{"id":41924,"date":"2019-02-20T11:35:04","date_gmt":"2019-02-20T16:35:04","guid":{"rendered":"https:\/\/www.cyberark.com\/product-security\/"},"modified":"2023-12-08T08:09:05","modified_gmt":"2023-12-08T13:09:05","slug":"product-security","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/it\/product-security\/","title":{"rendered":"Sicurezza del prodotto"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero-noimg dark&#8221;][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;column-1&#8243;][vc_column_text]<\/p>\n<h1>Bollettino di sicurezza dei prodotti CyberArk<\/h1>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-top text-md-center&#8221;][vc_column][vc_column_text el_class=&#8221;cybv2-pad-btm&#8221; css=&#8221;.vc_custom_1701169393494{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h3 class=\"vc_custom_heading cyb-ltr-spc-6 vc_custom_1550095646903\">Rimani aggiornato<\/h3>\n<div class=\"wpb_text_column wpb_content_element vc_custom_1550871538546\">\n<div class=\"wpb_wrapper\">\n<p>Questa pagina contiene informazioni sulle vulnerabilit\u00e0 di sicurezza che potrebbero avere un impatto sui prodotti CyberArk. CyberArk incoraggia vivamente gli utenti a eseguire l&#8217;upgrade o l&#8217;applicazione tempestiva delle relative patch.<\/p>\n<p>CyberArk prende molto sul serio la sicurezza dei prodotti. Se ritieni di aver trovato una vulnerabilit\u00e0 in uno dei nostri prodotti, ti chiediamo di seguire le linee guida sulla divulgazione responsabile e di contattare <a class=\"ext-url\" href=\"mailto:product_security@cyberark.com\">product_security@cyberark.com<\/a> e lavorare con noi per una rapida risoluzione al fine di proteggere i nostri clienti.<\/p>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][vc_btn title=&#8221;Leggi le nostre linee guida&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fcyberark-security-vulinerability-policy.pdf|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad text-center&#8221;][vc_column][vc_column_text css=&#8221;.vc_custom_1701169516508{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h3 class=\"vc_custom_heading vc_custom_1550858186777\">Ultimi bollettini di sicurezza<\/h3>\n<div class=\"wpb_text_column wpb_content_element vc_custom_1550859075590\">\n<div class=\"wpb_wrapper\">\n<p>Per maggiori dettagli sui nostri bollettini sulla sicurezza, ti invitiamo <a class=\"ext-url\" href=\"https:\/\/cyberark.my.site.com\/s\/login\/\" target=\"_blank\" rel=\"noopener noreferrer\">a effettuare l&#8217;accesso o a unirti<\/a> alla nostra technical community.<\/p>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-sm-offset-4 vc_col-xs-6&#8243; css=&#8221;.vc_custom_1561728971210{padding-right: 0px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1701169432891{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4 class=\"vc_custom_heading vc_custom_1550858186777\">Date<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; css=&#8221;.vc_custom_1561728983798{padding-left: 0px !important;}&#8221; offset=&#8221;vc_col-xs-6&#8243;][vc_column_text css=&#8221;.vc_custom_1655316673613{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4 class=\"vc_custom_heading vc_custom_1550858186777\">ID<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243; offset=&#8221;vc_col-sm-offset-4&#8243;][vc_basic_grid post_type=&#8221;security_bulletin&#8221; max_items=&#8221;10&#8243; element_width=&#8221;12&#8243; gap=&#8221;1&#8243; item=&#8221;36838&#8243; initial_loading_animation=&#8221;none&#8221; grid_id=&#8221;vc_gid:1701169469098-42e0d8be-29de-0&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_talk_to_an_expert&#8221; css=&#8221;.vc_custom_1608677118624{background-color: #061b2b !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;extra-space&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Login or join our technical community<\/h2>\n<p>[\/vc_column_text][vc_btn title=&#8221;Log in&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; align=&#8221;center&#8221; link=&#8221;url:https%3A%2F%2Fcyberark.my.site.com%2Fs%2Flogin%2F|target:_blank|&#8221; el_class=&#8221;cybv2-button-solid cyb-button-hpstyle_section5&#8243;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero-noimg dark&#8221;][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;column-1&#8243;][vc_column_text] Bollettino di sicurezza dei prodotti CyberArk [\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-top text-md-center&#8221;][vc_column][vc_column_text el_class=&#8221;cybv2-pad-btm&#8221; css=&#8221;.vc_custom_1701169393494{padding-bottom: 20px !important;}&#8221;] Rimani aggiornato Questa pagina contiene informazioni sulle vulnerabilit\u00e0 di sicurezza che potrebbero avere un&#8230;<\/p>\n","protected":false},"author":125,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-41924","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Sicurezza del prodotto | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/it\/product-security\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sicurezza del prodotto\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero-noimg dark&#8221;][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;column-1&#8243;][vc_column_text] Bollettino di sicurezza dei prodotti CyberArk [\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-top text-md-center&#8221;][vc_column][vc_column_text el_class=&#8221;cybv2-pad-btm&#8221; css=&#8221;.vc_custom_1701169393494{padding-bottom: 20px !important;}&#8221;] Rimani aggiornato Questa pagina contiene informazioni sulle vulnerabilit\u00e0 di sicurezza che potrebbero avere un...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/it\/product-security\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-08T13:09:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/it\/product-security\/\",\"url\":\"https:\/\/www.cyberark.com\/it\/product-security\/\",\"name\":\"Sicurezza del prodotto | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"datePublished\":\"2019-02-20T16:35:04+00:00\",\"dateModified\":\"2023-12-08T13:09:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/product-security\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/it\/product-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/it\/product-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sicurezza del prodotto\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Sicurezza del prodotto | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/it\/product-security\/","og_locale":"it_IT","og_type":"article","og_title":"Sicurezza del prodotto","og_description":"[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero-noimg dark&#8221;][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;column-1&#8243;][vc_column_text] Bollettino di sicurezza dei prodotti CyberArk [\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-top text-md-center&#8221;][vc_column][vc_column_text el_class=&#8221;cybv2-pad-btm&#8221; css=&#8221;.vc_custom_1701169393494{padding-bottom: 20px !important;}&#8221;] Rimani aggiornato Questa pagina contiene informazioni sulle vulnerabilit\u00e0 di sicurezza che potrebbero avere un...","og_url":"https:\/\/www.cyberark.com\/it\/product-security\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2023-12-08T13:09:05+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tempo di lettura stimato":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/it\/product-security\/","url":"https:\/\/www.cyberark.com\/it\/product-security\/","name":"Sicurezza del prodotto | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"datePublished":"2019-02-20T16:35:04+00:00","dateModified":"2023-12-08T13:09:05+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/it\/product-security\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/it\/product-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/it\/product-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Sicurezza del prodotto"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/41924","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/users\/125"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/comments?post=41924"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/41924\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/media?parent=41924"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/product_category?post=41924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}