{"id":115031,"date":"2021-01-26T08:06:41","date_gmt":"2021-01-26T13:06:41","guid":{"rendered":"https:\/\/www.cyberark.com\/solutions\/defense-in-depth\/"},"modified":"2025-02-14T12:22:00","modified_gmt":"2025-02-14T17:22:00","slug":"defense-in-depth","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/zh-hant\/solutions\/defense-in-depth\/","title":{"rendered":"\u7e31\u6df1\u9632\u79a6"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;cybv2 int-hero-full&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;column-1&#8243;][vc_column_text el_class=&#8221;cyb-breadcrumb&#8221;]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/zh-hant\/solutions\/defend-against-attacks\/\">\u8fd4\u56de\u300c\u9632\u79a6\u653b\u64ca\u300d<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>\u7e31\u6df1\u9632\u79a6<\/h1>\n<h2>\u6191\u85c9\u4ee5\u7279\u6b0a\u70ba\u6838\u5fc3\u7684\u5206\u5c64\u5b89\u5168\u7b56\u7565\uff0c\u5f37\u5316\u60a8\u7684\u5b89\u5168\u614b\u52e2\uff0c\u6e1b\u5c11\u52d5\u614b\u5a01\u8105\u98a8\u96aa\u3002<\/h2>\n<p>[\/vc_column_text][vc_btn title=&#8221;\u514d\u8cbb\u98a8\u96aa\u8a55\u4f30&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fzh-hant%2Ftry-buy%2Frapid-risk-assessment%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1614120192830{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/padlock-hero-solarwinds-2.jpg?id=112889) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221; el_class=&#8221;column-2&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top overview-vt&#8221; css=&#8221;.vc_custom_1611617874123{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;head-box&#8221;][vc_column_text]<\/p>\n<h3>\u5047\u8a2d\u5165\u4fb5<\/h3>\n<p>\u4ee5\u300c\u5047\u8a2d\u5165\u4fb5\u300d\u601d\u7dad\u8abf\u6574\u60a8\u7684\u98a8\u96aa\u4f4d\u7f6e \u2014 \u5c08\u6ce8\u65bc\u7aef\u9ede\u4fdd\u8b77\u4ee5\u78ba\u4fdd\u5b89\u5168\u5b58\u53d6 Tier0 \u7cfb\u7d71\u3002[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone wp-image-112833 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Pipeline-Infection.svg\" alt=\"Reduce Risks\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>\u964d\u4f4e\u98a8\u96aa<\/h4>\n<p>\u300c\u50cf\u653b\u64ca\u8005\u4e00\u6a23\u601d\u8003\u300d\u4e26\u63a1\u53d6\u57fa\u65bc\u98a8\u96aa\u7684\u65b9\u6cd5\uff0c\u4f86\u4fdd\u8b77\u6240\u6709\u5b58\u53d6\u5c64\u3002[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone wp-image-112841 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Privilege-Escalation.svg\" alt=\"Eliminate Gaps\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>\u6d88\u9664\u5dee\u8ddd<\/h4>\n<p>\u7d50\u5408\u9810\u9632\u63a7\u5236\u548c\u5075\u6e2c\u65b9\u6cd5\uff0c\u4ee5\u6d88\u9664\u73fe\u6709\u7684\u9593\u9699\u3002[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221;][vc_column_text]<img decoding=\"async\" class=\"alignnone wp-image-112849 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Impersonate.svg\" alt=\"Contain Attacks\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>\u904f\u5236\u653b\u64ca<\/h4>\n<p>\u9632\u6b62\u653b\u64ca\u900f\u904e\u5206\u5c64<a href=\"https:\/\/www.cyberark.com\/zh-hant\/products\/\">\u8eab\u5206\u5b89\u5168\u89e3\u6c7a\u65b9\u6848<\/a>\u9032\u884c\u3002[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 dark cybv2-pad fw-pr-links&#8221;][vc_column offset=&#8221;vc_col-lg-6&#8243;][vc_column_text]<\/p>\n<h3>\u8eab\u5206\u5b89\u5168\u8a55\u4f30<\/h3>\n<h5>\u91cd\u65b0\u7372\u5f97\u60a8\u7684 IT \u8ca1\u7522\u7684\u6307\u63ee\u548c\u63a7\u5236\u3002\u8207 CyberArk \u5408\u4f5c\uff0c\u4fee\u5fa9\u7dca\u6025\u5a01\u8105\u3002<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-lg-offset-1&#8243; el_class=&#8221;right-clmn&#8221;][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221; offset=&#8221;vc_col-lg-4&#8243;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/zh-hant\/try-buy\/rapid-risk-assessment\/\">\u53d6\u5f97\u8a55\u4f30<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1650997626746{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-top text-md-center&#8221;][vc_column][vc_column_text]<\/p>\n<h2>\u7e31\u6df1\u9632\u79a6\u7b56\u7565<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-btm text-md-center&#8221;][vc_column width=&#8221;2\/3&#8243; offset=&#8221;vc_col-sm-offset-2&#8243;][vc_column_text]<\/p>\n<h5>\u5be6\u65bd\u5177\u6709\u5206\u5c64\u5b89\u5168\u7684\u7e31\u6df1\u9632\u79a6\u7b56\u7565\u4e26\u63a1\u7528\u5047\u8a2d\u5165\u4fb5\u65b9\u6cd5\uff0c\u4ee5\u6e1b\u5c11\u6f0f\u6d1e\u3001\u904f\u5236\u5a01\u8105\u4e26\u964d\u4f4e\u98a8\u96aa\u3002<\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above wistia_embed&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-112865 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Protect-Privileged-Access-SeeSaw.jpg\" alt=\"\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Protect-Privileged-Access-SeeSaw.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Protect-Privileged-Access-SeeSaw-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Protect-Privileged-Access-SeeSaw-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Protect-Privileged-Access-SeeSaw-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-right&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>\u4fdd\u8b77\u7279\u6b0a\u5b58\u53d6<\/h4>\n<p>\u4f01\u696d\u9762\u81e8\u7684\u6700\u5927\u653b\u64ca\u9762\u4e4b\u4e00\u6d89\u53ca\u7279\u6b0a\u8cec\u6236\u548c\u6191\u64da\u3002\u8b58\u5225\u8207\u7ba1\u7406\u60a8\u7684\u7279\u6b0a\u5b58\u53d6\uff0c\u9632\u6b62\u7279\u6b0a\u6feb\u7528\u3002[\/vc_column_text][vc_btn title=&#8221;\u4e86\u89e3\u66f4\u591a&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fzh-hant%2Fproducts%2Fprivileged-access-manager%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw cyb-reverse&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-left&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>\u9396\u5b9a\u95dc\u9375\u7aef\u9ede<\/h4>\n<p>\u900f\u904e\u5be6\u65bd\u5177\u6709\u7279\u6b0a\u5347\u7d1a\u548c\u6191\u64da\u76dc\u7aca\u7b56\u7565\u7684<a href=\"https:\/\/www.cyberark.com\/zh-hant\/products\/endpoint-privilege-manager\/\">\u7aef\u9ede\u4fdd\u8b77<\/a>\u4f86\u9396\u5b9a Tier0 \u8cc7\u7522\uff0c\u4ee5\u9632\u6b62\u653b\u64ca\u8005\u7372\u53d6\u5c0d\u60a8\u7684\u74b0\u5883\u7684\u7ba1\u7406\u5b58\u53d6\u6b0a\u9650\u3002[\/vc_column_text][vc_btn title=&#8221;\u4e86\u89e3\u66f4\u591a&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fzh-hant%2Fproducts%2Fendpoint-privilege-manager%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-112873 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Lock-Down-Critical-Endpoints-SeeSaw.jpg\" alt=\"\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Lock-Down-Critical-Endpoints-SeeSaw.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Lock-Down-Critical-Endpoints-SeeSaw-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Lock-Down-Critical-Endpoints-SeeSaw-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Lock-Down-Critical-Endpoints-SeeSaw-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-111183 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/WorkForceIdent_Page-Seesaw-Adaptive-Multi-factor-Authentication-image-770x515-1.jpg\" alt=\"Adaptive Multi-Factor Authentication\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/WorkForceIdent_Page-Seesaw-Adaptive-Multi-factor-Authentication-image-770x515-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/WorkForceIdent_Page-Seesaw-Adaptive-Multi-factor-Authentication-image-770x515-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/WorkForceIdent_Page-Seesaw-Adaptive-Multi-factor-Authentication-image-770x515-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/WorkForceIdent_Page-Seesaw-Adaptive-Multi-factor-Authentication-image-770x515-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-right&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>\u555f\u7528\u81ea\u9069\u6027\u591a\u56e0\u7d20\u9a57\u8b49<\/h4>\n<p>\u4f7f\u7528<a href=\"https:\/\/www.cyberark.com\/zh-hant\/products\/adaptive-multi-factor-authentication\/\">\u81ea\u9069\u6027\u591a\u56e0\u7d20\u9a57\u8b49<\/a>\u4fdd\u8b77\u5b58\u53d6\uff0c\u4e26\u85c9\u7531\u70ba\u6bcf\u4f4d\u4f7f\u7528\u8005\u767b\u5165\u5617\u8a66\u6307\u6d3e\u98a8\u96aa\u4ee5\u53ca\u5efa\u7acb\u52d5\u614b\u5b58\u53d6\u7b56\u7565\uff0c\u5229\u7528\u4f4d\u7f6e\u3001\u88dd\u7f6e\u548c\u7db2\u8def\u8cc7\u8a0a\u7b49\u4f7f\u7528\u8005\u7279\u5b9a\u7684\u60c5\u5883\u5c6c\u6027\u3002[\/vc_column_text][vc_btn title=&#8221;\u4e86\u89e3\u66f4\u591a&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fzh-hant%2Fproducts%2Fadaptive-multi-factor-authentication%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw cyb-reverse&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-left&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>\u4fdd\u8b77\u958b\u767c\u4eba\u54e1\u5de5\u5177<\/h4>\n<p>\u958b\u767c\u74b0\u5883\u932f\u7d9c\u8907\u96dc\uff0c\u5e38\u5e38\u51fa\u73fe\u6191\u64da\u53ef\u80fd\u6703\u7121\u610f\u4e2d\u66b4\u9732\u7684\u9818\u57df\u3002\u4e86\u89e3<a href=\"https:\/\/www.cyberark.com\/zh-hant\/products\/secrets-manager-enterprise\/\">\u5b58\u53d6\u9470\u5319\u7ba1\u7406<\/a>\u5982\u4f55\u80fd\u900f\u904e\u958b\u767c\u4eba\u54e1\u53cb\u5584\u7684\u9078\u9805\u5feb\u901f\u4fdd\u8b77\u61c9\u7528\u7a0b\u5f0f\u3002[\/vc_column_text][vc_btn title=&#8221;\u4e86\u89e3\u66f4\u591a&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fzh-hant%2Fproducts%2Fsecrets-manager-enterprise%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/zh-hant\/resources\/ebooks\/%E4%BF%9D%E8%AD%B7%E8%BB%9F%E9%AB%94%E4%BE%9B%E6%87%89%E9%8F%88\">\u95b1\u8b80\u767d\u76ae\u66f8<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-110396 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/conjur-enterprise-seesaw.jpg\" alt=\"Conjur Enterprise\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/conjur-enterprise-seesaw.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/conjur-enterprise-seesaw-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/conjur-enterprise-seesaw-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/conjur-enterprise-seesaw-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources&#8221; css=&#8221;.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_column_text el_class=&#8221;no-break&#8221;]<\/p>\n<h3>\u63a2\u7d22<br \/>\n\u76f8\u95dc<br \/>\n\u8cc7\u6e90<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/zh-hant\/resources\/\">\u6aa2\u8996\u6240\u6709\u8cc7\u6e90<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column&#8221;][vc_column el_class=&#8221;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8221;.vc_custom_1627655172657{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;new_hpstyle_section8_uberflip&#8221;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2-pad cybv2-oval-left-background hv-cta-list&#8221; css=&#8221;.vc_custom_1611885567532{background-color: #ff7600 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;img-box&#8221; css=&#8221;.vc_custom_1614119961331{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Solarwinds-Solution-Page-Form-750&#215;622-1.jpg?id=112881) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;stat-column&#8221;][vc_row_inner][vc_column_inner el_class=&#8221;head-box&#8221; width=&#8221;3\/4&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text]<\/p>\n<h2>\u7372\u53d6\u514d\u8cbb\u8a55\u4f30<\/h2>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]\u5b58\u53d6\u5feb\u901f\u98a8\u96aa\u8a55\u4f30\u548c\u88dc\u6551\u670d\u52d9[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]\u4fdd\u8b77\u7279\u6b0a\u5b58\u53d6\u548c\u95dc\u9375\u7aef\u9ede[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]\u555f\u7528\u81ea\u9069\u6027\u591a\u56e0\u7d20\u9a57\u8b49[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8221;benefits-content-icon&#8221;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;list-text&#8221;]\u4fdd\u8b77\u958b\u767c\u4eba\u54e1\u5de5\u5177[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;list-box&#8221; width=&#8221;11\/12&#8243; offset=&#8221;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_btn title=&#8221;\u806f\u7d61\u6211\u5011&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fzh-hant%2Ftry-buy%2Frapid-risk-assessment%2F|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":69414,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-115031","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\u6df1\u5ea6\u9632\u79a6 - \u5206\u5c64\u5b89\u5168\u89e3\u6c7a\u65b9\u6848 | CyberArk<\/title>\n<meta name=\"description\" content=\"\u5be6\u65bd\u5177\u6709\u5206\u5c64\u5b89\u5168\u7684\u7e31\u6df1\u9632\u79a6\u7b56\u7565\u4e26\u63a1\u7528\u5047\u8a2d\u5165\u4fb5\u65b9\u6cd5\uff0c\u4ee5\u6e1b\u5c11\u6f0f\u6d1e\u3001\u904f\u5236\u5a01\u8105\u4e26\u964d\u4f4e\u98a8\u96aa\u3002\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/defense-in-depth\/\" \/>\n<meta property=\"og:locale\" content=\"zh_TW\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u7e31\u6df1\u9632\u79a6\" \/>\n<meta property=\"og:description\" content=\"\u5be6\u65bd\u5177\u6709\u5206\u5c64\u5b89\u5168\u7684\u7e31\u6df1\u9632\u79a6\u7b56\u7565\u4e26\u63a1\u7528\u5047\u8a2d\u5165\u4fb5\u65b9\u6cd5\uff0c\u4ee5\u6e1b\u5c11\u6f0f\u6d1e\u3001\u904f\u5236\u5a01\u8105\u4e26\u964d\u4f4e\u98a8\u96aa\u3002\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/defense-in-depth\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-14T17:22:00+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"\u9810\u4f30\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/defense-in-depth\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/defense-in-depth\/\",\"name\":\"\u6df1\u5ea6\u9632\u79a6 - \u5206\u5c64\u5b89\u5168\u89e3\u6c7a\u65b9\u6848 | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/defense-in-depth\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/defense-in-depth\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Pipeline-Infection.svg\",\"datePublished\":\"2021-01-26T13:06:41+00:00\",\"dateModified\":\"2025-02-14T17:22:00+00:00\",\"description\":\"\u5be6\u65bd\u5177\u6709\u5206\u5c64\u5b89\u5168\u7684\u7e31\u6df1\u9632\u79a6\u7b56\u7565\u4e26\u63a1\u7528\u5047\u8a2d\u5165\u4fb5\u65b9\u6cd5\uff0c\u4ee5\u6e1b\u5c11\u6f0f\u6d1e\u3001\u904f\u5236\u5a01\u8105\u4e26\u964d\u4f4e\u98a8\u96aa\u3002\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/defense-in-depth\/#breadcrumb\"},\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/defense-in-depth\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/defense-in-depth\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Pipeline-Infection.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Pipeline-Infection.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/defense-in-depth\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u8eab\u5206\u8b58\u5225\u5b89\u5168\u89e3\u6c7a\u65b9\u6848\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u7e31\u6df1\u9632\u79a6\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-TW\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u6df1\u5ea6\u9632\u79a6 - \u5206\u5c64\u5b89\u5168\u89e3\u6c7a\u65b9\u6848 | CyberArk","description":"\u5be6\u65bd\u5177\u6709\u5206\u5c64\u5b89\u5168\u7684\u7e31\u6df1\u9632\u79a6\u7b56\u7565\u4e26\u63a1\u7528\u5047\u8a2d\u5165\u4fb5\u65b9\u6cd5\uff0c\u4ee5\u6e1b\u5c11\u6f0f\u6d1e\u3001\u904f\u5236\u5a01\u8105\u4e26\u964d\u4f4e\u98a8\u96aa\u3002","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/defense-in-depth\/","og_locale":"zh_TW","og_type":"article","og_title":"\u7e31\u6df1\u9632\u79a6","og_description":"\u5be6\u65bd\u5177\u6709\u5206\u5c64\u5b89\u5168\u7684\u7e31\u6df1\u9632\u79a6\u7b56\u7565\u4e26\u63a1\u7528\u5047\u8a2d\u5165\u4fb5\u65b9\u6cd5\uff0c\u4ee5\u6e1b\u5c11\u6f0f\u6d1e\u3001\u904f\u5236\u5a01\u8105\u4e26\u964d\u4f4e\u98a8\u96aa\u3002","og_url":"https:\/\/www.cyberark.com\/solutions\/defense-in-depth\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-02-14T17:22:00+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"\u9810\u4f30\u95b1\u8b80\u6642\u9593":"9 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/defense-in-depth\/","url":"https:\/\/www.cyberark.com\/solutions\/defense-in-depth\/","name":"\u6df1\u5ea6\u9632\u79a6 - \u5206\u5c64\u5b89\u5168\u89e3\u6c7a\u65b9\u6848 | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/solutions\/defense-in-depth\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/solutions\/defense-in-depth\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Pipeline-Infection.svg","datePublished":"2021-01-26T13:06:41+00:00","dateModified":"2025-02-14T17:22:00+00:00","description":"\u5be6\u65bd\u5177\u6709\u5206\u5c64\u5b89\u5168\u7684\u7e31\u6df1\u9632\u79a6\u7b56\u7565\u4e26\u63a1\u7528\u5047\u8a2d\u5165\u4fb5\u65b9\u6cd5\uff0c\u4ee5\u6e1b\u5c11\u6f0f\u6d1e\u3001\u904f\u5236\u5a01\u8105\u4e26\u964d\u4f4e\u98a8\u96aa\u3002","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/defense-in-depth\/#breadcrumb"},"inLanguage":"zh-TW","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/defense-in-depth\/"]}]},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/www.cyberark.com\/solutions\/defense-in-depth\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Pipeline-Infection.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Pipeline-Infection.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/defense-in-depth\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"\u8eab\u5206\u8b58\u5225\u5b89\u5168\u89e3\u6c7a\u65b9\u6848","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"\u7e31\u6df1\u9632\u79a6"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-TW"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/pages\/115031","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/comments?post=115031"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/pages\/115031\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/pages\/69414"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/media?parent=115031"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/product_category?post=115031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}