{"id":179394,"date":"2021-07-01T13:48:27","date_gmt":"2021-07-01T17:48:27","guid":{"rendered":"https:\/\/www.cyberark.com\/industry-regulatory-compliance\/"},"modified":"2024-03-28T04:58:01","modified_gmt":"2024-03-28T08:58:01","slug":"industry-regulatory-compliance","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/ko\/solutions\/industry-regulatory-compliance\/","title":{"rendered":"Industry Regulatory Compliance"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 int-hero-full&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text el_class=&#8221;cyb-breadcrumb&#8221;]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/ko\/solutions\/audit-compliance\/\">Back to Satisfy Audit &amp; Compliance<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>Industry and regulatory compliance<\/h1>\n<h2>Check all the boxes. Remove all the headaches.<\/h2>\n<p>[\/vc_column_text][vc_btn title=&#8221;Request a Demo&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Frequest-demo%2F&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1624458231466{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Regulatory.jpg?id=119594) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221; el_class=&#8221;column-2&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top overview-vt&#8221; css=&#8221;.vc_custom_1611617874123{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;head-box&#8221;][vc_column_text]<\/p>\n<h3>Maintain compliance without losing control of time and resources.<\/h3>\n<p>Transparency is critically important to compliance\u2014and privacy is paramount to your customers. How do you accomplish both?[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-119298\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Money.svg\" alt=\"Money Icon\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Average $14.82 million<\/h4>\n<p>Cost to organization for non-compliance.+[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Demonstrate-Compliance-1.svg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-119602\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Demonstrate-Compliance-1.svg\" alt=\"Cost of Non-Compliance Icon\" width=\"300\" height=\"300\" \/><\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h4>60% Increase<\/h4>\n<p>In operating costs spent on compliance for retail and corporate banks.*[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-119306 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Time.svg\" alt=\"Time icon\" width=\"174\" height=\"150\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Resources and time<\/h4>\n<p>Many businesses focus more on compliance over proper security guidelines.**[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2-pad cybv2 cybv2-background-oval tour&#8221;][vc_column][vc_row_inner el_class=&#8221;cyb-center&#8221;][vc_column_inner el_class=&#8221;cyb-pad-btm&#8221;][vc_column_text el_class=&#8221;left-mobile&#8221;]<\/p>\n<h3>Minimize compliance challenges. Maximize time on business-critical projects<\/h3>\n<p>Take complexity out of passing security audits and focus energy on what delivers the most value.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=&#8221;square&#8221; active_section=&#8221;1&#8243; css_animation=&#8221;none&#8221;][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;Secure Privileged Access&#8221; tab_id=&#8221;Secure-Privileged-Access&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Secure privileged access<\/h4>\n<p>Compromised privileged identities are the leading cause of security breaches\u2014which makes privileged access one of the biggest priorities for your business. The most secure privileged access approach prevents human and machine identities from having more access to systems and resources than they need.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-119610 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-1.png\" alt=\"Enforce Least Privilege \" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;Enforce Least Privilege&#8221; tab_id=&#8221;Enforce-Least-Privilege&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Enforce least privilege<\/h4>\n<p>The least privilege principle\u202fensures the right access is provided to the right users for the right amount of time. The practice extends beyond human access to include applications, systems or connected devices that require\u202fprivileges\u202for permissions to perform a required task.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119618\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-2.png\" alt=\"Enforce Least Privilege\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-2.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-2-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-2-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;Enable Strong Authentication&#8221; tab_id=&#8221;Enable-Strong-Authentication&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Enable strong authentication<\/h4>\n<p>Multi-Factor Authentication (MFA) and Single Sign-On (SSO) are two best practices for ensuring your users are who they claim to be. MFA secures your entire organization: Apps, VPNs, Workstations, etc. SSO provides secure and frictionless sign-in experience for both internal and external users.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119626\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3.png\" alt=\"Enable Strong Authentication\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;Broker Secure Sessions&#8221; tab_id=&#8221;Broker-Secure-Sessions&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Broker secure sessions<\/h4>\n<p>In a secure brokered session, privileged users are able to connect to systems without exposing credentials to end-users or their machines. The approach ensures accountability, identifies risk, and produces a tamper-proof audit trail.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119634\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-4.png\" alt=\"Broker Secure Sessions\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-4.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-4-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-4-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-up&#8221; add_icon=&#8221;true&#8221; title=&#8221;Integrate with Compliance Tools&#8221; tab_id=&#8221;Integrate-Compliance-Tools&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Integrate with compliance tools<\/h4>\n<p>To address IT audit and compliance requirements, our Identity Security platform integrates with compliance and reporting tools. Consequently, you\u2019ll be able to provide comprehensive and integrated reports on privileged access and session activities to address questions and pass an IT audit.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-119642 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-5.png\" alt=\"Integrate with Compliance Tools\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-5.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-5-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-5-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]JTNDc2NyaXB0JTNFJTBBaWYlMjAlMjhqUXVlcnklMjh3aW5kb3clMjkud2lkdGglMjglMjklMjAlM0MlMjA3NjglMjklMjAlN0IlMEFqUXVlcnklMjglMjIudG91ciUyMC52Y190dGEtcGFuZWwlMjIlMjkub24lMjglMjJjbGljayUyMiUyQ2Z1bmN0aW9uJTI4JTI5JTIwJTdCJTBBJTA5JTBBJTA5aWYlMjhqUXVlcnklMjh0aGlzJTI5Lmhhc0NsYXNzJTI4JTIydmNfYWN0aXZlJTIyJTI5JTI5JTdCJTBBJTA5JTA5JTBBJTA5JTA5c2V0VGltZW91dCUyOGZ1bmN0aW9uJTI4JTI5JTdCJTBBJTA5JTA5JTA5alF1ZXJ5JTI4JTIyLnRvdXIlMjAudmNfdHRhLXBhbmVsJTIyJTI5LnJlbW92ZUNsYXNzJTI4JTIydmNfYWN0aXZlJTIyJTI5JTNCJTIwJTBBJTA5JTA5JTdEJTJDMTAwJTI5JTBBJTA5JTA5JTBBJTA5JTA5cmV0dXJuJTIwZmFsc2UlM0IlMEElMDklN0QlMEElN0QlMjklM0IlMEElN0QlMEElMEFqUXVlcnklMjglMjIudG91ciUyMC52Y190dGEtcGFuZWwlMjAud3BiX3RleHRfY29sdW1uJTIwYSUyMiUyOS5jbGljayUyOGZ1bmN0aW9uJTI4ZSUyOSUyMCU3QiUwQSUyMCUyMCUyMCUyRiUyRiUyMERvJTIwc29tZXRoaW5nJTBBJTIwJTIwJTIwZS5zdG9wUHJvcGFnYXRpb24lMjglMjklM0IlMEElN0QlMjklM0IlMEElM0MlMkZzY3JpcHQlM0U=[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 fullaccordion cybv2-pad-top acc1&#8243; css=&#8221;.vc_custom_1625850200965{background-color: #f7f7f7 !important;}&#8221;][vc_column offset=&#8221;vc_col-md-offset-2 vc_col-md-8&#8243;][vc_column_text el_class=&#8221;heading text-md-center&#8221;]<\/p>\n<h3>Top compliance assets<\/h3>\n<p>[\/vc_column_text][vc_tta_accordion shape=&#8221;square&#8221; color=&#8221;white&#8221; c_icon=&#8221;&#8221; active_section=&#8221;1&#8243; css_animation=&#8221;none&#8221; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;GDPR &#8211; A Privileged Access Management Approach to GDPR Readiness&#8221; tab_id=&#8221;gdpr&#8221;][vc_column_text el_class=&#8221;cyb-subpad-btm&#8221;]The General Data Protection Regulation (GDPR) is designed to better protect the personal information of EU citizens and residents.<\/p>\n<p>Download this eBook to prepare for GDPR and avoid being found in non-compliance.[\/vc_column_text][vc_btn title=&#8221;Download eBook&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Febooks%2Fa-privileged-account-security-approach-to-gdpr-readiness&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_tta_section][vc_tta_section title=&#8221;NERC CIP &#8211; Protect the Grid while Addressing Requirements&#8221; tab_id=&#8221;nerc&#8221;][vc_column_text el_class=&#8221;cyb-subpad-btm&#8221;]For energy utilities, meeting NERC compliance for privileged accounts can be demanding due to the size and complexity of Industrial Control Systems. Adding to the challenge, version 5 of the standard expands the scope to include new elements and requirements around the use of privileged accounts in critical cyber entities.<\/p>\n<p>Learn how you can put the solutions in place to meet the NERC compliance for privileged access control, remote access management and access revocation.[\/vc_column_text][vc_btn title=&#8221;Download Whitepaper&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fprotecting-the-grid-addressing-nerc-cip-requirements-for-securing-privileged-access&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_tta_section][vc_tta_section title=&#8221;MASTRM &#8211; Secure, Manage and Monitor Privileged Access&#8221; tab_id=&#8221;mastrm&#8221;][vc_column_text el_class=&#8221;cyb-subpad-btm&#8221;]Due to the advancement of information technology and the rapidly changing threat landscape, The Monetary Authority of Singapore (MAS) has revised, enhanced, and renamed the guidelines to the \u201cTechnology Risk Management\u201d (TRM) guidelines.<\/p>\n<p>Learn how you can address the MAS TRM guidelines with CyberArk Solutions.[\/vc_column_text][vc_btn title=&#8221;Download Whitepaper&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Faddressing-the-monetary-authority-of-singapore-mas-technology-risk-management-trm-guidelines-with-cyberark-solutions&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_tta_section][vc_tta_section title=&#8221;Sarbanes Oxley&#8221; tab_id=&#8221;oxley&#8221;][vc_column_text el_class=&#8221;cyb-subpad-btm&#8221;]Companies subject to the Sarbanes Oxley (SOX) Act face unprecedented challenges to compliance. Although Sarbanes Oxley compliance involves more than implementing technology, CyberArk\u2019s privileged access protection, accountability and intelligence solutions are proven to provide the proof and controls required by section 404 and supported by internal assessment frameworks, such as COSO and COBIT.<\/p>\n<p>Learn how you can protect financial information.[\/vc_column_text][vc_btn title=&#8221;Download Whitepaper&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fprotecting-financial-information-sarbanes-oxley&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_tta_section][vc_tta_section title=&#8221;Payment Card Industry &#8211; Security Standards for Cardholder Data&#8221; tab_id=&#8221;payment&#8221;][vc_column_text el_class=&#8221;cyb-subpad-btm&#8221;]Privileged accounts represent one of the most important aspects of protecting cardholder data. They are pervasive throughout IT environments and hold the highest levels of access to sensitive information and controls within an organization.<\/p>\n<p>Ensure that access to cardholder data environments is protected, controlled and auditable.[\/vc_column_text][vc_btn title=&#8221;Download Whitepaper&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fcyberark-privileged-access-management-solutions%20&#8243; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources&#8221; css=&#8221;.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8221;][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;no-break&#8221;][vc_column_text el_class=&#8221;no-break&#8221;]<\/p>\n<h3>Explore<br \/>\nrelated<br \/>\nresources<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/\">View all Resources<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources_uberflip&#8221;][vc_column el_class=&#8221;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html el_class=&#8221;new_hpstyle_section8_uberflip&#8221; css=&#8221;.vc_custom_1624459737256{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2-pad cybv2-oval-left-background hv-cta-list&#8221; css=&#8221;.vc_custom_1611885567532{background-color: #ff7600 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;img-box&#8221; css=&#8221;.vc_custom_1624459905791{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/IndustryandRegulatoryCompliance-HighValue-CTA-Copy.jpg?id=119650) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;stat-column&#8221;][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221; width=&#8221;3\/4&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text]<\/p>\n<h2>Request a demo<\/h2>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]Improve confidence in achieving audit\/compliance requirements[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]Reduce audit and compliance costs and time[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]Remediate audit gaps before they are flagged[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_btn title=&#8221;Request a Demo&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Frequest-demo%2F%20&#8243; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;cyb-pad cybv2&#8243;][vc_column][vc_column_text el_class=&#8221;tiny&#8221;]*SOURCE: https:\/\/www2.deloitte.com\/us\/en\/pages\/regulatory\/articles\/cost-of-compliance-regulatory-productivity.html<\/p>\n<p>**SOURCE: https:\/\/www.pwc.com\/us\/en\/services\/consulting\/risk-regulatory\/library\/top-policy-trends\/data-privacy.html<\/p>\n<p>+SOURCE: https:\/\/fmpglobal.com\/blog\/the-cost-of-non-compliance\/[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 int-hero-full&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text el_class=&#8221;cyb-breadcrumb&#8221;]Back to Satisfy Audit &amp; Compliance[\/vc_column_text][vc_column_text] Industry and regulatory compliance Check all the boxes. Remove all the headaches. [\/vc_column_text][vc_btn title=&#8221;Request a Demo&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Frequest-demo%2F&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column&#8230;<\/p>\n","protected":false},"author":125,"featured_media":0,"parent":186655,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27776],"class_list":["post-179394","page","type-page","status-publish","hentry","product_category-identity-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>IT Security Industry and Regulatory Compliance | CyberArk<\/title>\n<meta name=\"description\" content=\"CyberArk Industry and Regulatory Compliance solutions enable transparency and customer privacy without losing control of time and resources.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/ko\/solutions\/industry-regulatory-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industry Regulatory Compliance\" \/>\n<meta property=\"og:description\" content=\"CyberArk Industry and Regulatory Compliance solutions enable transparency and customer privacy without losing control of time and resources.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/ko\/solutions\/industry-regulatory-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-28T08:58:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Money.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"7\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/ko\/solutions\/industry-regulatory-compliance\/\",\"url\":\"https:\/\/www.cyberark.com\/ko\/solutions\/industry-regulatory-compliance\/\",\"name\":\"IT Security Industry and Regulatory Compliance | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/ko\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/ko\/solutions\/industry-regulatory-compliance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/ko\/solutions\/industry-regulatory-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Money.svg\",\"datePublished\":\"2021-07-01T17:48:27+00:00\",\"dateModified\":\"2024-03-28T08:58:01+00:00\",\"description\":\"CyberArk Industry and Regulatory Compliance solutions enable transparency and customer privacy without losing control of time and resources.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/ko\/solutions\/industry-regulatory-compliance\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/ko\/solutions\/industry-regulatory-compliance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.cyberark.com\/ko\/solutions\/industry-regulatory-compliance\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Money.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Money.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/ko\/solutions\/industry-regulatory-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/ko\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\uc544\uc774\ub374\ud2f0\ud2f0 \ubcf4\uc548 \uc194\ub8e8\uc158\",\"item\":\"https:\/\/www.cyberark.com\/ko\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Industry Regulatory Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/ko\/#website\",\"url\":\"https:\/\/www.cyberark.com\/ko\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/ko\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/ko\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/ko\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/ko\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.cyberark.com\/ko\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/ko\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IT Security Industry and Regulatory Compliance | CyberArk","description":"CyberArk Industry and Regulatory Compliance solutions enable transparency and customer privacy without losing control of time and resources.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/ko\/solutions\/industry-regulatory-compliance\/","og_locale":"ko_KR","og_type":"article","og_title":"Industry Regulatory Compliance","og_description":"CyberArk Industry and Regulatory Compliance solutions enable transparency and customer privacy without losing control of time and resources.","og_url":"https:\/\/www.cyberark.com\/ko\/solutions\/industry-regulatory-compliance\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2024-03-28T08:58:01+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Money.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"7\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/ko\/solutions\/industry-regulatory-compliance\/","url":"https:\/\/www.cyberark.com\/ko\/solutions\/industry-regulatory-compliance\/","name":"IT Security Industry and Regulatory Compliance | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/ko\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/ko\/solutions\/industry-regulatory-compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/ko\/solutions\/industry-regulatory-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Money.svg","datePublished":"2021-07-01T17:48:27+00:00","dateModified":"2024-03-28T08:58:01+00:00","description":"CyberArk Industry and Regulatory Compliance solutions enable transparency and customer privacy without losing control of time and resources.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/ko\/solutions\/industry-regulatory-compliance\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/ko\/solutions\/industry-regulatory-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.cyberark.com\/ko\/solutions\/industry-regulatory-compliance\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Money.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Money.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/ko\/solutions\/industry-regulatory-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/ko\/"},{"@type":"ListItem","position":2,"name":"\uc544\uc774\ub374\ud2f0\ud2f0 \ubcf4\uc548 \uc194\ub8e8\uc158","item":"https:\/\/www.cyberark.com\/ko\/solutions\/"},{"@type":"ListItem","position":3,"name":"Industry Regulatory Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/ko\/#website","url":"https:\/\/www.cyberark.com\/ko\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/ko\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/ko\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/ko\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/ko\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.cyberark.com\/ko\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/ko\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/pages\/179394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/users\/125"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/comments?post=179394"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/pages\/179394\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/pages\/186655"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/media?parent=179394"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/product_category?post=179394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}