{"id":179454,"date":"2017-06-22T09:39:11","date_gmt":"2017-06-22T13:39:11","guid":{"rendered":"https:\/\/www.cyberark.com\/terms-conditions\/"},"modified":"2025-03-06T01:36:38","modified_gmt":"2025-03-06T06:36:38","slug":"terms-conditions","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/ko\/terms-conditions\/","title":{"rendered":"Website Terms and Conditions"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero-noimg dark&#8221;][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;column-1&#8243;][vc_column_text]<\/p>\n<h1>Website Terms and Conditions<\/h1>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad&#8221;][vc_column width=&#8221;5\/6&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_column_text css=&#8221;&#8221;]The following terms and conditions govern your use of any site owned and operated by CyberArk\u00ae Software Ltd. and CyberArk Software, Inc. or one of their affiliated entities (\u201cCyberArk\u201d). By using this site or downloading any materials from it you agree that you have read and understood these terms and conditions and you agree to be bound by them, and to comply with all applicable laws and regulations regarding use of this site. If you do not agree to these terms and conditions, please do not use this site.<\/p>\n<p>CyberArk reserves the right to make changes to this site and to these terms and conditions at any time. Your continued use of this site will constitute your acceptance of any new or amended terms and conditions.<\/p>\n<p><strong>Restrictions on use<\/strong><br \/>\nThe information, documentation, data, material and related graphics available on this site (\u201cMaterials\u201d) are provided by CyberArk or its licensors. The Materials contained on this site are protected by copyright laws, international copyright treaties, and other intellectual property laws and treaties. CyberArk and its licensors retain all title to copyright in the Materials, and nothing on this site shall be construed as conferring any license under any intellectual property rights, whether by estoppel, implication or otherwise. Except as stated in these terms and conditions, you may not reproduce, edit, modify, display, distribute or make any other use of the Materials, in any form or by any means without CyberArk\u2019s prior written consent.<\/p>\n<p>CyberArk grants you permission to download, reproduce, display and distribute the Materials posted on this site solely for informational and non-commercial or personal use, provided that you do not modify such Materials and provided further that you retain all copyright and proprietary notices as they appear in such Materials. CyberArk further grants to educational institutions (specifically K-12, universities and community colleges) permission to download, reproduce, display and distribute the Materials posted on this site solely for use in the classroom, provided that such institutions identify CyberArk as the source of the Materials and include the following credit line: \u201cCourtesy of CyberArk\u201d.<\/p>\n<p>The permission granted to you herein shall terminate if you breach any of these terms and conditions. Upon termination you agree to destroy any Materials downloaded from this site. Unauthorized use of any of these Materials is expressly prohibited by law, and may result in civil and criminal penalties.<\/p>\n<p>You may not use any content contained in the Materials in any manner that may give a false or misleading impression or statement as to CyberArk or any third party referenced in the Materials. You agree to use the site and the Materials accessible via the Site only for lawful purposes.<\/p>\n<p><strong>Warranties and disclaimers<\/strong><br \/>\nCyberArk intends for the Materials contained on this site to be accurate and reliable. These Materials may, however, contain technical inaccuracies, typographical errors or other mistakes. CyberArk may make corrections or other changes to these Materials at any time. CyberArk reserves the right to make corrections, modifications, enhancements, improvements and other changes to its products, programs and services at any time or to discontinue any products, programs, or services without notice.<\/p>\n<p>Any information contained in the Materials regarding CyberArk\u2019s product roadmap is provided for informational purposes only, and represents CyberArk\u2019s current view of its innovation direction. It is not a commitment or an obligation to deliver any product or functionality. The development, release, and timing, if any, of any future innovation or product remains at CyberArk\u2019s sole discretion and may be subject to applicable fees.<\/p>\n<p>THE MATERIALS ON THIS SITE ARE PROVIDED \u201cAS IS\u201d. YOU ACKNOWLEDGE AND AGREE THAT THE APPLICATION NOTES, REFERENCE DESIGNS AND OTHER SUCH DESIGN MATERIALS INCLUDED HEREIN ARE PROVIDED AS AN EXAMPLE ONLY AND THAT YOU WILL EXERCISE YOUR OWN INDEPENDENT ANALYSIS AND JUDGMENT IN YOUR USE OF THESE MATERIALS. CYBERARK ASSUMES NO LIABILITY FOR YOUR USE OF THESE MATERIALS OR YOUR PRODUCT DESIGNS OR ANY APPLICATIONS ASSISTANCE PROVIDED BY CYBERARK. USE OF THE INFORMATION PROVIDED ON THIS SITE MAY REQUIRE A LICENSE FROM CYBERARK OR A THIRD PARTY UNDER THE PATENTS OR OTHER INTELLECTUAL PROPERTY RIGHTS OF CYBERARK OR THAT THIRD PARTY.<\/p>\n<p>IN ANY EVENT, ANY PRODUCT PURCHASED FROM CYBERARK OR ITS DISTRIBUTORS IS SUBJECT TO CYBERARK\u2019S TERMS AND CONDITIONS OF SALE, WHICH SHOULD BE REVIEWED CAREFULLY BEFORE PLACING ANY ORDER TO PURCHASE SUCH PRODUCT, AND THE MATERIALS PROVIDED IN THIS SITE DO NOT CONSTITUTE ANY WARRANTY OR REPRESENTATION ABOUT THE SUITABILITY OF CYBERARK PRODUCTS OR THESE MATERIALS FOR ANY PURPOSE, INCLUDING BUT NOT LIMITED TO, ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT OF ANY THIRD PARTY INTELLECTUAL PROPERTY RIGHT.<\/p>\n<p><strong>Limitation of liability<\/strong><\/p>\n<p>IN NO EVENT SHALL CYBERARK OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER, INCLUDING BUT NOT LIMITED TO, INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION RESULTING FROM USE OF THIS SITE OR ARISING OUT OF THE USE OR PERFORMANCE OF THE MATERIALS AVAILABLE ON THIS SITE, REGARDLESS OF WHETHER CYBERARK OR AN AUTHORIZED CYBERARK REPRESENTATIVE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.<\/p>\n<p><strong>Specific notice regarding software available on this site<\/strong><br \/>\nAny software and related documentation that is made available to download from this site (\u201cSoftware\u201d) is copyrighted. Use of this Software is governed by the terms of the license agreement, if any, that accompanies or is included with such Software (\u201cLicense Agreement\u201d). A user will be unable to install any Software that is accompanied by or includes a License Agreement before first agreeing to the License Agreement terms. Any reproduction or redistribution of the Software not in accordance with the License Agreement is expressly prohibited, and may result in civil and criminal penalties.<\/p>\n<p>WITHOUT LIMITING THE FOREGOING, COPYING OR REPRODUCTION OF THE SOFTWARE TO ANY OTHER LOCATION FOR FURTHER REPRODUCTION OR REDISTRIBUTION IS PROHIBITED, UNLESS SUCH REPRODUCTION OR REDISTRIBUTION IS EXPRESSLY PERMITTED BY THE LICENSE AGREEMENT ACCOMPANYING SUCH SOFTWARE.<br \/>\nSPECIFIC NOTICE REGARDING LINKS TO THIRD PARTY SITES.<\/p>\n<p>Certain links provided herein permit you to leave this site and enter non-CyberArk sites. These linked sites are not under CyberArk \u2018s control. CyberArk is not responsible for the contents of any linked site or any changes or updates to such sites. CyberArk is providing these links to you only as a convenience. The inclusion of any link does not imply endorsement by CyberArk of any linked site. CYBERARK\u2019S PUBLICATION OF INFORMATION REGARDING THIRD-PARTY PRODUCTS OR SERVICES DOES NOT CONSTITUTE AN ENDORSEMENT REGARDING THE SUITABILITY OF SUCH PRODUCTS OR SERVICES OR A WARRANTY, REPRESENTATION OR ENDORSEMENT OF SUCH PRODUCTS OR SERVICES, EITHER ALONE OR IN COMBINATION WITH ANY CyberArk PRODUCT OR SERVICE. Linking to this site is subject to CyberArk\u2019s Linking Policy. If you would like to link to CyberArk\u2019s web site, please contact us at:<\/p>\n<p><u><a href=\"mailto:Webmaster@CyberArk.com\">Webmaster@CyberArk.com<\/a><\/u><\/p>\n<p><strong>Trademarks<\/strong><br \/>\nThe trademarks, service marks and logos used and displayed on this site are registered and unregistered trademarks and service marks of CyberArk and others. CYBERARK\u00ae, PRIVILEGE CLOUD\u00ae, PASSWORD VAULT\u00ae, VAULTING TECHNOLOGY\u00ae, PRIVATEARK\u00ae, PRIVILEGED SESSION MANAGER\u00ae, CONJUR\u00ae, SECRETLESS\u00ae, SECRETLESS BROKER\u00ae, CYBERARK CLOUD ENTITLEMENTS MANAGER\u00ae, MFA EVERYWHERE\u00ae, TRUST ISSUES\u00ae, THE IDENTITY SECURITY COMPANY\u00ae, Privileged Access Manager\u2122 (PAM), Privileged Threat Analytics\u2122 (PTA), Vendor Privileged Access\u2122, Endpoint Privilege Manager\u2122 (EPM), CyberArk DNA\u2122 (Discovery and Audit), Dynamic Privileged Access\u2122 (DPA), Secure Infrastructure Access\u2122 (SIA), Application Identity Manager\u2122 (AIM), Application Access Manager\u2122 (AAM), CyberArk Identity\u2122, Workforce Access\u2122, Customer Access\u2122, Secure Web Sessions\u2122 (SWS), Secure Browser\u2122, Identity Compliance\u2122, Identity Flows\u2122, Credential Providers\u2122, Secrets Hub\u2122, C3 Alliance\u2122, Fearlessly Forward \u2122, CORA\u2122, VENAFI\u00ae, VIA VENAFI\u00ae, JETSTACK\u00ae, TLS PROTECT\u00ae, Zilla Security\u2122 and other marks appearing on this Site are trademarks or registered trademarks of CyberArk in the United States and other countries. All other registered and unregistered trademarks used on the Site are the property of their respective owners. Except as provided herein, you are not granted, expressly or by implication, estoppel or otherwise, any license or right to use any CyberArk trademark, service mark or logo used or displayed on the site without the prior express written permission of CyberArk. When used with CyberArk\u2019s permission, all trademarks must be identified as trademarks of CyberArk using the appropriate symbol (e.g., \u2122 or \u00ae) at the first occurrence in the text of any published printed or electronic communications, including advertising, promotions, packaging, technical documentation, sales and marketing collateral and product labels.<\/p>\n<p><strong>Patents<\/strong><br \/>\nCyberArk\u2019s technology and products are protected by one or more United States and\/or international patents or patents pending. For more information, please visit our patent marking page: <a href=\"https:\/\/www.cyberark.com\/ko\/patents\/\">https:\/\/www.cyberark.com\/patents<\/a><\/p>\n<p><strong>Export control<\/strong><br \/>\nThe exportation of the Software and related documentation is subject to compliance with: (i) the U.S. Export Administration Act, as amended, and the rules and regulations promulgated from time to time thereunder, including the Export Administration Regulations, (ii) the laws of the State of Israel, and (iii) the laws of any country or organization of nations within whose jurisdiction you operate or do business. You shall not export or re-export the Software, its related documentation, or any part thereof directly or indirectly other than in compliance with applicable export control law.<\/p>\n<p><strong>Jurisdiction and governing law<\/strong><br \/>\nAny claim relating to this site or use of this site will be governed by and interpreted in accordance with the laws of the State of Massachusetts, without reference to its conflict-of-laws principles. Any dispute arising out of or related to your use of this site will be brought in, and you hereby consent to exclusive jurisdiction and venue in, the competent courts of Boston, MA, USA. You agree to waive all defenses of lack of personal jurisdiction and forum non-conveniens and agree that process may be served in a manner authorized by applicable law or court rule.<\/p>\n<p><strong>Privacy policy<\/strong><br \/>\nYour use of this site and the information you submit to CyberArk through this site are governed by CyberArk\u2019s Privacy Policy. <a href=\"https:\/\/www.cyberark.com\/ko\/privacy-notice\/\">Click here to review CyberArk\u2019s Privacy Policy<\/a>.<\/p>\n<p>COPYRIGHT NOTICE. Copyright \u00a9 2000-2019 CyberArk Software, Ltd., All rights not expressly granted herein are reserved.<\/p>\n<p><strong>Contact information<\/strong><br \/>\nAll requests for further information or for permission to reproduce any portions of the Materials in addition to the permission granted above should be directed to:<\/p>\n<p><u><a href=\"mailto:Webmaster@CyberArk.com\">Webmaster@CyberArk.com<\/a><\/u>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero-noimg dark&#8221;][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;column-1&#8243;][vc_column_text] Website Terms and Conditions [\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad&#8221;][vc_column width=&#8221;5\/6&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_column_text css=&#8221;&#8221;]The following terms and conditions govern your use of any site owned and operated by CyberArk\u00ae Software Ltd. and&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27776],"class_list":["post-179454","page","type-page","status-publish","hentry","product_category-identity-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Website Terms and Conditions | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/ko\/terms-conditions\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Website Terms and Conditions\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero-noimg dark&#8221;][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;column-1&#8243;][vc_column_text] Website Terms and Conditions [\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad&#8221;][vc_column width=&#8221;5\/6&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_column_text css=&#8221;&#8221;]The following terms and conditions govern your use of any site owned and operated by CyberArk\u00ae Software Ltd. and...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/ko\/terms-conditions\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-06T06:36:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"8\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/ko\/terms-conditions\/\",\"url\":\"https:\/\/www.cyberark.com\/ko\/terms-conditions\/\",\"name\":\"Website Terms and Conditions | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"datePublished\":\"2017-06-22T13:39:11+00:00\",\"dateModified\":\"2025-03-06T06:36:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/ko\/terms-conditions\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/ko\/terms-conditions\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/ko\/terms-conditions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Website Terms and Conditions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Website Terms and Conditions | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/ko\/terms-conditions\/","og_locale":"ko_KR","og_type":"article","og_title":"Website Terms and Conditions","og_description":"[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero-noimg dark&#8221;][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;column-1&#8243;][vc_column_text] Website Terms and Conditions [\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad&#8221;][vc_column width=&#8221;5\/6&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_column_text css=&#8221;&#8221;]The following terms and conditions govern your use of any site owned and operated by CyberArk\u00ae Software Ltd. and...","og_url":"https:\/\/www.cyberark.com\/ko\/terms-conditions\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-03-06T06:36:38+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"8\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/ko\/terms-conditions\/","url":"https:\/\/www.cyberark.com\/ko\/terms-conditions\/","name":"Website Terms and Conditions | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"datePublished":"2017-06-22T13:39:11+00:00","dateModified":"2025-03-06T06:36:38+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/ko\/terms-conditions\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/ko\/terms-conditions\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/ko\/terms-conditions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Website Terms and Conditions"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/pages\/179454","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/comments?post=179454"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/pages\/179454\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/media?parent=179454"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/product_category?post=179454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}