{"id":187025,"date":"2023-12-06T16:22:30","date_gmt":"2023-12-06T21:22:30","guid":{"rendered":"https:\/\/www.cyberark.com\/solutions\/government\/"},"modified":"2025-09-22T14:35:08","modified_gmt":"2025-09-22T18:35:08","slug":"government","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/zh-hans\/solutions\/government\/","title":{"rendered":"\u653f\u5e9c"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 int-hero-noimg blue-gradient&#8221;][vc_column width=&#8221;5\/6&#8243; el_class=&#8221;column-1&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h1>\u5728\u5404\u7ea7\u653f\u5e9c\u4fdd\u62a4\u8eab\u4efd\u4fe1\u606f<\/h1>\n<p><\/p>\n<h2>\u786e\u4fdd\u4efb\u4f55\u8bbe\u5907\u4e0a\u7684\u8eab\u4efd\u968f\u65f6\u968f\u5730\u90fd\u80fd\u83b7\u5f97\u5b89\u5168\u4e14\u81ea\u52a8\u5316\u7684\u8bbf\u95ee\u6743\u9650\u3002\u901a\u8fc7\u4ee5\u6548\u7387\u548c\u5408\u89c4\u6027\u4f18\u5148\u7684\u96f6\u4fe1\u4efb\u7b56\u7565\u4fdd\u62a4\u5404\u7ea7\u653f\u5e9c\u7684\u654f\u611f\u6570\u636e\u548c\u5173\u952e\u57fa\u7840\u8bbe\u65bd\u3002<\/h2>\n<p>\n[\/vc_column_text][vc_btn title=&#8221;\u7533\u8bf7\u6f14\u793a&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; custom_onclick=&#8221;true&#8221; link=&#8221;url:%23form|&#8221; el_class=&#8221;cybv2-button-transp-green&#8221; custom_onclick_code=&#8221;data-scroll-class&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/addressing-zero-trust-for-government-the-role-of-identity-security\">\u9605\u8bfb\u767d\u76ae\u4e66<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top overview-vt&#8221; css=&#8221;.vc_custom_1611617874123{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;head-box&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>\u8eab\u4efd\u5b89\u5168\uff1a\u9ad8\u6548\u5b9e\u65bd\u96f6\u4fe1\u4efb\u7684\u57fa\u77f3<\/h3>\n<p>\u901a\u8fc7\u81ea\u52a8\u5316\u7ba1\u7406\u7ba1\u7406\u4f17\u591a\u5165\u53e3\u70b9\u6240\u5e26\u6765\u7684\u5b89\u5168\u6f0f\u6d1e\uff0c\u201c\u6c38\u4e0d\u4fe1\u4efb\uff0c\u59cb\u7ec8\u9a8c\u8bc1\u201d\u539f\u5219\u5f97\u5230\u4e86\u81f3\u5173\u91cd\u8981\u7684\u652f\u6301\u3002CyberArk \u5168\u9762\u7684<a href=\"https:\/\/www.cyberark.com\/zh-hans\/products\/\">\u8eab\u4efd\u5b89\u5168\u5e73\u53f0<\/a>\u901a\u8fc7\u52a0\u5f3a\u5b89\u5168\u6001\u52bf\u548c\u7b80\u5316\u9a8c\u8bc1\u8fc7\u7a0b\u6765\u589e\u5f3a<a href=\"https:\/\/www.cyberark.com\/zh-hans\/solutions\/zero-trust\/\">\u96f6\u4fe1\u4efb<\/a> \u67b6\u6784\uff0c\u4ece\u800c\u63d0\u9ad8\u751f\u4ea7\u6548\u7387\u529b\u5e76\u51cf\u5c11\u653f\u5e9c\u8fd0\u8425\u4e2d\u7684\u9519\u8bef\u3002[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-143134\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg\" alt=\"\u98ce\u9669\" width=\"300\" height=\"259\" \/><\/a>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>\u901a\u8fc7\u4e3b\u52a8\u5b89\u5168\u81ea\u52a8\u5316\u964d\u4f4e\u98ce\u9669<\/h4>\n<p>\u81ea\u52a8\u5316\u5b89\u5168\u63aa\u65bd\u53ef\u6700\u5927\u9650\u5ea6\u5730\u964d\u4f4e\u98ce\u9669\uff0c\u63d0\u9ad8\u653f\u5e9c\u90e8\u95e8\u7684\u8fd0\u8425\u6548\u7387\u3002[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-129953\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/4_Secretsicon-01.svg\" alt=\"\u53c2\u4e0e\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>\u901a\u8fc7\u4f18\u5316\u8eab\u4efd\u63a7\u5236\u904f\u5236\u653b\u51fb<\/h4>\n<p>\u6218\u7565\u6027\u7279\u6743\u63a7\u5236\u53ef\u9632\u6b62\u653b\u51fb\uff0c\u5e76\u501f\u52a9\u81ea\u52a8\u5316\u6700\u5927\u9650\u5ea6\u51cf\u5c11\u8fd0\u8425\u4e2d\u65ad\u3002[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-143628\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/Compliance_test-01.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>\u786e\u4fdd\u7b80\u5316\u5408\u89c4\u5de5\u4f5c<\/h4>\n<p>\u901a\u8fc7\u7b80\u5316\u6d41\u7a0b\u8f7b\u677e\u6ee1\u8db3 NIST\u3001NERC \u548c FIPS \u7b49\u5173\u952e\u6807\u51c6\uff0c\u51cf\u5c11\u4eba\u5de5\u8d39\u7528\u3002[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-199824 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/digital-health.svg\" alt=\"\u6570\u5b57\u5316\u5065\u5eb7\u56fe\u6807\" width=\"40\" height=\"46\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>\u63a8\u52a8\u73b0\u4ee3\u5316<\/h4>\n<p>\u5148\u8fdb\u7684\u5b89\u5168\u6280\u672f\u6709\u52a9\u4e8e\u663e\u8457\u8282\u7701\u6210\u672c\u5e76\u63d0\u9ad8\u8fd0\u8425\u6548\u7387\uff0c\u63a8\u52a8\u653f\u5e9c IT \u73b0\u4ee3\u5316\u3002[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_talk_to_an_expert&#8221; css=&#8221;.vc_custom_1608677118624{background-color: #061b2b !important;}&#8221;][vc_column el_class=&#8221;text-center&#8221;][vc_column_text el_class=&#8221;extra-space&#8221;]<\/p>\n<h2>\u89e3\u51b3\u8054\u90a6\u673a\u6784\u7684\u96f6\u4fe1\u4efb\u95ee\u9898<\/h2>\n<p>\n[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section9_text&#8221;]\u5728\u4efb\u4f55\u8bbe\u5907\u4e0a\u4fdd\u62a4\u6240\u6709\u8eab\u4efd\u7684\u8bbf\u95ee\uff0c\u5e76\u4fdd\u62a4\u8054\u90a6\u673a\u6784\u7684\u654f\u611f\u653f\u5e9c\u6570\u636e\u548c\u57fa\u7840\u8bbe\u65bd\u3002[\/vc_column_text][vc_btn title=&#8221;\u4e86\u89e3\u8be6\u60c5&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; align=&#8221;center&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fzh-hans%2Fsolutions%2Ffederal%2F|&#8221; el_class=&#8221;cybv2-button-solid cyb-button-hpstyle_section5&#8243;][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-top&#8221;][vc_column width=&#8221;2\/3&#8243; offset=&#8221;vc_col-sm-offset-2&#8243;][vc_column_text el_class=&#8221;text-md-center head-box&#8221;]<\/p>\n<h3>\u501f\u52a9 CyberArk \u7b26\u5408\u6cd5\u89c4\u548c\u5408\u89c4\u6807\u51c6<\/h3>\n<p>CyberArk \u662f\u8eab\u4efd\u5b89\u5168\u9886\u57df\u7684\u5168\u7403\u5f15\u9886\u8005\uff0c\u53d7\u5230\u5168\u7403 8,000 \u591a\u5bb6\u5ba2\u6237\u7684\u4fe1\u8d56\uff0c\u662f NIAP \u8ba4\u8bc1\u63d0\u4f9b\u5546\uff0c\u5165\u56f4 DoD UC APL\uff08\u7f8e\u56fd\u56fd\u9632\u90e8\u7edf\u4e00\u80fd\u529b\u6279\u51c6\u4ea7\u54c1\u540d\u5355\uff09\uff0c\u5e76\u62e5\u6709\u7f8e\u56fd\u519b\u65b9\u63d0\u4f9b\u7684\u7f51\u7edc\u53ef\u9760\u6027\u8bc1\u4e66 (CoN)\u3002\u9075\u7167 <a href=\"https:\/\/www.cyberark.com\/zh-hans\/blueprint\/\">CyberArk Blueprint<\/a> \u6846\u67b6\u8bbe\u8ba1\u6709\u6548\u7684\u8eab\u4efd\u5b89\u5168\u8def\u7ebf\u56fe\u5e76\u7b26\u5408\u5173\u952e\u6cd5\u89c4\u3002[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2-pad-top featured-integrations&#8221;][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fpublic-sector-government%2Faddressing-the-australian-essential-eight-cyber-security-maturity-model|&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143175\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/acsc-featured-grey.jpg\" alt=\"ACSC\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/acsc-featured-grey.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/acsc-featured-grey-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/acsc-featured-grey-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>AUS &#8211; ACSC Essential Eight<\/h4>\n<p>\u4e86\u89e3 CyberArk \u8eab\u4efd\u5b89\u5168\u5e73\u53f0\u5982\u4f55\u652f\u6301 Essential Eight \u98ce\u9669\u7ba1\u7406\u7b56\u7565\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/public-sector-government\/addressing-the-australian-essential-eight-cyber-security-maturity-model\">\u4e86\u89e3\u8be6\u60c5<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fgetting-ready-for-nis2|&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-180886 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-star.jpg\" alt=\"\u8054\u90a6\u653f\u5e9c\u5fbd\u6807\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-star.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-star-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-star-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>\u6b27\u76df &#8211; NIS2 \u6307\u4ee4<\/h4>\n<p>\u4e86\u89e3 NIS2 \u53ef\u80fd\u5982\u4f55\u5f71\u54cd\u60a8\u7684\u4e1a\u52a1\u4ee5\u53ca\u60a8\u5982\u4f55\u505a\u597d\u51c6\u5907\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/getting-ready-for-nis2\">\u4e86\u89e3\u8be6\u60c5<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fpublic-sector-government%2Fcybersecurity-in-a-digitalised-world|&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-143183 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/ncsc-featured.jpg\" alt=\"nscs\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/ncsc-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/ncsc-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/ncsc-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>\u82f1\u56fd &#8211; NCSC CAF<\/h4>\n<p>\u8be6\u7ec6\u4e86\u89e3\u60a8\u53ef\u4ee5\u5982\u4f55\u4f7f\u7528 CyberArk \u89e3\u51b3\u65b9\u6848\u5b9e\u73b0\u82f1\u56fd\u653f\u5e9c\u7f51\u7edc\u5b89\u5168\u6218\u7565\u76ee\u6807\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/public-sector-government\/cybersecurity-in-a-digitalised-world\">\u4e86\u89e3\u8be6\u60c5<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fblog%2Fcisa-cpg-report-ids-top-cybersecurity-steps-for-smb-critical-infrastructure-entities|&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143231\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cisa-featured-grey.jpg\" alt=\"CISA\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cisa-featured-grey.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cisa-featured-grey-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cisa-featured-grey-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>\u7f8e\u56fd &#8211; CISA CPG<\/h4>\n<p>\u4e86\u89e3\u8eab\u4efd\u5b89\u5168\u529f\u80fd\u5982\u4f55\u5e2e\u52a9\u5b9e\u73b0 CISA \u7684\u8de8\u90e8\u95e8\u7f51\u7edc\u5b89\u5168\u7ee9\u6548\u76ee\u6807 (CPG)\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/blog\/cisa-cpg-report-ids-top-cybersecurity-steps-for-smb-critical-infrastructure-entities\">\u4e86\u89e3\u8be6\u60c5<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fsolution-briefs%2Fdepartment-of-homeland-security-s-continuous-diagnostics-and-mitigation-cdm-phase-2-privilege-management-requirements|&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143191\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/dhs-featured.jpg\" alt=\"dhs\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/dhs-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/dhs-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/dhs-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>\u7f8e\u56fd &#8211; DHS CDM<\/h4>\n<p>\u8be6\u7ec6\u4e86\u89e3\u7279\u6743\u8bbf\u95ee\u7ba1\u7406\u5728\u8054\u90a6\u673a\u6784\u4e2d\u7684\u4f5c\u7528\u4ee5\u53ca\u5b83\u5982\u4f55\u5e2e\u52a9\u5b9e\u73b0 CDM \u8ba1\u5212\u7684\u4e24\u4e2a\u9636\u6bb5\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\" https:\/\/www.cyberark.com\/resources\/solution-briefs\/department-of-homeland-security-s-continuous-diagnostics-and-mitigation-cdm-phase-2-privilege-management-requirements \">\u4e86\u89e3\u8be6\u60c5<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fpress%2Fcyberark-achieves-fedramp-high-authorization%2F%20|&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-180895 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-ramp.jpg\" alt=\"FedRAMP \u5fbd\u6807\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-ramp.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-ramp-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-ramp-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>FedRAMP\u00ae High \u6388\u6743<\/h4>\n<p>\u8be6\u7ec6\u4e86\u89e3 CyberArk \u9886\u5148\u7684 SaaS \u4ea7\u54c1 CyberArk Endpoint Privilege Manager \u548c CyberArk Workforce Identity\uff0c\u5b83\u4eec\u5df2\u83b7\u5f97 FedRAMP High \u6388\u6743\uff0c\u80fd\u591f\u57fa\u4e8e\u96f6\u4fe1\u4efb\u539f\u5219\u589e\u5f3a\u8054\u90a6\u673a\u6784\u7684\u5b89\u5168\u6027\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/press\/cyberark-achieves-fedramp-high-authorization\/\">\u4e86\u89e3\u8be6\u60c5<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-180868 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fips-140-2.jpg\" alt=\"Fips 140 \u5fbd\u6807\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fips-140-2.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fips-140-2-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fips-140-2-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>\u7f8e\u56fd &#8211; FIPS 140 \u2013 2<\/h4>\n<p>CyberArk PAM &#8211; FIPS \u5408\u89c4\u6027\u548c\u6539\u8fdb\u53d1\u73b0\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/product-announcements-blog\/cyberark-privileged-access-manager-self-hosted-v13-0-release-fips-compliance-and-improved-discovery\">\u4e86\u89e3\u8be6\u60c5<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fprotecting-the-grid-addressing-nerc-cip-requirements-for-securing-privileged-access|&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143199\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nerc-featured.jpg\" alt=\"NERC\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nerc-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nerc-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nerc-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>\u7f8e\u56fd &#8211; NERC CIP<\/h4>\n<p>\u4e86\u89e3 CyberArk \u89e3\u51b3\u65b9\u6848\u5982\u4f55\u5bf9\u6807\u8fd9\u4e9b\u7279\u5b9a\u7684 NERC CIP \u8981\u6c42\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/protecting-the-grid-addressing-nerc-cip-requirements-for-securing-privileged-access\">\u4e86\u89e3\u8be6\u60c5<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Faddressing-the-department-of-defenses-zero-trust-framework-with-the-cyberark-identity-security-platform%20|&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-180859 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/us-fed-3-recovered.jpg\" alt=\"\u7f8e\u56fd\u56fd\u9632\u90e8\u5fbd\u6807\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/us-fed-3-recovered.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/us-fed-3-recovered-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/us-fed-3-recovered-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>DoD \u96f6\u4fe1\u4efb\u51c6\u5219<\/h4>\n<p>\u6709\u5173\u8054\u90a6\u673a\u6784\u5982\u4f55\u5229\u7528 CyberArk \u8eab\u4efd\u5b89\u5168\u89e3\u51b3\u65b9\u6848\u4e0e\u7f8e\u56fd\u56fd\u9632\u90e8 (DoD) \u7684\u96f6\u4fe1\u4efb\u53c2\u8003\u67b6\u6784\u534f\u8c03\u914d\u5408\u7684\u6280\u672f\u56de\u987e\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/addressing-the-department-of-defenses-zero-trust-framework-with-the-cyberark-identity-security-platform\">\u4e86\u89e3\u8be6\u60c5<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Faddressing-zero-trust-for-government-the-role-of-identity-security%20|&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143215\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured.jpg\" alt=\"NIST\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>\u7f8e\u56fd &#8211; NIST SP 800-171<\/h4>\n<p>\u8fd9\u5305\u62ec\u4e3a\u8054\u90a6\u627f\u5305\u5546\u63d0\u4f9b\u6709\u5173\u4fdd\u62a4\u53d7\u63a7\u975e\u673a\u5bc6\u4fe1\u606f\u7684\u6307\u5bfc\uff0c\u5e76\u6ee1\u8db3\u4e0e\u7279\u6743\u8bbf\u95ee\u5b89\u5168\u76f8\u5173\u7684 NIST 800-171 \u8981\u6c42\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/addressing-the-nist-sp-800-171-cui-requirements-with-cyberark\">\u4e86\u89e3\u8be6\u60c5<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fhome%2Fput-privileged-access-management-at-the-core-of-nist-zero-trust-architecture|&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143215\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured.jpg\" alt=\"NIST\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>\u7f8e\u56fd &#8211; NIST SP 800-207<\/h4>\n<p>\u5c06\u7279\u6743\u8bbf\u95ee\u7ba1\u7406\u7f6e\u4e8e NIST \u96f6\u4fe1\u4efb\u67b6\u6784\u7684\u6838\u5fc3\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\" https:\/\/www.cyberark.com\/resources\/home\/put-privileged-access-management-at-the-core-of-nist-zero-trust-architecture\">\u4e86\u89e3\u8be6\u60c5<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fpublic-sector-government%2Fmapping-cyberark-solutions-to-ksa-nca-ecc|&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143207\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nca-featured.jpg\" alt=\"NCA\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nca-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nca-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nca-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>\u6c99\u7279 &#8211; NCA ECC<\/h4>\n<p>\u4e86\u89e3 CyberArk \u5982\u4f55\u5e2e\u52a9\u6c99\u7279\u56fd\u5bb6\u7f51\u7edc\u5b89\u5168\u5c40\u6ee1\u8db3\u8fd9\u4e9b\u57fa\u672c\u7f51\u7edc\u5b89\u5168\u63a7\u5236\u63aa\u65bd\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/public-sector-government\/mapping-cyberark-solutions-to-ksa-nca-ecc\">\u4e86\u89e3\u8be6\u60c5<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-181863 size-medium\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso-27017-big-300x122.jpg\" alt=\"iso-27017\" width=\"300\" height=\"122\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso-27017-big-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso-27017-big-150x61.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso-27017-big.jpg 742w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>ISO 27018<\/h4>\n<p>\u8fd9\u79cd\u56fd\u9645\u516c\u8ba4\u6807\u51c6\u4fa7\u91cd\u4e8e\u4fdd\u62a4\u4e91\u8ba1\u7b97\u73af\u5883\u4e2d\u7684\u4e2a\u4eba\u53ef\u8bc6\u522b\u4fe1\u606f (PII)\uff0c\u7b26\u5408\u8be5\u6807\u51c6\u8868\u660e CyberArk \u4ee5\u6781\u9ad8\u4f18\u5148\u7ea7\u4e13\u6ce8\u4fdd\u62a4\u6570\u636e\u9690\u79c1\u5e76\u4e14\u4fdd\u6301\u900f\u660e\u5ea6\u548c\u53ef\u95ee\u8d23\u6027\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/zh-hans\/trust\/compliance\/\">\u4e86\u89e3\u8be6\u60c5<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-189789 size-medium\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-300x122.png\" alt=\"DORA\" width=\"300\" height=\"122\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-300x122.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-150x61.png 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora.png 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>DORA<\/h4>\n<p>\u6570\u5b57\u8fd0\u8425\u5f39\u6027\u6cd5\u6848 (DORA) \u65e8\u5728\u5e2e\u52a9\u6b27\u76df\u91d1\u878d\u884c\u4e1a\u7684\u7ec4\u7ec7\u63d0\u9ad8\u5176\u9632\u5fa1\u7f51\u7edc\u653b\u51fb\u7684\u5f39\u6027\u3002\u603b\u4f53\u800c\u8a00\uff0cDORA \u91cd\u70b9\u5173\u6ce8\u4fe1\u606f\u548c\u901a\u4fe1\u6280\u672f (ICT) \u7684\u4fdd\u62a4\u3002\u8be5\u6cd5\u6848\u4e0d\u4ec5\u9002\u7528\u4e8e\u91d1\u878d\u516c\u53f8\uff0c\u4e5f\u9002\u7528\u4e8e\u4e3a\u516c\u53f8\u63d0\u4f9b ICT \u7cfb\u7edf\u548c\u670d\u52a1\u7684\u7b2c\u4e09\u65b9\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/hybrid-and-multi-cloud-security\/dora-compliance-an-identity-security-guidebook\">\u4e86\u89e3\u8be6\u60c5<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-189780 size-medium\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-eu-1-300x122.png\" alt=\"\" width=\"300\" height=\"122\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-eu-1-300x122.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-eu-1-150x61.png 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-eu-1.png 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;tiny&#8221;]<\/p>\n<h4>DoDIN APL<\/h4>\n<p>CyberArk Privileged Access Manager Self-Hosted \u5df2\u88ab\u6b63\u5f0f\u5217\u4e3a\u56fd\u9632\u90e8 (DoD) \u5ba2\u6237\u7684\u53d7\u4fe1\u4efb\u89e3\u51b3\u65b9\u6848\u3002CyberArk PAM Self-Hosted \u7b26\u5408\u56fd\u9632\u90e8\u89c4\u8303\uff0c\u53ef\u5728\u56fd\u9632\u90e8\u4fe1\u606f\u7f51\u7edc\u83b7\u6279\u4ea7\u54c1\u6e05\u5355 (DoDIN APL) \u4e0a\u627e\u5230\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/zh-hans\/trust\/compliance\/\">\u4e86\u89e3\u8be6\u60c5<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; column_link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fpress%2Fcyberark-achieves-qc1-certification-from-italian-national-cybersecurity-agency%2F%20|title:%E4%BA%86%E8%A7%A3%E8%AF%A6%E6%83%85|&#8221; el_class=&#8221;cta-box&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215804\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/acn-logo.jpg\" alt=\"acn logo\" width=\"300\" height=\"122\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/acn-logo.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/acn-logo-150x61.jpg 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;tiny&#8221;]<\/p>\n<h4>Italy: QC1 Certification from Italian National Cybersecurity Agency (ACN)<\/h4>\n<p>CyberArk SaaS products are now available in the ACN marketplace to any government organization in Italy looking to consume or deploy cloud-based services.[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/press\/cyberark-achieves-qc1-certification-from-italian-national-cybersecurity-agency\/\">Learn More<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; column_link=&#8221;url:https%3A%2F%2Finvestors.cyberark.com%2Fnews%2Fnews-details%2F2025%2FCyberArk-Achieves-Cloud-Service-Provider-Security-Standard-Certification-From-Dubai-Electronic-Security-Center%2Fdefault.aspx|title:%E4%BA%86%E8%A7%A3%E8%AF%A6%E6%83%85|&#8221; el_class=&#8221;cta-box&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215822\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/DESC-Logo.jpg\" alt=\"dubai logo\" width=\"300\" height=\"122\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;tiny&#8221;]<\/p>\n<h4>UAE &#8211; CSP Security Standard Certification from DESC<\/h4>\n<p>CyberArk receives Cloud Service Provider certification from Dubai Electronic Security Center (DESC).[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/investors.cyberark.com\/news\/news-details\/2025\/CyberArk-Achieves-Cloud-Service-Provider-Security-Standard-Certification-From-Dubai-Electronic-Security-Center\/default.aspx\" target=\"_blank\" rel=\"noopener\">Learn More<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_talk_to_an_expert&#8221; css=&#8221;.vc_custom_1608677118624{background-color: #061b2b !important;}&#8221;][vc_column el_class=&#8221;text-center&#8221;][vc_column_text el_class=&#8221;extra-space&#8221;]<\/p>\n<h2>\u4fdd\u62a4\u6fb3\u5927\u5229\u4e9a\u7684\u5173\u952e\u57fa\u7840\u8bbe\u65bd\uff0c\u65e0\u8bba\u8fc7\u53bb\u3001\u73b0\u5728\u8fd8\u662f\u672a\u6765<\/h2>\n<p>\n[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section9_text&#8221;]<span class=\"TextRun SCXW70713111 BCX0\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW70713111 BCX0\">\u8be6\u7ec6\u4e86\u89e3\u5982\u4f55\u7ba1\u7406\u6fb3\u5927\u5229\u4e9a\u5173\u952e\u57fa\u7840\u8bbe\u65bd\u906d\u5230\u7834\u574f\u3001<\/span><span class=\"NormalTextRun SCXW70713111 BCX0\">\u523a\u63a2\u548c<\/span>\u80c1\u8feb\u7684\u56fd\u5bb6\u5b89\u5168\u98ce\u9669\u3002<span class=\"NormalTextRun SCXW70713111 BCX0\"><\/span><\/span>[\/vc_column_text][vc_btn title=&#8221;\u8be6\u7ec6\u9605\u8bfb&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; align=&#8221;center&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fcritical-infrastructure-australia%2F|&#8221; el_class=&#8221;cybv2-button-solid cyb-button-hpstyle_section5&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2-pad cybv2 cybv2-background-oval tour&#8221;][vc_column][vc_row_inner el_class=&#8221;cyb-center&#8221;][vc_column_inner el_class=&#8221;cyb-pad-btm&#8221;][vc_column_text el_class=&#8221;left-mobile&#8221;]<\/p>\n<h3>\u5b9e\u65bd\u5206\u5c42\u8eab\u4efd\u5b89\u5168\u7b56\u7565<\/h3>\n<p>\u52a0\u5f3a\u60a8\u7684\u5b89\u5168\u6001\u52bf\u5e76\u964d\u4f4e\u52a8\u6001\u5a01\u80c1\u98ce\u9669\u3002[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=&#8221;square&#8221; active_section=&#8221;1&#8243; css_animation=&#8221;none&#8221;][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;\u4fdd\u62a4\u7279\u6743\u8bbf\u95ee&#8221; tab_id=&#8221;privileged-access&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>\u4fdd\u62a4\u7279\u6743\u8bbf\u95ee<\/h4>\n<p>\u6452\u5f03\u5e38\u8bbe\u7684\u9ad8\u7ea7\u522b\u7279\u6743\u8bbf\u95ee\u6743\u9650\uff0c\u8f6c\u800c\u91c7\u7528\u66f4\u52a0\u52a8\u6001\u548c\u5373\u65f6\u7684\u7ba1\u7406\u5458\u8bbf\u95ee\u65b9\u6cd5\u3002\u5982\u679c\u7279\u6743\u8d26\u6237\u6613\u6210\u4e3a\u6076\u610f\u653b\u51fb\u8005\u7684\u76ee\u6807\uff0c\u90a3\u4e48\u4e3a\u5458\u5de5\u548c\u627f\u5305\u5546\u6388\u4e88\u8bbf\u95ee\u6743\u9650\u5e94\u9075\u5faa\u6700\u5c0f\u6743\u9650\u539f\u5219\uff0c\u4ee5\u6b64\u51cf\u5c0f\u653b\u51fb\u9762\u548c\u7206\u7834\u534a\u5f84\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/zh-hans\/products\/privileged-access\/\">\u4e86\u89e3\u8be6\u60c5<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119610\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-1.png\" alt=\"\u5b89\u5168\u7684 Amazon WorkSpaces\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;\u4fdd\u62a4\u7aef\u70b9&#8221; tab_id=&#8221;secure-endpoints&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>\u4fdd\u62a4\u7aef\u70b9<\/h4>\n<p>\u653b\u51fb\u8005\u53ef\u4f7f\u7528\u906d\u5230\u7834\u574f\u7684\u7aef\u70b9\u7ed5\u8fc7\u5f3a\u8eab\u4efd\u9a8c\u8bc1\u3002\u56e0\u6b64\uff0c\u52a1\u5fc5\u8981\u91c7\u53d6\u9002\u5f53\u7684\u63a7\u5236\u63aa\u65bd\uff0c\u786e\u4fdd\u53ea\u6709\u7ecf\u8fc7\u6279\u51c6\u7684\u8fdb\u7a0b\u624d\u80fd\u8bbf\u95ee\u51ed\u636e\u5b58\u50a8\u3002\u8fd9\u4f9d\u8d56\u4e8e\u5728\u7aef\u70b9\u4e0a\u5b9e\u65bd\u6700\u5c0f\u7279\u6743\u548c\u64a4\u9500\u672c\u5730\u7ba1\u7406\u5458\u6743\u9650\u7684\u57fa\u672c\u536b\u751f\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/zh-hans\/products\/endpoint-privilege-security\/\">\u4e86\u89e3\u8be6\u60c5<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119618\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-2.png\" alt=\"\u6267\u884c\u6700\u5c0f\u6743\u9650\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-2.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-2-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-2-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;\u4fdd\u62a4\u5e94\u7528\u7a0b\u5e8f\u8bbf\u95ee\u6743\u9650&#8221; tab_id=&#8221;secure-application-access&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>\u4fdd\u62a4\u5e94\u7528\u7a0b\u5e8f\u8bbf\u95ee\u6743\u9650<\/h4>\n<p>\u5f3a\u5927\u7684\u81ea\u9002\u5e94\u8eab\u4efd\u9a8c\u8bc1\u53ca\u6301\u7eed\u7684\u5ba1\u6279\u548c\u6388\u6743\u4e3a\u786e\u4fdd\u5458\u5de5\u5b89\u5168\u8bbf\u95ee\u5e94\u7528\u7a0b\u5e8f\u5960\u5b9a\u4e86\u57fa\u7840\u3002\u8fd9\u79cd\u4ece\u7f51\u7edc\u63a7\u5236\u5230\u8eab\u4efd\u63a7\u5236\u7684\u8f6c\u53d8\u65e2\u53ef\u7f14\u9020\u66f4\u597d\u7684\u7528\u6237\u4f53\u9a8c\uff0c\u4e5f\u80fd\u63d0\u9ad8\u751f\u4ea7\u529b\u3002\u4e3a\u5458\u5de5\u8d4b\u80fd\uff0c\u540c\u65f6\u6709\u6548\u9632\u8303\u6076\u610f\u653b\u51fb\u8005\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/zh-hans\/products\/access-management\/\">\u4e86\u89e3\u8be6\u60c5<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119626\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3.png\" alt=\"\u542f\u7528\u5f3a\u5927\u7684\u8eab\u4efd\u9a8c\u8bc1\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-down&#8221; add_icon=&#8221;true&#8221; title=&#8221;\u4fdd\u62a4\u6240\u6709\u975e\u4eba\u7c7b\u8bbf\u95ee\u8bf7\u6c42&#8221; tab_id=&#8221;secure-non-human-access-requests&#8221;][vc_row_inner el_class=&#8221;cybv2&#8243;][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>\u4fdd\u62a4\u975e\u4eba\u7c7b\u8bbf\u95ee\u8bf7\u6c42<\/h4>\n<p>\u96f6\u4fe1\u4efb\u7684\u2018\u6c38\u4e0d\u4fe1\u4efb\uff0c\u59cb\u7ec8\u9a8c\u8bc1\u2019\u51c6\u5219\u5fc5\u987b\u540c\u65f6\u6db5\u76d6\u975e\u4eba\u7c7b\u8eab\u4efd\uff08\u975e\u4eba\u7c7b\u5b9e\u4f53\uff09\u3002\u6765\u81ea\u8fd9\u4e9b\u673a\u5668\u8eab\u4efd\u7684\u5bfb\u6c42\u8bbf\u95ee\u7f51\u7edc\u8d44\u6e90\u7684\u6240\u6709\u8bf7\u6c42\u5747\u5e94\u5f97\u5230\u4fdd\u62a4\uff0c\u6574\u4e2a DevOps \u7ba1\u9053\u4e2d\u7684\u5bc6\u94a5\u5747\u5e94\u5f97\u5230\u59a5\u5584\u7ba1\u7406\u3002[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/zh-hans\/products\/secrets-management\/\">\u4e86\u89e3\u8be6\u60c5<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119733\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecureBotsandVirtualAgents-1.png\" alt=\"\u975e\u4eba\u7c7b\u8bbf\u95ee\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecureBotsandVirtualAgents-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecureBotsandVirtualAgents-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecureBotsandVirtualAgents-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cyb-pad-btm&#8221;][vc_column width=&#8221;2\/3&#8243; el_class=&#8221;text-center&#8221; offset=&#8221;vc_col-sm-offset-2&#8243;][vc_column_text]<\/p>\n<h2>\u5ba2\u6237\u6848\u4f8b<\/h2>\n<p>\u9605\u8bfb\u9886\u5148\u4f01\u4e1a\u548c\u653f\u5e9c\u673a\u6784\u4f7f\u7528 CyberArk \u6210\u529f\u5b9e\u73b0\u8eab\u4efd\u5b89\u5168\u7684\u6545\u4e8b\u3002[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cyb-pad-btm&#8221;][vc_column][vc_raw_html]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0iY3VzdG9tZXJfc3RvcnkiIHBvc3RzX3Blcl9wYWdlPSI0IiBjb2x1bW5zX2xhcmdlPSIzIiBzaG93X2F1dGhvcj0iZmFsc2UiIHNob3dfZXhjZXJwdD0iZmFsc2UiIHBvczFfaWQ9IjEzMTA4NiIgcG9zMl9pZD0iMTI4MzE0IiBwb3MzX2lkPSIxMjg0NTAiIHBvczRfaWQ9IjEzNTYyMSJd[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"templatera_shortcode\"><div data-vc-full-width=\"true\" data-vc-full-width-temp=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_full_width_resource\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_title\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h5 style=\"text-align: center;\">IDENTITY SECURITY: \u89e3\u51b3\u65b9\u6848\u4ee5\u667a\u80fd\u7279\u6743\u63a7\u5236\u4e3a\u4e2d\u5fc3<\/h5>\n<p><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section5_container\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_center   new_hpstyle_section5_gart_img\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1.jpg\" class=\"vc_single_image-img attachment-full\" alt=\"Professional woman with glasses standing confidently against a dark background with a glowing triangular frame\" title=\"gartner-300x300\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1-100x100.jpg 100w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>2025 Gartner\u00ae \u7279\u6743\u8bbf\u95ee\u7ba1\u7406\u9b54\u529b\u8c61\u9650\u2122<\/h4>\n<p><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_btn3-container  cybv2-button-solid cyb-button-hpstyle_section5 vc_btn3-inline\"  >\n\t<a class=\"vc_btn3-color-grey\" href=\"https:\/\/lp.cyberark.com\/gartner-mq-pam-2025-zh-hans.html\" title=\"\" target=\"_blank\">\u67e5\u770b\u62a5\u544a<\/a><\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/a><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources&#8221; css=&#8221;.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_column_text el_class=&#8221;no-break&#8221;]<\/p>\n<h3>\u4e86\u89e3\u76f8\u5173\u8d44\u6e90<\/h3>\n<p>\n[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/resources\/public-sector-government\">\u67e5\u770b\u6240\u6709\u8d44\u6e90<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column&#8221;][vc_column el_class=&#8221;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8221;.vc_custom_1691480099229{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;new_hpstyle_section8_uberflip&#8221;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_id=&#8221;\u8868\u683c&#8221;][vc_column][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1690896313684{background-color: #f7f7f7 !important;}&#8221; el_class=&#8221;cybv2 cybv2-pad-top hv-cta&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;left-clmn&#8221;][vc_column_text]<\/p>\n<h2>\u5f00\u59cb\u60a8\u7684\u96f6\u4fe1\u4efb\u4e4b\u65c5<\/h2>\n<p>\n[\/vc_column_text][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]\u5b9e\u65bd\u96f6\u4fe1\u4efb\u548c\u6700\u5c0f\u7279\u6743\uff0c\u65e0\u7f1d\u4fdd\u62a4\u4eba\u7c7b\u548c\u673a\u5668\u8eab\u4efd\u5728\u5404\u79cd\u8bbe\u5907\u548c\u73af\u5883\u4e2d\u7684\u8bbf\u95ee\u6743\u9650\u3002[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]\u5c06\u667a\u80fd\u7279\u6743\u63a7\u5236\u5e94\u7528\u81f3\u5404\u79cd\u5f62\u5f0f\u7684\u8eab\u4efd\uff0c\u4ee5\u5e2e\u52a9\u9694\u79bb\u548c\u963b\u6b62\u653b\u51fb\u3001\u4fdd\u62a4\u5173\u952e\u8d44\u4ea7\uff0c\u5e76\u6388\u4e88\u9002\u5f53\u65f6\u957f\u7684\u8bbf\u95ee\u6743\u9650\u3002<br \/>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]\u901a\u8fc7\u65e0\u7f1d\u65e0\u4ee3\u7801\u7684\u5e94\u7528\u7a0b\u5e8f\u96c6\u6210\u548c\u5de5\u4f5c\u6d41\u7a0b\uff0c\u5b9e\u73b0\u8eab\u4efd\u751f\u547d\u5468\u671f\u7ba1\u7406\u81ea\u52a8\u5316\uff0c\u8fdb\u800c\u63a7\u5236\u8fc7\u591a\u6743\u9650\u3002 [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;head-box-text&#8221;]\u901a\u8fc7\u5b9e\u65f6\u8eab\u4efd\u5b89\u5168\u60c5\u62a5\u6301\u7eed\u76d1\u63a7\u5a01\u80c1\uff0c\u4ee5\u4fbf\u7ec4\u7ec7\u53ef\u6839\u636e\u98ce\u9669\u8c03\u6574\u63a7\u5236\u63aa\u65bd\uff0c\u5e76\u5145\u5206\u5229\u7528\u5b9e\u65f6\u8865\u6551\u9009\u9879\u3002[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_single_image image=&#8221;106859&#8243; img_size=&#8221;full&#8221; el_class=&#8221;d-none d-md-block&#8221;][\/vc_column][vc_column width=&#8221;1\/12&#8243; css=&#8221;.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;right-clmn cybv2-form&#8221;][vc_column_text el_class=&#8221;bold&#8221;]<\/p>\n<h4>\u7533\u8bf7\u6f14\u793a<\/h4>\n<p>\n[\/vc_column_text][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iNDUzMyIgdHlfcGFnZV91cmw9Imh0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS90aGFuay15b3UtcmVxdWVzdC1kZW1vLyJd[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":69496,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-187025","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\u653f\u5e9c | CyberArk<\/title>\n<meta name=\"description\" content=\"\u968f\u65f6\u968f\u5730\u4fdd\u62a4\u8eab\u4efd\u5728\u4efb\u4f55\u8bbe\u5907\u4e0a\u7684\u8bbf\u95ee\u3002\u901a\u8fc7\u96f6\u4fe1\u4efb\u4fdd\u62a4\u5404\u7ea7\u653f\u5e9c\u7684\u654f\u611f\u6570\u636e\u548c\u5173\u952e\u57fa\u7840\u8bbe\u65bd\u3002\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/government\/\" \/>\n<meta property=\"og:locale\" content=\"zh_CN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u653f\u5e9c\" \/>\n<meta property=\"og:description\" content=\"\u968f\u65f6\u968f\u5730\u4fdd\u62a4\u8eab\u4efd\u5728\u4efb\u4f55\u8bbe\u5907\u4e0a\u7684\u8bbf\u95ee\u3002\u901a\u8fc7\u96f6\u4fe1\u4efb\u4fdd\u62a4\u5404\u7ea7\u653f\u5e9c\u7684\u654f\u611f\u6570\u636e\u548c\u5173\u952e\u57fa\u7840\u8bbe\u65bd\u3002\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/government\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-22T18:35:08+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 \u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/government\/\",\"name\":\"\u653f\u5e9c | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg\",\"datePublished\":\"2023-12-06T21:22:30+00:00\",\"dateModified\":\"2025-09-22T18:35:08+00:00\",\"description\":\"\u968f\u65f6\u968f\u5730\u4fdd\u62a4\u8eab\u4efd\u5728\u4efb\u4f55\u8bbe\u5907\u4e0a\u7684\u8bbf\u95ee\u3002\u901a\u8fc7\u96f6\u4fe1\u4efb\u4fdd\u62a4\u5404\u7ea7\u653f\u5e9c\u7684\u654f\u611f\u6570\u636e\u548c\u5173\u952e\u57fa\u7840\u8bbe\u65bd\u3002\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/#breadcrumb\"},\"inLanguage\":\"zh-CN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/government\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-CN\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u8eab\u4efd\u5b89\u5168\u89e3\u51b3\u65b9\u6848\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u653f\u5e9c\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-CN\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-CN\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u653f\u5e9c | CyberArk","description":"\u968f\u65f6\u968f\u5730\u4fdd\u62a4\u8eab\u4efd\u5728\u4efb\u4f55\u8bbe\u5907\u4e0a\u7684\u8bbf\u95ee\u3002\u901a\u8fc7\u96f6\u4fe1\u4efb\u4fdd\u62a4\u5404\u7ea7\u653f\u5e9c\u7684\u654f\u611f\u6570\u636e\u548c\u5173\u952e\u57fa\u7840\u8bbe\u65bd\u3002","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/government\/","og_locale":"zh_CN","og_type":"article","og_title":"\u653f\u5e9c","og_description":"\u968f\u65f6\u968f\u5730\u4fdd\u62a4\u8eab\u4efd\u5728\u4efb\u4f55\u8bbe\u5907\u4e0a\u7684\u8bbf\u95ee\u3002\u901a\u8fc7\u96f6\u4fe1\u4efb\u4fdd\u62a4\u5404\u7ea7\u653f\u5e9c\u7684\u654f\u611f\u6570\u636e\u548c\u5173\u952e\u57fa\u7840\u8bbe\u65bd\u3002","og_url":"https:\/\/www.cyberark.com\/solutions\/government\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-09-22T18:35:08+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4":"11 \u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/government\/","url":"https:\/\/www.cyberark.com\/solutions\/government\/","name":"\u653f\u5e9c | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg","datePublished":"2023-12-06T21:22:30+00:00","dateModified":"2025-09-22T18:35:08+00:00","description":"\u968f\u65f6\u968f\u5730\u4fdd\u62a4\u8eab\u4efd\u5728\u4efb\u4f55\u8bbe\u5907\u4e0a\u7684\u8bbf\u95ee\u3002\u901a\u8fc7\u96f6\u4fe1\u4efb\u4fdd\u62a4\u5404\u7ea7\u653f\u5e9c\u7684\u654f\u611f\u6570\u636e\u548c\u5173\u952e\u57fa\u7840\u8bbe\u65bd\u3002","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/government\/#breadcrumb"},"inLanguage":"zh-CN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/government\/"]}]},{"@type":"ImageObject","inLanguage":"zh-CN","@id":"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/government\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"\u8eab\u4efd\u5b89\u5168\u89e3\u51b3\u65b9\u6848","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"\u653f\u5e9c"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-CN"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"zh-CN","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/pages\/187025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/comments?post=187025"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/pages\/187025\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/pages\/69496"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/media?parent=187025"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/product_category?post=187025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}