{"id":42105,"date":"2017-06-13T15:11:57","date_gmt":"2017-06-13T19:11:57","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/"},"modified":"2026-02-16T06:31:33","modified_gmt":"2026-02-16T11:31:33","slug":"products","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/it\/products\/","title":{"rendered":"Prodotti"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 int-hero-full impact-hero dark&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243; css=&#8221;.vc_custom_1623332891297{margin-bottom: 50px !important;}&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h2>Proteggi ogni identit\u00e0, ovunque<\/h2>\n<p><\/p>\n<h3>Ogni identit\u00e0 pu\u00f2 diventare privilegiata. Ci\u00f2 significa che ogni identit\u00e0 umana, macchina e di intelligenza artificiale rappresenta un potenziale vettore di attacco. In un mondo in cui i tuoi utenti digitali hanno diritti di admin e possibilit\u00e0 di agire senza limiti, hai bisogno di una piattaforma di sicurezza che veda e protegga tutto.\u200b<\/h3>\n<p>\n[\/vc_column_text][vc_btn title=&#8221;\u30d9\u30f3\u30c0\u30fc\u8a55\u4fa1\u3092\u53d6\u5f97\u3059\u308b&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; css=&#8221;&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fanalyst-reports%2Fidc-marketscape-worldwide-integrated-solutions|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/zero-trust\/how-to-choose-an-identity-security-platform-in-2026\">Read Buyer&#8217;s Guide<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-top text-md-center&#8221;][vc_column][vc_column_text css=&#8221;&#8221;]<\/p>\n<h2>Piattaforma di sicurezza delle identit\u00e0 CyberArk<\/h2>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-btm text-md-center&#8221;][vc_column width=&#8221;2\/3&#8243; offset=&#8221;vc_col-sm-offset-2&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h5>Soluzione unificata per proteggere tutte le tue identit\u00e0. Ti aiutiamo a operare pi\u00f9 rapidamente, ridurre i rischi e semplificare il tuo stack di sicurezza, tutto da un&#8217;unica piattaforma intuitiva.<\/h5>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;seesaw-v2 cybv2 seesaw-v2 cybv2-pad-btm cyb-reverse cybv2&#8243;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;column&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;dark pb-4&#8243;]<\/p>\n<h4>Ottieni visibilit\u00e0 completa attraverso discovery continua e contesto<\/h4>\n<p>Non puoi proteggere ci\u00f2 che non \u00e8 visibile. Il problema \u00e8 che le nuove identit\u00e0 \u2013 umane, macchina, secret e certificati \u2013 emergono pi\u00f9 velocemente di quanto tu possa tracciarle. \u00c8 come cercare di contare le auto su un&#8217;autostrada a dieci corsie durante l&#8217;orario di punta.<\/p>\n<p>La nostra piattaforma ti offre la visibilit\u00e0 di cui hai bisogno. Scopriamo in modo continuo ogni identit\u00e0 nel tuo ambiente, dal cloud all&#8217;on-premise. Aggiungiamo quindi un contesto basato sul rischio, aiutandoti a dare priorit\u00e0 a ci\u00f2 che \u00e8 importante e ad automatizzare l&#8217;onboarding, affinch\u00e9 nulla sfugga al controllo.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-offset-1&#8243;][vc_single_image image=&#8221;111963&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221; el_class=&#8221;border-radius&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;seesaw-v2 cybv2&#8243;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;d-flex align-items-start&#8221;][vc_single_image image=&#8221;114248&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-lg-offset-1&#8243; el_class=&#8221;column&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;dark pb-4&#8243;]<\/p>\n<h4>Monitora gli accessi con moderni controlli dei privilegi<\/h4>\n<p>Concedere a tutti le chiavi del regno porta inevitabilmente a un evento disastroso. Ma gestire credenziali, lutenticazione, sessioni e diritti per migliaia di identit\u00e0 pu\u00f2 sembrare altrettanto caotico.<\/p>\n<p>Mettiamo ordine nel caos. La nostra piattaforma applica il minimo privilegio con controlli moderni progettati per le minacce attuali.<\/p>\n<p><strong>Proteggi tutte le credenziali:<\/strong> Gestisci password, secret e chiavi con la preparazione post-quantistica.<\/p>\n<p><strong>Concedi l&#8217;accesso in base alle tue condizioni:<\/strong> Utilizza Just-In-Time e Zero Standing Privileges per garantire che l&#8217;accesso sia concesso solo quando necessario, e rimosso in modo automatico.<\/p>\n<p><strong>Monitora ogni sessione:<\/strong> Tieni sotto controllo le attivit\u00e0 privilegiate con una moderna gestione delle sessioni che fornisce insight chiari e concreti.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;seesaw-v2 cybv2-pad-120 cyb-reverse cybv2&#8243;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;column&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;dark pb-4&#8243;]<\/p>\n<h4>Automatizza le policy in modo smart<\/h4>\n<p>Creare e aggiornare manualmente le policy di sicurezza per ogni identit\u00e0 non \u00e8 sostenibile. \u00c8 un processo soggetto anche a errori umani. La nostra piattaforma automatizza l\u2019applicazione delle policy in base a rischio, contesto e intelligence di CORA AI. Dalla rotazione delle credenziali trasparente e basata su AI, alla gestione intelligente dei diritti, ti aiutiamo ad applicare le policy corrette in modo coerente e scalabile.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-offset-1&#8243;][vc_single_image image=&#8221;114257&#8243; img_size=&#8221;full&#8221; css=&#8221;.vc_custom_1753989262655{border-radius: 5px !important;}&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;seesaw-v2 cybv2&#8243;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;d-flex align-items-start&#8221;][vc_single_image image=&#8221;110401&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-lg-offset-1&#8243; el_class=&#8221;column&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;dark pb-4&#8243;]<\/p>\n<h4>Gestisci l\u2019intero ciclo di vita delle identit\u00e0<\/h4>\n<p>Le identit\u00e0 non sono statiche. Gli individui entrano in azienda, cambiano ruolo o si dimettono. Le macchine vengono avviate e dismesse. La nostra piattaforma, potenziata dall&#8217;integrazione con Zilla Security, offre una gestione completa del ciclo di vita e funzionalit\u00e0 di Identity Governance and Administration (IGA). Utilizziamo raccomandazioni basate su AI per velocizzare il provisioning, semplificare le revisioni degli accessi e gestire le autorizzazioni, garantendo che le identit\u00e0 abbiano gli accessi adeguati in ogni fase.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;seesaw-v2 cybv2-pad-120 cyb-reverse cybv2&#8243;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;column&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;dark pb-4&#8243;]<\/p>\n<h4>Semplifica i tuoi audit con governance e compliance unificate<\/h4>\n<p>Quando si avvicina il periodo degli audit, l&#8217;ultima cosa che desideri \u00e8 una frenetica ricerca di evidenze. Semplifichiamo governance e conformit\u00e0. La piattaforma semplifica le revisioni degli accessi, centralizza le attivit\u00e0 di auditing e rende la raccolta delle evidenze estremamente agile. Con integrazioni per tutte le tue app \u2014 cloud, sviluppate internamente e on-prem \u2014 ottieni una visione completa e automatizzata degli accessi, rendendo pi\u00f9 semplice dimostrare la compliance e soddisfare gli stakeholder.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-offset-1&#8243;][vc_single_image image=&#8221;212845&#8243; img_size=&#8221;full&#8221; css=&#8221;.vc_custom_1753989389883{border-radius: 5px !important;}&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;seesaw-v2 cybv2&#8243;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;d-flex align-items-start&#8221;][vc_single_image image=&#8221;213227&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-lg-offset-1&#8243; el_class=&#8221;column&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;dark pb-4&#8243;]<\/p>\n<h4>Semplifica tutto con il Control Center<\/h4>\n<p>Per utilizzare gli strumenti di sicurezza non dovrebbe essere necessario un dottorato. Il nostro Control Center unificato \u00e8 l&#8217;hub centrale per admin e utenti. Ottimizza le attivit\u00e0 amministrative e offre agli utenti un accesso sicuro e intuitivo alle risorse necessarie per svolgere le proprie attivit\u00e0, eliminando l&#8217;esigenza di molteplici login o interfacce poco pratiche. Un unico luogo per gestire e accedere a tutto, in sicurezza.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;seesaw-v2 cybv2-pad-120 cyb-reverse cybv2&#8243;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;column&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;dark pb-4&#8243;]<\/p>\n<h4>Opera in modo pi\u00f9 smart con CORA AI<\/h4>\n<p>Scopri CORA, il motore di AI integrato nella nostra piattaforma. Consideralo l\u2019analista pi\u00f9 acuto del tuo team, attivo 24 ore su 24, 7 giorni su 7, per individuare problemi prima che si verifichino. CORA non \u00e8 una semplice funzionalit\u00e0 aggiuntiva; \u00e8 l\u2019intelligenza che rende pi\u00f9 efficace l&#8217;intera piattaforma.<\/p>\n<p>CORA AI ti aiuta a:<\/p>\n<p><strong>Rilevare anomalie:<\/strong> Individua comportamenti rischiosi che potrebbero sfuggire all\u2019attenzione umana.<\/p>\n<p><strong>Velocizzare gli audit di sessione<\/strong> Ottieni riepiloghi basati su AI delle sessioni privilegiate, trasformando ore di revisione in minuti.<\/p>\n<p><strong>Automatizzare con fiducia:<\/strong> Ricevi raccomandazioni intelligenti sulle policy e supporto per risoluzione dei problemi e onboarding.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-offset-1&#8243;][vc_single_image image=&#8221;208501&#8243; img_size=&#8221;full&#8221; css=&#8221;.vc_custom_1753989502815{border-radius: 5px !important;}&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2-pad cyan-gradient font-white cyb-br cybv2 info-graphic sub2 cybv2-margin-btm-120&#8243; css=&#8221;.vc_custom_1755617201729{margin-bottom: 50px !important;}&#8221;][vc_column width=&#8221;2\/3&#8243; offset=&#8221;vc_col-sm-offset-2&#8243; el_class=&#8221;text-center&#8221;][vc_column_text css=&#8221;.vc_custom_1753987263378{margin-bottom: 80px !important;}&#8221; el_class=&#8221;text-md-center head-box&#8221;]<\/p>\n<h3>Definizione di sicurezza delle identit\u00e0<\/h3>\n<p>Basata su controlli intelligenti dei privilegi, la sicurezza delle identit\u00e0 protegge senza soluzione di continuit\u00e0 gli accessi per tutte le identit\u00e0 e automatizza in modo flessibile il loro ciclo di vita, con rilevamento e prevenzione continui delle minacce, tutto ci\u00f2 con un approccio unificato.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1755616734689{border-bottom-width: 50px !important;}&#8221; el_class=&#8221;text-center&#8221;]<img decoding=\"async\" class=\"alignnone size-full wp-image-188738\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/PG-final-2025.svg\" alt=\"Grafico CSB\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1611959082037{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cyber-security-section5-bckgrd.jpg?id=105424) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cybv2 cybv2_full_width_resource&#8221;][vc_column][vc_column_text el_class=&#8221;new_hpstyle_section5_title&#8221;]<\/p>\n<h5 style=\"text-align: center;\">CyberArk Blueprint<\/h5>\n<p>\n[\/vc_column_text][vc_row_inner el_class=&#8221;new_hpstyle_section5_container&#8221;][vc_column_inner][vc_single_image image=&#8221;113626&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; el_class=&#8221;new_hpstyle_section5_gart_img&#8221;][vc_column_text el_class=&#8221;new_hpstyle_section5_text1&#8243;]<\/p>\n<h4>Guida pratica alla sicurezza delle identit\u00e0<\/h4>\n<p>\n[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section5_text2&#8243;]<\/p>\n<p style=\"text-align: left;\">CyberArk Blueprint \u00e8 uno strumento innovativo per creare roadmap di sicurezza altamente personalizzate. Facile da usare e da implementare, ti consentir\u00e0 di pianificare le tue prossime mosse per anni a venire.<\/p>\n<p>\n[\/vc_column_text][vc_btn title=&#8221;Per saperne di pi\u00f9&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fblueprint%2F|&#8221; el_class=&#8221;cybv2-button-solid cyb-button-hpstyle_section5&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources&#8221; css=&#8221;.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h3>Esplora le<br \/>\nrisorse<br \/>\ncorrelate<\/h3>\n<p>\n[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/it\/resources\/\">Visualizza tutte le risorse<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column&#8221;][vc_column el_class=&#8221;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8221;.vc_custom_1754984805959{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;new_hpstyle_section8_uberflip&#8221;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"templatera_shortcode\"><div data-vc-full-width=\"true\" data-vc-full-width-temp=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_logos vc_custom_1705518984428 vc_row-has-fill\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section7_carou_text extra-space link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4 style=\"text-align: center;\">CyberArk Marketplace<\/h4>\n<p style=\"text-align: center; font-weight: 300; padding-bottom: 0px;\">Sfoglia il nostro marketplace online per trovare le integrazioni.<br \/>\n<a style=\"display: inline-block; margin-top: 15px;\" href=\"https:\/\/cyberark-customers.force.com\/mplace\/s\/\" target=\"_blank\" rel=\"noopener noreferrer\">Visita il Marketplace<i class=\"fas fa-external-link-alt\"><\/i><\/a><\/p>\n<p><style>\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d6cc67f1ca5 .sp-lcp-item img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d6cc67f1ca5 .sp-lcp-item:hover img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv#sp-logo-carousel-pro69d6cc67f1ca5.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69d6cc67f1ca5.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\tpadding: 0px;\n\t\t\t\tbackground: rgba(10,10,10,0.01);\n\t\t\t}\n\t\t\tdiv#sp-logo-carousel-pro69d6cc67f1ca5.sp-logo-carousel-pro-area .sp-lcp-item:hover .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69d6cc67f1ca5.sp-logo-carousel-pro-area .sp-lcp-item:hover.sp-lcp-item-border{\n\t\t\t\tbackground: rgba(0,0,0,0.01);\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section.layout-carousel div#sp-logo-carousel-pro69d6cc67f1ca5 .slick-slide {\n\t\t\t\tfloat: none !important;\n\t\t\t\tdisplay: inline-block;\n\t\t\t\tvertical-align: middle;\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d6cc67f1ca5 [class*=\"lcp-col\"]{\n\t\t\t\tvertical-align: middle;\n\t\t\t\tmargin: 0;\n\t\t\t\tbox-shadow: none;\n\t\t\t}.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d6cc67f1ca5 .sp-lcpro-readmore-area{\n\t\t\t\t\ttext-align: center;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d6cc67f1ca5 .sp-lcpro-readmore-area .sp-lcpro-readmore{\n\t\t\t\t\tbackground: transparent;\n\t\t\t\t\tcolor: #05b3c6;\n\t\t\t\t\tpadding: 5px 13px;\n\t\t\t\t\tmargin-bottom: 18px;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tborder-radius: 2px;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t\tfont-size: 14px;font-family: Ubuntu;\n\t\t\t\t\t\tfont-style: normal; font-weight: 400;line-height:20px;\n\t\t\t\t\tletter-spacing: normal;\n\t\t\t\t\ttext-transform: none;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d6cc67f1ca5 .sp-lcpro-readmore-area .sp-lcpro-readmore:hover{\n\t\t\t\t\tbackground: #05b3c6;\n\t\t\t\t\tcolor: #ffffff;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t}div.sp-logo-section-id-69d6cc67f1ca5 .bx-viewport.bx-viewport { height: auto !important; }\n\t\t\t\tdiv#sp-logo-carousel-pro69d6cc67f1ca5.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69d6cc67f1ca5.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\t\tborder-radius: 100%;\n\t\t\t\t\tz-index: 1;\n\t\t\t\t\toverflow: hidden;\n\t\t\t\t}\n\t\t\t\t\tdiv#sp-logo-carousel-pro69d6cc67f1ca5.sp-logo-carousel-pro-area .sp-lcp-item{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tfloat: none !important;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tvertical-align: middle;}\n\t\t\t\tdiv#sp-logo-carousel-pro69d6cc67f1ca5.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69d6cc67f1ca5.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\t\t-webkit-box-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\t-moz-box-shadow:: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tbox-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tmargin-top: 6px;\n\t\t\t\t\tmargin-bottom:6px;\n\t\t\t\t}\n\t\t\t\tdiv#sp-logo-carousel-pro69d6cc67f1ca5.sp-logo-carousel-pro-area .sp-lcp-item:hover .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69d6cc67f1ca5.sp-logo-carousel-pro-area .sp-lcp-item:hover.sp-lcp-item-border{\n\t\t\t\t\t-webkit-box-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\t-moz-box-shadow:: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tbox-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-carousel.lcp_horizontal div#sp-logo-carousel-pro69d6cc67f1ca5.sp-logo-carousel-pro-area .slick-list{\n\t\t\t\t\tmargin-left: 0;\n\t\t\t\t\tmargin-right: 0;\n\t\t\t\t}\n\t\t\t\tdiv#sp-logo-carousel-pro69d6cc67f1ca5.sp-logo-carousel-pro-area [class*=\"lcp-col-\"]{\n\t\t\t\t\tmargin-bottom: 6px;\n\t\t\t\t}div.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d6cc67f1ca5 [class*=\"lcp-col\"]{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tbox-shadow: none;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69d6cc67f1ca5.sp-logo-carousel-pro-area [class*=\"lcp-col\"],\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69d6cc67f1ca5.sp-logo-carousel-pro-area [class*=\"lcp-col\"]{\n\t\t\t\t\tpadding-left: 10px;\n\t\t\t\t\tpadding-right: 10px;\n\t\t\t\t\tpadding-bottom: 20px;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69d6cc67f1ca5.sp-logo-carousel-pro-area.lcp-container,\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69d6cc67f1ca5.sp-logo-carousel-pro-area.lcp-container{\n\t\t\t\t\tmargin-left: -10px;\n\t\t\t\t\tmargin-right: -10px;\n\t\t\t\t\tmargin-bottom: -20px;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\t.sp-logo-carousel-pro-section.sp-lcpro-id-105685{\n\t\t\t\t\tposition: relative;\n\t\t\t\t}\n\t\t\t\t#lcp-preloader-105685{\n\t\t\t\t\tposition: absolute;\n\t\t\t\t\tleft: 0;\n\t\t\t\t\ttop: 0;\n\t\t\t\t\theight: 100%;\n\t\t\t\t\twidth: 100%;\n\t\t\t\t\ttext-align: center;\n\t\t\t\t\tdisplay: flex;\n\t\t\t\t\talign-items: center;\n\t\t\t\t\tjustify-content: center;\n\t\t\t\t\tbackground: #fff;\n\t\t\t\t\tz-index: 9999;\n\t\t\t\t}\n\t\t\t\t<\/style><div class=\"sp-logo-carousel-pro-section layout-carousel sp-lcpro-id-105685 sp-logo-section-id-69d6cc67f1ca5 nav_position_top_right title_position_bottom sp-lcpro-clear lcp_horizontal\"><div id=\"lcp-preloader-105685\" class=\"sp-logo-carousel-pro-preloader\"><img decoding=\"async\" src=\" https:\/\/www.cyberark.com\/wp-content\/plugins\/logo-carousel-pro\/public\/assets\/css\/images\/bx_loader.gif \"\/><\/div><div id=\"sp-logo-carousel-pro69d6cc67f1ca5\" class=\"sp-logo-carousel-pro-area lcp-preloader mode_ticker \" data-minslide=\"1\" data-maxslide=\"1\" data-slidewidth=\"\" data-slidemargin=\"20\" data-speed=\"30000\" data-mode=\"horizontal\" data-direction=\"next\" data-tickerhover=\"false\"><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/aws.png\" alt=\"aws logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/crowdstrike.png\" alt=\"crowdstrike logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Google.png\" alt=\"Google logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/microsoft-logo.png\" alt=\"Microsoft logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/paloalto.png\" alt=\"paloalto logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Proofpoint.png\" alt=\"Proofpoint logo\" ><\/div><\/div><\/div><\/div><\/div><br \/>\n<style>\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d6cc6802b52 .sp-lcp-item img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d6cc6802b52 .sp-lcp-item:hover img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv#sp-logo-carousel-pro69d6cc6802b52.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69d6cc6802b52.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\tpadding: 0px;\n\t\t\t\tbackground: rgba(10,10,10,0.01);\n\t\t\t}\n\t\t\tdiv#sp-logo-carousel-pro69d6cc6802b52.sp-logo-carousel-pro-area .sp-lcp-item:hover .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69d6cc6802b52.sp-logo-carousel-pro-area .sp-lcp-item:hover.sp-lcp-item-border{\n\t\t\t\tbackground: rgba(0,0,0,0.01);\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section.layout-carousel div#sp-logo-carousel-pro69d6cc6802b52 .slick-slide {\n\t\t\t\tfloat: none !important;\n\t\t\t\tdisplay: inline-block;\n\t\t\t\tvertical-align: middle;\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d6cc6802b52 [class*=\"lcp-col\"]{\n\t\t\t\tvertical-align: middle;\n\t\t\t\tmargin: 0;\n\t\t\t\tbox-shadow: none;\n\t\t\t}\n\t\t\t\tdiv.sp-logo-section-id-69d6cc6802b52 .bx-viewport{\n\t\t\t\tdirection: ltr;\n\t\t\t\t}.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d6cc6802b52 .sp-lcpro-readmore-area{\n\t\t\t\t\ttext-align: center;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d6cc6802b52 .sp-lcpro-readmore-area .sp-lcpro-readmore{\n\t\t\t\t\tbackground: transparent;\n\t\t\t\t\tcolor: #05b3c6;\n\t\t\t\t\tpadding: 5px 13px;\n\t\t\t\t\tmargin-bottom: 18px;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tborder-radius: 2px;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t\tfont-size: 14px;font-family: Ubuntu;\n\t\t\t\t\t\tfont-style: normal; font-weight: 400;line-height:20px;\n\t\t\t\t\tletter-spacing: normal;\n\t\t\t\t\ttext-transform: none;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d6cc6802b52 .sp-lcpro-readmore-area .sp-lcpro-readmore:hover{\n\t\t\t\t\tbackground: #05b3c6;\n\t\t\t\t\tcolor: #ffffff;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t}div.sp-logo-section-id-69d6cc6802b52 .bx-viewport.bx-viewport { height: auto !important; }\n\t\t\t\tdiv#sp-logo-carousel-pro69d6cc6802b52.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69d6cc6802b52.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\t\tborder-radius: 100%;\n\t\t\t\t\tz-index: 1;\n\t\t\t\t\toverflow: hidden;\n\t\t\t\t}\n\t\t\t\t\tdiv#sp-logo-carousel-pro69d6cc6802b52.sp-logo-carousel-pro-area .sp-lcp-item{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tfloat: none !important;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tvertical-align: middle;}\n\t\t\t\tdiv#sp-logo-carousel-pro69d6cc6802b52.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69d6cc6802b52.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\t\t-webkit-box-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\t-moz-box-shadow:: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tbox-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tmargin-top: 6px;\n\t\t\t\t\tmargin-bottom:6px;\n\t\t\t\t}\n\t\t\t\tdiv#sp-logo-carousel-pro69d6cc6802b52.sp-logo-carousel-pro-area .sp-lcp-item:hover .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69d6cc6802b52.sp-logo-carousel-pro-area .sp-lcp-item:hover.sp-lcp-item-border{\n\t\t\t\t\t-webkit-box-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\t-moz-box-shadow:: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tbox-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-carousel.lcp_horizontal div#sp-logo-carousel-pro69d6cc6802b52.sp-logo-carousel-pro-area .slick-list{\n\t\t\t\t\tmargin-left: 0;\n\t\t\t\t\tmargin-right: 0;\n\t\t\t\t}\n\t\t\t\tdiv#sp-logo-carousel-pro69d6cc6802b52.sp-logo-carousel-pro-area [class*=\"lcp-col-\"]{\n\t\t\t\t\tmargin-bottom: 6px;\n\t\t\t\t}div.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d6cc6802b52 [class*=\"lcp-col\"]{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tbox-shadow: none;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69d6cc6802b52.sp-logo-carousel-pro-area [class*=\"lcp-col\"],\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69d6cc6802b52.sp-logo-carousel-pro-area [class*=\"lcp-col\"]{\n\t\t\t\t\tpadding-left: 10px;\n\t\t\t\t\tpadding-right: 10px;\n\t\t\t\t\tpadding-bottom: 20px;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69d6cc6802b52.sp-logo-carousel-pro-area.lcp-container,\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69d6cc6802b52.sp-logo-carousel-pro-area.lcp-container{\n\t\t\t\t\tmargin-left: -10px;\n\t\t\t\t\tmargin-right: -10px;\n\t\t\t\t\tmargin-bottom: -20px;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\t.sp-logo-carousel-pro-section.sp-lcpro-id-105741{\n\t\t\t\t\tposition: relative;\n\t\t\t\t}\n\t\t\t\t#lcp-preloader-105741{\n\t\t\t\t\tposition: absolute;\n\t\t\t\t\tleft: 0;\n\t\t\t\t\ttop: 0;\n\t\t\t\t\theight: 100%;\n\t\t\t\t\twidth: 100%;\n\t\t\t\t\ttext-align: center;\n\t\t\t\t\tdisplay: flex;\n\t\t\t\t\talign-items: center;\n\t\t\t\t\tjustify-content: center;\n\t\t\t\t\tbackground: #fff;\n\t\t\t\t\tz-index: 9999;\n\t\t\t\t}\n\t\t\t\t<\/style><div class=\"sp-logo-carousel-pro-section layout-carousel sp-lcpro-id-105741 sp-logo-section-id-69d6cc6802b52 nav_position_top_right title_position_bottom sp-lcpro-clear lcp_horizontal\"><div id=\"sp-logo-carousel-pro69d6cc6802b52\" class=\"sp-logo-carousel-pro-area lcp-preloader mode_ticker \" data-minslide=\"1\" data-maxslide=\"1\" data-slidewidth=\"\" data-slidemargin=\"20\" data-speed=\"30000\" data-mode=\"horizontal\" data-direction=\"prev\" data-tickerhover=\"false\"><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/RedHat.png\" alt=\"RedHat Logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Sailpoint.png\" alt=\"Sailpoint logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/sap.png\" alt=\"sap logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Servicenow.png\" alt=\"Servicenow logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Tenable.png\" alt=\"Tenable\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/UIPath.png\" alt=\"UiPath\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/vmware-1.png\" alt=\"vmware logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/vmware-tanzu.png\" alt=\"vmware-tanzu logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Workday.png\" alt=\"Workday logo\" ><\/div><\/div><\/div><\/div><\/div>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div><\/div><\/a><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><div data-vc-full-width=\"true\" data-vc-full-width-temp=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid vc_custom_1611095281474 vc_row-has-fill\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<style>\r\n.page-id-105338 #hero-logo-container{\r\n    display: none;\r\n}\r\n\/* General *\/\r\n.cybv2 .link-arrow-right a {\r\n\tmargin-right: 6px;\r\n}\r\n.cybv2 h4 {\r\n\tline-height: 1.3em;\r\n}\r\n.cybv2 a.big_link {\r\n\tmargin: 0;\r\n}\r\n@media only screen and (max-device-width: 767px) {\r\n.cybv2 h2 {\r\n\tfont-size: 40px;\r\n}\r\n}\r\n.page-id-105338 .vc_btn3-color-grey{\r\n    font-weight: 600 !important;\r\n}\r\n\/* End General *\/\r\n\r\n\/* Section 7 *\/\r\n.cybv2.cybv2_logos h4 {\r\n\tcolor: #ffffff !important;\r\n}\r\n.cybv2.cybv2_logos .extra-space {\r\n\tmargin-bottom: 50px;\r\n}\r\n.cybv2_logos {\r\n    padding: 75px 100px 90px 100px;\r\n}\r\n.new_hpstyle_section7_carou_text p {\r\n    font-size: 20px;\r\n    color: #fff;\r\n    padding-bottom: 60px;\r\n}\r\n.new_hpstyle_section7_carousel1 {\r\n    padding: 50px 0 30px 500px;\r\n}\r\n.new_hpstyle_section7_carousel2 {\r\n    padding: 20px 500px 30px 0;\r\n}\r\n.cybv2_logos .sp-logo-carousel-pro-section.sp-lcpro-id-105685{\r\n    margin-bottom: 20px;\r\n}\r\n.cybv2_logos .link-arrow-right p a,\r\n.cybv2_logos .link-arrow-right p i{\r\n    color: #D4EB33 !important;\r\n}\r\n\r\n.cybv2_logos .link-arrow-right .wpb_wrapper p a:hover,\r\n.cybv2_logos .link-arrow-right .wpb_wrapper p a:hover i{\r\n    color: #F3FFA0 !important;\r\n}\r\n@media only screen and (max-width: 1024px) {\r\n.new_hpstyle_section7_carousel1 {\r\n    padding: 50px 0 30px 300px;\r\n}\r\n.new_hpstyle_section7_carousel2 {\r\n    padding: 20px 300px 30px 0;\r\n}\r\n}\r\n@media only screen and (max-width: 767px) {\r\n.cybv2.cybv2_logos .extra-space {\r\n\tmargin-bottom: 30px;\r\n}\r\n.cybv2_logos .sp-logo-carousel-pro-area .sp-lcp-item {\r\n\tmax-width: 82px;\r\n\tmargin-right: 10px !important;\r\n}\r\n.cybv2_logos {\r\n\tpadding: 40px 100px 50px 100px;\r\n}\r\n}\r\n\/* End section 7 *\/\r\n\r\n<\/style>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2-pad cybv2-oval-left-background hv-cta-list&#8221; css=&#8221;.vc_custom_1611885567532{background-color: #ff7600 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;img-box cyb-clm-background-rc&#8221; css=&#8221;.vc_custom_1612492474039{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/IdentitySolutionsPlatform-HighValue-CTA.jpg?id=108944) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;stat-column&#8221;][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221; width=&#8221;3\/4&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text]<\/p>\n<h2>Parla con un esperto<\/h2>\n<p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]Gestione di credenziali e account privilegiati[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]Protezione delle identit\u00e0 della forza lavoro e dei clienti[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]Protezione e gestione degli accessi per le applicazioni e altre identit\u00e0 non umane[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_btn title=&#8221;Contatta il team vendite&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fcontact%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221; el_class=&#8221;cybv2 int-hero&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text el_class=&#8221;cyb-breadcrumb&#8221;]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"#\">Torna a<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>PRODUCT CATEGORY<\/h1>\n<p><\/p>\n<h2>Lorem dolor sit amet consectetur libero tempore sol magni dolores ipsam quia sit.<\/h2>\n<p>\n[\/vc_column_text][vc_btn title=&#8221;CTA&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:%23|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"#\">Risorsa gratuita di grande valore<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-2&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-106192\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/int-hero-placeholder-1.jpg\" alt=\"\" width=\"640\" height=\"440\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/int-hero-placeholder-1.jpg 640w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/int-hero-placeholder-1-300x206.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/int-hero-placeholder-1-150x103.jpg 150w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; disable_element=&#8221;yes&#8221; el_class=&#8221;cybv2 int-hero&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text el_class=&#8221;cyb-breadcrumb&#8221;]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"#\">Torna a<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>PRODUCT CATEGORY<\/h1>\n<p><\/p>\n<h2>Lorem dolor sit amet consectetur libero tempore sol magni dolores ipsam quia sit.<\/h2>\n<p>\n[\/vc_column_text][vc_btn title=&#8221;CTA&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:%23|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-2&#8243;][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_0urpxbo8xu videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<p>&nbsp;<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&nbsp;&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27776],"class_list":["post-42105","page","type-page","status-publish","hentry","product_category-identity-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Soluzioni all&#039;interno dell&#039;Identity Security Platform | CyberArk<\/title>\n<meta name=\"description\" content=\"CyberArk Identity Security Platform \u00e8 una soluzione end-to-end di gestione di identit\u00e0 e accessi che applica privilegi, abilita accessi e protegge DevOps.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/products\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Prodotti\" \/>\n<meta property=\"og:description\" content=\"CyberArk Identity Security Platform \u00e8 una soluzione end-to-end di gestione di identit\u00e0 e accessi che applica privilegi, abilita accessi e protegge DevOps.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/products\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-16T11:31:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/PG-final-2025.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"15 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/products\/\",\"url\":\"https:\/\/www.cyberark.com\/products\/\",\"name\":\"Soluzioni all'interno dell'Identity Security Platform | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/PG-final-2025.svg\",\"datePublished\":\"2017-06-13T19:11:57+00:00\",\"dateModified\":\"2026-02-16T11:31:33+00:00\",\"description\":\"CyberArk Identity Security Platform \u00e8 una soluzione end-to-end di gestione di identit\u00e0 e accessi che applica privilegi, abilita accessi e protegge DevOps.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/products\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/products\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/PG-final-2025.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/PG-final-2025.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/products\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prodotti\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Soluzioni all'interno dell'Identity Security Platform | CyberArk","description":"CyberArk Identity Security Platform \u00e8 una soluzione end-to-end di gestione di identit\u00e0 e accessi che applica privilegi, abilita accessi e protegge DevOps.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/products\/","og_locale":"it_IT","og_type":"article","og_title":"Prodotti","og_description":"CyberArk Identity Security Platform \u00e8 una soluzione end-to-end di gestione di identit\u00e0 e accessi che applica privilegi, abilita accessi e protegge DevOps.","og_url":"https:\/\/www.cyberark.com\/products\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-02-16T11:31:33+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/PG-final-2025.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tempo di lettura stimato":"15 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/products\/","url":"https:\/\/www.cyberark.com\/products\/","name":"Soluzioni all'interno dell'Identity Security Platform | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/products\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/products\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/PG-final-2025.svg","datePublished":"2017-06-13T19:11:57+00:00","dateModified":"2026-02-16T11:31:33+00:00","description":"CyberArk Identity Security Platform \u00e8 una soluzione end-to-end di gestione di identit\u00e0 e accessi che applica privilegi, abilita accessi e protegge DevOps.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/products\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/products\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/products\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/PG-final-2025.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/PG-final-2025.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/products\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Prodotti"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/42105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/comments?post=42105"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/42105\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/media?parent=42105"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/product_category?post=42105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}