{"id":138615,"date":"2023-01-09T13:44:35","date_gmt":"2023-01-09T18:44:35","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/secrets-hub\/"},"modified":"2026-01-22T03:49:07","modified_gmt":"2026-01-22T08:49:07","slug":"secrets-hub","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/it\/products\/secrets-hub\/","title":{"rendered":"Secrets Hub"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765384736572{background-color: #082233 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;new-hero py-10&#8243;][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h1><span class=\"ice\">Secrets Hub<\/span><\/h1>\n<p>\n[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-8&#8243;]Gestione centralizzata, visibilit\u00e0 e rotazione dei secret in AWS Secrets Manager (ASM), Azure Key Vault (AKV) e Google Secret Manager (GSM), con discovery per HashiCorp Vault.[\/vc_column_text][vc_btn title=&#8221;Richiedi una demo&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; css=&#8221;&#8221; link=&#8221;url:%23modulo|title:Scarica%20il%20report|&#8221; el_class=&#8221;cybv2-button-solid-cyan&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_esp33i5i6x videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1765388773962{background-color: #A0E8F9 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cybv2&#8243;][vc_column width=&#8221;2\/3&#8243; offset=&#8221;vc_col-md-offset-2 vc_col-md-8&#8243; el_class=&#8221;text-center py-10&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;mb-6&#8243;]<\/p>\n<h3>Sai dove si trovano i tuoi vault di secret?<\/h3>\n<p>Completa questa breve auto-valutazione per scoprire i vault nascosti, comprendere i rischi e verificare se sei pronto per una scansione dei secret.[\/vc_column_text][vc_btn title=&#8221;Analizza la proliferazione di vault&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; css=&#8221;&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fvault-sprawl-assessment%2F|title:Analizza%20la%20proliferazione%20di%20vault|&#8221; el_class=&#8221;cybv2-button-solid-cyan&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 overview-vt py-10&#8243;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;head-box&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Proteggi le applicazioni cloud<\/h3>\n<p>Consenti agli sviluppatori di continuare a utilizzare i flussi di lavoro esistenti per accedere ai secret negli archivi integrati (nativi), offrendo ai team di sicurezza la visibilit\u00e0 e tutti i vantaggi della gestione centralizzata dei secret di CyberArk.<\/p>\n<p>Inizia subito a soddisfare le esigenze di team di sicurezza, sviluppatori e cloud operations che creano e distribuiscono applicazioni utilizzando i vault integrati dei cloud provider.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text css=&#8221;&#8221;]<img decoding=\"async\" class=\"alignnone size-full wp-image-134795\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg\" alt=\"Centralized Secrets Management and Rotation\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Gestione e rotazione centralizzate<\/h4>\n<p>Garantisci visibilit\u00e0, controllo e rotazione dei secret, applicando policy unificate.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text css=&#8221;&#8221;]<img decoding=\"async\" class=\"alignnone size-full wp-image-134811\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/ITsecurity-Icon.svg\" alt=\"Same Native Developer Experience\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Esperienza di sviluppo invariata<\/h4>\n<p>Consenti agli sviluppatori di continuare a utilizzare gli archivi di secret nativi del cloud provider, proprio come fanno oggi.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text css=&#8221;&#8221;]<img decoding=\"async\" class=\"alignnone size-full wp-image-134819\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Privilege-Escalation.svg\" alt=\"Reduces Vault Sprawl\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Rilevamento completo<\/h4>\n<p>Individua e fornisci insight sui secret archiviati, gestiti e non.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; disable_element=&#8221;yes&#8221; el_class=&#8221;cybv2 py-10&#8243;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;head-box&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-4&#8243;]<\/p>\n<h4>Il punteggio pi\u00f9 elevato per il caso d\u2019uso di secrets management nel report Gartner\u00ae Critical Capabilities for PAM 2023<\/h4>\n<p><span class=\"lead font-weight-normal\">Scopri perch\u00e9 CyberArk ha ottenuto il punteggio pi\u00f9 alto per il caso d\u2019uso nella gestione dei secret.<\/span>[\/vc_column_text][vc_btn title=&#8221;Scarica il report&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; css=&#8221;&#8221; el_class=&#8221;cybv2-button-solid-cyan&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fblog%2Fcio-pov-what-am-i-actually-supposed-to-do-with-agentic-ai|title:Leggi%20ora|&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_single_image image=&#8221;220376&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 py-10&#8243;][vc_column width=&#8221;5\/6&#8243; el_class=&#8221;text-center&#8221; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-4&#8243;]<\/p>\n<h3>CyberArk nominata Leader assoluto nel report KuppingerCole Analysts Leadership Compass for Enterprise Secrets Management 2025<\/h3>\n<p>\n[\/vc_column_text][vc_btn title=&#8221;Scarica il report completo&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; css=&#8221;&#8221; el_class=&#8221;cybv2-button-solid-cyan&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fanalyst-reports%2F2025-kuppingercole-leadership-compass-for-enterprise-secrets-management|title:Scarica%20il%20report%20completo|&#8221;][\/vc_column][vc_column][vc_single_image image=&#8221;215677&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 pt-12 pb-10&#8243; css=&#8221;.vc_custom_1765388794489{background-color: #082233 !important;}&#8221;][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;pb-8&#8243; offset=&#8221;vc_col-lg-offset-0 vc_col-md-3&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h5 class=\"ice\">Gestisci e individua in modo centralizzato i secret nei vault cloud-native, senza modificare l\u2019esperienza degli sviluppatori.<\/h5>\n<p><span class=\"text-white\">Ottieni tutti i vantaggi di una gestione centralizzata delle credenziali, senza influire sui flussi di lavoro degli sviluppatori.<\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; offset=&#8221;vc_col-md-offset-1 vc_col-md-8&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;pr-4 pb-8&#8243; width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-4&#8243;]<img decoding=\"async\" class=\"alignnone size-medium wp-image-208242\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/password__secondary-1.svg\" alt=\"icon\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h5 class=\"ice\">Gestione e rotazione centralizzate<\/h5>\n<p><span class=\"text-white\">Definisci un controllo centralizzato e applica rotazione unificata e altre policy sui secret, utilizzando i processi e l\u2019infrastruttura di sicurezza esistenti.<\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;pr-4 pb-8&#8243; width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-4&#8243;]<img decoding=\"async\" class=\"alignnone size-medium wp-image-208242\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/shield-security__secondary-1.svg\" alt=\"icon\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h5 class=\"ice\">Esperienza invariata per sviluppatori e ops<\/h5>\n<p><span class=\"text-white\">Consenti agli sviluppatori di continuare a utilizzare AWS Secrets Manager, Azure Key Vault e Google Secret Manager per accedere ai secret, mentre i team di sicurezza ottengono una visibilit\u00e0 centralizzata. Con Secrets Hub, possono anche rilevare le istanze di HashiCorp Vault create e gestite al di fuori della governance centrale.<\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;pr-4 pb-8&#8243; width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-4&#8243;]<img decoding=\"async\" class=\"alignnone size-medium wp-image-208242\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/shield-magnifying-glass__secondary-1.svg\" alt=\"icon\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h5 class=\"ice\">Discovery e visibilit\u00e0<\/h5>\n<p><span class=\"text-white\">Ottieni insight sui secret nei vault nativi di AWS, Azure e GCP e scopri le istanze di HashiCorp Vault che potrebbero essere gestite da sviluppatori o team al di fuori del controllo della sicurezza centrale.<\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;pr-4 pb-8&#8243; width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-4&#8243;]<img decoding=\"async\" class=\"alignnone size-medium wp-image-208242\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/fact-check__secondary-1.svg\" alt=\"icon\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h5 class=\"ice\">Estendibile e completo<\/h5>\n<p><span class=\"text-white\">Parte integrante di CyberArk Identity Security Platform, consente di proteggere e gestire in modo centralizzato i secret per tutte le tipologie di applicazioni e identit\u00e0 umane e macchina.<\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;pr-4 pb-8&#8243; width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-4&#8243;]<img decoding=\"async\" class=\"alignnone size-medium wp-image-208242\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/speed__secondary-1.svg\" alt=\"icon\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h5 class=\"ice\">Semplicit\u00e0 del SaaS<\/h5>\n<p><span class=\"text-white\">Semplifica operations e distribuzione, riduce al minimo la necessit\u00e0 di competenze specialistiche e offre elevati livelli di scalabilit\u00e0 e disponibilit\u00e0.<\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-top&#8221;][vc_column el_class=&#8221;text-md-center pb-12&#8243; offset=&#8221;vc_col-md-offset-2 vc_col-md-8&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>Elimina la proliferazione dei vault negli ambienti AWS, Azure e GCP e ottieni visibilit\u00e0 sull\u2019utilizzo di HashiCorp Vault che opera al di fuori della governance centrale.<\/h4>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 pb-10&#8243;][vc_column][vc_single_image image=&#8221;220386&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 customer-stories cybv2-pad&#8221;][vc_column width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-4&#8243;]<\/p>\n<h3>Aiutiamo i clienti di tutto il mondo a proteggere le identit\u00e0 di workload e applicazioni cloud<\/h3>\n<p><\/p>\n<h6>I clienti CyberArk utilizzano CyberArk Secrets Manager e Identity Security Platform per proteggere tutte le loro identit\u00e0, umane e non.<\/h6>\n<p>\n[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/?post_type=customer_story&#038;p=128197\">Visualizza pi\u00f9 clienti<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cyb-pad-btm featured-video-overflow&#8221; css=&#8221;.vc_custom_1671212795028{background-color: #ffffff !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;pb-6&#8243;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215681\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/dz-bank-logo-block.jpg\" alt=\"dz bank logo\" width=\"638\" height=\"622\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/dz-bank-logo-block.jpg 638w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/dz-bank-logo-block-300x292.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/dz-bank-logo-block-150x146.jpg 150w\" sizes=\"auto, (max-width: 638px) 100vw, 638px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-4&#8243;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-201899\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/01\/double-quotes.svg\" alt=\"double quotes\" width=\"87\" height=\"64\" \/><\/p>\n<p><span class=\"large-quote\" style=\"font-size: 22px;\">\u201c(with) identity security and especially PAM, CyberArk is the key service DZ BANK uses to protect our IT infrastructure. Since integrating CyberArk into our environment, privilege management and security have definitely improved. Fundamentally, it always comes back to having control over privileges and being able to manage secrets.\u201d<\/span><\/p>\n<p><strong>Kurt Sand<\/strong>,\u00a0GM,<br \/>Machine Identity Security at CyberArk[\/vc_column_text][vc_row_inner el_class=&#8221;resource-button-sand&#8221;][vc_column_inner column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-business-value-of-cyberark|title:Leggi%20il%20whitepaper|&#8221; offset=&#8221;vc_col-lg-10 vc_col-md-10 vc_col-xs-11&#8243;][vc_column_text css=&#8221;&#8221;]Whitepaper[\/vc_column_text][vc_column_text css=&#8221;&#8221;]Report The State of Machine Identity Security 2025<i class=\"fa-solid fa-circle-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-btm&#8221;][vc_column][vc_raw_html]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0iY3VzdG9tZXJfc3RvcnkiIHBvc3RzX3Blcl9wYWdlPSI0IiBjb2x1bW5zX2xhcmdlPSIzIiBzaG93X2F1dGhvcj0iZmFsc2UiIHNob3dfZXhjZXJwdD0iZmFsc2UiIHBvczFfaWQ9IjEzODQzNCIgcG9zMl9pZD0iMTI4MTQyIiBwb3MzX2lkPSIxMzU0NzYiIHBvczRfaWQ9IjEyODQ2MSJdPGJyPg==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 promo-image&#8221; css=&#8221;.vc_custom_1756391477950{background-color: #D6F77A !important;}&#8221;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/12&#8243; offset=&#8221;vc_col-md-offset-2&#8243;][vc_single_image image=&#8221;220413&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Migliora la sicurezza delle applicazioni, integrandola nei flussi di lavoro degli sviluppatori<\/h3>\n<p><strong>Considerazioni chiave per proteggere diverse tipologie di identit\u00e0 non umane<\/strong><br \/>Scopri come semplificare la protezione centralizzata dei secret su cloud, in ambienti ibridi e altro.[\/vc_column_text][vc_btn title=&#8221;Get the eBook&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; align=&#8221;center&#8221; css=&#8221;&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Febooks%2Fkey-considerations-for-securing-different-machine-identities|title:Get%20the%20eBook|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources&#8221; css=&#8221;.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8221;][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;no-break&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;no-break&#8221;]<\/p>\n<h3>Esplora le risorse correlate<\/h3>\n<p>\n[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/it\/resources\/\">Visualizza tutte le risorse<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources_uberflip&#8221;][vc_column el_class=&#8221;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8221;.vc_custom_1765389588065{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;new_hpstyle_section8_uberflip&#8221;]PCEtLSBVYmVyZmxpcCBFbWJlZGRlZCBIdWIgV2lkZ2V0IC0tPjxicj48YnI+ICA8ZGl2IGlkPSJVZkVtYmVkZGVkSHViMTY5NDc3NzA2OTA3OSI+PC9kaXY+PGJyPjxicj4gIDxzY3JpcHQ+DQogIHdpbmRvdy5fdWZIdWJDb25maWcgPSB3aW5kb3cuX3VmSHViQ29uZmlnIHx8IFtdOw0KICB3aW5kb3cuX3VmSHViQ29uZmlnLnB1c2goew0KICAgICdjb250YWluZXJzJzp7J2FwcCc6JyNVZkVtYmVkZGVkSHViMTY5NDc3NzA2OTA3OSd9LA0KICAgICdjb2xsZWN0aW9uJzogJzEwNjMwOTU5JywNCiAgICAnb3BlbkxpbmsnOmZ1bmN0aW9uKHVybCl7DQogICAgICB3aW5kb3cudG9wLmxvY2F0aW9uLmhyZWY9dXJsOw0KICAgIH0sDQogICAgJ2xhenlsb2FkZXInOnsNCiAgICAgICdpdGVtRGlzcGxheUxpbWl0JzoyMCwNCiAgICAgICdtYXhUaWxlc1BlclJvdyc6MywNCiAgICAgICdtYXhJdGVtc1RvdGFsJzogMw0KICAgIH0sDQogICAgJ3RpbGVTaXplJzogJ2xhcmdlJywNCiAgICAnZW5hYmxlUGFnZVRyYWNraW5nJzpmYWxzZSwNCiAgICAnYmFzZVVybCc6ICdodHRwczovL3d3dy5jeWJlcmFyay5jb20vcmVzb3VyY2VzLycsDQogICAgJ2ZpbGVzVXJsJzogJ2h0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS9yZXNvdXJjZXMvJywNCiAgICAnZ2VuZXJhdGVkQXRVVEMnOiAnMjAyMy0wOS0xNSAwOToyMDo1OCcsDQogIH0pOw0KICA8L3NjcmlwdD48YnI+PGJyPiAgPHNjcmlwdD4oZnVuY3Rpb24oZCx0LHUpIHsNCiAgICBmdW5jdGlvbiBsb2FkKCl7DQogICAgICB2YXIgcz1kLmNyZWF0ZUVsZW1lbnQodCk7cy5zcmM9dTtkLmJvZHkuYXBwZW5kQ2hpbGQocyk7DQogICAgfQ0KICAgIGlmICh3aW5kb3cuYWRkRXZlbnRMaXN0ZW5lcikgew0KICAgICAgd2luZG93LmFkZEV2ZW50TGlzdGVuZXIoJ2xvYWQnLGxvYWQsZmFsc2UpOw0KICAgIH0NCiAgICBlbHNlIGlmICh3aW5kb3cuYXR0YWNoRXZlbnQpIHsNCiAgICAgIHdpbmRvdy5hdHRhY2hFdmVudCgnb25sb2FkJyxsb2FkKTsNCiAgICB9DQogICAgZWxzZXsNCiAgICAgIHdpbmRvdy5vbmxvYWQ9bG9hZDsNCiAgICB9DQogIH0oZG9jdW1lbnQsJ3NjcmlwdCcsJ2h0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS9yZXNvdXJjZXMvaHVic0Zyb250L2VtYmVkX2NvbGxlY3Rpb24nKSk7DQogIDwvc2NyaXB0Pjxicj4gIDwhLS0gL0VuZCBVYmVyZmxpcCBFbWJlZGRlZCBIdWIgV2lkZ2V0IC0tPg==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1765389636724{background-color: #f7f7f7 !important;}&#8221; el_class=&#8221;cybv2 cybv2-pad-top hv-cta&#8221; el_id=&#8221;form&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;left-clmn&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h2>Richiedi una demo<\/h2>\n<p><strong>Discovery e visibilit\u00e0:<\/strong> visualizza i secret su AWS, Azure e GCP e scopri le istanze HashiCorp Vault al di fuori del controllo della sicurezza centrale<\/p>\n<p><strong>Gestione e rotazione centralizzate:<\/strong> gestisci e ruota i secret in modo coerente nei vault nativi di AWS, Azure e GCP.<\/p>\n<p><strong>Esperienza di sviluppo invariata:<\/strong> preserva i flussi di lavoro degli sviluppatori con AWS, Azure, GCP e HashiCorp Vault, aggiungendo visibilit\u00e0 centralizzata.<\/p>\n<p><strong>Riduzione della proliferazione di vault:<\/strong> semplifica le operazioni e aumenta la visibilit\u00e0, gestendo i secret centralmente in tutti i principali archivi di secret nativi di cloud provider e HashiCorp Vault.[\/vc_column_text][vc_single_image image=&#8221;220386&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221; el_class=&#8221;d-none d-md-block&#8221;][\/vc_column][vc_column width=&#8221;1\/12&#8243; css=&#8221;.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;right-clmn cybv2-form&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;bold&#8221;]<\/p>\n<h5>Inizia una demo di Secrets Hub<\/h5>\n<p>[\/vc_column_text][vc_raw_html css=&#8221;&#8221;]W21hcmtldG9fZm9ybSBpZD0iMTExMDEiIHR5X3BhZ2VfdXJsPSJodHRwczovL3d3dy5jeWJlcmFyay5jb20vdGhhbmsteW91LXNlY3JldHMtaHViLyJd[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765384736572{background-color: #082233 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;new-hero py-10&#8243;][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;] Secrets Hub [\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-8&#8243;]Gestione centralizzata, visibilit\u00e0 e rotazione dei secret in AWS Secrets Manager (ASM), Azure Key Vault (AKV)&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":42105,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27774],"class_list":["post-138615","page","type-page","status-publish","hentry","product_category-devsecops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Gestione e rotazione dei secret per AWS Secrets Manager | CyberArk<\/title>\n<meta name=\"description\" content=\"CyberArk Secrets Hub offre tutti i vantaggi della gestione e rotazione centralizzata dei secret per AWS Secrets Manager, senza impatto sui workflow degli sviluppatori.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/it\/products\/secrets-hub\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secrets Hub\" \/>\n<meta property=\"og:description\" content=\"CyberArk Secrets Hub offre tutti i vantaggi della gestione e rotazione centralizzata dei secret per AWS Secrets Manager, senza impatto sui workflow degli sviluppatori.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/it\/products\/secrets-hub\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-22T08:49:07+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/it\/products\/secrets-hub\/\",\"url\":\"https:\/\/www.cyberark.com\/it\/products\/secrets-hub\/\",\"name\":\"Gestione e rotazione dei secret per AWS Secrets Manager | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/products\/secrets-hub\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/products\/secrets-hub\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg\",\"datePublished\":\"2023-01-09T18:44:35+00:00\",\"dateModified\":\"2026-01-22T08:49:07+00:00\",\"description\":\"CyberArk Secrets Hub offre tutti i vantaggi della gestione e rotazione centralizzata dei secret per AWS Secrets Manager, senza impatto sui workflow degli sviluppatori.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/products\/secrets-hub\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/it\/products\/secrets-hub\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/it\/products\/secrets-hub\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/it\/products\/secrets-hub\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prodotti\",\"item\":\"https:\/\/www.cyberark.com\/it\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Secrets Hub\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/it\/#website\",\"url\":\"https:\/\/www.cyberark.com\/it\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/it\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Gestione e rotazione dei secret per AWS Secrets Manager | CyberArk","description":"CyberArk Secrets Hub offre tutti i vantaggi della gestione e rotazione centralizzata dei secret per AWS Secrets Manager, senza impatto sui workflow degli sviluppatori.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/it\/products\/secrets-hub\/","og_locale":"it_IT","og_type":"article","og_title":"Secrets Hub","og_description":"CyberArk Secrets Hub offre tutti i vantaggi della gestione e rotazione centralizzata dei secret per AWS Secrets Manager, senza impatto sui workflow degli sviluppatori.","og_url":"https:\/\/www.cyberark.com\/it\/products\/secrets-hub\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-01-22T08:49:07+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tempo di lettura stimato":"6 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/it\/products\/secrets-hub\/","url":"https:\/\/www.cyberark.com\/it\/products\/secrets-hub\/","name":"Gestione e rotazione dei secret per AWS Secrets Manager | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/it\/products\/secrets-hub\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/it\/products\/secrets-hub\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg","datePublished":"2023-01-09T18:44:35+00:00","dateModified":"2026-01-22T08:49:07+00:00","description":"CyberArk Secrets Hub offre tutti i vantaggi della gestione e rotazione centralizzata dei secret per AWS Secrets Manager, senza impatto sui workflow degli sviluppatori.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/it\/products\/secrets-hub\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/it\/products\/secrets-hub\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/it\/products\/secrets-hub\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/it\/products\/secrets-hub\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/it\/"},{"@type":"ListItem","position":2,"name":"Prodotti","item":"https:\/\/www.cyberark.com\/it\/products\/"},{"@type":"ListItem","position":3,"name":"Secrets Hub"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/it\/#website","url":"https:\/\/www.cyberark.com\/it\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/it\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/138615","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/comments?post=138615"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/138615\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/42105"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/media?parent=138615"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/product_category?post=138615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}