{"id":223145,"date":"2026-01-22T14:39:50","date_gmt":"2026-01-22T19:39:50","guid":{"rendered":"https:\/\/www.cyberark.com\/solutions\/secure-secrets-and-workloads\/"},"modified":"2026-02-10T05:02:31","modified_gmt":"2026-02-10T10:02:31","slug":"secure-secrets-and-workloads","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/it\/solutions\/secure-secrets-and-workloads\/","title":{"rendered":"Secure Secrets and Workloads"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 hero dark&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h1>Proteggere secret e identit\u00e0 dei carichi di lavoro su larga scala<\/h1>\n<p><\/p>\n<p class=\"lead\">Le identit\u00e0 macchina superano ora quelle umane in un rapporto di 82:1 e ogni carico di lavoro dipende da secret o identit\u00e0 per funzionare. CyberArk Secure Secrets and Workloads unifica scoperta, governance e autenticazione in ambienti ibridi e multi-cloud, riducendo la proliferazione di vault, contribuendo a eliminare credenziali di lunga durata e consentendo accessi di breve durata basati su identit\u00e0 per i carichi di lavoro moderni, senza interrompere le attivit\u00e0 degli sviluppatori.<\/p>\n<p>\n[\/vc_column_text][vc_btn title=&#8221;Richiedi una demo&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; css=&#8221;&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Ftry-buy%2Fsecrets-manager-saas-demo%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-2&#8243; offset=&#8221;vc_hidden-xs&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"border-radius alignnone wp-image-222885 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Data-stream-corrected.jpg\" alt=\"Data stream\" width=\"528\" height=\"446\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 v3 products cybv2-pad box-row&#8221;][vc_column][vc_row_inner][vc_column_inner el_class=&#8221;mb-4&#8243; offset=&#8221;vc_col-lg-10&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p class=\"head-content\">SFIDE<\/p>\n<h2 class=\"h3\">Le identit\u00e0 macchina stanno crescendo pi\u00f9 rapidamente di quanto i team di sicurezza possano gestire<\/h2>\n<p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;mb-8&#8243; offset=&#8221;vc_col-lg-8&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p class=\"lead\">Le aziende moderne gestiscono migliaia di carichi di lavoro (applicazioni, container, servizi e automazione) in ambienti ibridi, multi-cloud e cloud-native. Ogni carico di lavoro deve essere autenticato e autorizzato utilizzando un\u2019identit\u00e0 macchina. Con l\u2019ampliamento degli ambienti, anche secret, identit\u00e0 e vault si moltiplicano rapidamente, generando una governance frammentata, visibilit\u00e0 limitata e uno sforzo operativo che strumenti tradizionali e processi manuali non sono pi\u00f9 in grado di gestire.<\/p>\n<p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221;][vc_column_inner el_class=&#8221;icon-box mb-6&#8243; width=&#8221;1\/2&#8243; column_link=&#8221;title:Learn%20More|&#8221; offset=&#8221;vc_col-lg-3&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-6&#8243;]<img decoding=\"async\" class=\"alignnone wp-image-116584 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/04\/Private-Training.svg\" alt=\"Private Training\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>Secret e proliferazione di vault creano punti ciechi nella sicurezza<\/h4>\n<p>Man mano che le organizzazioni scalano applicazioni, container e automazione, i secret si disperdono tra vault cloud, pipeline e codice. Questa proliferazione frammenta la visibilit\u00e0 e i controlli di accesso, creando punti ciechi che i team di sicurezza non sono in grado di gestire in modo coerente.[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;icon-box mb-6&#8243; width=&#8221;1\/2&#8243; column_link=&#8221;title:Learn%20More|&#8221; offset=&#8221;vc_col-lg-3&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-6&#8243;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-199352 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/eye-icon.svg\" alt=\"Eye icon\" width=\"39\" height=\"46\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>I processi manuali introducono rischi e inefficienze<\/h4>\n<p>Rotazione manuale dei secret, aggiornamento degli accessi e gestione delle eccezioni rallentano i team e introducono errori umani. Con l\u2019aumentare dei carichi di lavoro, questi processi aumentano le configurazioni errate e creano lacune di sicurezza.[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;icon-box mb-6&#8243; width=&#8221;1\/2&#8243; column_link=&#8221;title:Learn%20More|&#8221; offset=&#8221;vc_col-lg-3&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-6&#8243;]<img decoding=\"async\" class=\"alignnone wp-image-119668 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Targeted-attack.svg\" alt=\"Targeted attack icon\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>L\u2019autenticazione dei carichi di lavoro \u00e8 incoerente e frammentata<\/h4>\n<p>I carichi di lavoro si autenticano e autorizzano in modo diverso nei vari ambienti, sulla base di credenziali statiche o controlli specifici della piattaforma. Questa incoerenza rende difficile applicare il principio del privilegio minimo e policy di sicurezza standardizzate.[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;icon-box mb-6&#8243; width=&#8221;1\/2&#8243; column_link=&#8221;title:Learn%20More|&#8221; offset=&#8221;vc_col-lg-3&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-6&#8243;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-204730 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/03\/risk-icon.svg\" alt=\"Risk icon\" width=\"39\" height=\"46\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>Lacune nell\u2019audit della governance di secret e carichi di lavoro<\/h4>\n<p>I team di sicurezza non dispongono di visibilit\u00e0 centralizzata sugli accessi ai carichi di lavoro. Strumenti non connessi e policy incoerenti rendono difficile dimostrare la propriet\u00e0, applicare i controlli degli accessi e dimostrare conformit\u00e0 agli audit.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-btm&#8221;][vc_column offset=&#8221;vc_col-lg-10&#8243; el_class=&#8221;mb-4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p class=\"head-content\">SOLUZIONI<\/p>\n<h2 class=\"h3\">Proteggere secret e carichi di lavoro<\/h2>\n<p>\n[\/vc_column_text][\/vc_column][vc_column offset=&#8221;vc_col-lg-8&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p class=\"lead\">CyberArk Secure Secrets and Workloads offre un approccio unificato per proteggere le identit\u00e0 macchina che alimentano le applicazioni moderne. La soluzione centralizza individuazione, governance e applicazione delle policy per gli accessi a secret e carichi di lavoro in ambienti ibridi, multi-cloud e cloud-native, senza interrompere i flussi di lavoro degli sviluppatori o forzare migrazioni.<\/p>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;seesaw-v2 cybv2-pad-btm-120 cyb-reverse v3&#8243;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;column&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Controllo di vault e della proliferazione dei secret<\/h3>\n<p>CyberArk centralizza la visibilit\u00e0 e il controllo dei secret e dell\u2019autenticazione dei carichi di lavoro in ambienti cloud, ibridi e on-premise. I team di sicurezza ottengono un\u2019unica fonte di verit\u00e0 su dove risiedono i secret, come vengono autenticati i carichi di lavoro e chi vi ha accesso, riducendo i punti ciechi creati da proliferazione di vault, strumenti non connessi e policy incoerenti. Le integrazioni native consentono ai team di gestire i secret e gli accessi ai carichi di lavoro nei vault e nelle piattaforme cloud esistenti, senza costringere gli sviluppatori a modificare il loro processo di creazione o distribuzione.[\/vc_column_text][vc_row_inner disable_element=&#8221;yes&#8221; el_class=&#8221;pt-4&#8243;][vc_column_inner][vc_btn title=&#8221;Request a Demo&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; css=&#8221;&#8221; link=&#8221;url:%23|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right pt-2 pl-3&#8243;]<a href=\"https:\/\/www.cyberark.com\/it\/solutions\/defend-against-attacks\/\">Scopri come<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-offset-1&#8243;][vc_single_image image=&#8221;222899&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;seesaw-v2 cybv2-pad-btm-120&#8243;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;d-flex align-items-start&#8221;][vc_single_image image=&#8221;222908&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-lg-offset-1&#8243; el_class=&#8221;column&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Modernizzazione della gestione dei secret<\/h3>\n<p>CyberArk automatizza l\u2019intero ciclo di vita dei secret &#8211; individuazione, rotazione, scadenza e dismissione, riducendo attivit\u00e0 manuali ed errori umani. Applicando policy coerenti in tutti gli ambienti, aiuta i team di sicurezza a eliminare le credenziali hard-coded e di lunga durata, migliorando al contempo l\u2019efficienza operativa. Gli sviluppatori continuano a utilizzare strumenti e flussi di lavoro familiari, mentre i secret vengono forniti in modo sicuro e gestiti centralmente, su larga scala.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;seesaw-v2 cybv2-pad-btm-120 cyb-reverse v3&#8243;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;column&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Abilitare accessi moderni ai carichi di lavoro<\/h3>\n<p>CyberArk consente ai carichi di lavoro di autenticarsi utilizzando identit\u00e0 macchina affidabili e gestite centralmente, sia attraverso secret dinamici, identit\u00e0 di breve durata o credenziali tradizionali gestite in modo sicuro. Questo approccio applica il principio del privilegio minimo, riduce gli accessi eccessivi e limita il raggio d\u2019azione, consentendo ai team di proteggere gli accessi ai carichi di lavoro senza interrompere le architetture o i flussi di lavoro esistenti.[\/vc_column_text][vc_row_inner disable_element=&#8221;yes&#8221; el_class=&#8221;pt-4&#8243;][vc_column_inner][vc_btn title=&#8221;Request a Demo&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; css=&#8221;&#8221; link=&#8221;url:%23|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right pt-2 pl-3&#8243;]<a href=\"https:\/\/www.cyberark.com\/it\/solutions\/defend-against-attacks\/\">Scopri come<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-offset-1&#8243;][vc_single_image image=&#8221;222917&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2-pad-top pb-10&#8243; css=&#8221;.vc_custom_1768576596270{background-color: #E8E8E3 !important;}&#8221;][vc_column][vc_row_inner][vc_column_inner el_class=&#8221;mb-4&#8243; offset=&#8221;vc_col-lg-10&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p class=\"head-content\">FUNZIONALIT\u00c0 E CARATTERISTICHE CHIAVE<\/p>\n<h2 class=\"h3\">Sicurezza unificata per secret e identit\u00e0 dei carichi di lavoro<\/h2>\n<p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;mb-8&#8243; offset=&#8221;vc_col-lg-8&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p class=\"lead\">CyberArk Secure Secrets and Workloads riunisce gestione dei secret, governance centralizzata e accessi sicuri ai carichi di lavoro in un\u2019unica soluzione. Le aziende possono proteggere le credenziali, gestire le identit\u00e0 macchina e abilitare autenticazione affidabile dei carichi di lavoro in ambienti ibridi, multi-cloud e cloud-native, senza compromettere le architetture esistenti o i flussi di lavoro degli sviluppatori.<\/p>\n<p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;cta-box mb-6&#8243; offset=&#8221;vc_col-lg-4&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;mb-6&#8243;]<img decoding=\"async\" class=\"alignnone wp-image-122920 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Document-Success-Icon.svg\" alt=\"Document Success Icon\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>CyberArk Secrets Manager<\/h4>\n<p>Gestire, ruotare e governare centralmente i secret, con un\u2019esperienza coerente in ambienti cloud, ibridi e on-premise, garantendo policy standardizzate e accesso affidabile, indipendentemente dalla piattaforma.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;cta-box mb-6&#8243; offset=&#8221;vc_col-lg-4&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;mb-6&#8243;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-121001\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/adaptive-Acecss-LockedApp-Icon.svg\" alt=\"Adaptive Acecss LockedApp Icon\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>CyberArk Secrets Hub<\/h4>\n<p>Gestire, ruotare e governare centralmente i secret, con un\u2019esperienza coerente in ambienti cloud, ibridi e on-premise, garantendo policy standardizzate e accesso affidabile, indipendentemente dalla piattaforma.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;cta-box mb-6&#8243; offset=&#8221;vc_col-lg-4&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;mb-6&#8243;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-112985\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Social_Login-Overview-Vertical-Overview-Vertical-Authentication-Authorization-1.svg\" alt=\"Authentication Authorization Icon\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>CyberArk Credential Providers<\/h4>\n<p>Proteggere applicazioni statiche, software di terze parti e strumenti di automazione, fornendo credenziali affidabili just-in-time, senza l\u2019hardcoding di secret o la richiesta di modifiche applicative.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;cta-box mb-6 d-none&#8221; offset=&#8221;vc_col-lg-4&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;mb-6&#8243;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-129929\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/aws-partner-icon-2.svg\" alt=\"AWS partner icon\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>Rilevamento continuo<\/h4>\n<p>Individuare i rischi tramite il rilevamento continuo di account e secret non gestiti, integrandoli in modo automatico in un sistema centralizzato per garantire policy di sicurezza coerenti e ridurre le superfici di attacco. [\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;cta-box mb-6&#8243; offset=&#8221;vc_col-lg-4&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;mb-6&#8243;]<img decoding=\"async\" class=\"alignnone wp-image-129953 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/4_Secretsicon-01.svg\" alt=\"Engage logo\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>Secure Workload Access<\/h4>\n<p>Fornire ai carichi di lavoro accessi protetti e con privilegio minimo utilizzando identit\u00e0 affidabili o secret gestiti, riducendo gli accessi eccessivi e abilitando policy coerenti in tutti gli ambienti.[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 dark stat-component&#8221;][vc_column][vc_row_inner el_class=&#8221;heading&#8221;][vc_column_inner offset=&#8221;vc_col-lg-10&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p class=\"head-content\">BENEFICI E VALORE<\/p>\n<h2 class=\"h3\">Perch\u00e9 la protezione dei secret e carichi di lavoro \u00e8 diventata un rischio aziendale critico<\/h2>\n<p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;d-none&#8221; offset=&#8221;vc_col-lg-8&#8243;][vc_column_text css=&#8221;&#8221;]<br \/>Man mano che le identit\u00e0 macchina proliferano in ambienti ibridi e multi-cloud, secret e accessi ai carichi di lavoro diventano frammentati, difficili da governare e da controllare. Vault scollegati, processi manuali e controlli incoerenti delle identit\u00e0 creano punti ciechi nella sicurezza che aumentano il rischio di violazioni, rallentano le indagini e complicano la conformit\u00e0 in tutta l\u2019azienda.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; el_class=&#8221;progress-component&#8221;][vc_column_inner width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-4&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;text-lg&#8221;]<\/p>\n<div class=\"h2 text-white\">60%<\/div>\n<p>ha difficolt\u00e0 con i silos di sicurezza cloud [\/vc_column_text][vc_raw_html css=&#8221;&#8221;]PGRpdiBjbGFzcz0icHJvZ3Jlc3MtYmFyLWNvbnRhaW5lciI+DQogIDxkaXYgY2xhc3M9InByb2dyZXNzLWJhciBwcm9ncmVzcy1iYXItcHVycGxlIiBkYXRhLXBlcmNlbnRhZ2U9IjYwIj48L2Rpdj48YnI+PC9kaXY+[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-lg-4&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;text-lg&#8221;]<\/p>\n<div class=\"h2 text-white\">42%<\/div>\n<p>non dispone di una strategia unificata per le identit\u00e0 macchina[\/vc_column_text][vc_raw_html css=&#8221;&#8221;]PGRpdiBjbGFzcz0icHJvZ3Jlc3MtYmFyLWNvbnRhaW5lciI+DQogIDxkaXYgY2xhc3M9InByb2dyZXNzLWJhciBwcm9ncmVzcy1iYXItZ3JlZW4iIGRhdGEtcGVyY2VudGFnZT0iNDIiPjwvZGl2Pjxicj48L2Rpdj4=[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-4&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;text-lg&#8221;]<\/p>\n<div class=\"h2 text-white\">45%<\/div>\n<p>affronta un rischio crescente nella gestione dei secret[\/vc_column_text][vc_raw_html css=&#8221;&#8221;]PGRpdiBjbGFzcz0icHJvZ3Jlc3MtYmFyLWNvbnRhaW5lciI+DQo8ZGl2IGNsYXNzPSJwcm9ncmVzcy1iYXIgcHJvZ3Jlc3MtYmFyLWJsdWUiIGRhdGEtcGVyY2VudGFnZT0iNDUiPjwvZGl2Pjxicj48L2Rpdj48YnI+[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-lg-4&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;text-lg&#8221;]<\/p>\n<h2>34%<\/h2>\n<p>non ha visibilit\u00e0 su vault di terze parti[\/vc_column_text][vc_raw_html css=&#8221;&#8221;]PGRpdiBjbGFzcz0icHJvZ3Jlc3MtYmFyLWNvbnRhaW5lciI+DQogIDxkaXYgY2xhc3M9InByb2dyZXNzLWJhciBwcm9ncmVzcy1iYXItcHVycGxlIiBkYXRhLXBlcmNlbnRhZ2U9IjM0Ij48L2Rpdj48YnI+PC9kaXY+[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-4&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;text-lg&#8221;]<\/p>\n<div class=\"h2 text-white\">33%<\/div>\n<p>non \u00e8 in grado di ruotare o revocare le credenziali rapidamente[\/vc_column_text][vc_raw_html css=&#8221;&#8221;]PGRpdiBjbGFzcz0icHJvZ3Jlc3MtYmFyLWNvbnRhaW5lciI+DQogIDxkaXYgY2xhc3M9InByb2dyZXNzLWJhciBwcm9ncmVzcy1iYXItZ3JlZW4iIGRhdGEtcGVyY2VudGFnZT0iMzMiPjwvZGl2Pjxicj48L2Rpdj4=[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-4&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;text-lg&#8221;]<\/p>\n<div class=\"h2 text-white\">47%<\/div>\n<p>non ha la visibilit\u00e0 per dimostrare la governance dei secret[\/vc_column_text][vc_raw_html css=&#8221;&#8221;]PGRpdiBjbGFzcz0icHJvZ3Jlc3MtYmFyLWNvbnRhaW5lciI+DQo8ZGl2IGNsYXNzPSJwcm9ncmVzcy1iYXIgcHJvZ3Jlc3MtYmFyLWJsdWUiIGRhdGEtcGVyY2VudGFnZT0iNDciPjwvZGl2Pjxicj48L2Rpdj48YnI+[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2&#8243;][vc_column el_class=&#8221;mb-4&#8243; offset=&#8221;vc_col-lg-10&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p class=\"head-content\">RISORSE<\/p>\n<h2 class=\"h3\">Scopri come proteggere secret e carichi di lavoro su scala aziendale<\/h2>\n<p>\n[\/vc_column_text][\/vc_column][vc_column el_class=&#8221;mb-8&#8243; offset=&#8221;vc_col-lg-8&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p class=\"lead\">Scopri come i team di sicurezza ottengono visibilit\u00e0, governance e controllo sui secret e sugli accessi ai carichi di lavoro in ambienti ibridi e multi-cloud, senza attrito sugli sviluppatori o le piattaforme esistenti.<\/p>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column&#8221;][vc_column el_class=&#8221;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8221;.vc_custom_1768990598990{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;new_hpstyle_section8_uberflip&#8221;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 partners cybv2-pad box-row cyb-background-lt bgimg-hide-mobile&#8221; css=&#8221;.vc_custom_1768577580463{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column][vc_row_inner][vc_column_inner el_class=&#8221;mb-4&#8243; offset=&#8221;vc_col-lg-10&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p class=\"head-content\">MARCHI DI FIDUCIA<\/p>\n<h2 class=\"h3\">Scelti da aziende globali per proteggere secret e carichi di lavoro<\/h2>\n<p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2&#8243;][vc_column_inner el_class=&#8221;partner-box&#8221; width=&#8221;1\/6&#8243; offset=&#8221;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fcustomer-stories%2Fcisco%2F|&#8221;][vc_single_image image=&#8221;222926&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;partner-box&#8221; width=&#8221;1\/6&#8243; offset=&#8221;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fcustomer-stories%2Fdz-bank%2F|&#8221;][vc_single_image image=&#8221;222935&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221; el_class=&#8221;partner-logo&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;partner-box&#8221; width=&#8221;1\/6&#8243; offset=&#8221;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fcustomer-stories%2Ftiaa%2F|&#8221;][vc_single_image image=&#8221;222944&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221; el_class=&#8221;partner-logo&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;partner-box&#8221; width=&#8221;1\/6&#8243; offset=&#8221;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fcustomer-stories%2Fhealthfirst%2F|&#8221;][vc_single_image image=&#8221;222953&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221; el_class=&#8221;partner-logo&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;partner-box&#8221; width=&#8221;1\/6&#8243; offset=&#8221;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fcustomer-stories%2Frepsol%2F|&#8221;][vc_single_image image=&#8221;221699&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221; el_class=&#8221;partner-logo&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;partner-box&#8221; width=&#8221;1\/6&#8243; offset=&#8221;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fcustomer-stories%2Fencova%2F|&#8221;][vc_single_image image=&#8221;222962&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; disable_element=&#8221;yes&#8221; el_class=&#8221;cybv2&#8243;][vc_column_inner el_class=&#8221;partner-box&#8221; width=&#8221;1\/6&#8243; offset=&#8221;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][\/vc_column_inner][vc_column_inner el_class=&#8221;partner-box d-none&#8221; width=&#8221;1\/6&#8243; offset=&#8221;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8221;222935&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221; el_class=&#8221;partner-logo&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;partner-box d-none&#8221; width=&#8221;1\/6&#8243; offset=&#8221;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8221;222944&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221; el_class=&#8221;partner-logo&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;partner-box d-none&#8221; width=&#8221;1\/6&#8243; offset=&#8221;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8221;222953&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221; el_class=&#8221;partner-logo&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;partner-box d-none&#8221; width=&#8221;1\/6&#8243; offset=&#8221;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8221;206237&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221; el_class=&#8221;partner-logo&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;partner-box d-none&#8221; width=&#8221;1\/6&#8243; offset=&#8221;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8221;211236&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221; el_class=&#8221;partner-logo&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 fullaccordion2 cybv2-pad acc1&#8243;][vc_column][vc_column_text css=&#8221;&#8221; el_class=&#8221;heading&#8221;]<\/p>\n<p class=\"head-content\">FAQ<\/p>\n<h3>Domande frequenti sulla protezione di secret e carichi di lavoro<\/h3>\n<p>\n[\/vc_column_text][vc_tta_accordion shape=&#8221;square&#8221; color=&#8221;white&#8221; c_icon=&#8221;&#8221; active_section=&#8221;1&#8243; css_animation=&#8221;none&#8221; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Come si pu\u00f2 visualizzare dove risiedono effettivamente tutte le credenziali di secret e carichi di lavoro?&#8221; tab_id=&#8221;general-1&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;padding-content-img&#8221;]La maggior parte delle aziende sottovaluta il numero di secret e vault gestiti su cloud, DevOps e strumenti di terze parti. CyberArk offre funzionalit\u00e0 centralizzate di discovery e visibilit\u00e0 su tutti i vault e gli ambienti esistenti, aiutando i team di sicurezza a conoscere propriet\u00e0, utilizzo e rischi, senza costringerli a modificare il proprio modo di lavorare.<br \/>Valutazione della proliferazione di vault<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/vault-sprawl-assessment\/\">Valutazione dell&#8217;espansione dei caveau Vault\u00ae<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;\u00c8 necessario sostituire AWS, Azure o HashiCorp Vault per utilizzare questa soluzione?&#8221; tab_id=&#8221;general-2&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;padding-content-img&#8221;]No, CyberArk \u00e8 progettato per funzionare con i vault e gli strumenti cloud pi\u00f9 diffusi che gi\u00e0 utilizzi. I team di sicurezza possono mantenere i vault cloud-native e di terze parti esistenti, applicando al contempo governance centralizzata, policy e la visibilit\u00e0 di audit su tutti. Ci\u00f2 consente alle organizzazioni di ridurre la proliferazione, senza interrompere le attivit\u00e0 dei team o i flussi di lavoro.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Questa soluzione rallenter\u00e0 gli sviluppatori o richieder\u00e0 modifiche al flusso di lavoro?&#8221; tab_id=&#8221;general-3&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;padding-content-img&#8221;]CyberArk \u00e8 progettato per allinearsi ai flussi di lavoro degli sviluppatori, non per interromperli. Gli sviluppatori continuano a utilizzare strumenti e modelli familiari, mentre i team di sicurezza ottengono visibilit\u00e0, controllo e automazione necessari per ridurre i rischi di sicurezza. Questo modello condiviso aiuta i team di security e sviluppo a collaborare in modo pi\u00f9 efficace, senza rallentare la consegna.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/resources\/ebooks\/identity-security-for-software-development-oreilly\">Oreilly<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Come questa soluzione supporta la protezione degli accessi per carichi di lavoro moderni e di breve durata?&#8221; tab_id=&#8221;general-4&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;padding-content-img&#8221;]CyberArk consente ai carichi di lavoro di accedere alle risorse utilizzando accessi basati sull\u2019identit\u00e0 con privilegio minimo, invece di affidarsi a credenziali di lunga durata. Ci\u00f2 riduce gli accessi permanenti, limita il raggio d\u2019azione e aiuta i team di sicurezza ad applicare controlli coerenti in ambienti dinamici e automatizzati.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Come questa soluzione facilita gli audit e la reportistica di conformit\u00e0?&#8221; tab_id=&#8221;features-and-capabilities-1&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;padding-content-img&#8221;]CyberArk centralizza visibilit\u00e0, applicazione di policy e audit trail su tutti i secret e gli accessi ai carichi di lavoro. I team di sicurezza possono rispondere rapidamente a chi ha effettuato l\u2019accesso a quali risorse, quando e con quali controlli, riducendo i tempi di preparazione agli audit e migliorando la conformit\u00e0 in ambienti cloud, ibridi e di terze parti.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;\u00c8 possibile adottare questa soluzione in modo incrementale, seguendo l\u2019evoluzione del nostro ambiente?&#8221; tab_id=&#8221;features-and-capabilities-2&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;padding-content-img&#8221;]S\u00ec, CyberArk supporta un approccio graduale, consentendo alle organizzazioni di iniziare con visibilit\u00e0 e governance, per poi adottare automazione e accessi protetti ai carichi di lavoro nel corso del tempo. Questa flessibilit\u00e0 aiuta i team a modernizzare la sicurezza in base al proprio ritmo, senza obbligo di \u201crip and replace\u201d.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Come CyberArk Secure Secrets and Workloads si integra con CyberArk Privileged Access Manager (PAM)?&#8221; tab_id=&#8221;features-and-capabilities-3&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;padding-content-img&#8221;]CyberArk Secure Secrets and Workloads integra CyberArk Privileged Access Manager estendendo la sicurezza delle identit\u00e0 oltre gli utenti umani, includendo carichi di lavoro, applicazioni e automazione. Mentre PAM protegge gli accessi privilegiati degli individui e le sessioni, Secure Secrets and Workloads governa identit\u00e0 non umane, secret e accessi ai carichi di lavoro, offrendo ai team di sicurezza visibilit\u00e0 unificata, coerenza delle policy e verificabilit\u00e0 sia per le identit\u00e0 umane che per quelle macchina.[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 get-started cybv2-pad&#8221; css=&#8221;.vc_custom_1768992071973{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2026\/01\/CTA-data-wave-blue-dots-1300&#215;390-1.jpg?id=222966) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;2\/3&#8243; el_class=&#8221;stat-column text-center&#8221; offset=&#8221;vc_col-md-offset-2&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;extra-space chartreuse&#8221;]<\/p>\n<h3 style=\"color: white;\">Proteggere ogni secret e carico di lavoro senza rallentare lo sviluppo<\/h3>\n<p><\/p>\n<p style=\"color: white;\">Scopri come CyberArk unifica gestione dei secret e protezione degli accessi ai carichi di lavoro in ambienti ibridi e multi-cloud. Ottieni visibilit\u00e0 centralizzata, applicazione coerente delle policy e un percorso chiaro verso le identit\u00e0 moderne dei carichi di lavoro, senza attriti gli strumenti o flussi di lavoro esistenti.<\/p>\n<p>\n[\/vc_column_text][vc_btn title=&#8221;Richiedi una demo&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; css=&#8221;&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Ftry-buy%2Fsecrets-manager-saas-demo%2F|&#8221; el_class=&#8221;cybv2-button-solid-chartreuse mt-8&#8243;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 hero dark&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text css=&#8221;&#8221;] Proteggere secret e identit\u00e0 dei carichi di lavoro su larga scala Le identit\u00e0 macchina superano ora quelle umane in un rapporto di 82:1 e ogni carico&#8230;<\/p>\n","protected":false},"author":259,"featured_media":0,"parent":42102,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-223145","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Proteggere secret e identit\u00e0 dei carichi di lavoro | CyberArk<\/title>\n<meta name=\"description\" content=\"Unificare governance dei secret e identit\u00e0 dei carichi di lavoro. Ridurre la proliferazione di vault, automatizzare la rotazione e proteggere le identit\u00e0 macchina in ambienti cloud e ibridi.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/secure-secrets-and-workloads\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure Secrets and Workloads\" \/>\n<meta property=\"og:description\" content=\"Unificare governance dei secret e identit\u00e0 dei carichi di lavoro. Ridurre la proliferazione di vault, automatizzare la rotazione e proteggere le identit\u00e0 macchina in ambienti cloud e ibridi.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/secure-secrets-and-workloads\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-10T10:02:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2026\/01\/secure-secrets-WL-OG-img-1200x630-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"13 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/secure-secrets-and-workloads\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/secure-secrets-and-workloads\/\",\"name\":\"Proteggere secret e identit\u00e0 dei carichi di lavoro | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/secure-secrets-and-workloads\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/secure-secrets-and-workloads\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Data-stream-corrected.jpg\",\"datePublished\":\"2026-01-22T19:39:50+00:00\",\"dateModified\":\"2026-02-10T10:02:31+00:00\",\"description\":\"Unificare governance dei secret e identit\u00e0 dei carichi di lavoro. Ridurre la proliferazione di vault, automatizzare la rotazione e proteggere le identit\u00e0 macchina in ambienti cloud e ibridi.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/secure-secrets-and-workloads\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/secure-secrets-and-workloads\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/secure-secrets-and-workloads\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Data-stream-corrected.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Data-stream-corrected.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/secure-secrets-and-workloads\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Soluzioni di Identity Security\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Secure Secrets and Workloads\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Proteggere secret e identit\u00e0 dei carichi di lavoro | CyberArk","description":"Unificare governance dei secret e identit\u00e0 dei carichi di lavoro. Ridurre la proliferazione di vault, automatizzare la rotazione e proteggere le identit\u00e0 macchina in ambienti cloud e ibridi.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/secure-secrets-and-workloads\/","og_locale":"it_IT","og_type":"article","og_title":"Secure Secrets and Workloads","og_description":"Unificare governance dei secret e identit\u00e0 dei carichi di lavoro. Ridurre la proliferazione di vault, automatizzare la rotazione e proteggere le identit\u00e0 macchina in ambienti cloud e ibridi.","og_url":"https:\/\/www.cyberark.com\/solutions\/secure-secrets-and-workloads\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-02-10T10:02:31+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2026\/01\/secure-secrets-WL-OG-img-1200x630-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tempo di lettura stimato":"13 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/secure-secrets-and-workloads\/","url":"https:\/\/www.cyberark.com\/solutions\/secure-secrets-and-workloads\/","name":"Proteggere secret e identit\u00e0 dei carichi di lavoro | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/solutions\/secure-secrets-and-workloads\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/solutions\/secure-secrets-and-workloads\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Data-stream-corrected.jpg","datePublished":"2026-01-22T19:39:50+00:00","dateModified":"2026-02-10T10:02:31+00:00","description":"Unificare governance dei secret e identit\u00e0 dei carichi di lavoro. Ridurre la proliferazione di vault, automatizzare la rotazione e proteggere le identit\u00e0 macchina in ambienti cloud e ibridi.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/secure-secrets-and-workloads\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/secure-secrets-and-workloads\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/solutions\/secure-secrets-and-workloads\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Data-stream-corrected.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Data-stream-corrected.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/secure-secrets-and-workloads\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Soluzioni di Identity Security","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Secure Secrets and Workloads"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/223145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/comments?post=223145"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/223145\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/42102"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/media?parent=223145"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/product_category?post=223145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}