{"id":209076,"date":"2025-03-12T23:23:28","date_gmt":"2025-03-13T03:23:28","guid":{"rendered":"https:\/\/www.cyberark.com\/state-of-machine-identity-security-report\/"},"modified":"2025-06-18T07:36:02","modified_gmt":"2025-06-18T11:36:02","slug":"state-of-machine-identity-security-report","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/it\/state-of-machine-identity-security-report\/","title":{"rendered":"State of Machine Identity Security Report 2025"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 hero dark&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243; offset=&#8221;vc_col-md-6&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h1>State of Machine Identity Security Report 2025<\/h1>\n<h2>Le identit\u00e0 macchina superano in modo significativo quelle umane, creando l\u2019urgente necessit\u00e0 di programmi di sicurezza dedicati.<\/h2>\n<p>[\/vc_column_text][vc_btn title=&#8221;Scarica ora&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; css=&#8221;&#8221; link=&#8221;url:%23form|title:Read%20Now|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-2&#8243;][vc_single_image image=&#8221;205434&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad overview-vt&#8221; css=&#8221;.vc_custom_1701205350215{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;head-box&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h2>Le aziende stanno puntando molto sulla sicurezza delle identit\u00e0 macchina, ma stanno facendo abbastanza?<\/h2>\n<p>I team lavorano per prepararsi a una durata di vita dei certificati pi\u00f9 breve, autenticare i carichi di lavoro cloud native, proteggere i modelli di intelligenza artificiale e prepararsi al quantum computing, e sono consapevoli che la machine identity security debba essere un caposaldo della loro strategia di sicurezza aziendale.<\/p>\n<p>Tuttavia, nonostante questo livello di consapevolezza, <strong>solo il 23% ammette di dare priorit\u00e0 esclusivamente alla protezione delle identit\u00e0 macchina<\/strong>, lasciando potenziali falle che i criminali informatici potrebbero sfruttare.<\/p>\n<p>A che punto \u00e8 il programma della tua azienda? Leggi il nostro report 2025 per scoprire come essere all\u2019avanguardia di fronte alla complessit\u00e0 in continua evoluzione della machine identity security.[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text css=&#8221;&#8221;]<img decoding=\"async\" class=\"alignnone size-full wp-image-114773\" src=\"https:\/\/cyberark.com\/wp-content\/uploads\/2021\/03\/Move-Up.svg\" alt=\"Move Up Icon\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>Crescita esponenziale<\/h4>\n<p>Il 79% delle organizzazioni prevede un\u2019impennata delle identit\u00e0 macchina, fino al 150%. [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text css=&#8221;&#8221;]<img decoding=\"async\" class=\"alignnone size-full wp-image-110378\" src=\"https:\/\/cyberark.com\/wp-content\/uploads\/2021\/02\/Social_Login-Overview-Vertical-Overview-Vertical-Authentication-Authorization-1.svg\" alt=\"Social Login Icon\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>Aumento dei rischi<\/h4>\n<p>Il 50% ha riportato violazioni legate alla compromissione delle identit\u00e0 macchina, con chiavi API e certificati TLS come principali vettori di minaccia. [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"94\" height=\"81\" class=\"alignnone size-full wp-image-107293\" src=\"https:\/\/cyberark.com\/wp-content\/uploads\/2021\/01\/icon-circle-help.svg\" alt=\"question mark icon\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>Strategie non coerenti<\/h4>\n<p>Il 42% degli intervistati dichiara di non avere un approccio unificato alla protezione delle identit\u00e0 macchina. [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 dark stat-component&#8221;][vc_column][vc_row_inner el_class=&#8221;heading&#8221;][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h2>Le percentuali<\/h2>\n<p>Un\u2019istantanea sugli insight da mettere in atto. Leggi subito il report per scoprire tutti i dettagli. [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;progress-component&#8221;][vc_column_inner width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-4&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;text-lg&#8221;]<\/p>\n<h2>79%<\/h2>\n<p>Il 79% prevede che il numero delle identit\u00e0 macchina cresca nel corso del prossimo anno. [\/vc_column_text][vc_raw_html css=&#8221;&#8221;]JTNDZGl2JTIwY2xhc3MlM0QlMjJwcm9ncmVzcy1iYXItY29udGFpbmVyJTIyJTNFJTBBJTIwJTIwJTNDZGl2JTIwY2xhc3MlM0QlMjJwcm9ncmVzcy1iYXIlMjBwcm9ncmVzcy1iYXItcHVycGxlJTIyJTIwZGF0YS1wZXJjZW50YWdlJTNEJTIyNzklMjIlM0UlM0MlMkZkaXYlM0UlMEElM0MlMkZkaXYlM0U=[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-4&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;text-lg&#8221;]<\/p>\n<h2>50%<\/h2>\n<p>Il 50% delle violazioni di sicurezza segnalate \u00e8 legato alla compromissione delle identit\u00e0[\/vc_column_text][vc_raw_html css=&#8221;&#8221;]JTNDZGl2JTIwY2xhc3MlM0QlMjJwcm9ncmVzcy1iYXItY29udGFpbmVyJTIyJTNFJTBBJTIwJTIwJTNDZGl2JTIwY2xhc3MlM0QlMjJwcm9ncmVzcy1iYXIlMjBwcm9ncmVzcy1iYXItYmx1ZSUyMiUyMGRhdGEtcGVyY2VudGFnZSUzRCUyMjUwJTIyJTNFJTNDJTJGZGl2JTNFJTBBJTNDJTJGZGl2JTNFJTBB[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-4&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;text-lg&#8221;]<\/p>\n<h2>77%<\/h2>\n<p>Il 77% sostiene che ogni identit\u00e0 macchina non scoperta rappresenti un potenziale punto di compromissione. [\/vc_column_text][vc_raw_html css=&#8221;&#8221;]JTNDZGl2JTIwY2xhc3MlM0QlMjJwcm9ncmVzcy1iYXItY29udGFpbmVyJTIyJTNFJTBBJTIwJTIwJTNDZGl2JTIwY2xhc3MlM0QlMjJwcm9ncmVzcy1iYXIlMjBwcm9ncmVzcy1iYXItcHVycGxlJTIyJTIwZGF0YS1wZXJjZW50YWdlJTNEJTIyNzclMjIlM0UlM0MlMkZkaXYlM0UlMEElM0MlMkZkaXYlM0U=[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-4&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;text-lg&#8221;]<\/p>\n<h2>72%<\/h2>\n<p>Il 72% ha sub\u00ecto almeno un\u2019interruzione di servizio legata ai certificati nell\u2019ultimo anno. [\/vc_column_text][vc_raw_html css=&#8221;&#8221;]JTNDZGl2JTIwY2xhc3MlM0QlMjJwcm9ncmVzcy1iYXItY29udGFpbmVyJTIyJTNFJTBBJTIwJTIwJTNDZGl2JTIwY2xhc3MlM0QlMjJwcm9ncmVzcy1iYXIlMjBwcm9ncmVzcy1iYXItYmx1ZSUyMiUyMGRhdGEtcGVyY2VudGFnZSUzRCUyMjcyJTIyJTNFJTNDJTJGZGl2JTNFJTBBJTNDJTJGZGl2JTNFJTBB[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-4&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;text-lg&#8221;]<\/p>\n<h2>81%<\/h2>\n<p>L\u201981% ritiene che la sicurezza delle identit\u00e0 macchina sia un elemento fondamentale per la protezione dei sistemi di intelligenza artificiale. [\/vc_column_text][vc_raw_html css=&#8221;&#8221;]JTNDZGl2JTIwY2xhc3MlM0QlMjJwcm9ncmVzcy1iYXItY29udGFpbmVyJTIyJTNFJTBBJTIwJTIwJTNDZGl2JTIwY2xhc3MlM0QlMjJwcm9ncmVzcy1iYXIlMjBwcm9ncmVzcy1iYXItZ3JlZW4lMjIlMjBkYXRhLXBlcmNlbnRhZ2UlM0QlMjI4MSUyMiUzRSUzQyUyRmRpdiUzRSUwQSUzQyUyRmRpdiUzRQ==[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-4&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;text-lg&#8221;]<\/p>\n<h2>74%<\/h2>\n<p>Il 74% afferma che gli attaccanti stanno prendendo di mira le identit\u00e0 macchina negli ambienti cloud nativi e di sviluppo. [\/vc_column_text][vc_raw_html css=&#8221;&#8221;]JTNDZGl2JTIwY2xhc3MlM0QlMjJwcm9ncmVzcy1iYXItY29udGFpbmVyJTIyJTNFJTBBJTIwJTIwJTNDZGl2JTIwY2xhc3MlM0QlMjJwcm9ncmVzcy1iYXIlMjBwcm9ncmVzcy1iYXItZ3JlZW4lMjIlMjBkYXRhLXBlcmNlbnRhZ2UlM0QlMjI3NCUyMiUzRSUzQyUyRmRpdiUzRSUwQSUzQyUyRmRpdiUzRQ==[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221;][vc_column][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;seesaw-v2 cybv2-pad-120 cyb-reverse&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;column&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>La crescita delle machine identity \u00e8 notevolmente superiore a quella delle identit\u00e0 umane<\/h4>\n<p>Il volume e la variet\u00e0 dei moderni inventari di identit\u00e0 macchina non possono essere sottovalutati.<\/p>\n<p>Inoltre, con sfide come la salvaguardia dei carichi di lavoro cloud native e la rapida crescita dell\u2019adozione dell\u2019AI, inclusa quella agentic, identit\u00e0, autenticazione e autorizzazione uniche sono pi\u00f9 critiche che mai. [\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-offset-1&#8243;][vc_single_image image=&#8221;204780&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;seesaw-v2&#8243;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;d-flex align-items-start&#8221;][vc_single_image image=&#8221;204280&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-lg-offset-1&#8243; el_class=&#8221;column&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>La complessit\u00e0 \u00e8 alla base di interruzioni, violazioni e rischi<\/h4>\n<p>Oltre il 70% delle organizzazioni ha sub\u00ecto almeno un\u2019interruzione di servizio legata ai certificati nell\u2019ultimo anno. Inoltre, i responsabili della sicurezza sono preoccupati per l\u2019imminente passaggio alla durata di 47 giorni dei certificati TLS, i potenziali eventi di sfiducia delle Certificate Authority (CA) e il quantum computing.<\/p>\n<p>Quali sono i fattori che causano maggiore complessit\u00e0? Mancanza di visibilit\u00e0 delle identit\u00e0 macchina, automazione inadeguata e frammentazione della propriet\u00e0. [\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;seesaw-v2 cybv2-pad-120 cyb-reverse&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;column&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>Gli attori delle minacce sono concentrati sulle identit\u00e0 macchina.<\/h4>\n<p>Il 50% delle organizzazioni ha segnalato violazioni legate alla compromissione delle identit\u00e0 macchina, con asset quali chiavi API, certificati TLS e altro ancora che vengono sempre pi\u00f9 spesso sfruttati come punti di accesso per gli attacchi.<\/p>\n<p>Approfittando di debolezze dell\u2019autenticazione o di credenziali scadute, i malintenzionati possono muoversi lateralmente all\u2019interno delle reti, accedere alle credenziali e interrompere le operazioni critiche. [\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-offset-1&#8243;][vc_single_image image=&#8221;204233&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2-pad quote-component white&#8221; css=&#8221;.vc_custom_1737658121182{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/01\/blue-dota-background.jpg?id=201917) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;img-box&#8221; css=&#8221;.vc_custom_1741738822855{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/hands-on-laptop-quote.jpg?id=205198) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;content-column&#8221;][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-201899\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/01\/double-quotes.svg\" alt=\"double quotes\" width=\"87\" height=\"64\" \/><\/p>\n<h4>&#8220;Identit\u00e0 macchina di ogni tipologia continueranno a crescere in modo vertiginoso nel corso del prossimo anno, portando non solo maggiore complessit\u00e0, ma anche un aumento dei rischi. Gli attaccanti sfruttano attivamente e senza sosta le falle di sicurezza delle identit\u00e0 macchina. Ogni giorno vediamo avversari che utilizzano strategie come chiavi API compromesse e certificati di firma di codice pericoloso. Questa ricerca evidenzia l\u2019urgenza per i responsabili della sicurezza di definire una strategia di machine identity security. Ogni passo \u00e8 importante: dall\u2019ottenere secret come chiavi API e token di accesso, all\u2019automazione della gestione del ciclo di vita dei certificati TLS. In questo momento, stiamo lasciando al caso le prossime violazioni o interruzioni. Se chiudiamo gli occhi, saremo ancora pi\u00f9 esposti quando gli agent di AI entreranno in funzione e la tempistica degli attacchi quantistici si accorcer\u00e0.&#8221;<\/h4>\n<p>Kevin Bocek, <strong>SVP, Innovation di CyberArk<\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 v3 products cybv2-pad-120 box-row&#8221;][vc_column][vc_row_inner el_class=&#8221;d-flex cybv2-pad-btm&#8221;][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h2>Informazioni sul report<\/h2>\n<p>State of Machine Identity Security Report 2025 si basa su un\u2019indagine approfondita condotta su 1.200 responsabili della sicurezza di Stati Uniti, Regno Unito, Australia, Francia, Germania e Singapore. Questi risultati, che riguardano diversi settori, riflettono i trend principali e i punti critici che caratterizzano gli attuali programmi di machine identity security.<\/p>\n<p>Il report \u00e8 stato sviluppato per rispondere alle seguenti domande principali: [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; el_class=&#8221;justify-content-center&#8221;][vc_column_inner el_class=&#8221;icon-box&#8221; width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-6&#8243;]<img decoding=\"async\" class=\"alignnone size-full wp-image-110791\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/off-network.svg\" alt=\"off network icon\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]Quali fattori stanno portando a una proliferazione di massa delle identit\u00e0 macchina? [\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;icon-box&#8221; width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-6&#8243;]<img decoding=\"async\" class=\"alignnone size-full wp-image-127165\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/oversight-icon.svg\" alt=\"DEI Across Organization\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]Quali sono oggi le maggiori preoccupazioni e sfide legate alle identit\u00e0 macchina?[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;icon-box&#8221; width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-6&#8243;]<img decoding=\"async\" class=\"alignnone size-full wp-image-129929\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/1_Botsicon-01.svg\" alt=\"bots icon\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]Quali team sono tradizionalmente responsabili della protezione delle identit\u00e0 macchina? [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; el_class=&#8221;pt-8&#8243;][vc_column_inner el_class=&#8221;icon-box&#8221; width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-6&#8243;]<img decoding=\"async\" class=\"alignnone size-full wp-image-111344\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Unified-View.svg\" alt=\"Unified View Icon\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]Quali tipologie di identit\u00e0 macchina sono pi\u00f9 vulnerabili alla compromissione?[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;icon-box&#8221; width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-6&#8243;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-199343\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/shield-check-icon.svg\" alt=\"shield\" width=\"39\" height=\"46\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]Su quali aree specifiche della sicurezza dell&#8217;identit\u00e0 delle macchine i team intendono concentrarsi maggiormente nel 2025?[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;icon-box&#8221; width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-6&#8243;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-199806\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/battle-swords-icon.svg\" alt=\"battle swords\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]Qual \u00e8 il futuro della machine identity security in relazione ad AI, quantum computing e sviluppo cloud native? [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_html css=&#8221;&#8221;]PGEgY2xhc3M9ImFuY2hvciIgbmFtZT0iZm9ybSI+PC9hPg==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1740937879088{background-color: #E8E8E3 !important;}&#8221; el_class=&#8221;cybv2 cybv2-pad-top hv-cta&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;left-clmn&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h2>Resta al passo con le minacce emergenti. <span style=\"color: #29b5e8;\">Scarica subito la tua copia. <\/span><\/h2>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]La machine identity security non \u00e8 solo un ulteriore elemento nella tua checklist di sicurezza. \u00c8 la tua prima linea di difesa. Leggi subito <strong>State of Machine Identity Security Report 2025<\/strong> per essere sempre all\u2019avanguardia.[\/vc_column_text][vc_single_image image=&#8221;205434&#8243; img_size=&#8221;full&#8221; css=&#8221;.vc_custom_1741817225802{padding-top: 40px !important;}&#8221; el_class=&#8221;cybv2-pad&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;right-clmn cybv2-form&#8221; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_raw_html css=&#8221;&#8221;]W21hcmtldG9fZm9ybSBpZD0iMTA4MjUiIHR5X3BhZ2VfdXJsPSJodHRwczovL3d3dy5jeWJlcmFyay5jb20vdGhhbmsteW91LXN0YXRlLW9mLW1hY2hpbmUtaWRlbnRpdHktc2VjdXJpdHktcmVwb3J0Il0=[\/vc_raw_html][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2-pad content-callout-resource electric-cyan&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;img-box&#8221; css=&#8221;.vc_custom_1737656757400{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/01\/city-overhead-view.jpg?id=201829) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;content-column&#8221;][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221; width=&#8221;5\/6&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Hai domande sulla tua strategia di machine identity security?<\/h3>\n<p>Confrontati con il nostro team per scoprire di pi\u00f9 su soluzioni su misura per la tua azienda. [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_btn title=&#8221;Confrontati con un esperto&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; css=&#8221;.vc_custom_1750233546570{margin-left: 30px !important;}&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Ftalk-with-us%2F|title:contact%20us|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 hero dark&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243; offset=&#8221;vc_col-md-6&#8243;][vc_column_text css=&#8221;&#8221;] State of Machine Identity Security Report 2025 Le identit\u00e0 macchina superano in modo significativo quelle umane, creando l\u2019urgente necessit\u00e0 di programmi di sicurezza dedicati&#8230;.<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-209076","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>State of Machine Identity Security Report 2025 | CyberArk<\/title>\n<meta name=\"description\" content=\"Approfondisci le sfide della machine identity security, come gestione dei certificati TLS, protezione dei modelli di intelligenza artificiale e preparazione al quantum computing. Scopri come superarne la crescita esponenziale e la complessit\u00e0.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/it\/state-of-machine-identity-security-report\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"State of Machine Identity Security Report 2025\" \/>\n<meta property=\"og:description\" content=\"Approfondisci le sfide della machine identity security, come gestione dei certificati TLS, protezione dei modelli di intelligenza artificiale e preparazione al quantum computing. Scopri come superarne la crescita esponenziale e la complessit\u00e0.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/it\/state-of-machine-identity-security-report\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-18T11:36:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberark.com\/wp-content\/uploads\/2021\/03\/Move-Up.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/it\/state-of-machine-identity-security-report\/\",\"url\":\"https:\/\/www.cyberark.com\/it\/state-of-machine-identity-security-report\/\",\"name\":\"State of Machine Identity Security Report 2025 | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/state-of-machine-identity-security-report\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/state-of-machine-identity-security-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberark.com\/wp-content\/uploads\/2021\/03\/Move-Up.svg\",\"datePublished\":\"2025-03-13T03:23:28+00:00\",\"dateModified\":\"2025-06-18T11:36:02+00:00\",\"description\":\"Approfondisci le sfide della machine identity security, come gestione dei certificati TLS, protezione dei modelli di intelligenza artificiale e preparazione al quantum computing. Scopri come superarne la crescita esponenziale e la complessit\u00e0.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/state-of-machine-identity-security-report\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/it\/state-of-machine-identity-security-report\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/it\/state-of-machine-identity-security-report\/#primaryimage\",\"url\":\"https:\/\/cyberark.com\/wp-content\/uploads\/2021\/03\/Move-Up.svg\",\"contentUrl\":\"https:\/\/cyberark.com\/wp-content\/uploads\/2021\/03\/Move-Up.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/it\/state-of-machine-identity-security-report\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"State of Machine Identity Security Report 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/it\/#website\",\"url\":\"https:\/\/www.cyberark.com\/it\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/it\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"State of Machine Identity Security Report 2025 | CyberArk","description":"Approfondisci le sfide della machine identity security, come gestione dei certificati TLS, protezione dei modelli di intelligenza artificiale e preparazione al quantum computing. Scopri come superarne la crescita esponenziale e la complessit\u00e0.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/it\/state-of-machine-identity-security-report\/","og_locale":"it_IT","og_type":"article","og_title":"State of Machine Identity Security Report 2025","og_description":"Approfondisci le sfide della machine identity security, come gestione dei certificati TLS, protezione dei modelli di intelligenza artificiale e preparazione al quantum computing. Scopri come superarne la crescita esponenziale e la complessit\u00e0.","og_url":"https:\/\/www.cyberark.com\/it\/state-of-machine-identity-security-report\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-06-18T11:36:02+00:00","og_image":[{"url":"https:\/\/cyberark.com\/wp-content\/uploads\/2021\/03\/Move-Up.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tempo di lettura stimato":"9 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/it\/state-of-machine-identity-security-report\/","url":"https:\/\/www.cyberark.com\/it\/state-of-machine-identity-security-report\/","name":"State of Machine Identity Security Report 2025 | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/it\/state-of-machine-identity-security-report\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/it\/state-of-machine-identity-security-report\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberark.com\/wp-content\/uploads\/2021\/03\/Move-Up.svg","datePublished":"2025-03-13T03:23:28+00:00","dateModified":"2025-06-18T11:36:02+00:00","description":"Approfondisci le sfide della machine identity security, come gestione dei certificati TLS, protezione dei modelli di intelligenza artificiale e preparazione al quantum computing. Scopri come superarne la crescita esponenziale e la complessit\u00e0.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/it\/state-of-machine-identity-security-report\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/it\/state-of-machine-identity-security-report\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/it\/state-of-machine-identity-security-report\/#primaryimage","url":"https:\/\/cyberark.com\/wp-content\/uploads\/2021\/03\/Move-Up.svg","contentUrl":"https:\/\/cyberark.com\/wp-content\/uploads\/2021\/03\/Move-Up.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/it\/state-of-machine-identity-security-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/it\/"},{"@type":"ListItem","position":2,"name":"State of Machine Identity Security Report 2025"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/it\/#website","url":"https:\/\/www.cyberark.com\/it\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/it\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/209076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/comments?post=209076"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/209076\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/media?parent=209076"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/product_category?post=209076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}