{"id":179390,"date":"2021-01-12T07:18:50","date_gmt":"2021-01-12T12:18:50","guid":{"rendered":"https:\/\/www.cyberark.com\/ransomware-protection\/"},"modified":"2025-07-08T05:25:55","modified_gmt":"2025-07-08T09:25:55","slug":"ransomware-protection","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/ko\/solutions\/ransomware-protection\/","title":{"rendered":"\ub79c\uc12c\uc6e8\uc5b4 \ubcf4\ud638"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 int-hero-full&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text el_class=&#8221;cyb-breadcrumb&#8221;]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/ko\/solutions\/defend-against-attacks\/\">\uacf5\uaca9 \ubc29\uc5b4\ub85c \ub3cc\uc544\uac00\uae30<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>\ub79c\uc12c\uc6e8\uc5b4 \ubcf4\ud638<\/h1>\n<h2>\uc5ec\ub7ec \uacb9\uc758 \ubcf4\uc548 \uacc4\uce35\uacfc \uae30\ubcf8\uc801\uc778 \ubaa8\ubc94 \uc0ac\ub840\ub85c \ub79c\uc12c\uc6e8\uc5b4\ub97c \ucc28\ub2e8\ud569\ub2c8\ub2e4.<\/h2>\n<p>[\/vc_column_text][vc_btn title=&#8221;\uc2dc\uc791\ud558\uae30&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fko%2Ftry-buy%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/ebooks\/identity-security-threat-landscape-2024-report\">eBook \ub2e4\uc6b4\ub85c\ub4dc<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1731669623344{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/05\/threat-landscape-hero.png?id=190681) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221; el_class=&#8221;column-2&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 cybv2_sticky_nav&#8221; css=&#8221;.vc_custom_1614201964540{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][vc_column_text el_class=&#8221;sticky-nav-title&#8221;]<\/p>\n<h3><i class=\"fas fa-long-arrow-alt-up\"><\/i>\ub79c\uc12c\uc6e8\uc5b4 \ubcf4\ud638<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_raw_html el_class=&#8221;sticky-nav-buttons&#8221;]PCEtLSBBZGQgbGkgZm9yIHNlY3Rpb24gZGF0YS1zY3JvbGwtY2xhc3MgaXMgd2hlcmUgeW91IHB1dCB0aGUgc2VjdGlvbiBjbGFzcyB5b3Ugd2FudCB0byBzY3JvbGwgdG8gLS0+Cjx1bD4KPGxpIGRhdGEtc2Nyb2xsLWNsYXNzPSJzdWItMSI+7Zic7YOdPC9saT4KPGxpIGRhdGEtc2Nyb2xsLWNsYXNzPSJzdWItMiI+6riw64qlPC9saT4KPGxpIGRhdGEtc2Nyb2xsLWNsYXNzPSJzdWItMyI+7ZWZ7Iq1PC9saT4KPGxpIGRhdGEtc2Nyb2xsLWNsYXNzPSJzdWItNCI+7Ya17ZWpPC9saT4KPGxpIGRhdGEtc2Nyb2xsLWNsYXNzPSJzdWItNSI+66as7IaM7IqkPC9saT4KPC91bD4=[\/vc_raw_html][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_btn title=&#8221;\ubb34\ub8cc \ud3c9\uac00\ud310 \uc2dc\uc791\ud558\uae30&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Ftry-buy%2Fendpoint-privilege-manager%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;subnav-dropdown&#8221;][vc_column_text el_class=&#8221;sticky-nav-title&#8221;]<\/p>\n<h5 style=\"text-align: right;\">\ubc14\ub85c\uac00\uae30<i class=\"fas fa-chevron-circle-down\"><\/i><\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top overview-vt sub-1&#8243; css=&#8221;.vc_custom_1615935316892{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;head-box&#8221;][vc_column_text]<\/p>\n<h3>\uc0ac\uc804 \uc608\ubc29\uc801 \ub79c\uc12c\uc6e8\uc5b4 \uc704\ud5d8 \uad00\ub9ac<\/h3>\n<p>\uc544\uc774\ub374\ud2f0\ud2f0 \uc911\uc2ec\uc758 <a href=\"https:\/\/www.cyberark.com\/ko\/solutions\/defense-in-depth\/\">\uc2ec\uce35 \ubc29\uc5b4<\/a> \uc811\uadfc \ubc29\uc2dd\uc744 \ub530\ub77c \uacf5\uaca9\uc744 \uc644\ud654\ud558\uace0 \uc790\uaca9 \uc99d\uba85 \ub3c4\uc6a9 \ubc0f \uce21\uba74 \uc774\ub3d9\uc744 \ubc29\uc9c0\ud558\uc2ed\uc2dc\uc624.[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-110957\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Defend-Against-Attacks-icon.svg\" alt=\"\uacf5\uaca9 \ubc29\uc5b4 \uc544\uc774\ucf58\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>\uacf5\uaca9 \ubc29\uc5b4<\/h4>\n<p>\uc218\uc775 \uc190\uc2e4, \ub2e4\uc6b4\ud0c0\uc784, \uc911\uc694 \ub370\uc774\ud130 \ubc0f IP\uc758 \ub3c4\ub09c \ubc29\uc9c0[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-110460\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Drive-Operational-Efficiency-icon.svg\" alt=\"\uc6b4\uc601 \ud6a8\uc728\uc131 \ud5a5\uc0c1 \uc544\uc774\ucf58\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>\uc6b4\uc601 \ud6a8\uc728\uc131 \ud5a5\uc0c1<\/h4>\n<p>\uc544\uc774\ub374\ud2f0\ud2f0 \uc778\uc99d\uc744 \uc790\ub3d9\ud654\ud558\uc5ec \ube44\uc6a9 \ubc0f \uc2dc\uac04 \uc808\uac10[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-110639\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Enable-the-Digital-Business-icon.svg\" alt=\"\ub514\uc9c0\ud138 \ube44\uc988\ub2c8\uc2a4 \ud65c\uc131\ud654 \uc544\uc774\ucf58\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>\ub514\uc9c0\ud138 \ube44\uc988\ub2c8\uc2a4 \ud65c\uc131\ud654<\/h4>\n<p>\uc544\uc774\ub374\ud2f0\ud2f0 \ubcf4\uc548\uc744 \ud1b5\ud55c \uc790\uaca9 \uc99d\uba85 \ub3c4\uc6a9 \ucc28\ub2e8[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-118792\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Satisfy-Audit-and-Compliance-icon.svg\" alt=\"\uac10\uc0ac \ubc0f \uaddc\uc815 \uc900\uc218 \ucda9\uc871 \uc544\uc774\ucf58\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>\uac10\uc0ac \ubc0f \uaddc\uc815 \uc900\uc218 \ucda9\uc871<\/h4>\n<p>\uc6cc\ud06c\uc2a4\ud14c\uc774\uc158\uc5d0\uc11c \uad00\ub9ac\uc790 \uad8c\ud55c \uc81c\uac70[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2-pad cybv2 cybv2-background-oval tour sub-2&#8243;][vc_column][vc_row_inner el_class=&#8221;cyb-center&#8221;][vc_column_inner el_class=&#8221;cyb-pad-btm&#8221;][vc_column_text el_class=&#8221;left-mobile&#8221;]<\/p>\n<h3>\uacf5\uaca9 \uc218\uba85 \uc8fc\uae30 \uc804\ubc18\uc5d0 \uac78\uccd0 \ub79c\uc12c\uc6e8\uc5b4 \ucc28\ub2e8<\/h3>\n<p>\uc5d4\ub4dc\ud3ec\uc778\ud2b8\ub294 \uacf5\uaca9\uc790\uac00 \uac70\uc810\uc744 \ud655\ubcf4\ud560 \uae30\ud68c\ub97c \uc81c\uacf5\ud558\ub294 \ub370 \uc8fc\ub3c4\uc801\uc774\uc9c0\ub9cc \uc720\uc77c\ud55c \uc5ed\ud560\uc744 \ud558\ub294 \uac83\uc740 \uc544\ub2d9\ub2c8\ub2e4. \uc0ac\ub78c, \ud504\ub85c\uc138\uc2a4 \ubc0f \uae30\uc220\uc744 \ubcf4\ud638\ud569\ub2c8\ub2e4.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=&#8221;square&#8221; active_section=&#8221;1&#8243; css_animation=&#8221;none&#8221;][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;\uc5d4\ub4dc\ud3ec\uc778\ud2b8 \ubcf4\ud638&#8221; tab_id=&#8221;endpoint-protection&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>\ub2e4\uacc4\uce35 \uc5d4\ub4dc\ud3ec\uc778\ud2b8 \ubcf4\ud638<\/h4>\n<p><a href=\"https:\/\/www.cyberark.com\/ko\/solutions\/defense-in-depth\/\">\uacf5\uaca9\uc790\uac00 \uad8c\ud55c\uc744 \uc0c1\uc2b9\uc2dc\ud0a4\uace0, \uc790\uaca9 \uc99d\uba85\uc744 \uce68\ud574\ud558\uba70, \uce21\uba74\uc73c\ub85c \uc774\ub3d9\ud558\uace0,<\/a> \uc5d4\ub4dc\ud3ec\uc778\ud2b8\uc5d0\uc11c \uc784\uc758\uc758 \ucf54\ub4dc\ub97c \uc2e4\ud589\ud558\ub294 \uac83\uc744 \ubc29\uc9c0\ud569\ub2c8\ub2e4. CyberArk Endpoint Privilege Manager(EPM)\uc640 Endpoint Detection &amp; Response(EDR)\ub97c \ud568\uaed8 \uc0ac\uc6a9\ud558\uc5ec \uc870\uc9c1\uc774 \ub79c\uc12c\uc6e8\uc5b4 \uacf5\uaca9\uc5d0 \ub300\uc751\ud558\ub294 \ubc29\ubc95\uc744 \uc54c\uc544\ubcf4\uc2ed\uc2dc\uc624.[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/ebooks\/how-to-stay-ahead-of-ransomware-a-review-of-combining-edr-and-epm\">eBook \uc77d\uae30<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-122792\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Products-Tour-RansomwarePrevention-1.png\" alt=\"\uc5d4\ub4dc\ud3ec\uc778\ud2b8 \ubcf4\ud638\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Products-Tour-RansomwarePrevention-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Products-Tour-RansomwarePrevention-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Products-Tour-RansomwarePrevention-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;PAM \uc81c\uc5b4&#8221; tab_id=&#8221;pam-controls&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>\ud3ec\uad04\uc801\uc778 PAM \uc81c\uc5b4<\/h4>\n<p>\uaca9\ub9ac \uacc4\uce35\uc744 \uc0dd\uc131\ud558\uace0, Tier 0 \uc2dc\uc2a4\ud15c\uc5d0 \ub300\ud55c \uc9c1\uc811 \uc561\uc138\uc2a4\ub97c \uc81c\uac70\ud558\uba70, \ud2b9\uad8c \uc561\uc138\uc2a4 \uad00\ub9ac(PAM) \uc81c\uc5b4\ub97c \ud1b5\ud574 \uc790\uaca9 \uc99d\uba85 \ub178\ucd9c\uc744 \uc81c\uac70\ud569\ub2c8\ub2e4.[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/cyberark-privileged-access-management-solutions\">\ubc31\uc11c \uc77d\uae30<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-122800\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Products-Tour-RansomwarePrevention-2.png\" alt=\"PAM \uc81c\uc5b4\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Products-Tour-RansomwarePrevention-2.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Products-Tour-RansomwarePrevention-2-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Products-Tour-RansomwarePrevention-2-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;\uc544\uc774\ub374\ud2f0\ud2f0 \ubc0f \uc561\uc138\uc2a4&#8221; tab_id=&#8221;identity&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>\ud1b5\ud569 \ub2e4\ub2e8\uacc4 \uc778\uc99d(MFA): \ubcf4\uc548 \uac15\ud654, \ubc88\uac70\ub85c\uc6c0 \uac10\uc18c<\/h4>\n<p>\uc801\uc751\ud615 MFA\ub85c \uc5d4\ub4dc\ud3ec\uc778\ud2b8\uc5d0 \ub300\ud55c \uc561\uc138\uc2a4\ub97c \ubcf4\ud638\ud558\uace0 IT \uc6b4\uc601\uc744 \ubcf5\uc7a1\ud558\uac8c \ud558\uac70\ub098 \uc0ac\uc6a9\uc790 \uc0dd\uc0b0\uc131\uc744 \uc800\ud574\ud558\uc9c0 \uc54a\uc73c\uba74\uc11c \ucd5c\uc18c \uad8c\ud55c \uc6d0\uce59\uc744 \uc801\uc6a9\ud558\uc2ed\uc2dc\uc624.[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/ebooks\/idaas-buyers-guide\">IDaaS \uad6c\ub9e4\uc790 \uac00\uc774\ub4dc \uc77d\uae30<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-109958\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-AdaptiveMulti-factorAuthentication-1.png\" alt=\"\uc801\uc751\ud615 \ub2e4\ub2e8\uacc4 \uc778\uc99d\" width=\"665\" height=\"451\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-AdaptiveMulti-factorAuthentication-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-AdaptiveMulti-factorAuthentication-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Products-Tour-AdaptiveMulti-factorAuthentication-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;DevSecOps&#8221; tab_id=&#8221;DevSecOps&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>\ube44\uc778\uac04 \uc561\uc138\uc2a4 \ubcf4\uc548<\/h4>\n<p>CyberArk Secrets Manager\ub97c \uc0ac\uc6a9\ud558\uc5ec Tier 0 \uc790\uc0b0 \ubc0f CI\/CD \ud30c\uc774\ud504\ub77c\uc778\uc5d0 \uc561\uc138\uc2a4\ud558\ub294 \ub370 \uc0ac\uc6a9\ub418\ub294 \uc560\ud50c\ub9ac\ucf00\uc774\uc158 \uc2dc\ud06c\ub9bf\ub4e4\uc774 \uce68\ud574\ub418\ub294 \uac83\uc744 \ubc29\uc9c0\ud569\ub2c8\ub2e4.[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/home\/a-blueprint-for-securing-all-applications-secrets-everywhere\">eBook \uc77d\uae30<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-122808\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Products-Tour-RansomwarePrevention-4.png\" alt=\"DevSecOps\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Products-Tour-RansomwarePrevention-4.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Products-Tour-RansomwarePrevention-4-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/Products-Tour-RansomwarePrevention-4-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-up&#8221; add_icon=&#8221;true&#8221; title=&#8221;\uc11c\ube44\uc2a4 \ud65c\ub3d9&#8221; tab_id=&#8221;services&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>\ubcf5\uc6d0\ub825 \ubc0f \ubcf5\uad6c \ud65c\ub3d9<\/h4>\n<p>\ub808\ub4dc\ud300 \uc11c\ube44\uc2a4\ub97c \ud1b5\ud574 \uae30\uc874 \uc81c\uc5b4\ub97c \ud14c\uc2a4\ud2b8\ud558\uace0 \ubcf4\uc548 \uacf5\ubc31\uacfc \ucde8\uc57d\uc810\uc744 \ud30c\uc545\ud569\ub2c8\ub2e4. \uac1c\uc120 \uc11c\ube44\uc2a4\ub97c \ud1b5\ud574 \ub370\uc774\ud130 \uce68\ud574 \ubcf5\uad6c\ub97c \uac00\uc18d\ud654\ud558\uace0 \ube44\uc988\ub2c8\uc2a4 \ud06c\ub9ac\ud2f0\uceec \uc11c\ube44\uc2a4\ub97c \ube60\ub974\uace0 \ud6a8\uc728\uc801\uc73c\ub85c \ubcf5\uc6d0\ud569\ub2c8\ub2e4.[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/ko\/services-support\/red-team-services\/\">\ub808\ub4dc\ud300 \uc11c\ube44\uc2a4 \uc54c\uc544\ubcf4\uae30<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/ko\/services-support\/remediation\/\">\uac1c\uc120 \uc11c\ube44\uc2a4 \uc54c\uc544\ubcf4\uae30<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-121828\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-1.png\" alt=\"\uc0ac\uc804 \uc608\ubc29\uc801 \ubc0f \uc0ac\ud6c4 \ub300\uc751\uc801 \ud65c\ub3d9\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/Products-Tour-RedTeamServices-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-top text-md-center sub-3&#8243;][vc_column][vc_column_text]<\/p>\n<h2>\ub79c\uc12c\uc6e8\uc5b4\ub85c\ubd80\ud130 \ube44\uc988\ub2c8\uc2a4\ub97c \uc120\uc81c\uc801\uc73c\ub85c \ubcf4\ud638\ud569\ub2c8\ub2e4<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-btm text-md-center&#8221;][vc_column width=&#8221;2\/3&#8243; offset=&#8221;vc_col-sm-offset-2&#8243;][vc_column_text el_class=&#8221;left-mobile&#8221;]<\/p>\n<h5>\uad00\ub9ac\uc790 \uad8c\ud55c\uc744 \uc81c\uac70\ud558\uace0 \uc560\ud50c\ub9ac\ucf00\uc774\uc158 \uc81c\uc5b4\ub97c \uad6c\ud604\ud558\uc5ec \ub79c\uc12c\uc6e8\uc5b4 \ud30c\uc77c \uc554\ud638\ud654\ub97c 100% \ubc29\uc9c0\ud569\ub2c8\ub2e4.<\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-112673\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/ransomware-seesaw-forest.jpg\" alt=\"\ub178\ucd9c\ub41c \ub79c\uc12c\uc6e8\uc5b4\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/ransomware-seesaw-forest.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/ransomware-seesaw-forest-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/ransomware-seesaw-forest-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/ransomware-seesaw-forest-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-right&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>CyberArk Labs\uc758 \ub79c\uc12c\uc6e8\uc5b4 \uc5f0\uad6c \ubc0f \uad8c\uc7a5 \uc0ac\ud56d<\/h4>\n<p>CyberArk Labs\ub294 \ub9e4\uc77c \uc0c8\ub85c\uc6b4 \ub79c\uc12c\uc6e8\uc5b4 \uc0d8\ud50c\uc744 \uc801\uadf9\uc801\uc73c\ub85c \ubd84\uc11d\ud569\ub2c8\ub2e4. \uc774 \ubc31\uc11c\uc5d0\uc11c\ub294 \ub79c\uc12c\uc6e8\uc5b4 \uc81c\ud488\uad70, \uacf5\ud1b5\uc810, \uc554\ud638\ud654 \uacbd\ub85c \ubc0f \ubc29\uc5b4 \uc804\ub7b5\uc5d0 \ub300\ud55c \uc870\uc0ac\ub97c \uacf5\uc720\ud569\ub2c8\ub2e4.[\/vc_column_text][vc_btn title=&#8221;\uc778\uc0ac\uc774\ud2b8 \uc5bb\uae30&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fanalyzing-ransomware-and-potential-mitigation-strategies-2|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw cyb-reverse&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-left&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>\uc5d4\ub4dc\ud3ec\uc778\ud2b8 \ubcf4\uc548 \uac80\ud1a0<\/h4>\n<p>\ub79c\uc12c\uc6e8\uc5b4 \ubc29\uc5b4\ub97c \uc704\ud55c \uc2ec\uce35 \ubc29\uc5b4 \uc811\uadfc \ubc29\uc2dd\uc5d0\ub294 5\uac00\uc9c0 \ud544\uc218 \uc694\uc18c\uac00 \uc788\uc2b5\ub2c8\ub2e4. \ub2e4\uacc4\uce35 \uc5d4\ub4dc\ud3ec\uc778\ud2b8 \ubcf4\uc548 \uacc4\ud68d\uc740 \ucde8\uc57d\uc131\uc744 \uac15\ud654\ud558\uace0 \ubcf4\uc548 \ud0dc\uc138\ub97c \uac1c\uc120\ud558\uba70 \uc704\ud5d8\uc744 \uc644\ud654\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4.[\/vc_column_text][vc_btn title=&#8221;eBook \uc77d\uae30&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Febooks%2Fendpoint-security-review-a-defense-in-depth-perspective-on-ransomware|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-112681\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/ransomware-seesaw-cube.jpg\" alt=\"\uc5d4\ub4dc\ud3ec\uc778\ud2b8 \ub2e4\uc2dc \uc0b4\ud3b4\ubcf4\uae30\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/ransomware-seesaw-cube.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/ransomware-seesaw-cube-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/ransomware-seesaw-cube-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/ransomware-seesaw-cube-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row el_class=&#8221;sub-4&#8243;][vc_column][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources sub-5&#8243; css=&#8221;.vc_custom_1616022078053{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8221;][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;no-break&#8221;][vc_column_text el_class=&#8221;no-break&#8221;]<\/p>\n<h3>\uad00\ub828 \ub9ac\uc18c\uc2a4 \uc0b4\ud3b4\ubcf4\uae30<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/\">\ubaa8\ub4e0 \ub9ac\uc18c\uc2a4 \ubcf4\uae30<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources_uberflip&#8221;][vc_column el_class=&#8221;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8221;.vc_custom_1732288610076{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;new_hpstyle_section8_uberflip&#8221;]PCEtLSBVYmVyZmxpcCBFbWJlZGRlZCBIdWIgV2lkZ2V0IC0tPgoKICA8ZGl2IGlkPSJVZkVtYmVkZGVkSHViMTczMjI4ODU1ODY2NyI+PC9kaXY+CgogIDxzY3JpcHQgbm9uY2U9Ijw\/PSAkbm9uY2UgPz4iPgogIHdpbmRvdy5fdWZIdWJDb25maWcgPSB3aW5kb3cuX3VmSHViQ29uZmlnIHx8IFtdOwogIHdpbmRvdy5fdWZIdWJDb25maWcucHVzaCh7CiAgICAnY29udGFpbmVycyc6eydhcHAnOicjVWZFbWJlZGRlZEh1YjE3MzIyODg1NTg2NjcnfSwKICAgICdjb2xsZWN0aW9uJzogJzc0NDczNzUnLAogICAgJ29wZW5MaW5rJzpmdW5jdGlvbih1cmwpewogICAgICB3aW5kb3cudG9wLmxvY2F0aW9uLmhyZWY9dXJsOwogICAgfSwKICAgICdsYXp5bG9hZGVyJzp7CiAgICAgICdpdGVtRGlzcGxheUxpbWl0JzoyMCwKICAgICAgJ21heFRpbGVzUGVyUm93JzozLAogICAgICAnbWF4SXRlbXNUb3RhbCc6IDMKICAgIH0sCiAgICAndGlsZVNpemUnOiAnbGFyZ2UnLAogICAgJ2VuYWJsZVBhZ2VUcmFja2luZyc6ZmFsc2UsCiAgICAnYmFzZVVybCc6ICdodHRwczovL3d3dy5jeWJlcmFyay5jb20vcmVzb3VyY2VzLycsCiAgICAnZmlsZXNVcmwnOiAnaHR0cHM6Ly93d3cuY3liZXJhcmsuY29tL3Jlc291cmNlcy8nLAogICAgJ2dlbmVyYXRlZEF0VVRDJzogJzIwMjQtMTEtMjIgMTU6MTU6MDEnLAogIH0pOwogIDwvc2NyaXB0PgoKICA8c2NyaXB0IG5vbmNlPSI8Pz0gJG5vbmNlID8+Ij4oZnVuY3Rpb24oZCx0LHUpIHsKICAgIGZ1bmN0aW9uIGxvYWQoKXsKICAgICAgdmFyIHM9ZC5jcmVhdGVFbGVtZW50KHQpO3Muc3JjPXU7ZC5ib2R5LmFwcGVuZENoaWxkKHMpOwogICAgfQogICAgaWYgKHdpbmRvdy5hZGRFdmVudExpc3RlbmVyKSB7CiAgICAgIHdpbmRvdy5hZGRFdmVudExpc3RlbmVyKCdsb2FkJyxsb2FkLGZhbHNlKTsKICAgIH0KICAgIGVsc2UgaWYgKHdpbmRvdy5hdHRhY2hFdmVudCkgewogICAgICB3aW5kb3cuYXR0YWNoRXZlbnQoJ29ubG9hZCcsbG9hZCk7CiAgICB9CiAgICBlbHNlewogICAgICB3aW5kb3cub25sb2FkPWxvYWQ7CiAgICB9CiAgfShkb2N1bWVudCwnc2NyaXB0JywnaHR0cHM6Ly93d3cuY3liZXJhcmsuY29tL3Jlc291cmNlcy9odWJzRnJvbnQvZW1iZWRfY29sbGVjdGlvbicpKTsKICA8L3NjcmlwdD4KICA8IS0tIC9FbmQgVWJlcmZsaXAgRW1iZWRkZWQgSHViIFdpZGdldCAtLT4=[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2-pad cybv2-oval-left-background hv-cta-list&#8221; css=&#8221;.vc_custom_1611885567532{background-color: #ff7600 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;img-box cyb-clm-background-rc&#8221; css=&#8221;.vc_custom_1612279360951{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Privilege-Access-Manager-High-value-CTA-770&#215;550-1.jpg?id=110566) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;stat-column&#8221;][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221; width=&#8221;3\/4&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text]<\/p>\n<h2>\ub79c\uc12c\uc6e8\uc5b4 \ubcf4\ud638 \uac00\uc18d\ud654<\/h2>\n<h4>\uc9c0\uae08 \ubb34\ub8cc\ub85c \uc2dc\uc791\ud558\uac70\ub098 \ub370\ubaa8\ub97c \uc694\uccad\ud558\uc2ed\uc2dc\uc624<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\uccb4\ud06c\ub9ac\uc2a4\ud2b8 \uc544\uc774\ucf58\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]\uc790\uaca9 \uc99d\uba85 \ub3c4\uc6a9 \ubc0f \uce21\uba74 \uc774\ub3d9 \ucc28\ub2e8(<a href=\"https:\/\/www.cyberark.com\/try-buy\/endpoint-privilege-manager\/\">EPM<\/a>)[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\uccb4\ud06c\ub9ac\uc2a4\ud2b8 \uc544\uc774\ucf58\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]\uc5d4\ub4dc\ud3ec\uc778\ud2b8\uc5d0\uc11c \uad00\ub9ac\uc790 \uad8c\ud55c \uc81c\uac70(<a href=\"https:\/\/www.cyberark.com\/try-buy\/endpoint-privilege-manager\/\">EPM<\/a>)[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\uccb4\ud06c\ub9ac\uc2a4\ud2b8 \uc544\uc774\ucf58\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]\uc801\uc751\ud615 \ub2e4\ub2e8\uacc4 \uc778\uc99d \uad6c\ud604(<a href=\"https:\/\/www.cyberark.com\/ko\/try-buy\/workforce-identity-trial\/\">Workforce Identity<\/a>)[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_btn title=&#8221;\uc635\uc158 \uc0b4\ud3b4\ubcf4\uae30&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fko%2Ftry-buy%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":186655,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-179390","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\ub79c\uc12c\uc6e8\uc5b4 \ubcf4\ud638 - \ub79c\uc12c\uc6e8\uc5b4 \uacf5\uaca9 \ubc29\uc9c0 | CyberArk<\/title>\n<meta name=\"description\" content=\"\uc5d4\ub4dc\ud3ec\uc778\ud2b8 \ubcf4\uc548 \uc811\uadfc \ubc29\uc2dd\uacfc \uc571 \ubc0f \uc2dc\uc2a4\ud15c\uc5d0 \ub300\ud55c \uc800\uc2a4\ud2b8 \uc778 \ud0c0\uc784 \ud2b9\uad8c \uc561\uc138\uc2a4\uc758 \uad8c\ud55c \uc0c1\uc2b9\uc744 \ud1b5\ud574 \uc804\uccb4\uc801\uc778 \ub79c\uc12c\uc6e8\uc5b4\ub97c \ubcf4\ud638\ud558\uc5ec \uacf5\uaca9\uc744 \ubc29\uc9c0\ud558\uc2ed\uc2dc\uc624.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/ransomware-protection\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\ub79c\uc12c\uc6e8\uc5b4 \ubcf4\ud638\" \/>\n<meta property=\"og:description\" content=\"\uc5d4\ub4dc\ud3ec\uc778\ud2b8 \ubcf4\uc548 \uc811\uadfc \ubc29\uc2dd\uacfc \uc571 \ubc0f \uc2dc\uc2a4\ud15c\uc5d0 \ub300\ud55c \uc800\uc2a4\ud2b8 \uc778 \ud0c0\uc784 \ud2b9\uad8c \uc561\uc138\uc2a4\uc758 \uad8c\ud55c \uc0c1\uc2b9\uc744 \ud1b5\ud574 \uc804\uccb4\uc801\uc778 \ub79c\uc12c\uc6e8\uc5b4\ub97c \ubcf4\ud638\ud558\uc5ec \uacf5\uaca9\uc744 \ubc29\uc9c0\ud558\uc2ed\uc2dc\uc624.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/ransomware-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-08T09:25:55+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"6\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/ransomware-protection\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/ransomware-protection\/\",\"name\":\"\ub79c\uc12c\uc6e8\uc5b4 \ubcf4\ud638 - \ub79c\uc12c\uc6e8\uc5b4 \uacf5\uaca9 \ubc29\uc9c0 | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/ransomware-protection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/ransomware-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Defend-Against-Attacks-icon.svg\",\"datePublished\":\"2021-01-12T12:18:50+00:00\",\"dateModified\":\"2025-07-08T09:25:55+00:00\",\"description\":\"\uc5d4\ub4dc\ud3ec\uc778\ud2b8 \ubcf4\uc548 \uc811\uadfc \ubc29\uc2dd\uacfc \uc571 \ubc0f \uc2dc\uc2a4\ud15c\uc5d0 \ub300\ud55c \uc800\uc2a4\ud2b8 \uc778 \ud0c0\uc784 \ud2b9\uad8c \uc561\uc138\uc2a4\uc758 \uad8c\ud55c \uc0c1\uc2b9\uc744 \ud1b5\ud574 \uc804\uccb4\uc801\uc778 \ub79c\uc12c\uc6e8\uc5b4\ub97c \ubcf4\ud638\ud558\uc5ec \uacf5\uaca9\uc744 \ubc29\uc9c0\ud558\uc2ed\uc2dc\uc624.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/ransomware-protection\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/ransomware-protection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/ransomware-protection\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Defend-Against-Attacks-icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Defend-Against-Attacks-icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/ransomware-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\uc544\uc774\ub374\ud2f0\ud2f0 \ubcf4\uc548 \uc194\ub8e8\uc158\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\ub79c\uc12c\uc6e8\uc5b4 \ubcf4\ud638\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\ub79c\uc12c\uc6e8\uc5b4 \ubcf4\ud638 - \ub79c\uc12c\uc6e8\uc5b4 \uacf5\uaca9 \ubc29\uc9c0 | CyberArk","description":"\uc5d4\ub4dc\ud3ec\uc778\ud2b8 \ubcf4\uc548 \uc811\uadfc \ubc29\uc2dd\uacfc \uc571 \ubc0f \uc2dc\uc2a4\ud15c\uc5d0 \ub300\ud55c \uc800\uc2a4\ud2b8 \uc778 \ud0c0\uc784 \ud2b9\uad8c \uc561\uc138\uc2a4\uc758 \uad8c\ud55c \uc0c1\uc2b9\uc744 \ud1b5\ud574 \uc804\uccb4\uc801\uc778 \ub79c\uc12c\uc6e8\uc5b4\ub97c \ubcf4\ud638\ud558\uc5ec \uacf5\uaca9\uc744 \ubc29\uc9c0\ud558\uc2ed\uc2dc\uc624.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/ransomware-protection\/","og_locale":"ko_KR","og_type":"article","og_title":"\ub79c\uc12c\uc6e8\uc5b4 \ubcf4\ud638","og_description":"\uc5d4\ub4dc\ud3ec\uc778\ud2b8 \ubcf4\uc548 \uc811\uadfc \ubc29\uc2dd\uacfc \uc571 \ubc0f \uc2dc\uc2a4\ud15c\uc5d0 \ub300\ud55c \uc800\uc2a4\ud2b8 \uc778 \ud0c0\uc784 \ud2b9\uad8c \uc561\uc138\uc2a4\uc758 \uad8c\ud55c \uc0c1\uc2b9\uc744 \ud1b5\ud574 \uc804\uccb4\uc801\uc778 \ub79c\uc12c\uc6e8\uc5b4\ub97c \ubcf4\ud638\ud558\uc5ec \uacf5\uaca9\uc744 \ubc29\uc9c0\ud558\uc2ed\uc2dc\uc624.","og_url":"https:\/\/www.cyberark.com\/solutions\/ransomware-protection\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-07-08T09:25:55+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"6\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/ransomware-protection\/","url":"https:\/\/www.cyberark.com\/solutions\/ransomware-protection\/","name":"\ub79c\uc12c\uc6e8\uc5b4 \ubcf4\ud638 - \ub79c\uc12c\uc6e8\uc5b4 \uacf5\uaca9 \ubc29\uc9c0 | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/solutions\/ransomware-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/solutions\/ransomware-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Defend-Against-Attacks-icon.svg","datePublished":"2021-01-12T12:18:50+00:00","dateModified":"2025-07-08T09:25:55+00:00","description":"\uc5d4\ub4dc\ud3ec\uc778\ud2b8 \ubcf4\uc548 \uc811\uadfc \ubc29\uc2dd\uacfc \uc571 \ubc0f \uc2dc\uc2a4\ud15c\uc5d0 \ub300\ud55c \uc800\uc2a4\ud2b8 \uc778 \ud0c0\uc784 \ud2b9\uad8c \uc561\uc138\uc2a4\uc758 \uad8c\ud55c \uc0c1\uc2b9\uc744 \ud1b5\ud574 \uc804\uccb4\uc801\uc778 \ub79c\uc12c\uc6e8\uc5b4\ub97c \ubcf4\ud638\ud558\uc5ec \uacf5\uaca9\uc744 \ubc29\uc9c0\ud558\uc2ed\uc2dc\uc624.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/ransomware-protection\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/ransomware-protection\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.cyberark.com\/solutions\/ransomware-protection\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Defend-Against-Attacks-icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Defend-Against-Attacks-icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/ransomware-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"\uc544\uc774\ub374\ud2f0\ud2f0 \ubcf4\uc548 \uc194\ub8e8\uc158","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"\ub79c\uc12c\uc6e8\uc5b4 \ubcf4\ud638"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/pages\/179390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/comments?post=179390"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/pages\/179390\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/pages\/186655"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/media?parent=179390"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/product_category?post=179390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}