{"id":206701,"date":"2025-04-01T11:39:01","date_gmt":"2025-04-01T15:39:01","guid":{"rendered":"https:\/\/www.cyberark.com\/?page_id=206701"},"modified":"2025-06-02T01:00:28","modified_gmt":"2025-06-02T05:00:28","slug":"product-name-updates","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/it\/product-name-updates\/","title":{"rendered":"Product Name Updates"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero-noimg dark&#8221;][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;column-1&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h1>Product Name Updates<\/h1>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad&#8221;][vc_column][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Machine Identity Security<\/h3>\n<p>We are updating the names of many of our Machine Identity Security products, making them clearer and more descriptive for our customers. These updated names include CyberArk product Conjur Secrets Manager, as well as the products from the Venafi acquisition in 2024. You may still see the previous names in the product user interface and documentation as we make this transition. Rest assured that all of the Machine Identity Security products you use and love today are remaining \u2013 just under a different name.<\/p>\n<p>Conjur Cloud Secrets Manager is now CyberArk Secrets Manager, SaaS<\/p>\n<p>CyberArk Conjur Secrets Manager Enterprise is now CyberArk Secrets Manager, Self-Hosted<\/p>\n<p>Venafi TLS Protect is now CyberArk Certificate Manager, Self-Hosted<\/p>\n<p>Venafi TLS Protect Cloud is now CyberArk Certificate Manager, SaaS<\/p>\n<p>Venafi TLS Protect for Kubernetes is now CyberArk Certificate Manager for Kubernetes<\/p>\n<p>Venafi SSH Protect is now CyberArk SSH Manager for Machines<\/p>\n<p>Venafi CodeSign Protect is now CyberArk Code Sign Manager<\/p>\n<p>Venafi Zero Touch PKI is now CyberArk Zero Touch PKI<\/p>\n<p>Venafi Firefly is now CyberArk Workload Identity Manager<\/p>\n<p><em>CyberArk Credential Providers and CyberArk Secrets Hub product names are not changing.<\/em>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero-noimg dark&#8221;][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;column-1&#8243;][vc_column_text css=&#8221;&#8221;] Product Name Updates [\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad&#8221;][vc_column][vc_column_text css=&#8221;&#8221;] Machine Identity Security We are updating the names of many of our Machine Identity Security products, making them clearer and&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-206701","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Product Name Updates | CyberArk<\/title>\n<meta name=\"description\" content=\"We are updating the names of many of our Machine Identity Security products, making them clearer and more descriptive for our customers.\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Product Name Updates\" \/>\n<meta property=\"og:description\" content=\"We are updating the names of many of our Machine Identity Security products, making them clearer and more descriptive for our customers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/it\/product-name-updates\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-02T05:00:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/it\/product-name-updates\/\",\"url\":\"https:\/\/www.cyberark.com\/it\/product-name-updates\/\",\"name\":\"Product Name Updates | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"datePublished\":\"2025-04-01T15:39:01+00:00\",\"dateModified\":\"2025-06-02T05:00:28+00:00\",\"description\":\"We are updating the names of many of our Machine Identity Security products, making them clearer and more descriptive for our customers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/product-name-updates\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/it\/product-name-updates\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/it\/product-name-updates\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Product Name Updates\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Product Name Updates | CyberArk","description":"We are updating the names of many of our Machine Identity Security products, making them clearer and more descriptive for our customers.","robots":{"index":"noindex","follow":"follow"},"og_locale":"it_IT","og_type":"article","og_title":"Product Name Updates","og_description":"We are updating the names of many of our Machine Identity Security products, making them clearer and more descriptive for our customers.","og_url":"https:\/\/www.cyberark.com\/it\/product-name-updates\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-06-02T05:00:28+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tempo di lettura stimato":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/it\/product-name-updates\/","url":"https:\/\/www.cyberark.com\/it\/product-name-updates\/","name":"Product Name Updates | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"datePublished":"2025-04-01T15:39:01+00:00","dateModified":"2025-06-02T05:00:28+00:00","description":"We are updating the names of many of our Machine Identity Security products, making them clearer and more descriptive for our customers.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/it\/product-name-updates\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/it\/product-name-updates\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/it\/product-name-updates\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Product Name Updates"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/206701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/comments?post=206701"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/206701\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/media?parent=206701"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/product_category?post=206701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}