u00e0 alle normative<\/h4>\n<p>Affronta le problematiche portate dai principali regolamenti come Sarbanes Oxley, PCI-DSS, MAS TRM e GDPR.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-top overview-hz&#8221;][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;head-box&#8221;][vc_column_text]<\/p>\n<h3>Proteggiti in un mondo digitale<\/h3>\n<p>Ecco alcuni modi in cui possiamo aiutarti ad avanzare senza paura in un mondo digitale.[\/vc_column_text][\/vc_column][vc_column width=&#8221;2\/3&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_row_inner equal_height=&#8221;yes&#8221;][vc_column_inner el_class=&#8221;cta-box&#8221; width=&#8221;5\/12&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114423\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/DigitalBusiness.svg\" alt=\"Enable Digital Business\" \/>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1697706140763{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4>Abilita il business digitale<\/h4>\n<p>Rendi sicuro l&#8217;accesso alle app aziendali per le identit\u00e0 umane e macchina.[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/it\/solutions\/digital-business-transformation\/\">Per saperne di pi\u00f9<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;cta-box&#8221; width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114431\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Ransomware.svg\" alt=\"Stop Ransomware\" \/>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1697706154872{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4>Blocca il ransomware<\/h4>\n<p>Previeni i movimenti laterali con un successo del 100% contro pi\u00f9 di 3 milioni di forme di ransomware.[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/it\/solutions\/ransomware-protection\/\">Per saperne di pi\u00f9<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;cta-box&#8221; width=&#8221;5\/12&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114439\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/RemoteWork.svg\" alt=\"Secure Remote Work\" \/>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1697706170311{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4>Proteggi il lavoro da remoto<\/h4>\n<p>Connetti la tua forza lavoro remota a ci\u00f2 di cui ha bisogno in modo rapido ed efficiente.\u202f[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/it\/solutions\/remote-workforce-access\/\">Per saperne di pi\u00f9<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1650999038064{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column]<div class=\"templatera_shortcode\"><div data-vc-full-width=\"true\" data-vc-full-width-temp=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_full_width_resource\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_title\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h5 style=\"text-align: center;\">Fondamenti della sicurezza delle identit\u00e0<\/h5>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section5_container\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_center   new_hpstyle_section5_gart_img\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/is-cta-image.png\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"is-cta-image\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/is-cta-image.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/is-cta-image-150x150.png 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/is-cta-image-100x100.png 100w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_text1\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Sicurezza delle identit\u00e0: perch\u00e9 \u00e8 importante e perch\u00e9 proprio ora<\/h4>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: left;\">Metti la sicurezza delle identit\u00e0 al primo posto senza compromettere la produttivit\u00e0.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_btn3-container  cybv2-button-solid cyb-button-hpstyle_section5 vc_btn3-inline\"  >\n\t<a class=\"vc_btn3-color-grey\" href=\"https:\/\/www.cyberark.com\/it\/resources\/ebooks\/sicurezza-delle-identit%C3%A0-perch%C3%A9-%C3%A8-importante-e-perch%C3%A9-adesso-avanti-senza-paura\" title=\"\">Scarica l\u2019eBook<\/a><\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/a><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/div>[\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-top text-md-center&#8221;][vc_column][vc_column_text]<\/p>\n<h2>Portafoglio di prodotti CyberArk identity security<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-btm text-md-center&#8221;][vc_column width=&#8221;2\/3&#8243; offset=&#8221;vc_col-sm-offset-2&#8243;][vc_column_text]<\/p>\n<h5>Come leader consolidato nella gestione degli accessi privilegiati, CyberArk offre il set pi\u00f9 completo e flessibile di funzionalit\u00e0 di Identity Security.<\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above wistia_embed&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-114447\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Privilege-SeeSaw.jpg\" alt=\"Privileged Access\u202f\" width=\"1500\" height=\"1000\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Privilege-SeeSaw.jpg 1500w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Privilege-SeeSaw-300x200.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Privilege-SeeSaw-1024x683.jpg 1024w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Privilege-SeeSaw-768x512.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Privilege-SeeSaw-150x100.jpg 150w\" sizes=\"auto, (max-width: 1500px) 100vw, 1500px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-right&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>Accesso privilegiato<\/h4>\n<p>L\u201980% delle violazioni della sicurezza \u00e8 dovuto alla compromissione delle credenziali privilegiate. Con CyberArk puoi isolare e bloccare gli attacchi ai privilegi prima che possano causare danni.\u202fGli utenti ottengono accesso nativo a tutto ci\u00f2 di cui hanno bisogno e tu puoi stare tranquillo, con la certezza che le tue risorse critiche siano al sicuro.[\/vc_column_text][vc_btn title=&#8221;Esplora le soluzioni&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fproducts%2Fprivileged-access%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw cyb-reverse&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-left&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>Identit\u00e0 cliente e forza lavoro<\/h4>\n<p>L\u2019identit\u00e0 \u00e8 il nuovo campo di battaglia per la sicurezza. Un\u2019esperienza senza password robuste offre agli utenti un accesso fluido, mentre la protezione dalle minacce \u00e8 garantita dall\u2019IA. Dai alla tua forza lavoro e ai tuoi clienti la praticit\u00e0 di un accesso facile e sicuro da qualsiasi dispositivo, ovunque e al momento giusto.[\/vc_column_text][vc_btn title=&#8221;Esplora le soluzioni&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fproducts%2Faccess-management%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-114312\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1.jpg\" alt=\"Access Management\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-114304\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-img-03-770x515-1.jpg\" alt=\"DevOps Security\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-img-03-770x515-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-img-03-770x515-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-img-03-770x515-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-img-03-770x515-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-right&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>Proteggi DevOps<\/h4>\n<p>Le applicazioni e gli strumenti di automazione sono essenziali per l\u2019innovazione. Purtroppo, sono anche un bersaglio molto comune per i cyber attacchi pi\u00f9 sofisticati. Possiamo aiutarti a proteggere le identit\u00e0 non umane in tutta la <a href=\"https:\/\/www.cyberark.com\/it\/solutions\/devsecops-cloud-native-apps\/\">pipeline DevOps<\/a>, senza sacrificare l\u2019agilit\u00e0 aziendale.\u202f[\/vc_column_text][vc_btn title=&#8221;Esplora le soluzioni&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fproducts%2Fdevsecops%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1609887293368{background-color: #f7f7f7 !important;}&#8221; el_class=&#8221;cybv2 cybv2-pad-top stckd-cllt cyb-reverse&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;left-clmn&#8221;][vc_column_text el_class=&#8221;head-box&#8221;]<\/p>\n<h3>Mitiga gli attacchi con la sicurezza su pi\u00f9 livelli<\/h3>\n<p class=\"cyb-quote\">&#8220;\u00c8 fondamentale per la nostra strategia di sicurezza perch\u00e9 la maggior parte degli attacchi avviene usando credenziali sottratte. CyberArk ci viene in aiuto aggiungendo livelli di sicurezza che ostacolano i tentativi di penetrazione nei sistemi da parte degli attaccanti.&#8221;<\/p>\n<p>Analista IT &#8211; Grande gruppo bancario[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;right-clmn&#8221; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_single_image image=&#8221;114455&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; el_class=&#8221;.border-shadow&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources&#8221; css=&#8221;.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8221;][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;no-break&#8221;][vc_column_text el_class=&#8221;no-break&#8221;]<\/p>\n<h3>Esplora le<br \/>\nrisorse<br \/>\ncorrelate<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/financial-services\">Visualizza tutte le risorse<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column&#8221;][vc_column el_class=&#8221;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html el_class=&#8221;new_hpstyle_section8_uberflip&#8221; css=&#8221;.vc_custom_1713337680109{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2-pad cybv2-oval-left-background hv-cta-list&#8221; css=&#8221;.vc_custom_1611885567532{background-color: #ff7600 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;img-box&#8221; css=&#8221;.vc_custom_1616004501748{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Highvalue-CTA.jpg?id=114463) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;stat-column&#8221;][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221; width=&#8221;3\/4&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text]<\/p>\n<h2>Richiedi una demo<\/h2>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]Proteggi le identit\u00e0 e gli accessi privilegiati in tutta l&#8217;azienda[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]Soddisfa con la massima tranquillit\u00e0 i requisiti di conformit\u00e0[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]Crea applicazioni cliente affidabili[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_btn title=&#8221;Richiedi una demo&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Frequest-demo%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":42102,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-115366","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Soluzioni di sicurezza delle identit\u00e0 e gestione degli accessi per il settore bancario | CyberArk<\/title>\n<meta name=\"description\" content=\"Gestisci e proteggi l&#039;accesso per tutte le identit\u00e0 di tutti i tuoi istituti bancari e tutte le tue applicazioni cliente e resta al passo con le aspettative in evoluzione dei consumatori.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/banking\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Settore bancario\" \/>\n<meta property=\"og:description\" content=\"Gestisci e proteggi l&#039;accesso per tutte le identit\u00e0 di tutti i tuoi istituti bancari e tutte le tue applicazioni cliente e resta al passo con le aspettative in evoluzione dei consumatori.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/banking\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-17T10:17:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/CredentialTheft.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/banking\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/banking\/\",\"name\":\"Soluzioni di sicurezza delle identit\u00e0 e gestione degli accessi per il settore bancario | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/banking\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/banking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/CredentialTheft.svg\",\"datePublished\":\"2021-03-18T18:07:19+00:00\",\"dateModified\":\"2024-04-17T10:17:09+00:00\",\"description\":\"Gestisci e proteggi l'accesso per tutte le identit\u00e0 di tutti i tuoi istituti bancari e tutte le tue applicazioni cliente e resta al passo con le aspettative in evoluzione dei consumatori.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/banking\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/banking\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/banking\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/CredentialTheft.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/CredentialTheft.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/banking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Soluzioni di Identity Security\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Settore bancario\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Soluzioni di sicurezza delle identit\u00e0 e gestione degli accessi per il settore bancario | CyberArk","description":"Gestisci e proteggi l'accesso per tutte le identit\u00e0 di tutti i tuoi istituti bancari e tutte le tue applicazioni cliente e resta al passo con le aspettative in evoluzione dei consumatori.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/banking\/","og_locale":"it_IT","og_type":"article","og_title":"Settore bancario","og_description":"Gestisci e proteggi l'accesso per tutte le identit\u00e0 di tutti i tuoi istituti bancari e tutte le tue applicazioni cliente e resta al passo con le aspettative in evoluzione dei consumatori.","og_url":"https:\/\/www.cyberark.com\/solutions\/banking\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2024-04-17T10:17:09+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/CredentialTheft.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tempo di lettura stimato":"6 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/banking\/","url":"https:\/\/www.cyberark.com\/solutions\/banking\/","name":"Soluzioni di sicurezza delle identit\u00e0 e gestione degli accessi per il settore bancario | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/solutions\/banking\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/solutions\/banking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/CredentialTheft.svg","datePublished":"2021-03-18T18:07:19+00:00","dateModified":"2024-04-17T10:17:09+00:00","description":"Gestisci e proteggi l'accesso per tutte le identit\u00e0 di tutti i tuoi istituti bancari e tutte le tue applicazioni cliente e resta al passo con le aspettative in evoluzione dei consumatori.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/banking\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/banking\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/solutions\/banking\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/CredentialTheft.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/CredentialTheft.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/banking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Soluzioni di Identity Security","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Settore bancario"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/115366","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/comments?post=115366"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/115366\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/42102"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/media?parent=115366"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/product_category?post=115366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}