{"id":115387,"date":"2021-03-22T16:13:14","date_gmt":"2021-03-22T20:13:14","guid":{"rendered":"https:\/\/www.cyberark.com\/solutions\/federal\/"},"modified":"2025-01-21T02:25:24","modified_gmt":"2025-01-21T07:25:24","slug":"federal","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/it\/solutions\/federal\/","title":{"rendered":"Governo federale"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 int-hero-full&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text]<\/p>\n<h1>Soluzioni per il governo federale<\/h1>\n<h2>Accesso sicuro per tutte le identit\u00e0 da qualsiasi dispositivo, ovunque e al momento giusto, per proteggere i dati sensibili e l&#8217;infrastruttura del governo.<\/h2>\n<p>[\/vc_column_text][vc_btn title=&#8221;Leggi il whitepaper&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fmitigate-risk-with-privileged-access-management|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1616174629453{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Federal.jpeg?id=114905) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221; el_class=&#8221;column-2&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top overview-vt&#8221; css=&#8221;.vc_custom_1611617874123{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;head-box&#8221;][vc_column_text]<\/p>\n<h3>Proteggi la continuit\u00e0 dell&#8217;assistenza<\/h3>\n<p>CyberArk gode della fiducia di oltre 8.000 clienti in tutto il mondo, grazie alla piattaforma Identity Security pi\u00f9 completa del settore.[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114480\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/PreventAttacks.svg\" alt=\"Icona Prevenzione degli attacchi\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Previeni gli attacchi<\/h4>\n<p>Implementa una sicurezza pi\u00f9 robusta per gli accessi privilegiati, per proteggere sistemi e dati federali dalle minacce.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114547\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/SecureDevOps.svg\" alt=\"Icona Protezione della fiducia dei consumatori \" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Proteggi la fiducia dei consumatori<\/h4>\n<p>Utilizza tool DevOps che facilitano l&#8217;inclusione della sicurezza nelle applicazioni consumer.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114415\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Compliance.svg\" alt=\"Icona Conformit\u00e0\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Rispetta la conformit\u00e0<\/h4>\n<p>Affronta i regolamenti chiave, tra cui FISMA e altri standard NIST e NERC.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-top text-md-center&#8221;][vc_column][vc_column_text]<\/p>\n<h2>Affronta le normative industriali pi\u00f9 complesse<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-btm text-md-center&#8221;][vc_column width=&#8221;2\/3&#8243; offset=&#8221;vc_col-sm-offset-2&#8243;][vc_column_text]<\/p>\n<h5>Muoversi tra i nuovi regolamenti e giocare d&#8217;anticipo sulle minacce emergenti non deve necessariamente essere difficile.<\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above wistia_embed&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-120535\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/federal-seesaw-FISMA-and-NIST-800-53.jpeg\" alt=\"Logo NIST\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/federal-seesaw-FISMA-and-NIST-800-53.jpeg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/federal-seesaw-FISMA-and-NIST-800-53-300x201.jpeg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/federal-seesaw-FISMA-and-NIST-800-53-768x514.jpeg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/federal-seesaw-FISMA-and-NIST-800-53-150x100.jpeg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-right&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>FISMA NIST SP 800-53<\/h4>\n<p><a href=\"https:\/\/www.cyberark.com\/it\/products\/privileged-access-manager\/\">CyberArk offre soluzioni integrate per la gestione degli accessi privilegiati e il monitoraggio in tempo reale<\/a> che soddisfano i requisiti FISMA e NIST 800-53 con un approccio ai programmi di sicurezza delle informazioni delle agenzie basato sui rischi.[\/vc_column_text][vc_btn title=&#8221;Scarica il whitepaper&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fnist-sp-800-53-revision-5-implementing-essential-security-controls-with-cyberark-solutions|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw cyb-reverse&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-left&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>NERC CIP<\/h4>\n<p>Per le aziende energetiche, soddisfare la conformit\u00e0 NERC per gli account privilegiati pu\u00f2 essere difficile, date le dimensioni e la complessit\u00e0 dei sistemi di controllo industriale.<\/p>\n<p>Con CyberArk Privileged Access Management, le aziende elettriche possono raggiungere la conformit\u00e0 NERC CIP garantendo affidabilit\u00e0 per qualsiasi utilizzo di account privilegiati o condivisi.[\/vc_column_text][vc_btn title=&#8221;Scarica il whitepaper&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fprotecting-the-grid-addressing-nerc-cip-requirements-for-securing-privileged-access|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-120543\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/federal-seesaw-NERC.jpeg\" alt=\"Logo NERC\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/federal-seesaw-NERC.jpeg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/federal-seesaw-NERC-300x201.jpeg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/federal-seesaw-NERC-768x514.jpeg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/federal-seesaw-NERC-150x100.jpeg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above wistia_embed&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-189188 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/fed-ramp-card.png\" alt=\"Autorizzazione FedRAMP High\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/fed-ramp-card.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/fed-ramp-card-300x201.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/fed-ramp-card-768x514.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/fed-ramp-card-150x100.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-right&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>Autorizzazione FedRAMP High<\/h4>\n<p>Scopri di pi\u00f9 sulle principali offerte SaaS di CyberArk, su CyberArk Endpoint Privilege Manager, CyberArk Workforce Identity e sull&#8217;autorizzazione FedRAMP High, che migliorano la sicurezza delle agenzie federali in linea con i principi zero trust.[\/vc_column_text][vc_btn title=&#8221;Per saperne di pi\u00f9&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fpress%2Fcyberark-achieves-fedramp-high-authorization%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw cyb-reverse&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-left&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>Elenco dei prodotti approvati per la rete informatica del Dipartimento della Difesa (DoDIN APL)<\/h4>\n<p>CyberArk Privileged Access Manager Self-Hosted \u00e8 stata ufficialmente riconosciuta come soluzione affidabile per i clienti del DoD (Department of Defense). CyberArk PAM Self-Hosted \u00e8 presente nell&#8217;elenco dei prodotti approvati dal DoD Information Network (DoDIN APL), poich\u00e9 soddisfa le specifiche DoD.[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-189761 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/network-approved-product-1.png\" alt=\"\" width=\"720\" height=\"455\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/network-approved-product-1.png 720w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/network-approved-product-1-300x190.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/network-approved-product-1-150x95.png 150w\" sizes=\"auto, (max-width: 720px) 100vw, 720px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top overview-hz&#8221; css=&#8221;.vc_custom_1626123100448{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;head-box&#8221;][vc_column_text]<\/p>\n<h3>Pronti ad assisterti<\/h3>\n<p>Ecco alcuni modi in cui possiamo aiutarti ad avanzare senza paura.[\/vc_column_text][\/vc_column][vc_column width=&#8221;2\/3&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_row_inner equal_height=&#8221;yes&#8221;][vc_column_inner el_class=&#8221;cta-box&#8221; width=&#8221;1\/2&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114571\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/DefendAgainstAttacks.svg\" alt=\"Difenditi dagli attacchi\" \/>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1697707560542{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4>Difenditi dagli attacchi<\/h4>\n<p>Proteggiti contro la causa principale delle violazioni: identit\u00e0 e credenziali compromesse.[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/it\/solutions\/defend-against-attacks\/\">Per saperne di pi\u00f9<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;cta-box&#8221; width=&#8221;1\/2&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114431\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Ransomware.svg\" alt=\"Blocca il ransomware\" \/>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1697707568161{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4>Blocca il ransomware<\/h4>\n<p>Previeni i movimenti laterali con un successo del 100% contro pi\u00f9 di 3 milioni di forme di ransomware.[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/it\/solutions\/ransomware-protection\/\">Per saperne di pi\u00f9<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;cta-box&#8221; width=&#8221;1\/2&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114579\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/ThirdPartyAccess.svg\" alt=\"Garantire l'accesso sicuro ai terzi\" \/>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1697707583043{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4>Garantire l&#8217;accesso sicuro ai terzi<\/h4>\n<p>Connetti i tuoi partner esterni a ci\u00f2 di cui hanno bisogno in modo rapido ed efficiente.[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/it\/products\/vendor-privileged-access-manager\/\">Per saperne di pi\u00f9<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;cta-box&#8221; width=&#8221;1\/2&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114488\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Satisfy-Audit-and-Compliance-icon.svg\" alt=\"Soddisfa i requisiti di audit e compliance\" \/>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1697707593416{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4>Soddisfa i requisiti di audit e compliance<\/h4>\n<p>Tieni il passo con un&#8217;ampia gamma di regolamenti, framework e standard generali e industriali come ISO\/IEC 27002, NIST e HIPAA.[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/it\/solutions\/audit-compliance\/\">Per saperne di pi\u00f9<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-top text-md-center&#8221;][vc_column][vc_column_text]<\/p>\n<h2>Piattaforma CyberArk Identity Security<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-btm text-md-center&#8221;][vc_column width=&#8221;2\/3&#8243; offset=&#8221;vc_col-sm-offset-2&#8243;][vc_column_text]<\/p>\n<h5>Come leader consolidato nella gestione degli accessi privilegiati, CyberArk offre il set pi\u00f9 completo e flessibile di funzionalit\u00e0 di Identity Security.<\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above wistia_embed&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-114447\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Privilege-SeeSaw.jpg\" alt=\"Accesso privilegiato\" width=\"1500\" height=\"1000\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Privilege-SeeSaw.jpg 1500w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Privilege-SeeSaw-300x200.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Privilege-SeeSaw-1024x683.jpg 1024w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Privilege-SeeSaw-768x512.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Privilege-SeeSaw-150x100.jpg 150w\" sizes=\"auto, (max-width: 1500px) 100vw, 1500px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-right&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>Accesso privilegiato<\/h4>\n<p>L\u201980% delle violazioni della sicurezza \u00e8 dovuto alla compromissione delle credenziali privilegiate. Con CyberArk puoi isolare e fermare gli attacchi ai privilegi prima che possano causare danni. I tuoi utenti hanno accesso nativo a tutto ci\u00f2 di cui hanno bisogno e tu hai la tranquillit\u00e0 di sapere che i tuoi asset critici sono al sicuro.[\/vc_column_text][vc_btn title=&#8221;Esplora i prodotti&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fproducts%2Fprivileged-access%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw cyb-reverse&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-left&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>Identit\u00e0 dei clienti e della forza lavoro<\/h4>\n<p>L\u2019identit\u00e0 \u00e8 il nuovo campo di battaglia per la sicurezza. Una solida esperienza senza password offre agli utenti un accesso fluido, mentre la protezione dalle minacce \u00e8 garantita dall\u2019AI. Dai alla tua forza lavoro e ai tuoi clienti la praticit\u00e0 di un accesso facile e sicuro da qualsiasi dispositivo, ovunque e al momento giusto.[\/vc_column_text][vc_btn title=&#8221;Esplora i prodotti&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fproducts%2Faccess-management%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-114312\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1.jpg\" alt=\"Gestione degli accessi\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-114304\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-img-03-770x515-1.jpg\" alt=\"Sicurezza DevOps\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-img-03-770x515-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-img-03-770x515-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-img-03-770x515-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-img-03-770x515-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-right&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>Protezione DevOps<\/h4>\n<p>Le applicazioni e gli strumenti di automazione sono essenziali per l\u2019innovazione. Purtroppo, sono anche un bersaglio molto comune per i cyber attacchi pi\u00f9 sofisticati. Possiamo aiutarti a proteggere le identit\u00e0 non umane lungo la <a href=\"https:\/\/www.cyberark.com\/it\/solutions\/devsecops-cloud-native-apps\/\">pipeline DevOps<\/a>, senza compromettere l&#8217;agilit\u00e0 aziendale.[\/vc_column_text][vc_btn title=&#8221;Esplora i prodotti&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fproducts%2Fdevsecops%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources&#8221; css=&#8221;.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_column_text el_class=&#8221;no-break&#8221;]<\/p>\n<h3>Esplora le risorse correlate<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/public-sector-government\">Visualizza tutte le risorse<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column&#8221;][vc_column el_class=&#8221;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html el_class=&#8221;new_hpstyle_section8_uberflip&#8221; css=&#8221;.vc_custom_1674510261051{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2-pad cybv2-oval-left-background hv-cta-list&#8221; css=&#8221;.vc_custom_1611885567532{background-color: #ff7600 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;img-box&#8221; css=&#8221;.vc_custom_1616016703186{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Federal-HighValue-CTA.jpg?id=114587) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;stat-column&#8221;][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221; width=&#8221;3\/4&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text]<\/p>\n<h2>Richiedi una demo<\/h2>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]Proteggi gli accessi privilegiati in tutta l&#8217;agenzia[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]Soddisfa con la massima tranquillit\u00e0 i requisiti di conformit\u00e0[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]Crea applicazioni consumer radicate nella fiducia[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_btn title=&#8221;Richiedi una demo&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Frequest-demo%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":42102,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-115387","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Soluzioni di sicurezza delle identit\u00e0 e gestione degli accessi per il governo federale | CyberArk<\/title>\n<meta name=\"description\" content=\"Proteggi i dati e le infrastrutture sensibili del governo federale con un accesso sicuro per tutte le identit\u00e0 da qualsiasi dispositivo, ovunque, al momento giusto.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/it\/solutions\/federal\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Governo federale\" \/>\n<meta property=\"og:description\" content=\"Proteggi i dati e le infrastrutture sensibili del governo federale con un accesso sicuro per tutte le identit\u00e0 da qualsiasi dispositivo, ovunque, al momento giusto.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/it\/solutions\/federal\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-21T07:25:24+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/it\/solutions\/federal\/\",\"url\":\"https:\/\/www.cyberark.com\/it\/solutions\/federal\/\",\"name\":\"Soluzioni di sicurezza delle identit\u00e0 e gestione degli accessi per il governo federale | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/solutions\/federal\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/solutions\/federal\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/PreventAttacks.svg\",\"datePublished\":\"2021-03-22T20:13:14+00:00\",\"dateModified\":\"2025-01-21T07:25:24+00:00\",\"description\":\"Proteggi i dati e le infrastrutture sensibili del governo federale con un accesso sicuro per tutte le identit\u00e0 da qualsiasi dispositivo, ovunque, al momento giusto.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/solutions\/federal\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/it\/solutions\/federal\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/it\/solutions\/federal\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/PreventAttacks.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/PreventAttacks.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/it\/solutions\/federal\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Soluzioni di Identity Security\",\"item\":\"https:\/\/www.cyberark.com\/it\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Governo federale\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/it\/#website\",\"url\":\"https:\/\/www.cyberark.com\/it\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/it\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Soluzioni di sicurezza delle identit\u00e0 e gestione degli accessi per il governo federale | CyberArk","description":"Proteggi i dati e le infrastrutture sensibili del governo federale con un accesso sicuro per tutte le identit\u00e0 da qualsiasi dispositivo, ovunque, al momento giusto.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/it\/solutions\/federal\/","og_locale":"it_IT","og_type":"article","og_title":"Governo federale","og_description":"Proteggi i dati e le infrastrutture sensibili del governo federale con un accesso sicuro per tutte le identit\u00e0 da qualsiasi dispositivo, ovunque, al momento giusto.","og_url":"https:\/\/www.cyberark.com\/it\/solutions\/federal\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-01-21T07:25:24+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tempo di lettura stimato":"8 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/it\/solutions\/federal\/","url":"https:\/\/www.cyberark.com\/it\/solutions\/federal\/","name":"Soluzioni di sicurezza delle identit\u00e0 e gestione degli accessi per il governo federale | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/it\/solutions\/federal\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/it\/solutions\/federal\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/PreventAttacks.svg","datePublished":"2021-03-22T20:13:14+00:00","dateModified":"2025-01-21T07:25:24+00:00","description":"Proteggi i dati e le infrastrutture sensibili del governo federale con un accesso sicuro per tutte le identit\u00e0 da qualsiasi dispositivo, ovunque, al momento giusto.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/it\/solutions\/federal\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/it\/solutions\/federal\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/it\/solutions\/federal\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/PreventAttacks.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/PreventAttacks.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/it\/solutions\/federal\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/it\/"},{"@type":"ListItem","position":2,"name":"Soluzioni di Identity Security","item":"https:\/\/www.cyberark.com\/it\/solutions\/"},{"@type":"ListItem","position":3,"name":"Governo federale"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/it\/#website","url":"https:\/\/www.cyberark.com\/it\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/it\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/115387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/comments?post=115387"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/115387\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/42102"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/media?parent=115387"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/product_category?post=115387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}