{"id":205525,"date":"2024-10-02T15:58:09","date_gmt":"2024-10-02T19:58:09","guid":{"rendered":"https:\/\/www.cyberark.com\/solutions\/managed-service-providers\/"},"modified":"2025-04-03T06:04:11","modified_gmt":"2025-04-03T10:04:11","slug":"managed-service-providers","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/it\/solutions\/managed-service-providers\/","title":{"rendered":"Managed Service Provider"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 hero dark&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h1>CyberArk per i fornitori di servizi gestiti\u200b<\/h1>\n<p><\/p>\n<h2>Promuovere la scalabilit\u00e0 e la crescita del business con le soluzioni MSP di CyberArk<\/h2>\n<p>\n[\/vc_column_text][vc_btn title=&#8221;Scarica la scheda tecnica&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; css=&#8221;&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fproduct-datasheets%2Fcyberark-msp-solution|title:Scarica%20la%20scheda%20tecnica|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-2&#8243; offset=&#8221;vc_hidden-xs&#8221;][vc_single_image image=&#8221;204656&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1741326382889{border-radius: 5px !important;}&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top overview-icons&#8221; css=&#8221;.vc_custom_1679682470478{background-color: #f7f7f7 !important;}&#8221;][vc_column el_class=&#8221;text-md-center cyb-pad-btm&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Esplora le soluzioni MSP<\/h3>\n<p>Scopri di pi\u00f9 sulla soluzione flessibile di CyberArk per i managed service provider \u200b[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"wp-image-144059 aligncenter\" style=\"width: 36px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-3.svg\" alt=\"Icona overview\" width=\"36\" height=\"36\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 style=\"text-align: center;\"><span class=\"TextRun BCX0 SCXP7953244\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP7953244\">Gestione e <\/span><\/span><span class=\"TextRun BCX0 SCXP7953244\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP7953244\">governance centralizzate<\/span><\/span><\/h4>\n<p><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun BCX0 SCXP206533491\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP206533491\">Gestione e <\/span><\/span><span class=\"TextRun BCX0 SCXP206533491\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP206533491\">amministrazione unificate di tutti gli ambienti <\/span><\/span><span class=\"TextRun BCX0 SCXP206533491\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP206533491\">e licenze dei clienti da un <\/span><\/span> <span class=\"TextRun BCX0 SCXP206533491\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP206533491\">portale centralizzato. <\/span><\/span><\/p>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"wp-image-144051 size-medium aligncenter\" style=\"width: 36px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-2.svg\" alt=\"\" width=\"300\" height=\"300\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 style=\"text-align: center;\"><span class=\"TextRun SCXP207810095 BCX0\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP207810095 BCX0\">Fornitura di servizi ottimizzata<\/span><\/span><\/h4>\n<p><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun BCX0 SCXP51829789\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP51829789\">Maggiore efficienza operativa <\/span><\/span><span class=\"TextRun BCX0 SCXP51829789\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP51829789\">grazie a processi automatizzati e <\/span><\/span><span class=\"TextRun BCX0 SCXP51829789\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP51829789\">reportistica <\/span><\/span><span class=\"TextRun BCX0 SCXP51829789\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP51829789\">accurata<\/span><\/span><span class=\"TextRun BCX0 SCXP51829789\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP51829789\"> sul <\/span><\/span><span class=\"TextRun BCX0 SCXP51829789\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP51829789\">programma di sicurezza delle identit\u00e0<\/span><\/span><span class=\"TextRun BCX0 SCXP51829789\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP51829789\"> del cliente<\/span><\/span><span class=\"TextRun BCX0 SCXP51829789\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP51829789\">.<\/span><\/span><\/p>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"wp-image-144043 size-medium aligncenter\" style=\"width: 36px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-1.svg\" alt=\"\" width=\"300\" height=\"300\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 style=\"text-align: center;\"><span class=\"TextRun BCX0 SCXP234840141\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP234840141\">Sicurezza e scalabilit\u00e0 potenziate<\/span><\/span><\/h4>\n<p><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXP54661066 BCX0\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP54661066 BCX0\">Maggiore sicurezza per i clienti con <\/span><\/span><span class=\"TextRun SCXP54661066 BCX0\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP54661066 BCX0\">monitoraggio e gestione efficienti delle sessioni <\/span><\/span><span class=\"TextRun SCXP54661066 BCX0\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP54661066 BCX0\">. Linee guida e best <\/span><\/span><span class=\"TextRun SCXP54661066 BCX0\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP54661066 BCX0\">practice per raggiungere gli obiettivi del programma di sicurezza delle identit\u00e0.<\/span><\/span><\/p>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2_customer_stories vc_tta-o-non-responsive cyb-pad-top&#8221; css=&#8221;.vc_custom_1701205658071{background-color: #ffffff !important;}&#8221;][vc_column][vc_tta_tabs style=&#8221;flat&#8221; shape=&#8221;square&#8221; color=&#8221;white&#8221; spacing=&#8221;&#8221; gap=&#8221;20&#8243; alignment=&#8221;center&#8221; active_section=&#8221;&#8221; el_class=&#8221;cybv2_customer_stories_tabs&#8221; css=&#8221;.vc_custom_1703194702840{background-color: #ffffff !important;}&#8221;][vc_tta_section title=&#8221;Deloitte&#8221; tab_id=&#8221;cisco&#8221; el_class=&#8221;new_hpstyle_section6_tab1_icon vc_active&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;194536&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221; css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]&#8221;Nel mondo digitale interconnesso di oggi, scegliere il giusto MSP equivale a selezionare un consulente di fiducia per il percorso della tua azienda. Questa decisione non solo influenza l&#8217;efficienza delle attivit\u00e0 quotidiane, ma anche la resilienza contro il panorama in continua evoluzione delle minacce cyber.\u00a0<a href=\"https:\/\/www.deloitte.com\/global\/en\/services\/risk-advisory\/services\/digital-identity-by-deloitte.html\" target=\"_blank\" rel=\"noopener\">Digital Identity by Deloitte<\/a>, la nostra soluzione di sicurezza delle identit\u00e0 completamente gestita, combinata alle <span class=\"TextRun Highlight SCXP193857762 BCX0\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP193857762 BCX0\">soluzioni<\/span><\/span> MSP di CyberArk, riduce significativamente i tempi e i costi di gestione della sicurezza delle identit\u00e0, consentendoci di concentrarci sull&#8217;estendere i vantaggi dell&#8217;identity security in mercati nuovi e pi\u00f9 ampi.&#8221;[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]Jan Vanhaecht, Global Digital Identity leader, <strong>Deloitte<\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Optiv&#8221; tab_id=&#8221;tiaa&#8221; el_class=&#8221;new_hpstyle_section6_tab2_icon&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;194545&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221; css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]&#8221;Nel mondo digitale interconnesso di oggi, la scelta del giusto MSP \u00e8 legata alla selezione di un partner di fiducia per il proprio percorso aziendale.  Questa decisione non solo incide sull&#8217;efficienza delle attivit\u00e0 quotidiane, ma anche sulla resilienza contro il panorama in continua evoluzione delle minacce alla sicurezza. Implementando le <span class=\"TextRun Highlight SCXP193857762 BCX0\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP193857762 BCX0\">soluzioni<\/span><\/span> MSP di CyberArk, abbiamo riscontrato una notevole riduzione dei tempi di manutenzione e un miglioramento dell\u2019efficienza operativa, permettendoci di concentrarci sull&#8217;estendere i benefici della sicurezza delle identit\u00e0 a tutti i nostri clienti partner.&#8221;[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]Micheal Steele, Senior Security Operations Manager, <strong>Optiv.<\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;blueAPACHE&#8221; tab_id=&#8221;capcom&#8221; el_class=&#8221;new_hpstyle_section6_tab3&#8243;][vc_row_inner equal_height=&#8221;yes&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;194733&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221; css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]&#8221;In un momento caratterizzato dal rapido avanzamento tecnologico e dalla crescente minaccia di attacchi cyber, selezionare il giusto partner MSP \u00e8 fondamentale per garantire la sicurezza delle operazioni quotidiane. La scelta adeguata si traduce in un consulente di fiducia per il tuo percorso di business, proteggendo i tuoi asset pi\u00f9 critici e rafforzando le difese dal panorama dinamico dei rischi digitali. In blueAPACHE, abbiamo integrato le <span class=\"TextRun Highlight SCXP193857762 BCX0\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP193857762 BCX0\">soluzioni <\/span><\/span>MSP di CyberArk nella nostra offerta di servizi, ottenendo miglioramenti significativi nella gestione del tempo, nella scalabilit\u00e0 e nell\u2019efficienza operativa, al fine di proteggere gli asset pi\u00f9 critici dei nostri clienti.&#8221;[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]Michael Zuppa, General Manager \u2013 Technology, <strong>blueAPACHE<\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1733233028486{background-color: #f7f7f7 !important;}&#8221; el_class=&#8221;cybv2 cybv2-pad-paragraph&#8221;][vc_column width=&#8221;5\/6&#8243; offset=&#8221;vc_col-lg-offset-2 vc_col-lg-8&#8243; el_class=&#8221;text-md-center&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;text-md-center&#8221;]<\/p>\n<h3>Con CyberArk, gli MSP possono scalare le proprie operazioni in modo efficiente e a costi vantaggiosi.\u200b<\/h3>\n<p>Le soluzioni di CyberArk offrono agli MSP una visione centralizzata degli ambienti CyberArk gestiti, abilitando un controllo unificato su tutte le istanze. Le soluzioni abilitano la <strong>Governance<\/strong>, consentendo la gestione di ambienti, licenze e automazione dei clienti. <strong>Provisioning<\/strong> abilita onboarding e manutenzione semplificati e sicuri degli account. <strong>Operations<\/strong>, con Single Sign-On, ricerca centralizzata, monitoraggio dei componenti, audit e gestione dei log.\u200b[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 paragraph-cta-list&#8221; css=&#8221;.vc_custom_1622730232307{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;stat-column border-col&#8221; css=&#8221;.vc_custom_1734014475267{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221; offset=&#8221;vc_col-sm-offset-0&#8243;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-125619 size-thumbnail\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/remote-work-icon.svg\" alt=\"remote work icon\" width=\"150\" height=\"150\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>Proteggi la tua organizzazione con i partner MSP di CyberArk\u200b<\/h4>\n<p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; offset=&#8221;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;list-text&#8221;]Riduci costi e complessit\u00e0 con uno dei nostri partner MSP.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; offset=&#8221;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;list-text&#8221;]Trai vantaggio dalle soluzioni di identity security all&#8217;avanguardia di CyberArk.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; offset=&#8221;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;list-text&#8221;]Proteggi i tuoi ambienti e asset critici e previeni i rischi di sicurezza. [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_btn title=&#8221;Richiedi una demo&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; css=&#8221;&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Frequest-demo%2F|title:Richiedi%20una%20demo|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;stat-column border-col&#8221;][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-126829 size-thumbnail\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/bulb-icon.svg\" alt=\"Soluzioni per uffici sostenibili\" width=\"150\" height=\"150\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>Iscriviti al programma MSP di CyberArk\u200b<\/h4>\n<p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; offset=&#8221;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;list-text&#8221;]Fai crescere la tua azienda con le soluzioni di identity security all&#8217;avanguardia di CyberArk..\u200b<br \/>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; offset=&#8221;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;list-text&#8221;]Ottimizza l\u2019efficienza operativa grazie alla gestione centralizzata dei tenant e alla visibilit\u00e0.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; offset=&#8221;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;list-text&#8221;]Riduci sovraccarico, tempi di manutenzione e costi grazie all\u2019automazione.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; offset=&#8221;vc_col-sm-offset-0&#8243;][vc_btn title=&#8221;Registrati ora&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; css=&#8221;&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fpartners%2Fbecome-a-partner%2F|title:%20Registrati%20ora%E2%80%8B|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources&#8221; css=&#8221;.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8221;][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;no-break&#8221;][vc_column_text el_class=&#8221;no-break&#8221;]<\/p>\n<h3>Esplora le<br \/>\nrisorse<br \/>\ncorrelate<\/h3>\n<p>\n[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/it\/resources\/\">Visualizza tutte le risorse<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column&#8221;][vc_column el_class=&#8221;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8221;.vc_custom_1720763936471{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;new_hpstyle_section8_uberflip&#8221;]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[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 hero dark&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text css=&#8221;&#8221;] CyberArk per i fornitori di servizi gestiti\u200b Promuovere la scalabilit\u00e0 e la crescita del business con le soluzioni MSP di CyberArk [\/vc_column_text][vc_btn title=&#8221;Scarica la scheda tecnica&#8221;&#8230;<\/p>\n","protected":false},"author":253,"featured_media":0,"parent":42102,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-205525","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Managed Service Provider | CyberArk<\/title>\n<meta name=\"description\" content=\"Un singolo punto di gestione per i Managed Service Provider (MSP) per accedere all\u2019ambiente dei propri clienti tramite un portale unificato, incluse funzionalit\u00e0 di telemetria, reportistica e provisioning.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/managed-service-providers\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managed Service Provider\" \/>\n<meta property=\"og:description\" content=\"Un singolo punto di gestione per i Managed Service Provider (MSP) per accedere all\u2019ambiente dei propri clienti tramite un portale unificato, incluse funzionalit\u00e0 di telemetria, reportistica e provisioning.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/managed-service-providers\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-03T10:04:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-3.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/managed-service-providers\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/managed-service-providers\/\",\"name\":\"Managed Service Provider | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/managed-service-providers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/managed-service-providers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-3.svg\",\"datePublished\":\"2024-10-02T19:58:09+00:00\",\"dateModified\":\"2025-04-03T10:04:11+00:00\",\"description\":\"Un singolo punto di gestione per i Managed Service Provider (MSP) per accedere all\u2019ambiente dei propri clienti tramite un portale unificato, incluse funzionalit\u00e0 di telemetria, reportistica e provisioning.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/managed-service-providers\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/managed-service-providers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/managed-service-providers\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-3.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-3.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/managed-service-providers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Soluzioni di Identity Security\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Managed Service Provider\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Managed Service Provider | CyberArk","description":"Un singolo punto di gestione per i Managed Service Provider (MSP) per accedere all\u2019ambiente dei propri clienti tramite un portale unificato, incluse funzionalit\u00e0 di telemetria, reportistica e provisioning.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/managed-service-providers\/","og_locale":"it_IT","og_type":"article","og_title":"Managed Service Provider","og_description":"Un singolo punto di gestione per i Managed Service Provider (MSP) per accedere all\u2019ambiente dei propri clienti tramite un portale unificato, incluse funzionalit\u00e0 di telemetria, reportistica e provisioning.","og_url":"https:\/\/www.cyberark.com\/solutions\/managed-service-providers\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-04-03T10:04:11+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-3.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tempo di lettura stimato":"7 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/managed-service-providers\/","url":"https:\/\/www.cyberark.com\/solutions\/managed-service-providers\/","name":"Managed Service Provider | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/solutions\/managed-service-providers\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/solutions\/managed-service-providers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-3.svg","datePublished":"2024-10-02T19:58:09+00:00","dateModified":"2025-04-03T10:04:11+00:00","description":"Un singolo punto di gestione per i Managed Service Provider (MSP) per accedere all\u2019ambiente dei propri clienti tramite un portale unificato, incluse funzionalit\u00e0 di telemetria, reportistica e provisioning.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/managed-service-providers\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/managed-service-providers\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/solutions\/managed-service-providers\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-3.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-3.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/managed-service-providers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Soluzioni di Identity Security","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Managed Service Provider"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/205525","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/users\/253"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/comments?post=205525"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/205525\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/42102"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/media?parent=205525"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/product_category?post=205525"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}