{"id":61747,"date":"2017-06-22T08:28:09","date_gmt":"2017-06-22T12:28:09","guid":{"rendered":"https:\/\/www.cyberark.com\/application-credential-security\/"},"modified":"2019-08-29T16:42:32","modified_gmt":"2019-08-29T20:42:32","slug":"application-credential-security","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/it\/solutions\/application-credential-security\/","title":{"rendered":"Application Credential Security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/CYB_GEN_Hero_2880x1536.jpg) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-hero-section&#8221;][vc_column][vc_row_inner content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-hero-header&#8221;][vc_column_inner el_class=&#8221;cyb-hero-header-text&#8221;][vc_custom_heading text=&#8221;APPLICATION CREDENTIAL SECURITY&#8221; font_container=&#8221;tag:h1|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column css=&#8221;.vc_custom_1538590489532{padding-top: 2rem !important;padding-bottom: 2rem !important;}&#8221;][vc_column_text]<\/p>\n<h4>Fully address security risks associated with application-to-application password management<\/h4>\n<p>In today\u2019s highly connected IT environments, business applications, processes and scripts often require frequent, automated access to systems, databases and other applications. And, before these applications, processes and scripts may access any connected systems, they must first authenticate using some type of credential. Typically, these credentials are embedded in clear text, hard-coded in the software\u00a0or stored in plain-text on local machines. This exposes application credentials to a wide audience, which leaves organizations with little ability to protect, audit and manage application access and puts business continuity at risk.<\/p>\n<p>CyberArk solutions enable organizations to remove embedded and locally stored credentials from applications and scripts, and allows these highly-sensitive passwords and SSH keys to be centrally secured, managed and audited within CyberArk\u2019s secure Digital Vault. CyberArk\u2019s solution for <a href=\"https:\/\/www.cyberark.com\/products\/privileged-account-security-solution\/application-access-manager\/\">application credential security<\/a> and management enables organizations to minimize the risk of stolen application credentials, ensure business continuity on critical systems, and comply with internal and regulatory compliance requirements.<\/p>\n<p>Key Benefits:<\/p>\n<ul>\n<li>Unique solution that eliminates embedded application passwords and SSH keys to strengthen application credential security and address compliance requirements<\/li>\n<li>Enables organizations to secure application credentials and proactively rotate them without requiring any downtime<\/li>\n<li>Ensure business continuity of business systems and applications<\/li>\n<li>Enhance enterprise and application security allowing access only to trusted applications<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/CYB_GEN_Hero_2880x1536.jpg) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-hero-section&#8221;][vc_column][vc_row_inner content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-hero-header&#8221;][vc_column_inner el_class=&#8221;cyb-hero-header-text&#8221;][vc_custom_heading text=&#8221;APPLICATION CREDENTIAL SECURITY&#8221; font_container=&#8221;tag:h1|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column css=&#8221;.vc_custom_1538590489532{padding-top: 2rem !important;padding-bottom: 2rem !important;}&#8221;][vc_column_text] Fully address security risks associated with application-to-application password management&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":42102,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-61747","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Application Password Management and Credential Control | CyberArk<\/title>\n<meta name=\"description\" content=\"CyberArk provides application credential security solutions to fully address security risks associated with application-to-application password management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/it\/solutions\/by-project__trashed\/application-credential-security\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Application Credential Security\" \/>\n<meta property=\"og:description\" content=\"CyberArk provides application credential security solutions to fully address security risks associated with application-to-application password management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/it\/solutions\/by-project__trashed\/application-credential-security\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2019-08-29T20:42:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/it\/solutions\/by-project__trashed\/application-credential-security\/\",\"url\":\"https:\/\/www.cyberark.com\/it\/solutions\/by-project__trashed\/application-credential-security\/\",\"name\":\"Application Password Management and Credential Control | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"datePublished\":\"2017-06-22T12:28:09+00:00\",\"dateModified\":\"2019-08-29T20:42:32+00:00\",\"description\":\"CyberArk provides application credential security solutions to fully address security risks associated with application-to-application password management.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/solutions\/by-project__trashed\/application-credential-security\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/it\/solutions\/by-project__trashed\/application-credential-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/it\/solutions\/by-project__trashed\/application-credential-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Soluzioni di Identity Security\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Application Credential Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Application Password Management and Credential Control | CyberArk","description":"CyberArk provides application credential security solutions to fully address security risks associated with application-to-application password management.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/it\/solutions\/by-project__trashed\/application-credential-security\/","og_locale":"it_IT","og_type":"article","og_title":"Application Credential Security","og_description":"CyberArk provides application credential security solutions to fully address security risks associated with application-to-application password management.","og_url":"https:\/\/www.cyberark.com\/it\/solutions\/by-project__trashed\/application-credential-security\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2019-08-29T20:42:32+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/it\/solutions\/by-project__trashed\/application-credential-security\/","url":"https:\/\/www.cyberark.com\/it\/solutions\/by-project__trashed\/application-credential-security\/","name":"Application Password Management and Credential Control | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"datePublished":"2017-06-22T12:28:09+00:00","dateModified":"2019-08-29T20:42:32+00:00","description":"CyberArk provides application credential security solutions to fully address security risks associated with application-to-application password management.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/it\/solutions\/by-project__trashed\/application-credential-security\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/it\/solutions\/by-project__trashed\/application-credential-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/it\/solutions\/by-project__trashed\/application-credential-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Soluzioni di Identity Security","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Application Credential Security"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/61747","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/comments?post=61747"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/61747\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/42102"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/media?parent=61747"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/product_category?post=61747"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}