{"id":188717,"date":"2017-06-13T15:19:49","date_gmt":"2017-06-13T19:19:49","guid":{"rendered":"https:\/\/www.cyberark.com\/endpoint-privilege-manager-old\/"},"modified":"2017-06-13T15:19:49","modified_gmt":"2017-06-13T19:19:49","slug":"endpoint-privilege-manager-old","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/ko\/endpoint-privilege-manager-old\/","title":{"rendered":"Endpoint Privilege Manager"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1536587795588{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-hero.jpg?id=26605) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-hero-section&#8221;][vc_column][vc_row_inner content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-hero-header&#8221;][vc_column_inner el_class=&#8221;cyb-hero-header-text&#8221;][vc_custom_heading text=&#8221;ENDPOINT PRIVILEGE MANAGER&#8221; font_container=&#8221;tag:h1|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_custom_heading text=&#8221;Implement Least Privilege, Credential Theft Protections and Application Control at Scale.&#8221; font_container=&#8221;tag:h3|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_btn title=&#8221;DOWNLOAD EBOOK&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#ffffff&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Febooks%2F5-essential-elements-of-a-comprehensive-endpoint-security-strategy&#8221; el_class=&#8221;cyb-button large event-click&#8221; el_id=&#8221;EPM Page: Download Datasheet&#8221;][vc_btn title=&#8221;REQUEST FREE TRIAL&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#ffffff&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fproducts%2Fprivileged-account-security-solution%2Fendpoint-privilege-manager%2Fendpoint-privilege-manager-free-trial%2F|||&#8221; el_class=&#8221;cyb-button green large event-click&#8221; el_id=&#8221;EPM Page: Request Free Trial&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;cyb-center cyb-pad-top&#8221;][vc_column offset=&#8221;vc_col-md-offset-2 vc_col-md-8&#8243;][vc_column_text el_class=&#8221;cyb-ltr-spc&#8221;]<\/p>\n<h2>BENEFITS<\/h2>\n<p>Reduce the risk of unmanaged admin access on endpoints.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cyb-card-hover&#8221;][vc_column width=&#8221;1\/3&#8243; column_link=&#8221;url:https%3A%2F%2Ffast.wistia.net%2Fembed%2Fiframe%2Flq0koobnt1%3FvideoFoam%3Dtrue|||&#8221;][vc_single_image image=&#8221;95350&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; el_class=&#8221;cyb-ken-img&#8221; css=&#8221;.vc_custom_1593710537314{padding-bottom: 1.5625px !important;}&#8221;][vc_column_text]<\/p>\n<h3>FOR SECURITY<\/h3>\n<p>Implement least privilege to contain malware and other threats by ensuring that Windows and Mac users operate with just the permissions they need and no more.[\/vc_column_text][vc_column_text]LEARN MORE &gt;[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresource%2Fsecuring-privilege-and-containing-attacks-on-the-endpoint%2F|||&#8221;][vc_single_image image=&#8221;95173&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; el_class=&#8221;cyb-ken-img border-top&#8221;][vc_column_text]<\/p>\n<h3>FOR OPERATIONS<\/h3>\n<p>Improve endpoint stability and reduce the cost of unmanaged admin access with minimal end-user friction.[\/vc_column_text][vc_column_text]LEARN MORE &gt;[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; column_link=&#8221;url:https%3A%2F%2Ffast.wistia.net%2Fembed%2Fiframe%2Fbhwe3t5ct0%3FvideoFoam%3Dtrue||target:%20_blank|&#8221;][vc_single_image image=&#8221;26515&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; el_class=&#8221;cyb-ken-img border-top&#8221;][vc_column_text]<\/p>\n<h3>FOR COMPLIANCE<\/h3>\n<p>Meet internal policy and regulatory requirements with comprehensive reporting and a searchable audit trail of permission elevations.[\/vc_column_text][vc_column_text]LEARN MORE &gt;[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-pad&#8221; css=&#8221;.vc_custom_1588344085836{background-color: #f1f2f2 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_raw_html]JTVCd2lzdGlhX3ZpZGVvJTIwaWQlM0QlMjJiaHdlM3Q1Y3QwJTIyJTVE[\/vc_raw_html][\/vc_column][vc_column width=&#8221;1\/3&#8243; offset=&#8221;vc_col-sm-offset-1&#8243; el_class=&#8221;cyb-subpad cyb-center-mobile&#8221;][vc_column_text css=&#8221;.vc_custom_1588618290918{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;}&#8221;]<\/p>\n<h3>SECURING PRIVILEGE AND CONTAINING ATTACKS ON THE ENDPOINT<\/h3>\n<p>Enforcing privilege security on the endpoint is a fundamental part of your security program, but doing so can impact user and helpdesk productivity. This short video demonstrates how CyberArk Endpoint Privilege Manager helps remove this barrier, adding a critical protection layer to strengthen your existing endpoint security and allowing you to contain attacks at the endpoint.[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1563218967296{padding-top: 2.5rem !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;FEATURES: ENDPOINT PRIVILEGE MANAGER&#8221; font_container=&#8221;tag:h2|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Lock down privilege on the endpoint and prevent lateral movement.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_tta_accordion style=&#8221;flat&#8221; shape=&#8221;square&#8221; color=&#8221;white&#8221; c_icon=&#8221;chevron&#8221; c_position=&#8221;right&#8221; active_section=&#8221;100&#8243; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;LEAST PRIVILEGE&#8221; tab_id=&#8221;least-privilege&#8221; sub_head=&#8221;Strike the balance between security and productivity by removing and managing local admin rights on Windows and Mac systems. Prevent lateral movement by enforcing Application Control.&#8221;][vc_column_text]Endpoint Privilege Manager is designed to prevent attacks that start at the endpoint by removing local admin rights while at the same time keeping end users productive. Just-in-time elevation and access can be provided on a by-request basis for a predefined period with a full audit of the privileged activities.<\/p>\n<p>Application Control reduces configuration drift on endpoints with minimal impact toend-users. IT operations and security teams can allow approved applications to run while restricting the unapproved ones. Unknown applications can run in \u2018Restricted Mode,\u2019 which prevents them from accessing corporate resources, sensitive data, or the Internet. For additional analysis, these applications can be sent to Endpoint Privilege Manager\u2019s cloud-based application analysis service, which leverages data feeds from Checkpoint, FireEye, Palo Alto Network, and others.<\/p>\n<p>Endpoint Privilege Manager protects against unknown threats that take advantage of unmanaged local admin access. In addition, it adds another layer of security while reducing help desk calls from end-users.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;PRIVILEGE DEFENSE&#8221; tab_id=&#8221;privilege-defense&#8221; sub_head=&#8221;Stop Ransomware with a solution that has been proven to be 100% effective. And prevent attacks with credential theft and privileged deception capabilities for Windows workstations and servers.&#8221;][vc_column_text]Ransomware penetrates organizations in multiple ways, so fighting it requires more than a single layer of security. Endpoint Privilege Manager provides the ability to detect ransomware with certainty and respond before the attack can cause damage. Based on testing by CyberArk Labs, the removal of local administrator rights combined with application control was 100 percent effective in preventing ransomware from encrypting files.<\/p>\n<p>In addition, Endpoint Privilege Manager\u2019s advanced credential theft capabilities for Windows systems helps organizations detect and block attempted theft of Windows credentials and those stored by popular web browsers and file cache credential stores.<\/p>\n<p>Privilege Deception enables defenders to quickly detect and proactively shut down in-progress attacks by placing deception components, such as local admin deceptive accounts or fake passwords lure, directly in the attack path for Windows workstations and server.<\/p>\n<p>Endpoint Privilege Manager breaks the attack chain at the initial point of entry by stopping Ransomware, mitigate the exploitation of privileged credentials, and reduce dwell time.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;INTEGRATIONS&#8221; tab_id=&#8221;integrations&#8221; sub_head=&#8221;Integrate seamlessly with your existing security and IT management solutions to provide the best protection for your workforce \u2014 secure, easy, robust.&#8221;][vc_column_text]Existing CyberArk Core Privileged Access Security and Privilege Cloud customers can leverage Endpoint Privilege Manager\u2019s loosely connected devices capability to vault and rotate passwords for workstations that connect infrequently to the corporate network, which is becoming increasingly more common with the push to remote work.<\/p>\n<p>Endpoint Privilege Manager also has pre-built integrations with over eight security vendors, including threat intelligence feeds, asset data, and other indicators of endpoint security health.<\/p>\n<p>Integrations are also available with additional security vendors via the CyberArk Marketplace. For example, Endpoint Privilege Manager\u2019s integration with Palo Alto WildFire offers the ability to analyze suspicious files by using cloud-based malware detection to identify unknown threats and produce a report about the file contents, including details of potentially malicious behavior. Endpoint Privilege Manager also integrates with Forescout, to provide out-of-the-box functionality to identify if Endpoint Privilege Manager has been installed or not or to start a disabled agent.<\/p>\n<p>Organizations can also leverage Endpoint Privilege Manager\u2019s advanced REST API capabilities to integrate with IT and help desk systems such as ServiceNow.<\/p>\n<p>Explore our existing plug-ins, product add-ons, and other integrations at the <a href=\"https:\/\/cyberark-customers.force.com\/mplace\/s\/#---CyberArk_Solution__c-LeastPrivilegesEnforcement\" target=\"_blank\" rel=\"noopener noreferrer\">CyberArk\u2019s marketplace<\/a>.[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1574805379030{background-color: #f1f2f2 !important;}&#8221;][vc_column css=&#8221;.vc_custom_1588355390480{padding-top: 2rem !important;padding-bottom: 1.25rem !important;}&#8221;][vc_column_text el_class=&#8221;cyb-center cyb-subpad-btm&#8221;]<\/p>\n<h2>SEE WHAT OUR CUSTOMERS HAVE TO SAY<\/h2>\n<p>[\/vc_column_text][vc_tta_pageable no_fill_content_area=&#8221;1&#8243; autoplay=&#8221;10&#8243; active_section=&#8221;1&#8243; pagination_color=&#8221;blue&#8221; el_class=&#8221;peer-reviews&#8221;][vc_tta_section title=&#8221;Section 1&#8243; tab_id=&#8221;1574702846345-d5fb6c55-8902&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-reverse&#8221;][vc_column_inner el_class=&#8221;cyb-subpad&#8221; width=&#8221;5\/12&#8243;][vc_column_text]<\/p>\n<h3>GLOBAL 2000 COMPANY REDUCES RISK THROUGH OPERATIONAL EFFICIENCY<\/h3>\n<p>Learn how EPM helps with the adoption of security policies through operational efficiency in a Global 2000 company.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_raw_html]JTVCd2lzdGlhX3ZpZGVvJTIwaWQlM0QlMjIyb3picGh0cm1hJTIyJTVE[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Section 1&#8243; tab_id=&#8221;1588355682827-efe44833-16a7&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-reverse&#8221;][vc_column_inner el_class=&#8221;cyb-submargin&#8221; width=&#8221;5\/12&#8243;][vc_custom_heading text=&#8221;We needed to critically address three security requirements from a global perspective: least privilege, patch management and application control; CyberArk covers two of these for us very nicely&#8230;having CyberArk Endpoint Privilege Manager takes away most of the guesswork for the \u2018can I install, should I install this, is this ok?\u2019 kind of questions and it allows us to have a more secure environment.&#8221; font_container=&#8221;tag:h3|font_size:1.625rem|text_align:left|line_height:1.9375rem&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc-6 blockquote&#8221;][vc_column_text css=&#8221;.vc_custom_1588620361298{padding-bottom: 1.25rem !important;}&#8221;]<strong>Laura Melton<\/strong>\u00a0\u2013 Senior Information Technology Associate, College of Architecture, Texas A&amp;M University[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;cyb-subpad&#8221; width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_raw_html]JTVCd2lzdGlhX3ZpZGVvJTIwaWQlM0QlMjJrNmtzYXhqOXlhJTIyJTVE[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_pageable][\/vc_column][\/vc_row][vc_row][vc_column css=&#8221;.vc_custom_1536613375372{padding-top: 2rem !important;padding-bottom: 0.5rem !important;}&#8221;][vc_custom_heading text=&#8221;THE ENDPOINT SECURITY PUZZLE&#8221; font_container=&#8221;tag:h2|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc&#8221; css=&#8221;.vc_custom_1536606553935{margin-bottom: 0.5rem !important;}&#8221;][vc_custom_heading text=&#8221;Where does Privilege Management fit in?&#8221; font_container=&#8221;tag:p|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;.vc_custom_1536606668346{padding-bottom: 1.75rem !important;}&#8221;][vc_column_text el_class=&#8221;cyb-center&#8221;]<img decoding=\"async\" class=\"alignnone size-full wp-image-26615\" style=\"width: 39.8125rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-endpoint-graphic.svg\" alt=\"\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cyb-margin&#8221;][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1536600696186{padding-bottom: 2.5rem !important;}&#8221;][vc_row_inner css=&#8221;.vc_custom_1536607864323{margin-right: 0px !important;margin-left: 0px !important;}&#8221;][vc_column_inner][vc_column_text css=&#8221;.vc_custom_1563215137343{padding-top: 2rem !important;}&#8221; el_class=&#8221;cyb-fxd-hgt-142 cyb-center&#8221;]<img decoding=\"async\" class=\"alignnone size-full wp-image-70646\" style=\"width: 4.375rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/07\/icon-cube-grey.svg\" alt=\"\" \/>[\/vc_column_text][vc_custom_heading text=&#8221;ENDPOINT DETECTION &amp; RESPONSE&#8221; font_container=&#8221;tag:h4|text_align:center|line_height:1.625rem&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc-4&#8243; css=&#8221;.vc_custom_1563215243910{margin-bottom: 0.5rem !important;}&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Detect and respond to advanced active attacks on endpoints.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1536600691036{padding-bottom: 2.5rem !important;}&#8221;][vc_row_inner css=&#8221;.vc_custom_1536613127131{margin-right: 0px !important;margin-left: 0px !important;}&#8221;][vc_column_inner][vc_column_text css=&#8221;.vc_custom_1563215375937{padding-top: 2rem !important;}&#8221; el_class=&#8221;cyb-fxd-hgt-142 cyb-center&#8221;]<img decoding=\"async\" class=\"alignnone size-full wp-image-70655\" style=\"width: 4.375rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/07\/icon-cube-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_custom_heading text=&#8221;ANTIVIRUS\/NGAV&#8221; font_container=&#8221;tag:h4|text_align:center|line_height:1.625rem&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc-4&#8243; css=&#8221;.vc_custom_1563215470116{margin-bottom: 0.5rem !important;}&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Prevent malware infection using a variety of techniques.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1536600701879{padding-bottom: 2.5rem !important;}&#8221;][vc_row_inner css=&#8221;.vc_custom_1536613168024{margin-right: 0px !important;margin-left: 0px !important;}&#8221;][vc_column_inner][vc_column_text css=&#8221;.vc_custom_1563215580172{padding-top: 2rem !important;}&#8221; el_class=&#8221;cyb-fxd-hgt-142 cyb-center&#8221;]<img decoding=\"async\" class=\"alignnone size-full wp-image-70664\" style=\"width: 4.375rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/07\/icon-cube-blue.svg\" alt=\"\" \/>[\/vc_column_text][vc_custom_heading text=&#8221;PRIVILEGE MANAGEMENT&#8221; font_container=&#8221;tag:h4|text_align:center|line_height:1.625rem&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc-4&#8243; css=&#8221;.vc_custom_1563216336057{margin-bottom: 0.5rem !important;}&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Manage local administrator rights while maintaining user productivity.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cyb-margin&#8221;][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1563215625250{padding-bottom: 2.5rem !important;}&#8221; offset=&#8221;vc_col-sm-offset-2&#8243;][vc_row_inner css=&#8221;.vc_custom_1536607864323{margin-right: 0px !important;margin-left: 0px !important;}&#8221;][vc_column_inner][vc_column_text css=&#8221;.vc_custom_1563215798499{padding-top: 2rem !important;}&#8221; el_class=&#8221;cyb-fxd-hgt-142 cyb-center&#8221;]<img decoding=\"async\" class=\"alignnone size-full wp-image-70673\" style=\"width: 4.375rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/07\/icon-cube-green.svg\" alt=\"\" \/>[\/vc_column_text][vc_custom_heading text=&#8221;APPLICATION PATCHING&#8221; font_container=&#8221;tag:h4|text_align:center|line_height:1.625rem&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc-4&#8243; css=&#8221;.vc_custom_1563215823434{margin-bottom: 0.5rem !important;}&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Apply application updates to address security issues.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1536600691036{padding-bottom: 2.5rem !important;}&#8221;][vc_row_inner css=&#8221;.vc_custom_1536613127131{margin-right: 0px !important;margin-left: 0px !important;}&#8221;][vc_column_inner][vc_column_text css=&#8221;.vc_custom_1563216215789{padding-top: 2rem !important;}&#8221; el_class=&#8221;cyb-fxd-hgt-142 cyb-center&#8221;]<img decoding=\"async\" class=\"alignnone size-full wp-image-70682\" style=\"width: 4.375rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/07\/icon-cube-yellow.svg\" alt=\"\" \/>[\/vc_column_text][vc_custom_heading text=&#8221;OS PATCHING&#8221; font_container=&#8221;tag:h4|text_align:center|line_height:1.625rem&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc-4&#8243; css=&#8221;.vc_custom_1563216238017{margin-bottom: 0.5rem !important;}&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Provides OS level security bug fixes.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cyb-center cyb-pad&#8221; css=&#8221;.vc_custom_1598623554823{background-color: #f1f2f2 !important;}&#8221;][vc_column][vc_column_text]<\/p>\n<h2>FLEXIBLE DEPLOYMENT<\/h2>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;cyb-center&#8221; css=&#8221;.vc_custom_1598973801847{padding-top: 1.75rem !important;padding-bottom: 2.875rem !important;padding-left: 1.375rem !important;}&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-98270\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/EPM-Graphic-V2-transparent.png\" alt=\"\" width=\"700\" height=\"793\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/EPM-Graphic-V2-transparent.png 1188w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/EPM-Graphic-V2-transparent-265x300.png 265w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/EPM-Graphic-V2-transparent-904x1024.png 904w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/EPM-Graphic-V2-transparent-768x869.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/09\/EPM-Graphic-V2-transparent-150x170.png 150w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column css=&#8221;.vc_custom_1536673593882{padding-top: 1.25rem !important;padding-bottom: 0.5rem !important;}&#8221;][vc_custom_heading text=&#8221;FLEXIBLE DEPLOYMENT OPTIONS&#8221; font_container=&#8221;tag:h2|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc&#8221; css=&#8221;.vc_custom_1536673675851{margin-bottom: 0.5rem !important;padding-bottom: 1.5625rem !important;}&#8221;][vc_tta_tabs style=&#8221;outline&#8221; shape=&#8221;square&#8221; spacing=&#8221;&#8221; alignment=&#8221;center&#8221; active_section=&#8221;1&#8243; no_fill_content_area=&#8221;true&#8221; el_class=&#8221;cyb-epm-tab&#8221;][vc_tta_section title=&#8221;ON-PREMISE&#8221; tab_id=&#8221;1598622543236-a875e90d-708e&#8221;][vc_column_text el_class=&#8221;cyb-center&#8221; css=&#8221;.vc_custom_1536674095813{padding-top: 1.75rem !important;padding-bottom: 2.875rem !important;padding-left: 1.375rem !important;}&#8221;]<img decoding=\"async\" class=\"alignnone size-full wp-image-26631\" style=\"width: 39.625rem; height: 38.125rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-deploy-graphic.svg\" alt=\"\" \/>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;SaaS&#8221; tab_id=&#8221;1598622543281-bb77af0c-89f0&#8243;][vc_column_text el_class=&#8221;cyb-center&#8221; css=&#8221;.vc_custom_1536674087589{padding-top: 1.75rem !important;padding-bottom: 2.875rem !important;}&#8221;]<img decoding=\"async\" class=\"alignnone size-full wp-image-26633\" style=\"width: 35.125rem; height: 38.125rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-deploy-sass-graphic.svg\" alt=\"\" \/>[\/vc_column_text][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; parallax=&#8221;content-moving&#8221; parallax_speed_bg=&#8221;1.6&#8243; css=&#8221;.vc_custom_1565205065173{padding-top: 5.625rem !important;padding-bottom: 5.625rem !important;background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/08\/marketplace.jpg?id=26455) !important;background-position: center;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-min-hgt-620&#8243;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1565205076548{padding-top: 2.5rem !important;padding-right: 10% !important;padding-bottom: 2.5rem !important;padding-left: 10% !important;background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/11\/blue-graphic.png?id=30217) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; offset=&#8221;vc_col-sm-offset-6&#8243;][vc_custom_heading text=&#8221;MARKETPLACE&#8221; font_container=&#8221;tag:h3|text_align:left|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc-4&#8243; css=&#8221;.vc_custom_1534274649060{padding-bottom: 0.3125rem !important;}&#8221;][vc_custom_heading text=&#8221;Extend secure privileged access across your entire enterprise with integrations from CyberArk and our partners.&#8221; font_container=&#8221;tag:h3|text_align:left|color:%23ffffff|line_height:1.875rem&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc-1-4 light&#8221; css=&#8221;.vc_custom_1534274655933{padding-bottom: 0.9375rem !important;}&#8221;][vc_btn title=&#8221;EXPLORE MARKETPLACE&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#ffffff&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fcyberark-customers.force.com%2Fmplace%2Fs%2F|||&#8221; el_class=&#8221;cyb-button white&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1557429496033{padding-top: 2.5rem !important;}&#8221;][vc_column css=&#8221;.vc_custom_1557496295891{padding-bottom: 1.4375rem !important;}&#8221; el_class=&#8221;cyb-center&#8221;][vc_column_text]<\/p>\n<h2>SAAS FROM THE MARKET LEADER<\/h2>\n<p>Leverage the extensive experience of CyberArk in both privileged access management and SaaS to quickly secure your ever-evolving business.[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; content_placement=&#8221;bottom&#8221; css=&#8221;.vc_custom_1579899779493{padding-bottom: 1.5rem !important;}&#8221; el_class=&#8221;cyb-center&#8221;][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1586265438614{margin-top: 10px !important;margin-right: 10px !important;margin-bottom: 10px !important;margin-left: 10px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 1.375rem !important;padding-bottom: 1.375rem !important;border-left-color: #d0d2d3 !important;border-left-style: solid !important;border-right-color: #d0d2d3 !important;border-right-style: solid !important;border-top-color: #d0d2d3 !important;border-top-style: solid !important;border-bottom-color: #d0d2d3 !important;border-bottom-style: solid !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1581371272671{padding-bottom: 10px !important;}&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"359\" height=\"357\" class=\"alignnone size-full wp-image-85470\" style=\"width: 9.375rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/02\/logo-soc.png\" alt=\"\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/02\/logo-soc.png 359w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/02\/logo-soc-300x298.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/02\/logo-soc-150x150.png 150w\" sizes=\"auto, (max-width: 359px) 100vw, 359px\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h5>SOC 2 COMPLIANT<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1581369982186{margin-top: 10px !important;margin-right: 10px !important;margin-bottom: 10px !important;margin-left: 10px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 1.375rem !important;padding-bottom: 1.375rem !important;border-left-color: #d0d2d3 !important;border-left-style: solid !important;border-right-color: #d0d2d3 !important;border-right-style: solid !important;border-top-color: #d0d2d3 !important;border-top-style: solid !important;border-bottom-color: #d0d2d3 !important;border-bottom-style: solid !important;}&#8221; offset=&#8221;vc_col-sm-offset-0&#8243;][vc_column_text css=&#8221;.vc_custom_1581429524393{padding-bottom: 2.5rem !important;}&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-49828\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/04\/SC-Logo-v2.png\" alt=\"\" width=\"224\" height=\"73\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/04\/SC-Logo-v2.png 224w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/04\/SC-Logo-v2-150x49.png 150w\" sizes=\"auto, (max-width: 224px) 100vw, 224px\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h5>FOR BEST ENTERPRISE SECURITY SOLUTION<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1579899808670{margin-top: 10px !important;margin-right: 10px !important;margin-bottom: 10px !important;margin-left: 10px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 1.375rem !important;padding-bottom: 1.375rem !important;border-left-color: #d0d2d3 !important;border-left-style: solid !important;border-right-color: #d0d2d3 !important;border-right-style: solid !important;border-top-color: #d0d2d3 !important;border-top-style: solid !important;border-bottom-color: #d0d2d3 !important;border-bottom-style: solid !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1581429535026{padding-bottom: 1.375rem !important;}&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-49846\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/04\/Cyber-Defense-2019-v2.png\" alt=\"\" width=\"155\" height=\"129\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/04\/Cyber-Defense-2019-v2.png 155w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/04\/Cyber-Defense-2019-v2-150x125.png 150w\" sizes=\"auto, (max-width: 155px) 100vw, 155px\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h5>FOR PRIVILEGED ACCOUNT SECURITY<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1586265452006{margin-top: 10px !important;margin-right: 10px !important;margin-bottom: 10px !important;margin-left: 10px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 1.375rem !important;padding-bottom: 1.375rem !important;border-left-color: #d0d2d3 !important;border-left-style: solid !important;border-right-color: #d0d2d3 !important;border-right-style: solid !important;border-top-color: #d0d2d3 !important;border-top-style: solid !important;border-bottom-color: #d0d2d3 !important;border-bottom-style: solid !important;}&#8221; offset=&#8221;vc_col-sm-offset-2&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"634\" class=\"alignnone size-full wp-image-68394\" style=\"width: 9.375rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/06\/CyberSecurityAward-2019.jpg\" alt=\"\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/06\/CyberSecurityAward-2019.jpg 600w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/06\/CyberSecurityAward-2019-284x300.jpg 284w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/06\/CyberSecurityAward-2019-150x159.jpg 150w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1579899825763{margin-top: 10px !important;margin-right: 10px !important;margin-bottom: 10px !important;margin-left: 10px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 1.375rem !important;padding-bottom: 1.375rem !important;border-left-color: #d0d2d3 !important;border-left-style: solid !important;border-right-color: #d0d2d3 !important;border-right-style: solid !important;border-top-color: #d0d2d3 !important;border-top-style: solid !important;border-bottom-color: #d0d2d3 !important;border-bottom-style: solid !important;}&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"162\" height=\"225\" class=\"size-full wp-image-37853 aligncenter\" style=\"width: 6.875rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/03\/WINNER_gold_2019.png\" alt=\"\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/03\/WINNER_gold_2019.png 162w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/03\/WINNER_gold_2019-150x208.png 150w\" sizes=\"auto, (max-width: 162px) 100vw, 162px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1534867652115{padding-top: 2rem !important;background-color: #f1f2f2 !important;}&#8221;][vc_column width=&#8221;1\/12&#8243;][\/vc_column][vc_column width=&#8221;5\/6&#8243; css=&#8221;.vc_custom_1534353344275{padding-bottom: 1.25rem !important;}&#8221;][vc_custom_heading text=&#8221;RESOURCES&#8221; font_container=&#8221;tag:h2|text_align:center|color:%23414042&#8243; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc-6&#8243;][\/vc_column][vc_column width=&#8221;1\/12&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1595432169439{background-color: #f1f2f2 !important;}&#8221;][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1537979261232{background-color: #f1f2f2 !important;}&#8221;][vc_column css=&#8221;.vc_custom_1537546542206{padding-bottom: 3.125rem !important;}&#8221; el_class=&#8221;cyb-center&#8221;][vc_btn title=&#8221;MORE RESOURCES&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#414042&#8243; shape=&#8221;square&#8221; link=&#8221;url:%2Fresources%2F|||&#8221; el_class=&#8221;cyb-button&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1534869861269{padding-top: 2rem !important;}&#8221;][vc_column width=&#8221;1\/12&#8243;][\/vc_column][vc_column width=&#8221;5\/6&#8243; css=&#8221;.vc_custom_1534353344275{padding-bottom: 1.25rem !important;}&#8221;][vc_custom_heading text=&#8221;REQUEST A LIVE DEMO&#8221; font_container=&#8221;tag:h2|text_align:center|color:%23414042&#8243; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc-6&#8243;][\/vc_column][vc_column width=&#8221;1\/12&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1534881520756{padding-bottom: 2.5rem !important;}&#8221;][vc_column][vc_raw_html]JTVCcmVxdWVzdF9kZW1vJTVE[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1536587795588{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-hero.jpg?id=26605) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-hero-section&#8221;][vc_column][vc_row_inner content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-hero-header&#8221;][vc_column_inner el_class=&#8221;cyb-hero-header-text&#8221;][vc_custom_heading text=&#8221;ENDPOINT PRIVILEGE MANAGER&#8221; font_container=&#8221;tag:h1|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_custom_heading text=&#8221;Implement Least Privilege, Credential Theft Protections and Application Control at Scale.&#8221; font_container=&#8221;tag:h3|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_btn title=&#8221;DOWNLOAD&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-188717","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Endpoint Privilege Manager | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/ko\/endpoint-privilege-manager-old\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Endpoint Privilege Manager\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1536587795588{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-hero.jpg?id=26605) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-hero-section&#8221;][vc_column][vc_row_inner content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-hero-header&#8221;][vc_column_inner el_class=&#8221;cyb-hero-header-text&#8221;][vc_custom_heading text=&#8221;ENDPOINT PRIVILEGE MANAGER&#8221; font_container=&#8221;tag:h1|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_custom_heading text=&#8221;Implement Least Privilege, Credential Theft Protections and Application Control at Scale.&#8221; font_container=&#8221;tag:h3|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_btn title=&#8221;DOWNLOAD...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/ko\/endpoint-privilege-manager-old\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-endpoint-graphic.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"17\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/ko\/endpoint-privilege-manager-old\/\",\"url\":\"https:\/\/www.cyberark.com\/ko\/endpoint-privilege-manager-old\/\",\"name\":\"Endpoint Privilege Manager | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/ko\/endpoint-privilege-manager-old\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/ko\/endpoint-privilege-manager-old\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-endpoint-graphic.svg\",\"datePublished\":\"2017-06-13T19:19:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/ko\/endpoint-privilege-manager-old\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/ko\/endpoint-privilege-manager-old\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.cyberark.com\/ko\/endpoint-privilege-manager-old\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-endpoint-graphic.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-endpoint-graphic.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/ko\/endpoint-privilege-manager-old\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Endpoint Privilege Manager\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Endpoint Privilege Manager | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/ko\/endpoint-privilege-manager-old\/","og_locale":"ko_KR","og_type":"article","og_title":"Endpoint Privilege Manager","og_description":"[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1536587795588{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-hero.jpg?id=26605) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-hero-section&#8221;][vc_column][vc_row_inner content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-hero-header&#8221;][vc_column_inner el_class=&#8221;cyb-hero-header-text&#8221;][vc_custom_heading text=&#8221;ENDPOINT PRIVILEGE MANAGER&#8221; font_container=&#8221;tag:h1|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_custom_heading text=&#8221;Implement Least Privilege, Credential Theft Protections and Application Control at Scale.&#8221; font_container=&#8221;tag:h3|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_btn title=&#8221;DOWNLOAD...","og_url":"https:\/\/www.cyberark.com\/ko\/endpoint-privilege-manager-old\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-endpoint-graphic.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"17\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/ko\/endpoint-privilege-manager-old\/","url":"https:\/\/www.cyberark.com\/ko\/endpoint-privilege-manager-old\/","name":"Endpoint Privilege Manager | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/ko\/endpoint-privilege-manager-old\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/ko\/endpoint-privilege-manager-old\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-endpoint-graphic.svg","datePublished":"2017-06-13T19:19:49+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/ko\/endpoint-privilege-manager-old\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/ko\/endpoint-privilege-manager-old\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.cyberark.com\/ko\/endpoint-privilege-manager-old\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-endpoint-graphic.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/epm-endpoint-graphic.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/ko\/endpoint-privilege-manager-old\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Endpoint Privilege Manager"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/pages\/188717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/comments?post=188717"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/pages\/188717\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/media?parent=188717"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/product_category?post=188717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}