{"id":42078,"date":"2017-06-13T15:19:49","date_gmt":"2017-06-13T19:19:49","guid":{"rendered":"https:\/\/www.cyberark.com\/endpoint-privilege-manager\/"},"modified":"2021-05-25T11:17:06","modified_gmt":"2021-05-25T15:17:06","slug":"endpoint-privilege-manager-old","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/it\/products\/endpoint-privilege-manager-old\/","title":{"rendered":"Endpoint Privilege Manager"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1536587795588{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-hero.jpg?id=26605) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-hero-section&#8221;][vc_column][vc_row_inner content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-hero-header&#8221;][vc_column_inner el_class=&#8221;cyb-hero-header-text&#8221;][vc_custom_heading text=&#8221;ENDPOINT PRIVILEGE MANAGER&#8221; font_container=&#8221;tag:h1|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_custom_heading text=&#8221;Implementa i principi del privilegio minimo, le protezioni contro il furto delle credenziali e il controllo delle applicazioni in scala.&#8221; font_container=&#8221;tag:h3|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_btn title=&#8221;SCARICA IL DATA SHEET&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#ffffff&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fresources%2Fproduct-datasheets%2Fcyberark-endpoint-privilege-manager-it|&#8221; el_class=&#8221;cyb-button large event-click&#8221; el_id=&#8221;EPM Page: Download Datasheet&#8221;][vc_btn title=&#8221;RICHIEDI LA PROVA GRATUITA&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#ffffff&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fproducts%2Fprivileged-account-security-solution%2Fendpoint-privilege-manager%2Fendpoint-privilege-manager-free-trial%2F|&#8221; el_class=&#8221;cyb-button green large event-click&#8221; el_id=&#8221;EPM Page: Request Free Trial&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;cyb-center cyb-pad-top&#8221;][vc_column offset=&#8221;vc_col-md-offset-2 vc_col-md-8&#8243;][vc_column_text el_class=&#8221;cyb-ltr-spc&#8221;]<\/p>\n<h2>VANTAGGI<\/h2>\n<p>Riduci il rischio degli accessi amministrativi non gestiti sugli endpoint.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cyb-card-hover&#8221;][vc_column width=&#8221;1\/3&#8243; column_link=&#8221;url:https%3A%2F%2Ffast.wistia.net%2Fembed%2Fiframe%2Flq0koobnt1%3FvideoFoam%3Dtrue|&#8221;][vc_single_image image=&#8221;95350&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; el_class=&#8221;cyb-ken-img&#8221; css=&#8221;.vc_custom_1593710537314{padding-bottom: 1.5625px !important;}&#8221;][vc_column_text]<\/p>\n<h3>PER LA SICUREZZA<\/h3>\n<p>Implementa i principi del privilegio minimo per contenere malware e altre minacce assicurando che gli utenti Windows e Mac operino esclusivamente con le autorizzazioni di cui hanno bisogno e nient&#8217;altro.[\/vc_column_text][vc_column_text]PER SAPERNE DI PI\u00d9 &gt;[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fresource%2Fsecuring-privilege-and-containing-attacks-on-the-endpoint%2F|&#8221;][vc_single_image image=&#8221;95173&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; el_class=&#8221;cyb-ken-img border-top&#8221;][vc_column_text]<\/p>\n<h3>PER LE OPERATION<\/h3>\n<p>Migliora la stabilit\u00e0 dell&#8217;endpoint e riduci il costo degli accessi amministrativi non gestiti minimizzando i problemi per gli utenti finali.[\/vc_column_text][vc_column_text]PER SAPERNE DI PI\u00d9 &gt;[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; column_link=&#8221;url:https%3A%2F%2Ffast.wistia.net%2Fembed%2Fiframe%2Fbhwe3t5ct0%3FvideoFoam%3Dtrue|target:%20_blank|&#8221;][vc_single_image image=&#8221;26515&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; el_class=&#8221;cyb-ken-img border-top&#8221;][vc_column_text]<\/p>\n<h3>PER LA CONFORMIT\u00c0<\/h3>\n<p>Soddisfa le policy interne e i requisiti normativi con una reportistica approfondita e un processo di verifica delle elevazioni dei permessi visionabile.[\/vc_column_text][vc_column_text]PER SAPERNE DI PI\u00d9 &gt;[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-pad&#8221; css=&#8221;.vc_custom_1588344085836{background-color: #f1f2f2 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_raw_html]W3dpc3RpYV92aWRlbyBpZD0iYmh3ZTN0NWN0MCJd[\/vc_raw_html][\/vc_column][vc_column width=&#8221;1\/3&#8243; offset=&#8221;vc_col-sm-offset-1&#8243; el_class=&#8221;cyb-subpad cyb-center-mobile&#8221;][vc_column_text css=&#8221;.vc_custom_1588618290918{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;}&#8221;]<\/p>\n<h3>PROTEGGERE I PRIVILEGI E CONTENERE GLI ATTACCHI ALL&#8217;ENDPOINT<\/h3>\n<p>Applicare la sicurezza dei privilegi presso l&#8217;endpoint \u00e8 una componente fondamentale del tuo programma di sicurezza, ma ci\u00f2 pu\u00f2 andare a discapito della produttivit\u00e0 degli utenti e dell&#8217;helpdesk. Questo breve video illustra come CyberArk Endpoint Privilege Manager contribuisce a rimuovere questa barriera, aggiungendo un livello di protezione critico per rafforzare la sicurezza degli endpoint esistente e consentendo di contenere gli attacchi a livello endpoint.[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1563218967296{padding-top: 2.5rem !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;CARATTERISTICHE: ENDPOINT PRIVILEGE MANAGER&#8221; font_container=&#8221;tag:h2|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Blocca i privilegi sull&#8217;endpoint e impedisci movimenti laterali.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_tta_accordion style=&#8221;flat&#8221; shape=&#8221;square&#8221; color=&#8221;white&#8221; c_icon=&#8221;chevron&#8221; c_position=&#8221;right&#8221; active_section=&#8221;100&#8243; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;GESTIONE DEI PRIVILEGI&#8221; tab_id=&#8221;privilege&#8221; sub_head=&#8221;Elimina e gestisci i diritti amministrativi locali su workstation e server Windows e sui Mac per prevenire movimenti laterali. Consenti elevazioni ed accessi just-in-time con piena verifica delle attivit\u00e0 privilegiate.&#8221;][vc_column_text]Endpoint Privilege Manager \u00e8 progettato per prevenire gli attacchi che partono dall&#8217;endpoint, eliminando i diritti degli amministratori locali da server e postazioni lavorative Windows e Mac. Endpoint Privilege Manager consente l&#8217;elevazione e l&#8217;accesso just-in-time in base alle richieste, con la piena verifica delle attivit\u00e0 privilegiate. \u00c8 possibile concedere diritti amministrativi completi o solo l&#8217;accesso a livello di applicazione; l&#8217;accesso \u00e8 limitato nel tempo ed \u00e8 revocabile secondo necessit\u00e0. Endpoint Privilege Manager aiuta le organizzazioni a proteggersi dalle minacce che sfruttano gli accessi amministrativi non gestiti, con un impatto sugli utenti finali ridotto al minimo.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;PROTEZIONE DAL FURTO DI CREDENZIALI&#8221; tab_id=&#8221;credential&#8221; el_class=&#8221;isolate&#8221; sub_head=&#8221;Rileva e blocca i tentativi sospetti di furto delle credenziali su workstation e server Windows. Proteggi gli archivi delle credenziali del sistema operativo, dei browser e delle cache dei file.&#8221;][vc_column_text]Il furto di credenziali ha un ruolo fondamentale in qualsiasi attacco. Grazie alle sue avanzate capacit\u00e0 di bloccare i furti delle credenziali, Endpoint Privilege Manager consente alle organizzazioni di rilevare e bloccare i tentativi di furto delle credenziali Windows e di quelle memorizzate dai browser web pi\u00f9 diffusi e nelle cache dei file.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;CONTROLLO DELLE APPLICAZIONI&#8221; tab_id=&#8221;application&#8221; sub_head=&#8221;Blocca automaticamente l&#8217;esecuzione del malware, ransomware incluso. Riduci le deviazioni di configurazione presso gli endpoint, con un impatto minimo sugli utenti finali.&#8221;][vc_column_text]Grazie alla funzione Application Control di Endpoint Privilege Manager, i team operativi e di sicurezza IT possono autorizzare l&#8217;esecuzione delle applicazioni approvate e bloccare malware e ransomware. Le applicazioni sconosciute possono essere eseguite in \u2018Restricted Mode\u2019, che impedisce loro di accedere alle risorse aziendale, ai dati sensibili o a Internet. Queste applicazioni possono, inoltre, essere inviate per ulteriori analisi al servizio Application Analysis Service di Endpoint Privilege Manager, basato sul cloud, che si integra con feed di dati da CheckPoint, FireEye, Palo Alto Network e altri servizi. La soluzione riduce i rischi per la sicurezza e le deviazioni di configurazione presso gli endpoint, nonch\u00e9 le chiamate all&#8217;helpdesk da parte degli utenti finali. In base ai test condotti nei <a href=\"https:\/\/www.cyberark.com\/it\/resource\/cyberark-labs-ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\">Laboratori CyberArk<\/a>, la rimozione dei diritti amministrativi locali combinata con il controllo delle applicazioni ha avuto un&#8217;efficacia del 100 percento nel prevenire la criptazione dei file da parte di ransomware.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;PRIVILEGE DECEPTION&#8221; tab_id=&#8221;1582315340358-ba0a8283-7cc9&#8243; sub_head=&#8221;Consente alle difese di rilevare e bloccare rapidamente gli attacchi in corso, inserendo componenti di inganno nel percorso di attacco.&#8221;][vc_column_text]Endpoint Privilege <a href=\"https:\/\/www.cyberark.com\/it\/resource\/cyberark-endpoint-privilege-manager-privilege-deception-demo\/\">Deception<\/a> rompe la catena di attacco nel punto iniziale di entrata offrendo una modalit\u00e0 deliberata e controllata per tracciare e deviare potenziali attaccanti, attenuare lo sfruttamento di credenziali privilegiate e ridurre il tempo di sosta.[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1574805379030{background-color: #f1f2f2 !important;}&#8221;][vc_column css=&#8221;.vc_custom_1588355390480{padding-top: 2rem !important;padding-bottom: 1.25rem !important;}&#8221;][vc_column_text el_class=&#8221;cyb-center cyb-subpad-btm&#8221;]<\/p>\n<h2>SCOPRI COSA DICONO I NOSTRI CLIENTI<\/h2>\n<p>[\/vc_column_text][vc_tta_pageable no_fill_content_area=&#8221;1&#8243; autoplay=&#8221;10&#8243; active_section=&#8221;1&#8243; pagination_color=&#8221;blue&#8221; el_class=&#8221;peer-reviews&#8221;][vc_tta_section title=&#8221;Sezione 1&#8243; tab_id=&#8221;1574702846345-d5fb6c55-8902&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-reverse&#8221;][vc_column_inner el_class=&#8221;cyb-subpad&#8221; width=&#8221;5\/12&#8243;][vc_column_text]<\/p>\n<h3>AZIENDA GLOBAL 2000 RIDUCE I RISCHI ATTRAVERSO L&#8217;EFFICIENZA OPERATIVA<\/h3>\n<p>Scopri come EPM contribuisce all&#8217;adozione di policy di sicurezza grazie all&#8217;efficienza operativa in un&#8217;azienda Global 2000.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_raw_html]W3dpc3RpYV92aWRlbyBpZD0iMm96YnBodHJtYSJd[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Sezione 1&#8243; tab_id=&#8221;1588355682827-efe44833-16a7&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-reverse&#8221;][vc_column_inner el_class=&#8221;cyb-submargin&#8221; width=&#8221;5\/12&#8243;][vc_custom_heading text=&#8221;Avevamo bisogno di gestire tre requisiti di sicurezza in una prospettiva globale: privilegi minimi, gestione delle patch e controllo delle applicazioni. CyberArk si occupa di due di questi tre aspetti per noi, e lo fa in modo eccellente&#8230; CyberArk Endpoint Privilege Manager ci aiuta a sciogliere la maggior parte dei dubbi sui componenti da installare e ci permette di creare un ambiente pi\u00f9 sicuro.&#8221; font_container=&#8221;tag:h3|font_size:1.625rem|text_align:left|line_height:1.9375rem&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc-6 blockquote&#8221;][vc_column_text css=&#8221;.vc_custom_1588620361298{padding-bottom: 1.25rem !important;}&#8221;]<strong>Laura Melton<\/strong>\u00a0\u2013 Senior Information Technology Associate, College of Architecture, Texas A&amp;M University[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;cyb-subpad&#8221; width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_raw_html]W3dpc3RpYV92aWRlbyBpZD0iazZrc2F4ajl5YSJd[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_pageable][\/vc_column][\/vc_row][vc_row][vc_column css=&#8221;.vc_custom_1536613375372{padding-top: 2rem !important;padding-bottom: 0.5rem !important;}&#8221;][vc_custom_heading text=&#8221;IL ROMPICAPO DELLA SICUREZZA DEGLI ENDPOINT&#8221; font_container=&#8221;tag:h2|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc&#8221; css=&#8221;.vc_custom_1536606553935{margin-bottom: 0.5rem !important;}&#8221;][vc_custom_heading text=&#8221;Dove si colloca la gestione dei privilegi?&#8221; font_container=&#8221;tag:p|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;.vc_custom_1536606668346{padding-bottom: 1.75rem !important;}&#8221;][vc_column_text el_class=&#8221;cyb-center&#8221;]<img decoding=\"async\" class=\"alignnone size-full wp-image-26615\" style=\"width: 39.8125rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-endpoint-graphic.svg\" alt=\"\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cyb-margin&#8221;][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1536600696186{padding-bottom: 2.5rem !important;}&#8221;][vc_row_inner css=&#8221;.vc_custom_1536607864323{margin-right: 0px !important;margin-left: 0px !important;}&#8221;][vc_column_inner][vc_column_text css=&#8221;.vc_custom_1563215137343{padding-top: 2rem !important;}&#8221; el_class=&#8221;cyb-fxd-hgt-142 cyb-center&#8221;]<img decoding=\"async\" class=\"alignnone size-full wp-image-70646\" style=\"width: 4.375rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/07\/icon-cube-grey.svg\" alt=\"\" \/>[\/vc_column_text][vc_custom_heading text=&#8221;RILEVAMENTO E REAZIONE PRESSO L&#8217;ENDPOINT&#8221; font_container=&#8221;tag:h4|text_align:center|line_height:1.625rem&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc-4&#8243; css=&#8221;.vc_custom_1563215243910{margin-bottom: 0.5rem !important;}&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Rileva e reagisci ad attacchi attivi avanzati presso gli endpoint.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1536600691036{padding-bottom: 2.5rem !important;}&#8221;][vc_row_inner css=&#8221;.vc_custom_1536613127131{margin-right: 0px !important;margin-left: 0px !important;}&#8221;][vc_column_inner][vc_column_text css=&#8221;.vc_custom_1563215375937{padding-top: 2rem !important;}&#8221; el_class=&#8221;cyb-fxd-hgt-142 cyb-center&#8221;]<img decoding=\"async\" class=\"alignnone size-full wp-image-70655\" style=\"width: 4.375rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/07\/icon-cube-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_custom_heading text=&#8221;ANTIVIRUS\/NGAV&#8221; font_container=&#8221;tag:h4|text_align:center|line_height:1.625rem&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc-4&#8243; css=&#8221;.vc_custom_1563215470116{margin-bottom: 0.5rem !important;}&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Previeni le infezioni malware applicando diverse tecniche.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1536600701879{padding-bottom: 2.5rem !important;}&#8221;][vc_row_inner css=&#8221;.vc_custom_1536613168024{margin-right: 0px !important;margin-left: 0px !important;}&#8221;][vc_column_inner][vc_column_text css=&#8221;.vc_custom_1563215580172{padding-top: 2rem !important;}&#8221; el_class=&#8221;cyb-fxd-hgt-142 cyb-center&#8221;]<img decoding=\"async\" class=\"alignnone size-full wp-image-70664\" style=\"width: 4.375rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/07\/icon-cube-blue.svg\" alt=\"\" \/>[\/vc_column_text][vc_custom_heading text=&#8221;GESTIONE DEI PRIVILEGI&#8221; font_container=&#8221;tag:h4|text_align:center|line_height:1.625rem&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc-4&#8243; css=&#8221;.vc_custom_1563216336057{margin-bottom: 0.5rem !important;}&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Gestisci i diritti degli amministratori locali e mantieni produttivi gli utenti.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cyb-margin&#8221;][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1563215625250{padding-bottom: 2.5rem !important;}&#8221; offset=&#8221;vc_col-sm-offset-2&#8243;][vc_row_inner css=&#8221;.vc_custom_1536607864323{margin-right: 0px !important;margin-left: 0px !important;}&#8221;][vc_column_inner][vc_column_text css=&#8221;.vc_custom_1563215798499{padding-top: 2rem !important;}&#8221; el_class=&#8221;cyb-fxd-hgt-142 cyb-center&#8221;]<img decoding=\"async\" class=\"alignnone size-full wp-image-70673\" style=\"width: 4.375rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/07\/icon-cube-green.svg\" alt=\"\" \/>[\/vc_column_text][vc_custom_heading text=&#8221;PATCH DELLE APPLICAZIONI&#8221; font_container=&#8221;tag:h4|text_align:center|line_height:1.625rem&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc-4&#8243; css=&#8221;.vc_custom_1563215823434{margin-bottom: 0.5rem !important;}&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Applica aggiornamenti alle applicazioni per affrontare le problematiche di sicurezza.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1536600691036{padding-bottom: 2.5rem !important;}&#8221;][vc_row_inner css=&#8221;.vc_custom_1536613127131{margin-right: 0px !important;margin-left: 0px !important;}&#8221;][vc_column_inner][vc_column_text css=&#8221;.vc_custom_1563216215789{padding-top: 2rem !important;}&#8221; el_class=&#8221;cyb-fxd-hgt-142 cyb-center&#8221;]<img decoding=\"async\" class=\"alignnone size-full wp-image-70682\" style=\"width: 4.375rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/07\/icon-cube-yellow.svg\" alt=\"\" \/>[\/vc_column_text][vc_custom_heading text=&#8221;PATCH DEL SISTEMA OPERATIVO&#8221; font_container=&#8221;tag:h4|text_align:center|line_height:1.625rem&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc-4&#8243; css=&#8221;.vc_custom_1563216238017{margin-bottom: 0.5rem !important;}&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Garantisce le correzioni dei bug di sicurezza a livello del sistema operativo.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cyb-center cyb-pad&#8221; css=&#8221;.vc_custom_1598623554823{background-color: #f1f2f2 !important;}&#8221;][vc_column][vc_column_text]<\/p>\n<h2>IMPLEMENTAZIONE FLESSIBILE<\/h2>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;cyb-center&#8221; css=&#8221;.vc_custom_1598973801847{padding-top: 1.75rem !important;padding-bottom: 2.875rem !important;padding-left: 1.375rem !important;}&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-98270\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/EPM-Graphic-V2-transparent.png\" alt=\"\" width=\"700\" height=\"793\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/EPM-Graphic-V2-transparent.png 1188w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/EPM-Graphic-V2-transparent-265x300.png 265w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/EPM-Graphic-V2-transparent-904x1024.png 904w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/EPM-Graphic-V2-transparent-768x869.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/EPM-Graphic-V2-transparent-150x170.png 150w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column css=&#8221;.vc_custom_1536673593882{padding-top: 1.25rem !important;padding-bottom: 0.5rem !important;}&#8221;][vc_custom_heading text=&#8221;OPZIONI DI IMPLEMENTAZIONE FLESSIBILI&#8221; font_container=&#8221;tag:h2|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc&#8221; css=&#8221;.vc_custom_1536673675851{margin-bottom: 0.5rem !important;padding-bottom: 1.5625rem !important;}&#8221;][vc_tta_tabs style=&#8221;outline&#8221; shape=&#8221;square&#8221; spacing=&#8221;&#8221; alignment=&#8221;center&#8221; active_section=&#8221;1&#8243; no_fill_content_area=&#8221;true&#8221; el_class=&#8221;cyb-epm-tab&#8221;][vc_tta_section title=&#8221;ON-PREMISE&#8221; tab_id=&#8221;1598622543236-a875e90d-708e&#8221;][vc_column_text el_class=&#8221;cyb-center&#8221; css=&#8221;.vc_custom_1536674095813{padding-top: 1.75rem !important;padding-bottom: 2.875rem !important;padding-left: 1.375rem !important;}&#8221;]<img decoding=\"async\" class=\"alignnone size-full wp-image-26631\" style=\"width: 39.625rem; height: 38.125rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-deploy-graphic.svg\" alt=\"\" \/>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;SaaS&#8221; tab_id=&#8221;1598622543281-bb77af0c-89f0&#8243;][vc_column_text el_class=&#8221;cyb-center&#8221; css=&#8221;.vc_custom_1536674087589{padding-top: 1.75rem !important;padding-bottom: 2.875rem !important;}&#8221;]<img decoding=\"async\" class=\"alignnone size-full wp-image-26633\" style=\"width: 35.125rem; height: 38.125rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-deploy-sass-graphic.svg\" alt=\"\" \/>[\/vc_column_text][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; parallax=&#8221;content-moving&#8221; parallax_speed_bg=&#8221;1.6&#8243; css=&#8221;.vc_custom_1565205065173{padding-top: 5.625rem !important;padding-bottom: 5.625rem !important;background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/08\/marketplace.jpg?id=26455) !important;background-position: center;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-min-hgt-620&#8243;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1565205076548{padding-top: 2.5rem !important;padding-right: 10% !important;padding-bottom: 2.5rem !important;padding-left: 10% !important;background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/11\/blue-graphic.png?id=30217) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; offset=&#8221;vc_col-sm-offset-6&#8243;][vc_custom_heading text=&#8221;MARKETPLACE&#8221; font_container=&#8221;tag:h3|text_align:left|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc-4&#8243; css=&#8221;.vc_custom_1534274649060{padding-bottom: 0.3125rem !important;}&#8221;][vc_custom_heading text=&#8221;Estendi l&#8217;accesso privilegiato sicuro a tutta la tua azienda con le integrazioni di CyberArk e dei nostri partner.&#8221; font_container=&#8221;tag:h3|text_align:left|color:%23ffffff|line_height:1.875rem&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc-1-4 light&#8221; css=&#8221;.vc_custom_1534274655933{padding-bottom: 0.9375rem !important;}&#8221;][vc_btn title=&#8221;ESPLORA IL MARKETPLACE&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#ffffff&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fcyberark-customers.force.com%2Fmplace%2Fs%2F|&#8221; el_class=&#8221;cyb-button white&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1557429496033{padding-top: 2.5rem !important;}&#8221;][vc_column css=&#8221;.vc_custom_1557496295891{padding-bottom: 1.4375rem !important;}&#8221; el_class=&#8221;cyb-center&#8221;][vc_column_text]<\/p>\n<h2>SOLUZIONE SAAS DEL LEADER DI MERCATO<\/h2>\n<p>Sfrutta la lunga esperienza e il vasto know-how di CyberArk nella gestione degli accessi privilegiati e in ambito SaaS per proteggere la tua azienda in continua trasformazione.[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; content_placement=&#8221;bottom&#8221; css=&#8221;.vc_custom_1579899779493{padding-bottom: 1.5rem !important;}&#8221; el_class=&#8221;cyb-center&#8221;][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1586265438614{margin-top: 10px !important;margin-right: 10px !important;margin-bottom: 10px !important;margin-left: 10px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 1.375rem !important;padding-bottom: 1.375rem !important;border-left-color: #d0d2d3 !important;border-left-style: solid !important;border-right-color: #d0d2d3 !important;border-right-style: solid !important;border-top-color: #d0d2d3 !important;border-top-style: solid !important;border-bottom-color: #d0d2d3 !important;border-bottom-style: solid !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1581371272671{padding-bottom: 10px !important;}&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"359\" height=\"357\" class=\"alignnone size-full wp-image-85470\" style=\"width: 9.375rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/02\/logo-soc.png\" alt=\"\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/02\/logo-soc.png 359w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/02\/logo-soc-300x298.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/02\/logo-soc-150x150.png 150w\" sizes=\"auto, (max-width: 359px) 100vw, 359px\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h5>CONFORME A SOC 2<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1581369982186{margin-top: 10px !important;margin-right: 10px !important;margin-bottom: 10px !important;margin-left: 10px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 1.375rem !important;padding-bottom: 1.375rem !important;border-left-color: #d0d2d3 !important;border-left-style: solid !important;border-right-color: #d0d2d3 !important;border-right-style: solid !important;border-top-color: #d0d2d3 !important;border-top-style: solid !important;border-bottom-color: #d0d2d3 !important;border-bottom-style: solid !important;}&#8221; offset=&#8221;vc_col-sm-offset-0&#8243;][vc_column_text css=&#8221;.vc_custom_1581429524393{padding-bottom: 2.5rem !important;}&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-49828\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/04\/SC-Logo-v2.png\" alt=\"\" width=\"224\" height=\"73\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/04\/SC-Logo-v2.png 224w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/04\/SC-Logo-v2-150x49.png 150w\" sizes=\"auto, (max-width: 224px) 100vw, 224px\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h5>LA MIGLIORE SOLUZIONE DI SICUREZZA AZIENDALE<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1579899808670{margin-top: 10px !important;margin-right: 10px !important;margin-bottom: 10px !important;margin-left: 10px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 1.375rem !important;padding-bottom: 1.375rem !important;border-left-color: #d0d2d3 !important;border-left-style: solid !important;border-right-color: #d0d2d3 !important;border-right-style: solid !important;border-top-color: #d0d2d3 !important;border-top-style: solid !important;border-bottom-color: #d0d2d3 !important;border-bottom-style: solid !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1581429535026{padding-bottom: 1.375rem !important;}&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-49846\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/04\/Cyber-Defense-2019-v2.png\" alt=\"\" width=\"155\" height=\"129\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/04\/Cyber-Defense-2019-v2.png 155w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/04\/Cyber-Defense-2019-v2-150x125.png 150w\" sizes=\"auto, (max-width: 155px) 100vw, 155px\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h5>SICUREZZA PER GLI ACCOUNT PRIVILEGIATI<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1586265452006{margin-top: 10px !important;margin-right: 10px !important;margin-bottom: 10px !important;margin-left: 10px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 1.375rem !important;padding-bottom: 1.375rem !important;border-left-color: #d0d2d3 !important;border-left-style: solid !important;border-right-color: #d0d2d3 !important;border-right-style: solid !important;border-top-color: #d0d2d3 !important;border-top-style: solid !important;border-bottom-color: #d0d2d3 !important;border-bottom-style: solid !important;}&#8221; offset=&#8221;vc_col-sm-offset-2&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"634\" class=\"alignnone size-full wp-image-68394\" style=\"width: 9.375rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/06\/CyberSecurityAward-2019.jpg\" alt=\"\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/06\/CyberSecurityAward-2019.jpg 600w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/06\/CyberSecurityAward-2019-284x300.jpg 284w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/06\/CyberSecurityAward-2019-150x159.jpg 150w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1579899825763{margin-top: 10px !important;margin-right: 10px !important;margin-bottom: 10px !important;margin-left: 10px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 1.375rem !important;padding-bottom: 1.375rem !important;border-left-color: #d0d2d3 !important;border-left-style: solid !important;border-right-color: #d0d2d3 !important;border-right-style: solid !important;border-top-color: #d0d2d3 !important;border-top-style: solid !important;border-bottom-color: #d0d2d3 !important;border-bottom-style: solid !important;}&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"162\" height=\"225\" class=\"size-full wp-image-37853 aligncenter\" style=\"width: 6.875rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/03\/WINNER_gold_2019.png\" alt=\"\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/03\/WINNER_gold_2019.png 162w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/03\/WINNER_gold_2019-150x208.png 150w\" sizes=\"auto, (max-width: 162px) 100vw, 162px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1534867652115{padding-top: 2rem !important;background-color: #f1f2f2 !important;}&#8221;][vc_column width=&#8221;1\/12&#8243;][\/vc_column][vc_column width=&#8221;5\/6&#8243; css=&#8221;.vc_custom_1534353344275{padding-bottom: 1.25rem !important;}&#8221;][vc_custom_heading text=&#8221;RISORSE&#8221; font_container=&#8221;tag:h2|text_align:center|color:%23414042&#8243; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc-6&#8243;][\/vc_column][vc_column width=&#8221;1\/12&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1595432169439{background-color: #f1f2f2 !important;}&#8221;][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1537979261232{background-color: #f1f2f2 !important;}&#8221;][vc_column css=&#8221;.vc_custom_1537546542206{padding-bottom: 3.125rem !important;}&#8221; el_class=&#8221;cyb-center&#8221;][vc_btn title=&#8221;ALTRE RISORSE&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#414042&#8243; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fresources%2F|&#8221; el_class=&#8221;cyb-button&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1534869861269{padding-top: 2rem !important;}&#8221;][vc_column width=&#8221;1\/12&#8243;][\/vc_column][vc_column width=&#8221;5\/6&#8243; css=&#8221;.vc_custom_1534353344275{padding-bottom: 1.25rem !important;}&#8221;][vc_custom_heading text=&#8221;RICHIEDI UNA DEMO LIVE&#8221; font_container=&#8221;tag:h2|text_align:center|color:%23414042&#8243; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc-6&#8243;][\/vc_column][vc_column width=&#8221;1\/12&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1534881520756{padding-bottom: 2.5rem !important;}&#8221;][vc_column][vc_raw_html]W3JlcXVlc3RfZGVtb10=[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1536587795588{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-hero.jpg?id=26605) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-hero-section&#8221;][vc_column][vc_row_inner content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-hero-header&#8221;][vc_column_inner el_class=&#8221;cyb-hero-header-text&#8221;][vc_custom_heading text=&#8221;ENDPOINT PRIVILEGE MANAGER&#8221; font_container=&#8221;tag:h1|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_custom_heading text=&#8221;Implementa i principi del privilegio minimo, le protezioni contro il furto delle credenziali e&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":42105,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-42078","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CyberArk Endpoint Privilege Manager per aziende<\/title>\n<meta name=\"description\" content=\"Scopri come CyberArk Endpoint Privilege Manager consente alle aziende di bloccare e contenere gli attacchi agli endpoint.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution__trashed\/endpoint-privilege-manager-old\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Endpoint Privilege Manager\" \/>\n<meta property=\"og:description\" content=\"Scopri come CyberArk Endpoint Privilege Manager consente alle aziende di bloccare e contenere gli attacchi agli endpoint.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution__trashed\/endpoint-privilege-manager-old\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-25T15:17:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-endpoint-graphic.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"17 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution__trashed\/endpoint-privilege-manager-old\/\",\"url\":\"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution__trashed\/endpoint-privilege-manager-old\/\",\"name\":\"CyberArk Endpoint Privilege Manager per aziende\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution__trashed\/endpoint-privilege-manager-old\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution__trashed\/endpoint-privilege-manager-old\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-endpoint-graphic.svg\",\"datePublished\":\"2017-06-13T19:19:49+00:00\",\"dateModified\":\"2021-05-25T15:17:06+00:00\",\"description\":\"Scopri come CyberArk Endpoint Privilege Manager consente alle aziende di bloccare e contenere gli attacchi agli endpoint.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution__trashed\/endpoint-privilege-manager-old\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution__trashed\/endpoint-privilege-manager-old\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution__trashed\/endpoint-privilege-manager-old\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-endpoint-graphic.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-endpoint-graphic.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution__trashed\/endpoint-privilege-manager-old\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prodotti\",\"item\":\"https:\/\/www.cyberark.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Endpoint Privilege Manager\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CyberArk Endpoint Privilege Manager per aziende","description":"Scopri come CyberArk Endpoint Privilege Manager consente alle aziende di bloccare e contenere gli attacchi agli endpoint.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution__trashed\/endpoint-privilege-manager-old\/","og_locale":"it_IT","og_type":"article","og_title":"Endpoint Privilege Manager","og_description":"Scopri come CyberArk Endpoint Privilege Manager consente alle aziende di bloccare e contenere gli attacchi agli endpoint.","og_url":"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution__trashed\/endpoint-privilege-manager-old\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2021-05-25T15:17:06+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-endpoint-graphic.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tempo di lettura stimato":"17 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution__trashed\/endpoint-privilege-manager-old\/","url":"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution__trashed\/endpoint-privilege-manager-old\/","name":"CyberArk Endpoint Privilege Manager per aziende","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution__trashed\/endpoint-privilege-manager-old\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution__trashed\/endpoint-privilege-manager-old\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-endpoint-graphic.svg","datePublished":"2017-06-13T19:19:49+00:00","dateModified":"2021-05-25T15:17:06+00:00","description":"Scopri come CyberArk Endpoint Privilege Manager consente alle aziende di bloccare e contenere gli attacchi agli endpoint.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution__trashed\/endpoint-privilege-manager-old\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution__trashed\/endpoint-privilege-manager-old\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution__trashed\/endpoint-privilege-manager-old\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-endpoint-graphic.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-endpoint-graphic.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution__trashed\/endpoint-privilege-manager-old\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Prodotti","item":"https:\/\/www.cyberark.com\/products\/"},{"@type":"ListItem","position":3,"name":"Endpoint Privilege Manager"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/42078","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/comments?post=42078"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/42078\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/42105"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/media?parent=42078"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/product_category?post=42078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}