{"id":131029,"date":"2021-07-20T10:51:15","date_gmt":"2021-07-20T14:51:15","guid":{"rendered":"https:\/\/www.cyberark.com\/trust\/"},"modified":"2025-12-03T06:49:31","modified_gmt":"2025-12-03T11:49:31","slug":"trust","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/it\/trust\/","title":{"rendered":"Trust Center"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero-noimg dark&#8221;][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;column-1&#8243;][vc_column_text]<\/p>\n<h1>La fiducia in CyberArk<\/h1>\n<h2>Organizzazioni di ogni natura e dimensione affidano a CyberArk la protezione delle chiavi del loro regno. Come proteggiamo le nostre chiavi?<\/h2>\n<p>[\/vc_column_text][vc_btn title=&#8221;Visita il nostro Trust Portal&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; css=&#8221;&#8221; link=&#8221;url:http%3A%2F%2Ftrust.cyberark.com|title:Visita|target:_blank|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/security-of-the-cyberark-corporate-network\">Scarica il whitepaper<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2-pad-top overview-icons&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-120202\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/High-Performance.svg\" alt=\"Corporate Security Icon\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>Sicurezza aziendale<\/h4>\n<p>Seguiamo approfondite pratiche amministrative, operative e di configurazione per proteggere le tue informazioni attraverso un set completo di controlli di sicurezza, pratiche e formazione. I nostri team di sicurezza dedicati lavorano per migliorare continuamente sviluppo sicuro, operazioni di sicurezza e pratiche di mitigazione delle minacce, che consentono di rilevare e prevenire le minacce alla sicurezza, e sono progettate per garantire che i tuoi dati siano protetti.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/it\/trust\/corporate-security\/\">Per saperne di pi\u00f9<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;cta-box&#8221; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-120211\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/SaaS-Security.svg\" alt=\"SaaS Security Icon\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>Sicurezza SAAS<\/h4>\n<p>Le organizzazioni implementano a livello globale i prodotti e i servizi di sicurezza leader di settore di CyberArk &#8211; ecco perch\u00e9 ci impegniamo a fornire prodotti e offerte SaaS progettati per essere altamente scalabili, stabili e sicuri su larga scala. Le nostre offerte SaaS si basano sulle migliori tecnologie di base della categoria e sono progettate per garantire prestazioni e disponibilit\u00e0 elevate a supporto della continuit\u00e0 aziendale.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/it\/trust\/saas-security\/\">Per saperne di pi\u00f9<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 overview-icons&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-120219\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Identity-Logon-Overview-Vertical-Directory-User-Management.svg\" alt=\"Reliability Icon\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>Affidabilit\u00e0<\/h4>\n<p>Vogliamo che i nostri clienti si sentano a proprio agio quando utilizzano i nostri servizi. I nostri piani organizzativi includono una rigorosa gestione delle risorse e della configurazione, monitoraggio continuo della rete e piani di continuit\u00e0 operativa, ripristino di emergenza e risposta agli incidenti.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/it\/trust\/reliability\/\">Per saperne di pi\u00f9<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;cta-box&#8221; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-120227\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/ContinuousCompliance-Overview-Vertical-Overview-Vertical.svg\" alt=\"Industry Standards Compliance Icon\" \/>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1747146453237{margin-bottom: 40px !important;}&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>Conformit\u00e0 alle normative del settore<\/h4>\n<p>In CyberArk, i nostri prodotti e sistemi di gestione della sicurezza delle informazioni vengono regolarmente sottoposti a revisioni e test rigorosi, tra cui audit e certificazioni come SOC 2 Tipo 2 e ISO 27001. I nostri fornitori di servizi tecnologici sono tenuti a sottoporsi a un rigoroso processo di qualificazione della sicurezza per verificare le loro pratiche, e i data center dei nostri fornitori di cloud sono almeno conformi allo standard SOC 2.[\/vc_column_text][vc_btn title=&#8221;Visita il nostro Trust Portal&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; css=&#8221;&#8221; link=&#8221;url:http%3A%2F%2Ftrust.cyberark.com|title:Visita|target:_blank|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;inline link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/it\/trust\/compliance\/\">Per saperne di pi\u00f9<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 overview-icons&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-120236\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Privacyandsinglesignon.svg\" alt=\"Privacy and Legal Compliance Icon\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>Privacy e protezione dei dati<\/h4>\n<p>Ci impegniamo a proteggere i tuoi dati dall&#8217;accesso non autorizzato e a supportare la tua organizzazione nel mantenere la conformit\u00e0 in tema di privacy dei dati. Abbiamo anche investito significativamente in misure rigorose di protezione dei dati per aiutarti a proteggere i tuoi dati, compresi i nostri programmi per GDPR e privacy  internazionale.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/it\/trust\/privacy\/\">Per saperne di pi\u00f9<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;cta-box&#8221; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-126797\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/esg-hammer-icon.svg\" alt=\"Informativa sulle policy\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>Compliance legale e codice di condotta<\/h4>\n<p>Ci impegniamo a operare in conformit\u00e0 ai nostri obblighi legali e a standard etici riconosciuti. Riconosciamo che le nostre persone, la nostra cultura, i nostri valori e la nostra integrit\u00e0 sono parte integrante del nostro successo.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/it\/trust\/legal-compliance-and-code-of-conduct\/\" rel=\"noopener\">Per saperne di pi\u00f9<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 overview-icons&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text css=&#8221;&#8221;]<img decoding=\"async\" class=\"alignnone wp-image-133458 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/brain-icon.svg\" alt=\"prescriptive guidance icon\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>IA responsabile<\/h4>\n<p>Siamo impegnati a sviluppare funzionalit\u00e0 IA sicure, eque e accurate e a darti strumenti progettati per migliorare la tua sicurezza e la tua esperienza utente.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/trust\/responsible-ai\/\">Per saperne di pi\u00f9<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;cta-box&#8221; offset=&#8221;vc_col-sm-offset-1&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_full_width_resource&#8221;][vc_column][vc_row_inner el_class=&#8221;new_hpstyle_section5_container&#8221;][vc_column_inner][vc_single_image image=&#8221;209393&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section5_gart_img&#8221;][vc_column_text css=&#8221;.vc_custom_1747147298130{margin-bottom: 20px !important;}&#8221; el_class=&#8221;new_hpstyle_section5_text1&#8243;]<\/p>\n<h4>Visita il nostro Trust Portal per ricevre ulteriori informazioni sul nostro impegno dedicato a sicurezza e privacy e per accedere alla documentazione.<\/h4>\n<p>[\/vc_column_text][vc_btn title=&#8221;Visita il nostro Trust Portal&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; css=&#8221;&#8221; link=&#8221;url:http%3A%2F%2Ftrust.cyberark.com|title:Visita|target:_blank|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1615402724220{background-color: #f7f7f7 !important;}&#8221; el_class=&#8221;cybv2 cybv2-pad-top stckd-cllt flex-column-reverse flex-lg-row&#8221;][vc_column el_class=&#8221;left-clmn&#8221; offset=&#8221;vc_col-md-5&#8243;][vc_column_text el_class=&#8221;head-box&#8221;]<\/p>\n<h3>Una nota dal nostro CIO<\/h3>\n<p class=\"cyb-quote\">&#8220;Come azienda focalizzata sulla protezione degli asset e dei sistemi pi\u00f9 critici dei clienti, ci dedichiamo con la massima cura alla sicurezza delle informazioni e seguiamo standard di sicurezza solidi e consolidati.&#8221;<\/p>\n<p>Omer Grossman, Chief Information Officer di CyberArk[\/vc_column_text][\/vc_column][vc_column el_class=&#8221;right-clmn&#8221; offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_single_image image=&#8221;138108&#8243; img_size=&#8221;full&#8221; el_class=&#8221;.border-shadow&#8221;][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2-pad-top plp-overview-more-col&#8221;][vc_column width=&#8221;5\/6&#8243; el_class=&#8221;text-center heading&#8221; offset=&#8221;vc_col-md-offset-1 vc_col-sm-offset-1&#8243;][vc_column_text]<\/p>\n<h3>Persone chiave<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;cta-box&#8221; offset=&#8221;vc_col-md-offset-2 vc_col-sm-offset-2&#8243;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-134548\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/peretz-regev-small.jpg\" alt=\"Peretz Regev\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/peretz-regev-small.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/peretz-regev-small-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/peretz-regev-small-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>Peretz Regev<\/h4>\n<p>Chief Product Officer<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/company\/leadership\/peretz-regev\/\">Leggi la biografia<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-138116\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/12\/omer-grossman-people.jpg\" alt=\"omer grossman headshot\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/12\/omer-grossman-people.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/12\/omer-grossman-people-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/12\/omer-grossman-people-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>Omer Grossman<\/h4>\n<p>Chief Information Officer<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/it\/company\/leadership\/omer-grossman\/\">Leggi la biografia<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top overview-hz&#8221; css=&#8221;.vc_custom_1625753067539{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;head-box&#8221;][vc_column_text]<\/p>\n<h3>Risorse chiave<\/h3>\n<p>Scopri di pi\u00f9 con le risorse di supporto.[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_row_inner equal_height=&#8221;yes&#8221;][vc_column_inner el_class=&#8221;cta-box&#8221; width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1756992973507{padding-bottom: 20px !important;}&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-118800\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg\" alt=\"Difenditi dagli attacchi\" \/>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1756992827893{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4>Overview sull&#8217;incidente di Salesloft Drift e risposta di CyberArk<\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/all-blog-posts\/salesloft-drift-incident-overview-and-cyberarks-response\">Per saperne di pi\u00f9<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;cta-box&#8221; width=&#8221;1\/3&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-120227\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/ContinuousCompliance-Overview-Vertical-Overview-Vertical.svg\" alt=\"White paper sulla sicurezza aziendale\" \/>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1700483092115{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4>White paper sulla sicurezza aziendale Standard e pratiche<\/h4>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/cyberark-corporate-security-white-paper-standards-and-practices\">Per saperne di pi\u00f9<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;cta-box&#8221; width=&#8221;1\/3&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-118800\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg\" alt=\"Difenditi dagli attacchi\" \/>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1625751898228{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4>Centro per la privacy<\/h4>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/privacy-center\/\">Per saperne di pi\u00f9<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 get-started cybv2-pad dark&#8221; css=&#8221;.vc_custom_1706302169617{margin-top: 80px !important;margin-bottom: 80px !important;}&#8221;][vc_column width=&#8221;2\/3&#8243; el_class=&#8221;stat-column text-center&#8221; offset=&#8221;vc_col-md-offset-2&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;extra-space chartreuse&#8221;]<\/p>\n<h3 style=\"color: #d4eb33 !important;\">Documenti del Trust Center<\/h3>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1747146779520{margin-bottom: 40px !important;}&#8221; el_class=&#8221;new_hpstyle_section9_text&#8221;]<\/p>\n<h5>Scopri di pi\u00f9 sul nostro approccio a sicurezza e conformit\u00e0 e accedi alla documentazione relativa a sicurezza, compliance e privacy.<\/h5>\n<p>[\/vc_column_text][vc_btn title=&#8221;Visita il nostro Trust Portal&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; css=&#8221;&#8221; link=&#8221;url:http%3A%2F%2Ftrust.cyberark.com|title:Visita|target:_blank|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero-noimg dark&#8221;][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;column-1&#8243;][vc_column_text] La fiducia in CyberArk Organizzazioni di ogni natura e dimensione affidano a CyberArk la protezione delle chiavi del loro regno. Come proteggiamo le nostre chiavi? [\/vc_column_text][vc_btn title=&#8221;Visita il&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-131029","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Trust Center Aziendale | CyberArk<\/title>\n<meta name=\"description\" content=\"In CyberArk la fiducia inizia con la sicurezza, ma include anche l&#039;affidabilit\u00e0, la privacy e la conformit\u00e0 agli standard di settore e alle normative legali. Per saperne di pi\u00f9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/it\/trust\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trust Center\" \/>\n<meta property=\"og:description\" content=\"In CyberArk la fiducia inizia con la sicurezza, ma include anche l&#039;affidabilit\u00e0, la privacy e la conformit\u00e0 agli standard di settore e alle normative legali. Per saperne di pi\u00f9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/it\/trust\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-03T11:49:31+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/it\/trust\/\",\"url\":\"https:\/\/www.cyberark.com\/it\/trust\/\",\"name\":\"Trust Center Aziendale | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/trust\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/High-Performance.svg\",\"datePublished\":\"2021-07-20T14:51:15+00:00\",\"dateModified\":\"2025-12-03T11:49:31+00:00\",\"description\":\"In CyberArk la fiducia inizia con la sicurezza, ma include anche l'affidabilit\u00e0, la privacy e la conformit\u00e0 agli standard di settore e alle normative legali. Per saperne di pi\u00f9.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/trust\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/it\/trust\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/it\/trust\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/High-Performance.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/High-Performance.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/it\/trust\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trust Center\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/it\/#website\",\"url\":\"https:\/\/www.cyberark.com\/it\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/it\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Trust Center Aziendale | CyberArk","description":"In CyberArk la fiducia inizia con la sicurezza, ma include anche l'affidabilit\u00e0, la privacy e la conformit\u00e0 agli standard di settore e alle normative legali. Per saperne di pi\u00f9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/it\/trust\/","og_locale":"it_IT","og_type":"article","og_title":"Trust Center","og_description":"In CyberArk la fiducia inizia con la sicurezza, ma include anche l'affidabilit\u00e0, la privacy e la conformit\u00e0 agli standard di settore e alle normative legali. Per saperne di pi\u00f9.","og_url":"https:\/\/www.cyberark.com\/it\/trust\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-12-03T11:49:31+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/it\/trust\/","url":"https:\/\/www.cyberark.com\/it\/trust\/","name":"Trust Center Aziendale | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/it\/trust\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/it\/trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/High-Performance.svg","datePublished":"2021-07-20T14:51:15+00:00","dateModified":"2025-12-03T11:49:31+00:00","description":"In CyberArk la fiducia inizia con la sicurezza, ma include anche l'affidabilit\u00e0, la privacy e la conformit\u00e0 agli standard di settore e alle normative legali. Per saperne di pi\u00f9.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/it\/trust\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/it\/trust\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/it\/trust\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/High-Performance.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/High-Performance.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/it\/trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/it\/"},{"@type":"ListItem","position":2,"name":"Trust Center"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/it\/#website","url":"https:\/\/www.cyberark.com\/it\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/it\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/131029","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/comments?post=131029"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/131029\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/media?parent=131029"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/product_category?post=131029"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}