{"id":75579,"date":"2019-10-11T09:21:09","date_gmt":"2019-10-11T13:21:09","guid":{"rendered":"https:\/\/www.cyberark.com\/corporate-responsibility\/risk-reduction\/"},"modified":"2021-03-01T13:36:32","modified_gmt":"2021-03-01T18:36:32","slug":"risk-reduction","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/zh-hans\/risk-reduction\/","title":{"rendered":"Risk Reduction"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1570631159091{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/10\/risk-hero.jpg?id=75478) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-hero-section&#8221;][vc_column][vc_row_inner content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-hero-header&#8221;][vc_column_inner el_class=&#8221;cyb-hero-header-text&#8221;][vc_custom_heading text=&#8221;RISK REDUCTION&#8221; font_container=&#8221;tag:h1|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_custom_heading text=&#8221;Security is Our Business.&#8221; font_container=&#8221;tag:h3|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_btn title=&#8221;CORPORATE SECURITY WHITE PAPER&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#ffffff&#8221; shape=&#8221;square&#8221; link=&#8221;url:%2Fresource%2Fcyberark-corporate-security-white-paper-standards-and-practices%2F||target:%20_blank|&#8221; el_class=&#8221;cyb-button xlarge&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1570554206386{padding-top: 2.125rem !important;padding-right: 0px !important;padding-left: 0px !important;}&#8221; offset=&#8221;vc_col-sm-offset-2&#8243;][vc_custom_heading text=&#8221;CyberArk is the global leader in privileged access management, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry\u2019s most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world\u2019s leading organizations, including more than 50% of the Fortune 500, to protect against external attackers and malicious insiders. Our solution empowers our customers to significantly reduce risk in their IT environments.&#8221; font_container=&#8221;tag:p|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;.vc_custom_1576603991825{margin-bottom: 0px !important;}&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1570556298592{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;cyb-center&#8221;][vc_single_image image=&#8221;85461&#8243; img_size=&#8221;full&#8221;][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_column_text css=&#8221;.vc_custom_1614623739045{padding-bottom: 0.375rem !important;}&#8221;]To honor and protect our solutions and services, all CyberArk personnel, software and infrastructure must adhere to high security practices and comply fully with corporate policies. Our priorities include:<\/p>\n<ul>\n<li>ISO\/IEC 27001:2013 certified Information Security Management System<\/li>\n<li>CyberArk Endpoint Privilege Manager, CyberArk Identity (formerly Idaptive), Remote Access (formerly Alero) and Privilege Cloud services are both SOC 2 Type 2 compliant<\/li>\n<li>People security including ongoing training, education and background checks<\/li>\n<li>Network, applications and infrastructure security including best-in-class systems and technology solutions<\/li>\n<li>Physical security with stringent policies and procedures<\/li>\n<li>Ongoing risk assessments<\/li>\n<li>Business continuity and disaster recovery planning<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1570631159091{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/10\/risk-hero.jpg?id=75478) !important;background-position: center !impor&#8230;<\/p>\n","protected":false},"author":125,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-75579","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Risk Reduction | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/zh-hans\/risk-reduction\/\" \/>\n<meta property=\"og:locale\" content=\"zh_CN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Risk Reduction\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1570631159091{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/10\/risk-hero.jpg?id=75478) !important;background-position: center !impor...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/zh-hans\/risk-reduction\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-01T18:36:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 \u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/zh-hans\/risk-reduction\/\",\"url\":\"https:\/\/www.cyberark.com\/zh-hans\/risk-reduction\/\",\"name\":\"Risk Reduction | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/zh-hans\/#website\"},\"datePublished\":\"2019-10-11T13:21:09+00:00\",\"dateModified\":\"2021-03-01T18:36:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/zh-hans\/risk-reduction\/#breadcrumb\"},\"inLanguage\":\"zh-CN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/zh-hans\/risk-reduction\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/zh-hans\/risk-reduction\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/zh-hans\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Risk Reduction\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/zh-hans\/#website\",\"url\":\"https:\/\/www.cyberark.com\/zh-hans\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/zh-hans\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/zh-hans\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-CN\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/zh-hans\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/zh-hans\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-CN\",\"@id\":\"https:\/\/www.cyberark.com\/zh-hans\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/zh-hans\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Risk Reduction | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/zh-hans\/risk-reduction\/","og_locale":"zh_CN","og_type":"article","og_title":"Risk Reduction","og_description":"[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1570631159091{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/10\/risk-hero.jpg?id=75478) !important;background-position: center !impor...","og_url":"https:\/\/www.cyberark.com\/zh-hans\/risk-reduction\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2021-03-01T18:36:32+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4":"2 \u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/zh-hans\/risk-reduction\/","url":"https:\/\/www.cyberark.com\/zh-hans\/risk-reduction\/","name":"Risk Reduction | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/zh-hans\/#website"},"datePublished":"2019-10-11T13:21:09+00:00","dateModified":"2021-03-01T18:36:32+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/zh-hans\/risk-reduction\/#breadcrumb"},"inLanguage":"zh-CN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/zh-hans\/risk-reduction\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/zh-hans\/risk-reduction\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/zh-hans\/"},{"@type":"ListItem","position":2,"name":"Risk Reduction"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/zh-hans\/#website","url":"https:\/\/www.cyberark.com\/zh-hans\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/zh-hans\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/zh-hans\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-CN"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/zh-hans\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/zh-hans\/","logo":{"@type":"ImageObject","inLanguage":"zh-CN","@id":"https:\/\/www.cyberark.com\/zh-hans\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/zh-hans\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/pages\/75579","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/users\/125"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/comments?post=75579"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/pages\/75579\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/media?parent=75579"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/product_category?post=75579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}