{"id":86118,"date":"2020-02-11T15:40:43","date_gmt":"2020-02-11T20:40:43","guid":{"rendered":"https:\/\/www.cyberark.com\/blueprint\/"},"modified":"2025-02-13T17:50:51","modified_gmt":"2025-02-13T22:50:51","slug":"blueprint","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/it\/blueprint\/","title":{"rendered":"Blueprint"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 hero dark&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text el_class=&#8221;cyb-breadcrumb&#8221;]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/it\/services-support\/\"> Torna a Customer Success<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>CyberArk Blueprint per il successo dell\u2019Identity Security<\/h1>\n<h2>Un framework di best practice per lo sviluppo di un programma di Identity Security di successo.<\/h2>\n<p>[\/vc_column_text][vc_btn title=&#8221;Ottieni il toolkit&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Ftry-buy%2Fblueprint-toolkit%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-2&#8243;][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_allzrp3jd7 videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top overview-vt&#8221; css=&#8221;.vc_custom_1611617874123{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;head-box&#8221;][vc_column_text]<\/p>\n<h3>Accelera la tua sicurezza<\/h3>\n<p>L\u2019Identity security offre alle aziende la tranquillit\u00e0 di poter proteggere i propri asset pi\u00f9 critici, accelerando l&#8217;agilit\u00e0 di business. Tuttavia, implementare un piano che protegga in modo efficace identit\u00e0 e ambienti in continua crescita, e i loro accessi, pu\u00f2 apparire complesso. CyberArk Blueprint \u00e8 stato progettato proprio pensando a questo, per consentire alle aziende di comprendere meglio gli attacchi legati alle identit\u00e0, valutare la propria sicurezza, creare un piano per ridurre i rischi in modo misurabile e apprendere best practice per l\u2019implementazione di controlli intelligenti dei privilegi. Non devi fare tutto ci\u00f2 da solo: Blueprint serve proprio a supportarti lungo tutto il percorso, aiutandoti a ottenere risultati di sicurezza pi\u00f9 incisivi, in modo pi\u00e0 rapido.[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-126857\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/hat-icon.svg\" alt=\"Ridurre il footprint aziendale\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Best practice<\/h4>\n<p>Guida pratica relativa a persone, processi e tecnologie, per aiutarti a rendere operativa l\u2019identity security.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-133434\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/self-service-icon.svg\" alt=\"laptop arrow icon\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Self-service<\/h4>\n<p>Accelera la tua transizione a Identity Security con risorse self-service disponibili su richiesta.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-133442\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/ecosystem-icon.svg\" alt=\"ecosystem icon\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Ecosistema<\/h4>\n<p>Un insieme completo di materiali con video, whitepaper, articoli di blog e toolkit. [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-top overview-hz-no-hdr&#8221;][vc_column el_class=&#8221;text-md-center&#8221;][vc_column_text]<\/p>\n<h3>Basato su un\u2019esperienza consolidata<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-112176\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Accelarete-Business-Speed-Icons.svg\" alt=\"Accelerare il business\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Ridurre il rischio in modo misurabile<\/h4>\n<p>Blueprint \u00e8 strutturato in modo da massimizzare l\u2019impatto sulla sicurezza con il minimo sforzo, aiutandoti a dare la priorit\u00e0 ai rischi pi\u00f9 critici che fanno la differenza in modo significativo. [\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-133450\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/battle-swords-icon.svg\" alt=\"lessons learned icon\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Ci\u00f2 che abbiamo imparato nella pratica<\/h4>\n<p>Blueprint \u00e8 stato sviluppato in base alle esperienze maturate in operazioni di ripristino da alcune delle pi\u00f9 ampie violazioni moderne, nella realizzazione di ricerche all&#8217;avanguardia sulle minacce e nell&#8217;assistenza dei nostri oltre 8.500 clienti in tutto il mondo.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-133458\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/brain-icon.svg\" alt=\"prescriptive guidance icon\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Guida prescrittiva per ogni identit\u00e0<\/h4>\n<p>Blueprint ci consente di condividere la nostra esperienza, grazie a un approccio prescrittivo volto a proteggere l&#8217;intero spettro di identit\u00e0, che si tratti di forza lavoro, IT, sviluppatori o macchine.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2-pad cybv2 cybv2-background-oval tour&#8221;][vc_column][vc_row_inner el_class=&#8221;cyb-center&#8221;][vc_column_inner el_class=&#8221;cyb-pad-btm&#8221;][vc_column_text el_class=&#8221;left-mobile&#8221;]<\/p>\n<h3>Ottenere il massimo da Blueprint<\/h3>\n<p>Modalit\u00e0 pi\u00f9 comuni di utilizzo di CyberArk Blueprint da parte delle aziende nel loro percorso. [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=&#8221;square&#8221; active_section=&#8221;1&#8243; css_animation=&#8221;none&#8221;][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;Comprensione della catena di attacco&#8221; tab_id=&#8221;chain&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Comprendere la catena di attacco<\/h4>\n<p>Sfruttare CyberArk Blueprint per comprendere meglio la catena di attacco alle identit\u00e0, scoprire come i malintenzionati sfruttino quelle della tua forza lavoro, dell&#8217;IT, degli sviluppatori e macchina per raggiungere i loro obiettivi, e come prevenire questi attacchi con controlli intelligenti dei privilegi. [\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/cyberark.my.site.com\/s\/article\/Understanding-the-Identity-Attack-Chain-with-the-CyberArk-Blueprint\" target=\"_blank\" rel=\"noopener\">Per saperne di pi\u00f9<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-133466\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/understand-the-attack-chain-tour.png\" alt=\"attack tour\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/understand-the-attack-chain-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/understand-the-attack-chain-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/understand-the-attack-chain-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/understand-the-attack-chain-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;Valuta la tua postura di sicurezza&#8221; tab_id=&#8221;assess&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Valuta la tua postura di sicurezza<\/h4>\n<p>Le valutazioni della sicurezza sono fondamentali per proteggere le informazioni. Sfrutta CyberArk Blueprint per accelerare i tuoi sforzi mirati alla sicurezza e identificare punti deboli e lacune nei controlli di sicurezza, per poi conoscere meglio la tua postura di sicurezza attraverso lenti come la priorit\u00e0, le famiglie di controlli di sicurezza e i gruppi tecnologici.[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/cyberark.my.site.com\/s\/article\/Assessing-Your-Security-Posture-with-the-Blueprint-Self-Assessment-Workbook\" target=\"_blank\" rel=\"noopener\">Per saperne di pi\u00f9<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-133474\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/assess-your-security-posture-tour.png\" alt=\"lock tour\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/assess-your-security-posture-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/assess-your-security-posture-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/assess-your-security-posture-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/assess-your-security-posture-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;Crea la tua Roadmap&#8221; tab_id=&#8221;roadmap&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Crea la tua roadmap<\/h4>\n<p>Una roadmap funge da guida di base per le iniziative di sicurezza, consentendoti di attuare un piano specifico mirato proattivamente alle lacune della sicurezza. Accelera la tua capacit\u00e0 di creare un piano attuabile, misurabile e prioritario con CyberArk Blueprint.[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/cyberark.my.site.com\/s\/article\/Create-Your-Identity-Security-Roadmap-with-the-CyberArk-Blueprint\" target=\"_blank\" rel=\"noopener\">Per saperne di pi\u00f9<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-133490\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/roadmap-tour.png\" alt=\"roadmap\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/roadmap-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/roadmap-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/roadmap-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/roadmap-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;Formazione alle Best practice&#8221; tab_id=&#8221;education&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Formazione sulle best practice<\/h4>\n<p>I programmi di successo non si limitano a fornire strumenti di sicurezza efficaci, ma richiedono anche il giusto personale, processi corretti e linee guida tecnologiche appropriate. Elimina i problemi di pianificazione, esecuzione e implementazione di controlli intelligenti dei privilegi con la guida alle best practice del Success Blog di CyberArk.[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/cyberark.my.site.com\/s\/success-blog\" target=\"_blank\" rel=\"noopener\">Per saperne di pi\u00f9<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-133482\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/best-practice-education-tour.png\" alt=\"graduation cap tour\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/best-practice-education-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/best-practice-education-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/best-practice-education-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/08\/best-practice-education-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 cybv2-pad int-hero&#8221; css=&#8221;.vc_custom_1715090991235{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-2&#8243;][vc_raw_html]PGRpdiBjbGFzcz0idmlkZW8td2luZG93Ij5bd2lzdGlhX3ZpZGVvIGlkPSIxZ3RqeG9zMGNjIl08L2Rpdj4=[\/vc_raw_html][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h3>Comprendere la catena di attacco all&#8217;identit\u00e1<\/h3>\n<p>CyberArk Blueprint si basa su tre principi fondamentali che guidano le raccomandazioni sui controlli di sicurezza e sono progettati per mitigare i rischi pi\u00f9 comuni associati agli attacchi incentrati sulle identit\u00e0.[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2_customer_stories vc_tta-o-non-responsive mt-12&#8243; css=&#8221;.vc_custom_1714763180252{background-color: #ffffff !important;}&#8221;][vc_column][vc_tta_tabs style=&#8221;flat&#8221; shape=&#8221;square&#8221; color=&#8221;white&#8221; spacing=&#8221;&#8221; gap=&#8221;20&#8243; alignment=&#8221;center&#8221; active_section=&#8221;&#8221; el_class=&#8221;cybv2_customer_stories_tabs&#8221; css=&#8221;.vc_custom_1608676900675{background-color: #ffffff !important;}&#8221;][vc_tta_section title=&#8221;Cisco&#8221; tab_id=&#8221;1607742493330-265de97c-f2d9eb66-6bf8111f-e61f&#8221; el_class=&#8221;new_hpstyle_section6_tab1_icon vc_active&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;185382&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221; css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]&#8221;Siamo molto orgogliosi dei risultati ottenuti con il nostro programma&#8230; &#8220;Negli ultimi tre anni, CyberArk \u00e8 stata una componente importante per Cisco. Ora prevediamo di far evolvere la nostra CyberArk Identity Security Plaform per beneficiare di alcune nuove soluzioni avanzate che CyberArk sta sviluppando.[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text2&#8221;]<strong>Santosh Prusty<\/strong>, Senior Leader, Enterprise Security Team, Cisco[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/it\/customer-stories\/cisco\/\">Leggi la customer story<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;DCB Bank Limited&#8221; tab_id=&#8221;1714765172150-a555e50f-a6c7111f-e61f&#8221; el_class=&#8221;new_hpstyle_section6_tab2_icon&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;190495&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221; css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]&#8221;La partnership con CyberArk, incluso l&#8217;utilizzoo del framework CyberArk Blueprint, ci ha aiutato a sviluppare una strategia di Identity Security a prova di futuro, che risponde alle sfide di oggi e a quelle future, considerando soprattutto il ritmo accelerato della nostra trasformazione digitale&#8221;[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]<strong>Murali Mohan Rao Manduva,<\/strong> CTO, DCB Bank[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/dcb-bank\/\">Leggi la customer story<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;E-Global&#8221; tab_id=&#8221;1607742494008-8c0fb98b-2b6beb66-6bf8111f-e61f&#8221; el_class=&#8221;new_hpstyle_section6_tab3_icon&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607653503563{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;190504&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221; css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]Un vantaggio chiave della partnership con CyberArk, che ha consentito a E-Global di sviluppare la sua strategia di Identity Security, \u00e8 stato l&#8217;accesso a CyberArk Blueprint. Questo framework di best practice \u00e8 supportato da anni di esperienza e competenze di CyberArk nella cybersecurity in termini di persone, processi e tecnologie. E-Global ha utilizzato Blueprint per analizzare il proprio allineamento alle best practice di identity security e pianificare, personalizzare e progettare la roadmap per un\u2019implementazione ottimale, in modo da migliorare la sua postura di sicurezza.[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text2&#8243;]E-Global[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/e-global\/\">Leggi la customer story<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Encora&#8221; tab_id=&#8221;1607742494616-60a6dced-32cfeb66-6bf8111f-e61f&#8221; el_class=&#8221;new_hpstyle_section6_tab4_icon&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;new_hpstyle_section6_maintab_row&#8221;][vc_column_inner el_class=&#8221;image-column&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1607653481888{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_single_image image=&#8221;190513&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221; css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section6_tab1_left_image&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;new_hpstyle_section6_tab1_right_bckgrd&#8221; width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text1 text&#8221;]&#8221;Il supporto e la consulenza di CyberArk prima dell&#8217;acquisto e durante l&#8217;implementazione sono stati eccezionali,&#8221; ha affermato Krish. &#8220;Da allora, CyberArk \u00e8 in contatto regolare con noi per controllare e monitorare l&#8217;implementazione della soluzione.&#8221;[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section6_tab1_text2&#8221;]<strong>Krish Anand,<\/strong> CIO, Encora[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/encora\/\">Leggi la customer story<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources&#8221; css=&#8221;.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_column_text el_class=&#8221;no-break&#8221;]<\/p>\n<h3>Esplora le risorse correlate<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/blueprint\">Visualizza tutte le risorse<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column&#8221;][vc_column el_class=&#8221;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8221;.vc_custom_1660928639057{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;new_hpstyle_section8_uberflip&#8221;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1609868130755{background-color: #f7f7f7 !important;}&#8221; el_class=&#8221;cybv2 cybv2-pad-top hv-cta&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;left-clmn&#8221;][vc_column_text]<\/p>\n<h2><b>Accelera il tuo percorso di Identity security<\/b><\/h2>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]Comprendi la catena di attacco comune e mappa un approccio prioritario basato sul rischio[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]Valuta il tuo stato di sicurezza, identifica le falle nei controlli di sicurezza e ottieni informazioni pi\u00f9 approfondite[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]Identifica le best practice per promuovere l&#8217;adozione da parte di tutti i dipendenti[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_single_image image=&#8221;113505&#8243; img_size=&#8221;full&#8221; el_class=&#8221;d-none d-md-block&#8221;][\/vc_column][vc_column width=&#8221;1\/12&#8243; css=&#8221;.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;right-clmn cybv2-form&#8221;][vc_column_text el_class=&#8221;bold&#8221;]<\/p>\n<h4>Ottieni il toolkit<\/h4>\n<p>[\/vc_column_text][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iODQ5MSIgdHlfcGFnZV91cmw9Imh0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS90cnktYnV5L3RoYW5rLXlvdS1ibHVlcHJpbnQtdG9vbGtpdC8iXQ==[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 hero dark&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text el_class=&#8221;cyb-breadcrumb&#8221;] Torna a Customer Success[\/vc_column_text][vc_column_text] CyberArk Blueprint per il successo dell\u2019Identity Security Un framework di best practice per lo sviluppo di un programma di Identity Security di&#8230;<\/p>\n","protected":false},"author":125,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27776],"class_list":["post-86118","page","type-page","status-publish","hentry","product_category-identity-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Identity Security Blueprint | CyberArk<\/title>\n<meta name=\"description\" content=\"Scopri CyberArk Blueprint, un framework di best practice relative a persone, processi e tecnologie fondamentali per implementare con successo l&#039;Identity Security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/blueprint\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blueprint\" \/>\n<meta property=\"og:description\" content=\"Scopri CyberArk Blueprint, un framework di best practice relative a persone, processi e tecnologie fondamentali per implementare con successo l&#039;Identity Security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/blueprint\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-13T22:50:51+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/blueprint\/\",\"url\":\"https:\/\/www.cyberark.com\/blueprint\/\",\"name\":\"Identity Security Blueprint | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/blueprint\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/blueprint\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/hat-icon.svg\",\"datePublished\":\"2020-02-11T20:40:43+00:00\",\"dateModified\":\"2025-02-13T22:50:51+00:00\",\"description\":\"Scopri CyberArk Blueprint, un framework di best practice relative a persone, processi e tecnologie fondamentali per implementare con successo l'Identity Security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/blueprint\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/blueprint\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/blueprint\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/hat-icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/hat-icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/blueprint\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blueprint\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Identity Security Blueprint | CyberArk","description":"Scopri CyberArk Blueprint, un framework di best practice relative a persone, processi e tecnologie fondamentali per implementare con successo l'Identity Security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/blueprint\/","og_locale":"it_IT","og_type":"article","og_title":"Blueprint","og_description":"Scopri CyberArk Blueprint, un framework di best practice relative a persone, processi e tecnologie fondamentali per implementare con successo l'Identity Security.","og_url":"https:\/\/www.cyberark.com\/blueprint\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-02-13T22:50:51+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tempo di lettura stimato":"7 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/blueprint\/","url":"https:\/\/www.cyberark.com\/blueprint\/","name":"Identity Security Blueprint | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/blueprint\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/blueprint\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/hat-icon.svg","datePublished":"2020-02-11T20:40:43+00:00","dateModified":"2025-02-13T22:50:51+00:00","description":"Scopri CyberArk Blueprint, un framework di best practice relative a persone, processi e tecnologie fondamentali per implementare con successo l'Identity Security.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/blueprint\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/blueprint\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/blueprint\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/hat-icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/hat-icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/blueprint\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Blueprint"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/86118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/users\/125"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/comments?post=86118"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/86118\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/media?parent=86118"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/product_category?post=86118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}