{"id":182559,"date":"2023-09-15T14:38:56","date_gmt":"2023-09-15T18:38:56","guid":{"rendered":"https:\/\/www.cyberark.com\/%e5%ae%89%e5%85%a8%e8%ba%ab%e4%bb%bd\/"},"modified":"2025-04-29T03:52:22","modified_gmt":"2025-04-29T07:52:22","slug":"secureidentities","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/zh-hans\/secureidentities\/","title":{"rendered":"\u4fdd\u62a4\u8eab\u4efd"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 hero dark&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243; offset=&#8221;vc_col-md-6&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h1>\u5229\u7528 Intelligent Privilege Controls\u2122 \u4fdd\u62a4\u6bcf\u4e2a\u8eab\u4efd<\/h1>\n<p><\/p>\n<h2>\u5728\u8fd9\u4e2a\u5b89\u5168\u7684\u65b0\u65f6\u4ee3\uff0c\u4fdd\u62a4\u4f01\u4e1a\u7684\u552f\u4e00\u65b9\u6cd5\u662f\u4fdd\u62a4\u6bcf\u4e2a\u8eab\u4efd\u3002\u200b<\/h2>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-2&#8243;][vc_column_text css=&#8221;&#8221;]    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_afgvh3zsms videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        [\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 v3 cybv2-pad overview-vt&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;head-box&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>\u6bcf\u4e2a\u8eab\u4efd\u3002\u6bcf\u5929\u3002\u6bcf\u4e2a\u4f01\u4e1a\u3002<\/h3>\n<p>CyberArk \u8ba9\u60a8\u80fd\u591f\u5229\u7528 Intelligent Privilege Controls\u2122 \u4fdd\u62a4\u6240\u6709\u7528\u6237\uff0c\u5305\u62ec\u8d22\u52a1\u548c\u4eba\u529b\u8d44\u6e90\u5458\u5de5\uff0c\u5728\u4e91\u7aef\u6784\u5efa\u9762\u5411\u5ba2\u6237\u7684\u5e94\u7528\u7684\u5f00\u53d1\u4eba\u5458\uff0c\u7ef4\u62a4\u4e1a\u52a1\u5173\u952e\u7cfb\u7edf\u7684 IT \u7ba1\u7406\u5458\uff0c\u4ee5\u53ca\u65e0\u6570\u7684\u8ba1\u7b97\u673a\u8eab\u4efd\u3002<\/p>\n<p>\u51ed\u501f\u5bf9\u6bcf\u4e2a\u7528\u6237\u5e94\u7528\u9ad8\u7ea7\u8eab\u4efd\u5b89\u5168\u63a7\u5236\u7684\u80fd\u529b\uff0c\u60a8\u53ef\u4ee5\u6839\u636e\u9700\u8981\u4ece\u7aef\u70b9\u5230\u4e91\u7aef\u81ea\u4e3b\u6388\u4e88\u548c\u64a4\u9500\u6743\u9650\uff0c\u5e76\u786e\u4fdd\u53ea\u6709\u6b63\u786e\u7684\u7528\u6237\u53ef\u4ee5\u5728\u6b63\u786e\u7684\u65f6\u95f4\u8bbf\u95ee\u6b63\u786e\u7684\u4fe1\u606f\u3002[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_single_image image=&#8221;196749&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2-pad-btm&#8221;][vc_column width=&#8221;5\/6&#8243; el_class=&#8221;text-md-center heading pb-12&#8243; offset=&#8221;vc_col-md-offset-1 vc_col-sm-offset-1&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h2>\u5728\u4e0d\u5f71\u54cd\u7528\u6237\u4f53\u9a8c\u7684\u60c5\u51b5\u4e0b\u63d0\u9ad8\u5b89\u5168\u6027\u3002<\/h2>\n<p><\/p>\n<h5>\u968f\u7740 IT \u73af\u5883\u548c\u653b\u51fb\u65b9\u6cd5\u7684\u53d1\u5c55\uff0cCyberArk \u7684\u667a\u80fd\u7279\u6743\u63a7\u5236\u53ef\u4fdd\u62a4\u6240\u6709\u7c7b\u578b\u7684\u8eab\u4efd\uff0c\u65e0\u8bba\u60a8\u9762\u4e34\u4ec0\u4e48\u60c5\u51b5\uff0c\u90fd\u80fd\u786e\u4fdd\u60a8\u548c\u60a8\u7684\u7ec4\u7ec7\u7684\u5b89\u5168\u3002\u6211\u4eec\u90fd\u80fd\u5e2e\u60a8\u641e\u5b9a\uff1a\u200b\u200b<\/h5>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box text-center mb-10&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-6&#8243;]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Get-a-Front-Row-Seat-to-Security-Innovation.svg\"><img decoding=\"async\" class=\"alignnone wp-image-196774 size-thumbnail\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Get-a-Front-Row-Seat-to-Security-Innovation.svg\" alt=\"\u5f15\u9886\u5b89\u5168\u521b\u65b0\" width=\"40px\" \/><\/a>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>\u901a\u8fc7\u51ed\u636e\u4fdd\u7ba1\u548c\u8f6e\u8f6c\uff0c\u9632\u6b62\u51ed\u636e\u76d7\u7a83<\/h4>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box text-center mb-10&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-6&#8243;]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Enable-Seamless-User-Access-icon.svg\"><img decoding=\"async\" class=\"alignnone wp-image-196765 size-thumbnail\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Enable-Seamless-User-Access-icon.svg\" alt=\"\u542f\u7528\u65e0\u7f1d\u7528\u6237\u8bbf\u95ee \" width=\"40px\" \/><\/a>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>\u5373\u65f6\u8bbf\u95ee\u548c\u96f6\u5e38\u8bbe\u7279\u6743\u200b<\/h4>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box text-center mb-10&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-6&#8243;]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg\"><img decoding=\"async\" class=\"alignnone wp-image-196783 size-thumbnail\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Flexible-Icon.svg\" alt=\"\u7075\u6d3b\" width=\"40px\" \/><\/a>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>\u901a\u8fc7\u4f1a\u8bdd\u9694\u79bb\uff0c\u9632\u8303\u6a2a\u5411\u79fb\u52a8\u200b<\/h4>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box text-center mb-10&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;pb-6&#8243;]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Endpoint.svg\"><img decoding=\"async\" class=\"alignnone wp-image-196792 size-thumbnail\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Endpoint.svg\" alt=\"\u7aef\u70b9\" width=\"40px\" \/><\/a>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>\u7aef\u70b9\u6700\u5c0f\u7279\u6743\u548c\u6301\u7eed\u8ba4\u8bc1<\/h4>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; disable_element=&#8221;yes&#8221; el_class=&#8221;cybv2 cyberark-blueprint dark&#8221;][vc_column width=&#8221;1\/4&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section3_h4&#8243;]<\/p>\n<h3>\u8be5\u4ece\u54ea\u91cc\u5f00\u59cb\u7740\u624b\uff1f<\/h3>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section3_text&#8221;]<\/p>\n<h4>\u4e0b\u8f7d\u6211\u4eec\u7684\u767d\u76ae\u4e66\u300aThe Backbone of Modern Security: Intelligent Privilege Controls\u2122 for Every Identity\u300b\uff0c\u6df1\u5165\u4e86\u89e3\u5982\u4f55\u91cd\u65b0\u8003\u8651\u8eab\u4efd\u5b89\u5168\u5e76\u4fdd\u62a4\u60a8\u7684\u7ec4\u7ec7\u6b63\u5728\u6784\u5efa\u7684\u4e00\u5207\u3002<\/h4>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_btn title=&#8221;\u4e0b\u8f7d\u767d\u76ae\u4e66&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; align=&#8221;right&#8221; css=&#8221;&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-backbone-of-modern-security-intelligent-privilege-controls-for-every-identity|title:%E4%B8%8B%E8%BD%BD%E7%99%BD%E7%9A%AE%E4%B9%A6%20|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_full_width_resource&#8221;][vc_column][vc_row_inner el_class=&#8221;new_hpstyle_section5_container&#8221;][vc_column_inner][vc_single_image image=&#8221;202059&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section5_gart_img&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section5_text1&#8243;]<\/p>\n<h4>Required reading for modern security leaders.<\/h4>\n<p>\n[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;new_hpstyle_section5_text2&#8243;]<\/p>\n<p style=\"text-align: left;\">The Identity Security Imperative is the ultimate guide for security leaders who want to sharpen their identity security strategies and build a resilient enterprise.<\/p>\n<p>\n[\/vc_column_text][vc_btn title=&#8221;Download Book&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; css=&#8221;&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Febooks%2Fthe-identity-security-imperative%3Futm_source%3Dcyberark%26utm_medium%3Dreferral%26utm_content%3Deb_the_identity_security_imperative%26utm_campaign%3Didentity_security%26cq_plac%3D%7Bplacement%7D%26cq_net%3D%7Bnetwork%7D%26cq_plt%3Dgp|title:Download%20the%20whitepaper|&#8221; el_class=&#8221;cybv2-button-solid cyb-button-hpstyle_section5&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 v3 cybv2-pad overview-vt&#8221;][vc_column width=&#8221;6\/12&#8243;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"cyb-br alignnone size-full wp-image-196801\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/neon-office.jpg\" alt=\"\u9713\u8679\u706f\u529e\u516c\u697c\" width=\"640\" height=\"350\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/neon-office.jpg 640w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/neon-office-300x164.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/neon-office-150x82.jpg 150w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243; el_class=&#8221;head-box&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>\u4e3a\u4ec0\u4e48\u9009\u62e9 CyberArk<\/h3>\n<p>CyberArk \u76f8\u4fe1\uff0c\u65e0\u8bba\u4ec0\u4e48\u884c\u4e1a\uff0c\u90fd\u53ef\u4ee5\u5728\u4e00\u4e2a\u901a\u7528\u7684\u5e73\u53f0\u4e0a\uff0c\u4ee5\u66f4\u7b80\u5355\u3001\u66f4\u9ad8\u6548\u3001\u66f4\u6709\u6548\u7684\u7f51\u7edc\u5b89\u5168\u89e3\u51b3\u65b9\u6848\u4fdd\u62a4\u6bcf\u4e2a\u8eab\u4efd\u3002\u6211\u4eec\u5f00\u521b\u4e86\u7279\u6743\u8bbf\u95ee\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\uff0c\u53ef\u4ee5\u5728\u516c\u53f8\u5185\u7684 IT \u8eab\u4efd\u8bbf\u95ee\u6700\u91cd\u8981\u7684\u8d44\u4ea7\u65f6\u5bf9\u5176\u8fdb\u884c\u4fdd\u62a4\u3002\u73b0\u5728\uff0c\u5229\u7528\u652f\u6301 CORA AI \u7684\u8eab\u4efd\u5b89\u5168\u5e73\u53f0\uff0c\u6211\u4eec\u901a\u8fc7\u65b0\u7684\u8eab\u4efd\u5b89\u5168\u65b9\u6cd5\u8ba9\u4f01\u4e1a\u80fd\u591f\u4fdd\u62a4\u91cd\u8981\u7684\u8d44\u4ea7\u3002\u200b<\/p>\n<p>CyberArk \u662f\u552f\u4e00\u4e00\u5bb6\u80fd\u591f\u8ba9\u60a8\u5728\u4e00\u4e2a\u4ee5\u5b89\u5168\u4e3a\u5148\u3001\u652f\u6301 AI \u7684\u5e73\u53f0\u4e0a\uff0c\u5229\u7528\u9002\u5f53\u7ea7\u522b\u7684\u7279\u6743\u63a7\u5236\u548c\u5373\u65f6\u8bbf\u95ee\uff0c\u6765\u4fdd\u62a4\u6240\u6709\u8eab\u4efd\u7684\u5b89\u5168\u516c\u53f8\u3002\u51e0\u5341\u5e74\u6765\uff0c\u6211\u4eec\u4e00\u76f4\u4e13\u6ce8\u4e8e\u8be5\u9886\u57df\uff0c\u62e5\u6709\u65e0\u4e0e\u4f26\u6bd4\u7684\u4e13\u4e1a\u77e5\u8bc6\uff0c\u53ef\u4ee5\u5e2e\u52a9\u60a8\u7684\u4f01\u4e1a\u52c7\u5f80\u76f4\u524d\u3002\u200b<\/p>\n<p>\u4e86\u89e3\u4e3a\u4ec0\u4e48\u9886\u5148\u7684\u4f01\u4e1a\u90fd\u4fe1\u4efb CyberArk\uff0c\u8ba9 CyberArk \u6765\u5f3a\u5236\u5b9e\u65bd\u6700\u5c0f\u7279\u6743\uff0c\u8d4b\u80fd\u6240\u6709\u8bbe\u5907\u7684\u5458\u5de5\uff0c\u4fdd\u62a4\u6240\u6709 DevOps \u7ba1\u9053\u7684\u51ed\u636e\u3002\u202f\u200b[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 hero dark&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243; offset=&#8221;vc_col-md-6&#8243;][vc_co&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-182559","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\u4fdd\u62a4\u8eab\u4efd | CyberArk<\/title>\n<meta name=\"description\" content=\"\u968f\u7740\u73af\u5883\u7684\u4e0d\u65ad\u6269\u5c55\u548c\u53d8\u5316\uff0c\u4efb\u4f55\u8bbf\u95ee\u70b9\u7684\u6bcf\u4e2a\u8eab\u4efd\u90fd\u662f\u83b7\u53d6\u7ec4\u7ec7\u6700\u5b9d\u8d35\u8d44\u6e90\u7684\u4e00\u79cd\u9014\u5f84\u3002\u6269\u5c55\u667a\u80fd\u7279\u6743\u63a7\u5236\u662f\u771f\u6b63\u786e\u4fdd\u6240\u6709\u8eab\u4efd\u5b89\u5168\u7684\u552f\u4e00\u9014\u5f84\u3002\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/secureidentities\/\" \/>\n<meta property=\"og:locale\" content=\"zh_CN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u4fdd\u62a4\u8eab\u4efd\" \/>\n<meta property=\"og:description\" content=\"\u968f\u7740\u73af\u5883\u7684\u4e0d\u65ad\u6269\u5c55\u548c\u53d8\u5316\uff0c\u4efb\u4f55\u8bbf\u95ee\u70b9\u7684\u6bcf\u4e2a\u8eab\u4efd\u90fd\u662f\u83b7\u53d6\u7ec4\u7ec7\u6700\u5b9d\u8d35\u8d44\u6e90\u7684\u4e00\u79cd\u9014\u5f84\u3002\u6269\u5c55\u667a\u80fd\u7279\u6743\u63a7\u5236\u662f\u771f\u6b63\u786e\u4fdd\u6240\u6709\u8eab\u4efd\u5b89\u5168\u7684\u552f\u4e00\u9014\u5f84\u3002\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/secureidentities\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-29T07:52:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Get-a-Front-Row-Seat-to-Security-Innovation.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 \u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/secureidentities\/\",\"url\":\"https:\/\/www.cyberark.com\/secureidentities\/\",\"name\":\"\u4fdd\u62a4\u8eab\u4efd | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/secureidentities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/secureidentities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Get-a-Front-Row-Seat-to-Security-Innovation.svg\",\"datePublished\":\"2023-09-15T18:38:56+00:00\",\"dateModified\":\"2025-04-29T07:52:22+00:00\",\"description\":\"\u968f\u7740\u73af\u5883\u7684\u4e0d\u65ad\u6269\u5c55\u548c\u53d8\u5316\uff0c\u4efb\u4f55\u8bbf\u95ee\u70b9\u7684\u6bcf\u4e2a\u8eab\u4efd\u90fd\u662f\u83b7\u53d6\u7ec4\u7ec7\u6700\u5b9d\u8d35\u8d44\u6e90\u7684\u4e00\u79cd\u9014\u5f84\u3002\u6269\u5c55\u667a\u80fd\u7279\u6743\u63a7\u5236\u662f\u771f\u6b63\u786e\u4fdd\u6240\u6709\u8eab\u4efd\u5b89\u5168\u7684\u552f\u4e00\u9014\u5f84\u3002\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/secureidentities\/#breadcrumb\"},\"inLanguage\":\"zh-CN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/secureidentities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-CN\",\"@id\":\"https:\/\/www.cyberark.com\/secureidentities\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Get-a-Front-Row-Seat-to-Security-Innovation.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Get-a-Front-Row-Seat-to-Security-Innovation.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/secureidentities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u4fdd\u62a4\u8eab\u4efd\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-CN\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-CN\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u4fdd\u62a4\u8eab\u4efd | CyberArk","description":"\u968f\u7740\u73af\u5883\u7684\u4e0d\u65ad\u6269\u5c55\u548c\u53d8\u5316\uff0c\u4efb\u4f55\u8bbf\u95ee\u70b9\u7684\u6bcf\u4e2a\u8eab\u4efd\u90fd\u662f\u83b7\u53d6\u7ec4\u7ec7\u6700\u5b9d\u8d35\u8d44\u6e90\u7684\u4e00\u79cd\u9014\u5f84\u3002\u6269\u5c55\u667a\u80fd\u7279\u6743\u63a7\u5236\u662f\u771f\u6b63\u786e\u4fdd\u6240\u6709\u8eab\u4efd\u5b89\u5168\u7684\u552f\u4e00\u9014\u5f84\u3002","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/secureidentities\/","og_locale":"zh_CN","og_type":"article","og_title":"\u4fdd\u62a4\u8eab\u4efd","og_description":"\u968f\u7740\u73af\u5883\u7684\u4e0d\u65ad\u6269\u5c55\u548c\u53d8\u5316\uff0c\u4efb\u4f55\u8bbf\u95ee\u70b9\u7684\u6bcf\u4e2a\u8eab\u4efd\u90fd\u662f\u83b7\u53d6\u7ec4\u7ec7\u6700\u5b9d\u8d35\u8d44\u6e90\u7684\u4e00\u79cd\u9014\u5f84\u3002\u6269\u5c55\u667a\u80fd\u7279\u6743\u63a7\u5236\u662f\u771f\u6b63\u786e\u4fdd\u6240\u6709\u8eab\u4efd\u5b89\u5168\u7684\u552f\u4e00\u9014\u5f84\u3002","og_url":"https:\/\/www.cyberark.com\/secureidentities\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-04-29T07:52:22+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Get-a-Front-Row-Seat-to-Security-Innovation.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4":"3 \u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/secureidentities\/","url":"https:\/\/www.cyberark.com\/secureidentities\/","name":"\u4fdd\u62a4\u8eab\u4efd | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/secureidentities\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/secureidentities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Get-a-Front-Row-Seat-to-Security-Innovation.svg","datePublished":"2023-09-15T18:38:56+00:00","dateModified":"2025-04-29T07:52:22+00:00","description":"\u968f\u7740\u73af\u5883\u7684\u4e0d\u65ad\u6269\u5c55\u548c\u53d8\u5316\uff0c\u4efb\u4f55\u8bbf\u95ee\u70b9\u7684\u6bcf\u4e2a\u8eab\u4efd\u90fd\u662f\u83b7\u53d6\u7ec4\u7ec7\u6700\u5b9d\u8d35\u8d44\u6e90\u7684\u4e00\u79cd\u9014\u5f84\u3002\u6269\u5c55\u667a\u80fd\u7279\u6743\u63a7\u5236\u662f\u771f\u6b63\u786e\u4fdd\u6240\u6709\u8eab\u4efd\u5b89\u5168\u7684\u552f\u4e00\u9014\u5f84\u3002","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/secureidentities\/#breadcrumb"},"inLanguage":"zh-CN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/secureidentities\/"]}]},{"@type":"ImageObject","inLanguage":"zh-CN","@id":"https:\/\/www.cyberark.com\/secureidentities\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Get-a-Front-Row-Seat-to-Security-Innovation.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/09\/Get-a-Front-Row-Seat-to-Security-Innovation.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/secureidentities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"\u4fdd\u62a4\u8eab\u4efd"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-CN"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"zh-CN","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/pages\/182559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/comments?post=182559"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/pages\/182559\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/media?parent=182559"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/product_category?post=182559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}