{"id":132471,"date":"2022-07-11T11:47:07","date_gmt":"2022-07-11T15:47:07","guid":{"rendered":"https:\/\/www.cyberark.com\/identity-security\/"},"modified":"2024-10-17T16:23:46","modified_gmt":"2024-10-17T20:23:46","slug":"identity-security","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/it\/identity-security\/","title":{"rendered":"Identity Security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;.cybv2 .int-hero-noimg blue-gradient&#8221;][vc_column width=&#8221;5\/6&#8243; el_class=&#8221;column-1&#8243;][vc_column_text]<\/p>\n<h1><span class=\"font-green\"> Il futuro della sicurezza sono le identit\u00e0 <\/span><\/h1>\n<h2>L\u2019attuale panorama delle minacce \u00e8 caratterizzato da nuove identit\u00e0, nuovi ambienti e nuovi metodi di attacco. La combinazione tra proliferazione delle identit\u00e0, migrazione sul cloud e attacchi informatici sempre pi\u00f9 innovativi sta alimentando una quantit\u00e0 crescente di cyber attacchi mirati alle identit\u00e0. L\u2019unico modo per essere veramente certi che gli utenti giusti accedano alle risorse giuste al momento giusto consiste nell\u2019applicare a ogni identit\u00e0 controlli di autorizzazione adeguati.<\/h2>\n<p>[\/vc_column_text][vc_btn title=&#8221;Scopri come&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fblueprint%2F|&#8221; el_class=&#8221;cybv2-button-transp-green&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top info-graphic&#8221;][vc_column width=&#8221;5\/6&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_column_text el_class=&#8221;text-md-center head-box&#8221;]<\/p>\n<h3>Fiducia da pi\u00f9 di 8.000 organizzazioni<\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2_customer_stories vc_tta-o-non-responsive&#8221; css=&#8221;.vc_custom_1686775642430{background-color: #ffffff !important;}&#8221;][vc_column][vc_tta_tabs style=&#8221;flat&#8221; shape=&#8221;square&#8221; color=&#8221;white&#8221; spacing=&#8221;&#8221; gap=&#8221;20&#8243; alignment=&#8221;center&#8221; active_section=&#8221;&#8221; el_class=&#8221;cybv2_customer_stories_tabs&#8221; css=&#8221;.vc_custom_1608676900675{background-color: #ffffff !important;}&#8221;][vc_tta_section title=&#8221;Healthfirst&#8221; tab_id=&#8221;healthfirst&#8221; el_class=&#8221;new_hpstyle_section6_tab1_icon vc_active&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;188758&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221; css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]&#8221;Riuscire a controllare le identit\u00e0 significa poter bloccare la maggior parte degli attacchi moderni. E se controlli le identit\u00e0 controlli ogni perimetro, ogni applicazione e ogni container, ovvero ogni parte dell&#8217;ambiente. Questo \u00e8 ci\u00f2 che chiamo Zero Trust, ed \u00e8 per questo che utilizziamo CyberArk. \u00c8 questo che mi fa dormire la notte.&#8221;[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]Brian Miller, CISO, <strong>Healthfirst<\/strong>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/healthfirst-applies-an-identity-security-first-approach-to-implement-zero-trust\/\">Leggi il Case Study<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Glasgow Caledonian University&#8221; tab_id=&#8221;1711948553583-e7615151-2203&#8243; el_class=&#8221;new_hpstyle_section6_tab2_icon&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607653503563{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;188767&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221; css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;] \u201cNegli ultimi anni la GCU e altri enti del settore sono stati sempre pi\u00f9 spesso bersaglio di attacchi informatici. Questi rischi ci hanno spinto a rivalutare completamente il nostro approccio alla sicurezza informatica in generale e alla gestione delle identit\u00e0 e degli accessi in particolare. Dovevamo esaminare attentamente ogni aspetto del nostro stack di sicurezza. Abbiamo scelto la piattaforma CyberArk per le sue consolidate funzionalit\u00e0 di gestione degli accessi privilegiati e di gestione degli accessi, sapendo che avrebbe potuto offrire ulteriori funzionalit\u00e0 di sicurezza delle identit\u00e0 man mano che avremmo maturato e ampliato i nostri programmi di sicurezza\u201d.[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]Tahir Yousaf, Direttore IT presso <strong>Glasgow Caledonian University (GCU)<\/strong>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/press\/glasgow-caledonian-university-selects-cyberark-to-reduce-identity-security-risk-for-thousands-of-staff-and-students\/\">Leggi il comunicato stampa <\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;CapCom&#8221; tab_id=&#8221;capcom&#8221; el_class=&#8221;new_hpstyle_section6_tab3_icon&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1687286224685{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;185373&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221; css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]&#8221;Oltre a migliorare le contromisure tecniche, la nostra missione \u00e8 quella di migliorare l&#8217;alfabetizzazione degli utenti finali. Visualizzare bene la situazione attuale ci ha permesso di lavorare alla creazione di un ambiente migliore. Riteniamo che non ci siano soluzioni alternative a CyberArk Privileged Access Manager.&#8221;[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]Kohei Akiyama, Engine Development Support Section, R&amp;D Foundational Technology Department, <strong>CapCom<\/strong>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/it\/customer-stories\/capcom\/\">Leggi il Case Study<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][vc_raw_js]JTNDc2NyaXB0JTNFJTBBalF1ZXJ5JTI4ZG9jdW1lbnQlMjkucmVhZHklMjhmdW5jdGlvbiUyOCUyOSU3QiUwQSUyMCUyMCUyMCUyMCUyRiUyRkFkZCUyMEFjdGl2ZSUyMHRvJTIwdGFiJTIwb24lMjBwYWdlJTIwbG9hZCUwQSUyMCUyMCUyMCUyMCUyNHBhbmVscyUyMCUzRCUyMGpRdWVyeSUyOCUyNy5jeWJ2Ml9jdXN0b21lcl9zdG9yaWVzX3RhYnMlMjAudmNfdHRhLXBhbmVscyUyMC52Y190dGEtcGFuZWwlMjclMjklM0IlMEElMjAlMjAlMjAlMjAlMjR0YWJzJTIwJTNEJTIwalF1ZXJ5JTI4JTI3LmN5YnYyX2N1c3RvbWVyX3N0b3JpZXNfdGFicyUyMC52Y190dGEtdGFicy1saXN0JTIwLnZjX3R0YS10YWIlMjclMjklM0IlMEElMjAlMjAlMjAlMjB2YXIlMjBpbmRleCUyMCUzRCUyMDAlM0IlMEElMEElMjAlMjAlMjAlMjAlMkYlMkZBbGlnbiUyMFRhYnMlMjB3aXRoJTIwcGFuZWxzJTBBJTIwJTIwJTIwJTIwJTI0cGFuZWxzLmVhY2glMjhmdW5jdGlvbiUyOCUyOSU3QiUwQSUyMCUyMCUyMCUyMCUyMCUyMCUyMCUyMGpRdWVyeSUyOHRoaXMlMjkuaGFzQ2xhc3MlMjglMjd2Y19hY3RpdmUlMjclMjklM0IlMEElMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjByZXR1cm4lMjBmYWxzZSUzQiUwQSUyMCUyMCUyMCUyMCUyMCUyMCUyMCUyMGluZGV4JTJCJTJCJTNCJTBBJTIwJTIwJTIwJTIwJTdEJTI5JTBBJTIwJTIwJTIwJTIwdmFyJTIwbmV3SW5kZXglMjAlM0QlMjAwJTNCJTBBJTIwJTIwJTIwJTIwJTI0dGFicy5lYWNoJTI4ZnVuY3Rpb24lMjglMjklN0IlMEElMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjBpZiUyOGluZGV4JTIwJTNEJTNEJTIwbmV3SW5kZXglMjklN0IlMEElMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjBqUXVlcnklMjh0aGlzJTI5LmFkZENsYXNzJTI4JTI3dmNfYWN0aXZlJTI3JTI5JTNCJTBBJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTdEJTBBJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTIwbmV3SW5kZXglMkIlMkIlM0IlMEElMjAlMjAlMjAlMjAlN0QlMjklMEElN0QlMjklM0IlMEElM0MlMkZzY3JpcHQlM0U=[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top dark&#8221;][vc_column width=&#8221;2\/3&#8243; offset=&#8221;vc_col-sm-offset-2&#8243; el_class=&#8221;text-center&#8221;][vc_column_text]<\/p>\n<h3>Con la <span class=\"font-green\">proliferazione delle identit\u00e0<\/span>, aumentano anche le sfide alla sicurezza<\/h3>\n<p>Secondo una ricerca del 2022 a cui hanno partecipato 1.500 professionisti della sicurezza provenienti da tutto il mondo, le difficolt\u00e0 legate alla protezione delle identit\u00e0 stanno crescendo esponenzialmente.[\/vc_column_text][vc_btn title=&#8221;Scarica la ricerca&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; align=&#8221;center&#8221; css=&#8221;.vc_custom_1687291468267{margin-top: 30px !important;}&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fanalyst-reports%2Fthe-holistic-identity-security-maturity-model|&#8221; el_class=&#8221;cybv2-button-transp&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 hz-stats dark&#8221;][vc_column width=&#8221;1\/4&#8243;][vc_column_text el_class=&#8221;stat-box dark&#8221;]<strong>L&#8217;infrastruttura \u00e8 frammentata.<\/strong><\/p>\n<div class=\"stat\">\n<p>il 57%<\/p>\n<\/div>\n<p>ha due team di sicurezza: uno per le risorse on-premise e uno per il cloud.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_column_text el_class=&#8221;stat-box&#8221;]<strong>Le identit\u00e0 continuano a moltiplicarsi.<\/strong><\/p>\n<div class=\"stat\">\n<p>Il 79%<\/p>\n<\/div>\n<p>prevede che le identit\u00e0 in tutta l&#8217;organizzazione saranno pi\u00f9 che rappoddiate ogni anno.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_column_text el_class=&#8221;stat-box&#8221;]<strong>L&#8217;automazione \u00e8 fondamentale.<\/strong><\/p>\n<div class=\"stat\">\n<p>Il 61%<\/p>\n<\/div>\n<p>trova difficile automatizzare gli ambienti ibridi con strumenti legacy e nativi sul cloud.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_column_text el_class=&#8221;stat-box&#8221;]<strong>\u00c8 preferibile un approccio unificato.<\/strong><\/p>\n<div class=\"stat\">\n<p>Il 54%<\/p>\n<\/div>\n<p>preferisce adottare controlli unificati riducendo il numero di fornitori.[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2-pad cybv2 graphic-csb&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;blue-gradient-background cyb-br&#8221;][vc_column_text css=&#8221;.vc_custom_1711991903947{padding-top: 50px !important;padding-right: 50px !important;padding-bottom: 50px !important;padding-left: 50px !important;}&#8221; el_class=&#8221;text-center&#8221;]<img decoding=\"async\" class=\"alignnone size-full wp-image-188738\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg\" alt=\"CSB graphic\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;right-clmn&#8221; css=&#8221;.vc_custom_1711638016096{padding-top: 60px !important;}&#8221;][vc_column_text el_class=&#8221;head-box&#8221;]<\/p>\n<h3>Definizione dell\u2019identity security<\/h3>\n<p>Centered on intelligent privilege controls, identity security seamlessly secures access for all identities and flexibly automates the identity lifecycle with continuous threat detection and prevention \u2014 all with a unified approach.[\/vc_column_text][vc_btn title=&#8221;Scopri la piattaforma&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; css=&#8221;.vc_custom_1711991855874{margin-top: 40px !important;}&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fproducts%2F|title:Scopri%20la%20piattaforma|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"templatera_shortcode\"><div data-vc-full-width=\"true\" data-vc-full-width-temp=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_full_width_resource\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_title\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h5 style=\"text-align: center;\">IDENTITY SECURITY: INCENTRATO SUI<br \/>\nCONTROLLI DEI PRIVILEGI<\/h5>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section5_container\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_center   new_hpstyle_section5_gart_img\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/11\/gartner-square-cta.jpg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"gartner-square-cta\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/11\/gartner-square-cta.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/11\/gartner-square-cta-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/11\/gartner-square-cta-100x100.jpg 100w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>CyberArk \u00e8 Leader nel 2022 Gartner\u00ae Magic Quadrant\u2122 per Access Management.<\/h4>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_btn3-container  cybv2-button-solid cyb-button-hpstyle_section5 vc_btn3-inline\"  >\n\t<a class=\"vc_btn3-color-grey\" href=\"https:\/\/www.cyberark.com\/it\/gartner-magic-quadrant-for-access-management\/\" title=\"\">Scaricare il Report<\/a><\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/a><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources sub4&#8243; css=&#8221;.vc_custom_1666797120002{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8221;][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;no-break&#8221;][vc_column_text el_class=&#8221;no-break&#8221;]<\/p>\n<h3>Esplora le<br \/>\nrisorse<br \/>\ncorrelate<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/it\/resources\/\">Visualizza tutte le risorse<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column uf-height&#8221;][vc_column el_class=&#8221;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8221;.vc_custom_1710357149501{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;new_hpstyle_section8_uberflip&#8221;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_html]PGEgY2xhc3M9ImFuY2hvciIgbmFtZT0iZm9ybSI+PC9hPg==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1729196153107{background-color: #f7f7f7 !important;}&#8221; el_class=&#8221;cybv2 cybv2-pad-top hv-cta&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;left-clmn&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Parla con i nostri esperti di come:<\/h3>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-145290 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/06\/icon-check.svg\" alt=\"\" width=\"23\" height=\"25\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]assumere il controllo dei privilegi non gestiti sugli endpoint[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-145290 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/06\/icon-check.svg\" alt=\"\" width=\"23\" height=\"25\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]proteggere la forza lavoro e le credenziali dei clienti[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-145290 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/06\/icon-check.svg\" alt=\"\" width=\"23\" height=\"25\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]proteggere le identit\u00e0 in ambienti multi-cloud[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-145290 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/06\/icon-check.svg\" alt=\"\" width=\"23\" height=\"25\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]proteggere e gestire segreti e credenziali utilizzati da identit\u00e0 non umane[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-145290 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/06\/icon-check.svg\" alt=\"\" width=\"23\" height=\"25\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]proteggere le identit\u00e0 in ambienti multi-cloud[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_single_image image=&#8221;145624&#8243; img_size=&#8221;full&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;right-clmn cybv2-form&#8221; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_column_text el_class=&#8221;bold&#8221;]<\/p>\n<h4>Chiedi un appuntamento<\/h4>\n<p>[\/vc_column_text][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iOTE3NSIgdHlfcGFnZV91cmw9Imh0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS9pdC90aGFuay15b3UtY29udGFjdC8iXQ==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row el_class=&#8221;cyb-pad cybv2&#8243;][vc_column][vc_column_text el_class=&#8221;tiny&#8221;]* CyberArk ha sponsorizzato l&#8217;ESG Identity Security Maturity Model Survey 2022 (N=1500 | 16 paesi | 4 regioni)[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27776],"class_list":["post-132471","page","type-page","status-publish","hentry","product_category-identity-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Identity Security | CyberArk<\/title>\n<meta name=\"description\" content=\"Proteggi le tue applicazioni, la tua infrastruttura e i tuoi dati con CyberArk Identity Security, un approccio olistico e basato sul rischio per proteggere le identit\u00e0 sia umane che macchina.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/identity-security\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity Security\" \/>\n<meta property=\"og:description\" content=\"Proteggi le tue applicazioni, la tua infrastruttura e i tuoi dati con CyberArk Identity Security, un approccio olistico e basato sul rischio per proteggere le identit\u00e0 sia umane che macchina.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/identity-security\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-17T20:23:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"13 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/identity-security\/\",\"url\":\"https:\/\/www.cyberark.com\/identity-security\/\",\"name\":\"Identity Security | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/identity-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/identity-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg\",\"datePublished\":\"2022-07-11T15:47:07+00:00\",\"dateModified\":\"2024-10-17T20:23:46+00:00\",\"description\":\"Proteggi le tue applicazioni, la tua infrastruttura e i tuoi dati con CyberArk Identity Security, un approccio olistico e basato sul rischio per proteggere le identit\u00e0 sia umane che macchina.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/identity-security\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/identity-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/identity-security\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/identity-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identity Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Identity Security | CyberArk","description":"Proteggi le tue applicazioni, la tua infrastruttura e i tuoi dati con CyberArk Identity Security, un approccio olistico e basato sul rischio per proteggere le identit\u00e0 sia umane che macchina.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/identity-security\/","og_locale":"it_IT","og_type":"article","og_title":"Identity Security","og_description":"Proteggi le tue applicazioni, la tua infrastruttura e i tuoi dati con CyberArk Identity Security, un approccio olistico e basato sul rischio per proteggere le identit\u00e0 sia umane che macchina.","og_url":"https:\/\/www.cyberark.com\/identity-security\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2024-10-17T20:23:46+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tempo di lettura stimato":"13 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/identity-security\/","url":"https:\/\/www.cyberark.com\/identity-security\/","name":"Identity Security | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/identity-security\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/identity-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg","datePublished":"2022-07-11T15:47:07+00:00","dateModified":"2024-10-17T20:23:46+00:00","description":"Proteggi le tue applicazioni, la tua infrastruttura e i tuoi dati con CyberArk Identity Security, un approccio olistico e basato sul rischio per proteggere le identit\u00e0 sia umane che macchina.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/identity-security\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/identity-security\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/identity-security\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/identity-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Identity Security"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/132471","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/comments?post=132471"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/132471\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/media?parent=132471"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/product_category?post=132471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}