{"id":3171,"date":"2021-12-17T07:40:28","date_gmt":"2021-12-17T07:40:28","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-kh\/?p=3171"},"modified":"2022-06-28T09:21:45","modified_gmt":"2022-06-28T09:21:45","slug":"cyberark-privilege-cloud-is-built-to-protect-control-and-monitor-privileged-access-across-both-cloud-and-hybrid-infrastructures-whitepaper","status":"publish","type":"post","link":"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/cyberark-privilege-cloud-is-built-to-protect-control-and-monitor-privileged-access-across-both-cloud-and-hybrid-infrastructures-whitepaper\/","title":{"rendered":"CYBERARK PRIVILEGE CLOUD IS BUILT TO PROTECT, CONTROL, AND MONITOR PRIVILEGED ACCESS ACROSS BOTH CLOUD AND HYBRID INFRASTRUCTURES. &#8211; WHITEPAPER"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3171\" class=\"elementor elementor-3171\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e8491a0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e8491a0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-705e4e7\" data-id=\"705e4e7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-461ad189 elementor-widget elementor-widget-heading\" data-id=\"461ad189\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h4 class=\"elementor-heading-title elementor-size-default\">CYBERARK PRIVILEGE CLOUD IS BUILT TO PROTECT, CONTROL, AND MONITOR PRIVILEGED ACCESS ACROSS BOTH CLOUD AND HYBRID INFRASTRUCTURES.\n<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-648f22eb elementor-widget elementor-widget-text-editor\" data-id=\"648f22eb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p style=\"text-align: justify;\">Designed from the ground up for security, Privilege Cloud helps organizations efficiently manage privileged account credentials and access rights, proactively monitor and control privileged account activity, and quickly respond to threats. Customers can feel confident in the knowledge that CyberArk\u2019s \u201cas a Service\u201d offering is a SOC 2 Type 2 compliant service, and is hosted in an industry-leading cloud platform that delivers global scalability, high availability, and strong security.\n<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CYBERARK PRIVILEGE CLOUD IS BUILT TO PROTECT, CONTROL, AND MONITOR PRIVILEGED ACCESS ACROSS BOTH CLOUD AND HYBRID INFRASTRUCTURES. Designed from the ground up for security, Privilege Cloud helps organizations efficiently manage privileged account credentials and access rights, proactively monitor and control privileged account activity, and quickly respond to threats. Customers can feel confident in the &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/cyberark-privilege-cloud-is-built-to-protect-control-and-monitor-privileged-access-across-both-cloud-and-hybrid-infrastructures-whitepaper\/\"> <span class=\"screen-reader-text\">CYBERARK PRIVILEGE CLOUD IS BUILT TO PROTECT, CONTROL, AND MONITOR PRIVILEGED ACCESS ACROSS BOTH CLOUD AND HYBRID INFRASTRUCTURES. &#8211; WHITEPAPER<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":2692,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"page-builder","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"disabled","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[11],"tags":[],"whitepapers":[86],"case_studies":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/posts\/3171"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/comments?post=3171"}],"version-history":[{"count":28,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/posts\/3171\/revisions"}],"predecessor-version":[{"id":12825,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/posts\/3171\/revisions\/12825"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/media\/2692"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/media?parent=3171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/categories?post=3171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/tags?post=3171"},{"taxonomy":"whitepapers","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/whitepapers?post=3171"},{"taxonomy":"case_studies","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/case_studies?post=3171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}