{"id":62730,"date":"2024-09-16T12:22:44","date_gmt":"2024-09-16T11:22:44","guid":{"rendered":"https:\/\/www.wallix.com\/securing-financial-institutions-with-the-help-of-pam-solutions\/"},"modified":"2025-02-13T11:25:41","modified_gmt":"2025-02-13T10:25:41","slug":"securing-financial-institutions-with-the-help-of-pam-solutions","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/it\/blogpost\/securing-financial-institutions-with-the-help-of-pam-solutions\/","title":{"rendered":"La messa in sicurezza delle istituzioni finanziarie con le soluzioni PAM"},"content":{"rendered":"<div id='full_slider_1'  class='avia-fullwidth-slider main_color avia-shadow   avia-builder-el-0  el_before_av_two_third  avia-builder-el-first   container_wrap fullsize'  ><div  class='avia-slideshow av-llxr1vtd-4e32574d024ef9405158ec454a104e45 avia-slideshow-entry_without_sidebar av_slideshow_full avia-slide-slider av-slideshow-ui av-control-default av-slideshow-manual av-loop-once av-loop-manual-endless av-default-height-applied   avia-slideshow-1' data-slideshow-options=\"{&quot;animation&quot;:&quot;slide&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;bg_slider&quot;:false,&quot;keep_padding&quot;:false,&quot;hoverpause&quot;:false,&quot;show_slide_delay&quot;:0}\"  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><ul class='avia-slideshow-inner ' style='padding-bottom: 34.95867768595%;'><li  class='avia-slideshow-slide av-llxr1vtd-4e32574d024ef9405158ec454a104e45__0  av-single-slide slide-1 slide-odd'><div data-rel='slideshow-1' class='avia-slide-wrap '   ><img decoding=\"async\" fetchpriority=\"high\" class=\"wp-image-52296 avia-img-lazy-loading-not-52296\"  src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/02\/AdobeStock_504360195-1210x423.jpeg\" width=\"1210\" height=\"423\" title='Identity and Access Management Concept - IAM and IdAM - Users wi' alt='Identity and Access Management Concept - IAM and IdAM - New Technologies to Ensure that the Right Users Within a Network Have Appropriate Access to Enterprise Resources - Users with IDs Within a Secure Perimeter - 3D Illustration'  itemprop=\"thumbnailUrl\"   \/><\/div><\/li><\/ul><\/div><\/div><div id='after_full_slider_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-62730'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-4qec4hy-d402408ea97d6ed8b58d08740fdad36c sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4qec4hy-d402408ea97d6ed8b58d08740fdad36c\">\n#top .flex_column_table.av-equal-height-column-flextable.av-4qec4hy-d402408ea97d6ed8b58d08740fdad36c{\nmargin-top:-300px;\nmargin-bottom:0px;\n}\n.flex_column.av-4qec4hy-d402408ea97d6ed8b58d08740fdad36c{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-4qec4hy-d402408ea97d6ed8b58d08740fdad36c{\nmargin-top:-200px;\n}\n}\n<\/style>\n<div  class='flex_column av-4qec4hy-d402408ea97d6ed8b58d08740fdad36c av_two_third  avia-builder-el-1  el_after_av_slideshow_full  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lq0ygsuz-9301f4822f451bb96fe39457518279e2\">\n#top .av-special-heading.av-lq0ygsuz-9301f4822f451bb96fe39457518279e2{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lq0ygsuz-9301f4822f451bb96fe39457518279e2 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lq0ygsuz-9301f4822f451bb96fe39457518279e2 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lq0ygsuz-9301f4822f451bb96fe39457518279e2 av-special-heading-h1 blockquote modern-quote  avia-builder-el-2  el_before_av_textblock  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >La messa in sicurezza delle istituzioni finanziarie con le soluzioni PAM<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-llxr2uwy-f28c48b5d5734578d1685e989d92eb33 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Oggi\u00a0pi\u00f9\u00a0che\u00a0mai, le\u00a0istituzioni\u00a0finanziarie\u00a0sono un\u00a0bersaglio\u00a0privilegiato\u00a0per i\u00a0cybercriminali.\u00a0Questa\u00a0situazione\u00a0\u00e8 molto\u00a0preoccupante, come\u00a0dimostra\u00a0uno\u00a0studio\u00a0condotto\u00a0da Accenture,\u00a0che\u00a0ha\u00a0rivelato\u00a0che\u00a0il\u00a0costo\u00a0degli\u00a0attacchi\u00a0informatici\u00a0sui\u00a0servizi\u00a0finanziari\u00a0\u00e8 molto pi\u00f9\u00a0elevato\u00a0rispetto\u00a0a\u00a0quello\u00a0degli\u00a0altri\u00a0settori,\u00a0raggiungendo\u00a0fino\u00a0a 18,5\u00a0milioni\u00a0di\u00a0dollari\u00a0all&#8217;anno\u00a0per\u00a0azienda.<\/p>\n<p>Ancora\u00a0pi\u00f9\u00a0preoccupanti\u00a0sono i\u00a0dati\u00a0di\u00a0un&#8217;indagine\u00a0secondo\u00a0la quale circa il 70%\u00a0degli\u00a0istituti\u00a0finanziari\u00a0ha subito un attacco\u00a0informatico\u00a0negli\u00a0ultimi\u00a0tre\u00a0anni.\u00a0Inoltre, il\u00a0numero\u00a0crescente\u00a0di\u00a0minacce\u00a0ha\u00a0portato\u00a0le\u00a0istituzioni\u00a0finanziarie\u00a0a\u00a0dover\u00a0affrontare\u00a0molteplici\u00a0possibilit\u00e0\u00a0di\u00a0estorsione,\u00a0furto\u00a0e\u00a0frode.\u00a0Questo\u00a0pu\u00f2\u00a0facilmente\u00a0comportare\u00a0gravi\u00a0perdite\u00a0finanziarie, un\u00a0danno\u00a0alla\u00a0reputazione\u00a0delle\u00a0istituzioni\u00a0e\u00a0una\u00a0perdita\u00a0di\u00a0fiducia\u00a0da parte dei\u00a0clienti. \u00c8\u00a0quindi\u00a0imperativo\u00a0per le\u00a0istituzioni\u00a0finanziarie\u00a0garantire\u00a0l&#8217;implementazione\u00a0di\u00a0soluzioni\u00a0di\u00a0sicurezza\u00a0degli\u00a0accessi\u00a0solide per\u00a0proteggersi.<\/p>\n<h2>Perch\u00e9 i\u00a0pirati\u00a0informatici\u00a0preferiscono\u00a0attaccare\u00a0le\u00a0banche?<\/h2>\n<p>Il\u00a0denaro\u00a0\u00e8\u00a0ovviamente\u00a0un\u00a0fattore\u00a0importante. Le banche\u00a0gestiscono\u00a0quotidianamente\u00a0ingenti\u00a0somme di\u00a0denaro\u00a0e i\u00a0pirati\u00a0informatici\u00a0sono sempre alla\u00a0ricerca\u00a0di\u00a0nuovi\u00a0modi\u00a0per\u00a0accedere\u00a0senza\u00a0autorizzazione\u00a0ai\u00a0conti\u00a0bancari\u00a0dei\u00a0clienti\u00a0per\u00a0sottrarre\u00a0i\u00a0loro\u00a0fondi.<\/p>\n<p>Tuttavia, le banche non\u00a0dispongono\u00a0solo di grandi\u00a0quantit\u00e0\u00a0di\u00a0denaro,\u00a0ma\u00a0anche di\u00a0una\u00a0grande\u00a0quantit\u00e0\u00a0di\u00a0dati\u00a0personali.\u00a0Queste\u00a0istituzioni\u00a0trattano\u00a0e\u00a0memorizzano\u00a0un\u00a0numero\u00a0significativo\u00a0di PII (informazioni\u00a0personali\u00a0identificabili) molto\u00a0sensibili\u00a0e\u00a0preziose,\u00a0che\u00a0sono\u00a0particolarmente\u00a0ambite\u00a0sul\u00a0Dark\u00a0Web.<\/p>\n<p>In\u00a0caso\u00a0di\u00a0attacchi\u00a0informatici, le\u00a0organizzazioni\u00a0finanziarie\u00a0rischiano\u00a0di\u00a0dover\u00a0affrontare\u00a0responsabilit\u00e0\u00a0legali\u00a0e\u00a0sanzioni\u00a0normative per non\u00a0aver\u00a0garantito\u00a0la\u00a0sicurezza\u00a0delle\u00a0informazioni\u00a0riservate\u00a0dei\u00a0loro\u00a0clienti.\u00a0Inoltre, per\u00a0gestire\u00a0mutui,\u00a0pensioni\u00a0e\u00a0prestiti\u00a0dei\u00a0loro\u00a0clienti, le banche\u00a0devono\u00a0prima\u00a0stabilire\u00a0un\u00a0solido\u00a0rapporto\u00a0di\u00a0fiducia\u00a0con\u00a0loro,\u00a0rapporto\u00a0che\u00a0viene\u00a0minacciato\u00a0quando\u00a0si\u00a0verifica\u00a0un attacco\u00a0informatico.<\/p>\n<p>L&#8217;integrazione\u00a0delle banche in\u00a0questa\u00a0nuova\u00a0era\u00a0digitale ha\u00a0comportato\u00a0un&#8217;espansione\u00a0considerevole\u00a0delle\u00a0loro\u00a0superfici\u00a0di attacco. Sempre pi\u00f9\u00a0aziende\u00a0hanno\u00a0ridotto\u00a0il\u00a0numero\u00a0delle\u00a0loro\u00a0filiali\u00a0fisiche, le\u00a0nuove\u00a0banche\u00a0cosiddette\u00a0&#8220;challenger&#8221;\u00a0operano\u00a0interamente\u00a0online e i\u00a0clienti\u00a0si\u00a0rivolgono\u00a0sempre pi\u00f9\u00a0agli\u00a0strumenti\u00a0digitali\u00a0per\u00a0accedere\u00a0ai\u00a0loro\u00a0servizi.\u00a0Tuttavia,\u00a0questa\u00a0esplosione\u00a0del\u00a0digitale rende le\u00a0istituzioni\u00a0finanziarie\u00a0obiettivi\u00a0pi\u00f9\u00a0attraenti\u00a0per i\u00a0pirati\u00a0informatici,\u00a0che\u00a0perpetrano\u00a0attacchi\u00a0di\u00a0tipo\u00a0ransomware e phishing per\u00a0indurre\u00a0le\u00a0persone\u00a0a\u00a0condividere\u00a0informazioni\u00a0riservate.<\/p>\n<h2>Cosa rende le banche\u00a0difficili\u00a0da\u00a0proteggere?<\/h2>\n<p>Gli\u00a0istituti\u00a0finanziari\u00a0operano\u00a0in un\u00a0ambiente\u00a0normativo\u00a0complesso\u00a0e\u00a0rigoroso.\u00a0Questo\u00a0significa\u00a0che\u00a0le\u00a0autorit\u00e0\u00a0impongono\u00a0sanzioni\u00a0e\u00a0multe\u00a0severe\u00a0per\u00a0proteggere\u00a0i\u00a0consumatori\u00a0e le\u00a0aziende,\u00a0aumentando\u00a0le\u00a0conseguenze\u00a0negative\u00a0che\u00a0possono\u00a0derivare\u00a0da\u00a0una\u00a0violazione\u00a0dei\u00a0dati.<\/p>\n<p>Le banche\u00a0dispongono\u00a0anche di\u00a0infrastrutture\u00a0complicate.\u00a0Molte\u00a0di\u00a0queste\u00a0istituzioni\u00a0hanno\u00a0effettuato\u00a0una\u00a0transizione\u00a0dalla\u00a0loro\u00a0vecchia\u00a0infrastruttura\u00a0ereditaria\u00a0cercando\u00a0di\u00a0tenere\u00a0il\u00a0passo\u00a0con la\u00a0rapida\u00a0trasformazione\u00a0digitale in\u00a0atto\u00a0nel\u00a0settore\u00a0finanziario.\u00a0All&#8217;interno\u00a0di\u00a0una\u00a0stessa\u00a0organizzazione,\u00a0possono\u00a0esserci\u00a0centinaia\u00a0di\u00a0applicazioni\u00a0utilizzate\u00a0da\u00a0migliaia\u00a0di\u00a0dipendenti\u00a0in\u00a0numerosi\u00a0siti.<\/p>\n<p>Le\u00a0organizzazioni\u00a0finanziarie\u00a0dispongono\u00a0di\u00a0infrastrutture\u00a0di\u00a0sicurezza\u00a0complesse\u00a0che\u00a0richiedono\u00a0una\u00a0buona\u00a0coordinazione\u00a0dei\u00a0processi, delle\u00a0organizzazioni\u00a0e delle\u00a0persone. D&#8217;altra\u00a0parte, le normative in\u00a0materia\u00a0di\u00a0sicurezza\u00a0informatica\u00a0impongono\u00a0alle\u00a0banche di\u00a0proteggere\u00a0sia\u00a0i\u00a0loro\u00a0sistemi\u00a0interni\u00a0che\u00a0il\u00a0loro\u00a0ambiente\u00a0esterno.\u00a0Infatti, le\u00a0transazioni\u00a0finanziarie\u00a0spesso\u00a0coinvolgono\u00a0pi\u00f9 di\u00a0un&#8217;organizzazione\u00a0e, di\u00a0conseguenza, pi\u00f9 di un\u00a0sistema\u00a0informatico.<\/p>\n<p>Per\u00a0facilitare\u00a0questo\u00a0processo,\u00a0molte\u00a0organizzazioni\u00a0finanziarie\u00a0dipendono\u00a0da\u00a0fornitori\u00a0di\u00a0servizi\u00a0esterni\u00a0che\u00a0utilizzano\u00a0i\u00a0conti\u00a0privilegiati\u00a0come\u00a0strumento\u00a0nelle\u00a0loro\u00a0operazioni\u00a0quotidiane. Pi\u00f9 i\u00a0sistemi\u00a0sono\u00a0importanti\u00a0e\u00a0complessi,\u00a0maggiore\u00a0\u00e8 il\u00a0numero\u00a0di\u00a0utenti\u00a0privilegiati\u00a0che\u00a0devono\u00a0avere\u00a0accesso\u00a0ai\u00a0dati.\u00a0Queste\u00a0persone\u00a0possono\u00a0essere\u00a0dipendenti\u00a0diretti\u00a0dell&#8217;istituto\u00a0finanziario,\u00a0utenti\u00a0automatizzati,\u00a0appaltatori,\u00a0lavoratori\u00a0a\u00a0distanza\u00a0o\u00a0persino\u00a0supporto\u00a0informatico.\u00a0Sebbene\u00a0questo\u00a0approccio\u00a0sia\u00a0generalmente\u00a0indispensabile, i\u00a0conti\u00a0privilegiati\u00a0possono\u00a0rappresentare\u00a0un\u00a0enorme\u00a0rischio\u00a0potenziale\u00a0per l&#8217;azienda.<\/p>\n<p>Per quanto\u00a0riguarda\u00a0i\u00a0rischi\u00a0potenziali, i\u00a0conti\u00a0privilegiati\u00a0possono\u00a0accedere\u00a0a\u00a0dati\u00a0finanziari\u00a0preziosi\u00a0ed\u00a0eseguire\u00a0applicazioni\u00a0o\u00a0transazioni.\u00a0Essi\u00a0conferiscono\u00a0agli\u00a0utenti\u00a0i\u00a0privilegi\u00a0di &#8220;root&#8221; e l&#8217;accesso\u00a0per\u00a0apportare\u00a0grandi\u00a0modifiche\u00a0ai\u00a0sistemi,\u00a0nonch\u00e9\u00a0la\u00a0capacit\u00e0\u00a0di\u00a0nascondere\u00a0tutte le\u00a0attivit\u00e0\u00a0che\u00a0hanno\u00a0realizzato.<\/p>\n<p>I\u00a0conti\u00a0privilegiati\u00a0sono\u00a0essenziali\u00a0per i\u00a0processi\u00a0quotidiani\u00a0delle\u00a0istituzioni\u00a0finanziarie.\u00a0Tuttavia, le\u00a0aziende\u00a0devono\u00a0assicurarsi\u00a0che\u00a0siano\u00a0adeguatamente\u00a0protetti. In\u00a0caso\u00a0contrario, i\u00a0pirati\u00a0informatici\u00a0potrebbero\u00a0facilmente\u00a0ottenere\u00a0privilegi\u00a0amministrativi\u00a0e\u00a0apportare\u00a0modifiche\u00a0che\u00a0avrebbero\u00a0gravi\u00a0conseguenze.<\/p>\n<p><strong>Come<\/strong><strong>\u00a0le\u00a0soluzioni\u00a0di\u00a0Gestione\u00a0degli\u00a0Accessi\u00a0Privilegiati\u00a0possono\u00a0aiutare<\/strong><\/p>\n<p>Il\u00a0contesto\u00a0delle\u00a0minacce\u00a0\u00e8 in continua\u00a0evoluzione\u00a0e i\u00a0servizi\u00a0finanziari\u00a0devono\u00a0assicurarsi\u00a0di\u00a0utilizzare\u00a0un\u00a0approccio\u00a0semplificato\u00a0e\u00a0multilivello\u00a0nelle\u00a0operazioni\u00a0e\u00a0nella\u00a0sicurezza. Per\u00a0affrontare\u00a0queste\u00a0nuove\u00a0sfide,\u00a0proteggersi\u00a0dagli\u00a0attacchi\u00a0informatici\u00a0e\u00a0garantire\u00a0la\u00a0sicurezza\u00a0completa\u00a0dei\u00a0dati\u00a0e dei\u00a0sistemi\u00a0critici, \u00e8\u00a0quindi\u00a0necessario\u00a0implementare\u00a0una\u00a0soluzione\u00a0avanzata\u00a0di PAM (Gestione\u00a0degli\u00a0Accessi\u00a0Privilegiati) e di EPM (Gestione\u00a0dei\u00a0Privilegi\u00a0degli\u00a0Endpoint).<\/p>\n<p>Quando\u00a0un\u00a0sistema\u00a0PAM e EPM \u00e8 in\u00a0atto\u00a0per\u00a0monitorare\u00a0e\u00a0gestire\u00a0il\u00a0comportamento\u00a0degli\u00a0utenti\u00a0privilegiati, i\u00a0dati\u00a0diventano\u00a0pi\u00f9\u00a0sicuri\u00a0e le\u00a0organizzazioni\u00a0finanziarie\u00a0si\u00a0conformano\u00a0alle\u00a0normative\u00a0grazie\u00a0a:<\/p>\n<ul>\n<li>Un\u00a0vault\u00a0di\u00a0password\u00a0per\u00a0eliminare\u00a0l&#8217;accesso\u00a0agli\u00a0account\u00a0condivisi\u00a0e\u00a0imporre\u00a0la\u00a0rotazione\u00a0delle\u00a0password.<\/li>\n<li>La politica di Zero Trust per l&#8217;accesso privilegiato e privilegi elevati Just-In-Time per l&#8217;accesso alle applicazioni.<\/li>\n<li>La\u00a0sorveglianza\u00a0e la\u00a0registrazione\u00a0delle\u00a0sessioni\u00a0privilegiate\u00a0a fini di\u00a0prova\u00a0e audit.<\/li>\n<\/ul>\n<p>Tra i\u00a0vantaggi\u00a0offerti\u00a0dalle\u00a0soluzioni\u00a0PAM e EPM\u00a0figurano\u00a0l&#8217;autorizzazione, la\u00a0riautorizzazione\u00a0e la\u00a0sorveglianza\u00a0rapide e\u00a0sicure.\u00a0Queste\u00a0tecnologie\u00a0aiutano\u00a0il\u00a0settore\u00a0finanziario\u00a0a\u00a0rafforzare\u00a0la\u00a0sicurezza\u00a0degli\u00a0accessi\u00a0attraverso\u00a0la\u00a0gestione\u00a0delle\u00a0password,\u00a0garantendo\u00a0la\u00a0conformit\u00e0\u00a0con\u00a0le ultime\u00a0normative e\u00a0fornendo\u00a0le\u00a0informazioni\u00a0richieste\u00a0dagli\u00a0auditor.<\/p>\n<p>Le\u00a0soluzioni\u00a0PAM e EPM\u00a0implementano\u00a0anche\u00a0politiche\u00a0che\u00a0impediscono\u00a0agli\u00a0utenti\u00a0privilegiati\u00a0di\u00a0eludere\u00a0i\u00a0sistemi\u00a0di\u00a0sicurezza.\u00a0Inoltre,\u00a0entrambe\u00a0le\u00a0soluzioni\u00a0proteggono\u00a0gli\u00a0account\u00a0privilegiati\u00a0e\u00a0consentono\u00a0alle\u00a0organizzazioni\u00a0finanziarie\u00a0di\u00a0proteggersi\u00a0in modo\u00a0proattivo. Il\u00a0controllo\u00a0dell&#8217;accesso\u00a0privilegiato\u00a0limita i\u00a0movimenti\u00a0che\u00a0un pirata\u00a0informatico\u00a0pu\u00f2\u00a0compiere\u00a0una\u00a0volta\u00a0che\u00a0ha\u00a0ottenuto\u00a0un\u00a0accesso\u00a0alla\u00a0rete.<\/p>\n<p>Ci\u00f2\u00a0riduce\u00a0significativamente\u00a0la\u00a0loro\u00a0capacit\u00e0\u00a0di\u00a0muoversi\u00a0lateralmente\u00a0e di\u00a0accedere\u00a0ai\u00a0sistemi\u00a0sensibili\u00a0e consente anche di\u00a0monitorare\u00a0tutti i\u00a0vostri\u00a0utenti\u00a0privilegiati\u00a0con\u00a0registrazioni\u00a0complete\u00a0degli\u00a0accessi\u00a0e delle\u00a0azioni\u00a0effettuate\u00a0durante\u00a0la\u00a0loro\u00a0sessione. PAM \u00e8\u00a0essenziale\u00a0per\u00a0una\u00a0cybersicurezza\u00a0efficace perch\u00e9 permette di\u00a0controllare\u00a0l&#8217;accesso\u00a0alle\u00a0informazioni\u00a0pi\u00f9\u00a0critiche\u00a0di\u00a0un&#8217;organizzazione.<\/p>\n<p>Poich\u00e9\u00a0il\u00a0contesto\u00a0delle\u00a0minacce\u00a0\u00e8 in continua\u00a0evoluzione, \u00e8\u00a0quindi\u00a0imperativo\u00a0che\u00a0le\u00a0organizzazioni\u00a0finanziarie\u00a0dispongano\u00a0di\u00a0una\u00a0soluzione\u00a0di\u00a0sicurezza\u00a0facile da\u00a0usare,\u00a0flessibile\u00a0e capace di\u00a0adattarsi\u00a0facilmente\u00a0ai\u00a0cambiamenti\u00a0continui\u00a0nell&#8217;ambiente. L&#8217;implementazione\u00a0delle\u00a0giuste\u00a0misure\u00a0di\u00a0sicurezza\u00a0degli\u00a0accessi\u00a0privilegiati\u00a0ridurr\u00e0\u00a0significativamente\u00a0la\u00a0capacit\u00e0\u00a0dei\u00a0pirati\u00a0informatici\u00a0di\u00a0elevare\u00a0i\u00a0loro\u00a0privilegi\u00a0e di\u00a0accedere\u00a0a\u00a0informazioni\u00a0sensibili\u00a0come i\u00a0dati\u00a0personali\u00a0dei\u00a0clienti.<\/p>\n<p>\u00c8 per\u00a0questo\u00a0motivo\u00a0che\u00a0la\u00a0gestione\u00a0degli\u00a0accessi\u00a0privilegiati\u00a0e\u00a0degli\u00a0endpoint\u00a0diventa\u00a0cruciale per\u00a0queste\u00a0istituzioni\u00a0finanziarie\u00a0che\u00a0vogliono\u00a0proteggere\u00a0se\u00a0stesse\u00a0e i\u00a0propri\u00a0clienti,\u00a0rimanendo\u00a0sicure\u00a0e\u00a0conformi\u00a0alle\u00a0normative.<\/p>\n<p>Pirataggio:\u00a0Quando\u00a0la\u00a0sicurezza\u00a0conta per Uber\u00a0Scoprite\u00a0come\u00a0una\u00a0soluzione\u00a0PAM\u00a0avrebbe\u00a0permesso\u00a0di\u00a0proteggere\u00a0gli\u00a0accessi\u00a0alla\u00a0piattaforma\u00a0AWS, anche in\u00a0caso\u00a0di\u00a0compromissione\u00a0degli\u00a0account\u00a0GitHub.<\/p>\n<ul>\n<li>I\u00a0dati\u00a0di 57\u00a0milioni\u00a0di\u00a0utenti\u00a0sono\u00a0stati\u00a0rubati\u00a0a Uber.<\/li>\n<li>Individui\u00a0malintenzionati\u00a0sono\u00a0riusciti\u00a0a\u00a0connettersi\u00a0al\u00a0sito\u00a0privato\u00a0GitHub\u00a0degli\u00a0sviluppatori\u00a0dell&#8217;applicazione,\u00a0hanno\u00a0trovato\u00a0credenziali\u00a0di\u00a0accesso\u00a0AWS e le\u00a0hanno\u00a0utilizzate\u00a0per\u00a0sottrarre\u00a0dati\u00a0privati.<\/li>\n<\/ul>\n<p>Se il\u00a0numero\u00a0di\u00a0credenziali\u00a0rubate\u00a0\u00e8 molto\u00a0elevato,\u00a0molti\u00a0si\u00a0chiedono\u00a0come\u00a0ci\u00f2\u00a0sia\u00a0potuto\u00a0accadere, perch\u00e9 i\u00a0loro\u00a0dati\u00a0siano\u00a0su Amazon e\u00a0cosa\u00a0sia\u00a0esattamente\u00a0GitHub.\u00a0Approfondiamo\u00a0ci\u00f2\u00a0che\u00a0potrebbe\u00a0essere\u00a0successo&#8230;<\/p>\n<p>Gli\u00a0account\u00a0GitHub\u00a0degli\u00a0sviluppatori\u00a0dell&#8217;applicazione\u00a0Uber sono\u00a0stati\u00a0compromessi. Le\u00a0loro\u00a0password\u00a0sono state\u00a0rubate?\u00a0Si \u00e8\u00a0trattato\u00a0di un attacco di\u00a0phishing?\u00a0Abbiamo\u00a0poche\u00a0informazioni\u00a0su\u00a0questo\u00a0argomento\u00a0che\u00a0rimane\u00a0ancora\u00a0inspiegato\u00a0per\u00a0ora.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-av_button-e7bd3493009a07fe4e066fad555f8c2f-wrap avia-button-center  avia-builder-el-4  el_after_av_textblock  avia-builder-el-last '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_button-e7bd3493009a07fe4e066fad555f8c2f\">\n#top #wrap_all .avia-button.av-av_button-e7bd3493009a07fe4e066fad555f8c2f{\nbackground-color:#ec6707;\nborder-color:#ea6e52;\ncolor:#ffffff;\nborder-style:solid;\nborder-width:1px 1px 1px 1px;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-av_button-e7bd3493009a07fe4e066fad555f8c2f:hover{\nbackground-color:#ffffff;\ncolor:#f17c00;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-av_button-e7bd3493009a07fe4e066fad555f8c2f .avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n#top #wrap_all .avia-button.av-av_button-e7bd3493009a07fe4e066fad555f8c2f:hover .avia-svg-icon svg:first-child{\nfill:#f17c00;\nstroke:#f17c00;\n}\n<\/style>\n<a href='https:\/\/www.wallix.com\/company\/contact\/'  class='avia-button av-av_button-e7bd3493009a07fe4e066fad555f8c2f av-link-btn avia-icon_select-no avia-size-large avia-position-center'   aria-label=\"Contact us\"><span class='avia_iconbox_title' >Contact us<\/span><\/a><\/div><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4aosgyu-f6e8f307457a82be01f1fb1bd8fdd9b8\">\n#top .flex_column_table.av-equal-height-column-flextable.av-4aosgyu-f6e8f307457a82be01f1fb1bd8fdd9b8{\nmargin-top:-300px;\nmargin-bottom:0px;\n}\n.flex_column.av-4aosgyu-f6e8f307457a82be01f1fb1bd8fdd9b8{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-4aosgyu-f6e8f307457a82be01f1fb1bd8fdd9b8{\nmargin-top:-200px;\n}\n}\n<\/style>\n<div  class='flex_column av-4aosgyu-f6e8f307457a82be01f1fb1bd8fdd9b8 av_one_third  avia-builder-el-5  el_after_av_two_third  avia-builder-el-last  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-3v6bvja-d9b7b20d746a82b488f7c4d40a5ba4dc av-social-sharing-box-default  avia-builder-el-6  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Condividi questa voce<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Condividi su X\" href='https:\/\/twitter.com\/share?text=La%20messa%20in%20sicurezza%20delle%20istituzioni%20finanziarie%20con%20le%20soluzioni%20PAM&#038;url=https:\/\/www.wallix.com\/it\/?p=62730' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Condividi su X'><span class='avia_hidden_link_text'>Condividi su X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Condividi su LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=La%20messa%20in%20sicurezza%20delle%20istituzioni%20finanziarie%20con%20le%20soluzioni%20PAM&#038;url=https:\/\/www.wallix.com\/it\/blogpost\/securing-financial-institutions-with-the-help-of-pam-solutions\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Condividi su LinkedIn'><span class='avia_hidden_link_text'>Condividi su LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Condividi attraverso Mail\" href='mailto:?subject=La%20messa%20in%20sicurezza%20delle%20istituzioni%20finanziarie%20con%20le%20soluzioni%20PAM&#038;body=https:\/\/www.wallix.com\/it\/blogpost\/securing-financial-institutions-with-the-help-of-pam-solutions\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Condividi attraverso Mail'><span class='avia_hidden_link_text'>Condividi attraverso Mail<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-brqukm-cc7b9806476a00e1a2ac12f27801b589\">\n#top .hr.hr-invisible.av-brqukm-cc7b9806476a00e1a2ac12f27801b589{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-brqukm-cc7b9806476a00e1a2ac12f27801b589 hr-invisible  avia-builder-el-7  el_after_av_social_share  el_before_av_heading '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-31ywd7q-7500c5088b42032078f8a02608b0b840\">\n#top .av-special-heading.av-31ywd7q-7500c5088b42032078f8a02608b0b840{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-31ywd7q-7500c5088b42032078f8a02608b0b840 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-31ywd7q-7500c5088b42032078f8a02608b0b840 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-31ywd7q-7500c5088b42032078f8a02608b0b840 av-special-heading-h3 blockquote modern-quote  avia-builder-el-8  el_after_av_hr  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Contenuti correlati<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2ot1gue-bdf2598a24be988c05c4b67a113f0195\">\n#top .hr.hr-invisible.av-2ot1gue-bdf2598a24be988c05c4b67a113f0195{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-2ot1gue-bdf2598a24be988c05c4b67a113f0195 hr-invisible  avia-builder-el-9  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1hewbt2-69a56c4f34d1c5f0d051ee7acc3d774e\">\n#top .av-special-heading.av-1hewbt2-69a56c4f34d1c5f0d051ee7acc3d774e{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-1hewbt2-69a56c4f34d1c5f0d051ee7acc3d774e .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-1hewbt2-69a56c4f34d1c5f0d051ee7acc3d774e .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-1hewbt2-69a56c4f34d1c5f0d051ee7acc3d774e av-special-heading-h3 blockquote modern-quote  avia-builder-el-11  el_after_av_magazine  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Risorse correlate<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-zgk5hi-211c9dc37c8caee822554bedd58db2fa\">\n#top .hr.hr-invisible.av-zgk5hi-211c9dc37c8caee822554bedd58db2fa{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-zgk5hi-211c9dc37c8caee822554bedd58db2fa hr-invisible  avia-builder-el-12  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":52296,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1642,1724,1790],"tags":[],"class_list":["post-62730","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","category-finanza-e-assicurazione","category-privileged-access-management-it"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>La messa in sicurezza delle istituzioni finanziarie con le soluzioni PAM - WALLIX<\/title>\n<meta name=\"description\" content=\"Now more than ever, financial institutions are a favourite target for cybercriminals. This raises great concerns as an Accenture study...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/it\/blogpost\/securing-financial-institutions-with-the-help-of-pam-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La messa in sicurezza delle istituzioni finanziarie con le soluzioni PAM - WALLIX\" \/>\n<meta property=\"og:description\" content=\"Now more than ever, financial institutions are a favourite target for cybercriminals. This raises great concerns as an Accenture study...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/it\/blogpost\/securing-financial-institutions-with-the-help-of-pam-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-16T11:22:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-13T10:25:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/02\/AdobeStock_504360195-1030x575.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1030\" \/>\n\t<meta property=\"og:image:height\" content=\"575\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"WALLIX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"WALLIX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/securing-financial-institutions-with-the-help-of-pam-solutions\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/securing-financial-institutions-with-the-help-of-pam-solutions\\\/\"},\"author\":{\"name\":\"WALLIX\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\"},\"headline\":\"La messa in sicurezza delle istituzioni finanziarie con le soluzioni PAM\",\"datePublished\":\"2024-09-16T11:22:44+00:00\",\"dateModified\":\"2025-02-13T10:25:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/securing-financial-institutions-with-the-help-of-pam-solutions\\\/\"},\"wordCount\":3232,\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/securing-financial-institutions-with-the-help-of-pam-solutions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AdobeStock_504360195-scaled.jpeg\",\"articleSection\":[\"BLOGPOST\",\"FINANZA E ASSICURAZIONE\",\"PRIVILEGED ACCESS MANAGEMENT\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/securing-financial-institutions-with-the-help-of-pam-solutions\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/securing-financial-institutions-with-the-help-of-pam-solutions\\\/\",\"name\":\"La messa in sicurezza delle istituzioni finanziarie con le soluzioni PAM - WALLIX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/securing-financial-institutions-with-the-help-of-pam-solutions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/securing-financial-institutions-with-the-help-of-pam-solutions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AdobeStock_504360195-scaled.jpeg\",\"datePublished\":\"2024-09-16T11:22:44+00:00\",\"dateModified\":\"2025-02-13T10:25:41+00:00\",\"description\":\"Now more than ever, financial institutions are a favourite target for cybercriminals. This raises great concerns as an Accenture study...\",\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/securing-financial-institutions-with-the-help-of-pam-solutions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/securing-financial-institutions-with-the-help-of-pam-solutions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AdobeStock_504360195-scaled.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/AdobeStock_504360195-scaled.jpeg\",\"width\":2560,\"height\":1429,\"caption\":\"Identity and Access Management Concept - IAM and IdAM - New Technologies to Ensure that the Right Users Within a Network Have Appropriate Access to Enterprise Resources - Users with IDs Within a Secure Perimeter - 3D Illustration\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#website\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/wallixcom\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wallix\\\/\",\"https:\\\/\\\/www.youtube.com\\\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\",\"name\":\"WALLIX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"caption\":\"WALLIX\"},\"url\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/author\\\/alex\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La messa in sicurezza delle istituzioni finanziarie con le soluzioni PAM - WALLIX","description":"Now more than ever, financial institutions are a favourite target for cybercriminals. This raises great concerns as an Accenture study...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/it\/blogpost\/securing-financial-institutions-with-the-help-of-pam-solutions\/","og_locale":"it_IT","og_type":"article","og_title":"La messa in sicurezza delle istituzioni finanziarie con le soluzioni PAM - WALLIX","og_description":"Now more than ever, financial institutions are a favourite target for cybercriminals. This raises great concerns as an Accenture study...","og_url":"https:\/\/www.wallix.com\/it\/blogpost\/securing-financial-institutions-with-the-help-of-pam-solutions\/","og_site_name":"WALLIX","article_published_time":"2024-09-16T11:22:44+00:00","article_modified_time":"2025-02-13T10:25:41+00:00","og_image":[{"width":1030,"height":575,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/02\/AdobeStock_504360195-1030x575.jpeg","type":"image\/jpeg"}],"author":"WALLIX","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"Scritto da":"WALLIX","Tempo di lettura stimato":"7 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/it\/blogpost\/securing-financial-institutions-with-the-help-of-pam-solutions\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/it\/blogpost\/securing-financial-institutions-with-the-help-of-pam-solutions\/"},"author":{"name":"WALLIX","@id":"https:\/\/www.wallix.com\/it\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd"},"headline":"La messa in sicurezza delle istituzioni finanziarie con le soluzioni PAM","datePublished":"2024-09-16T11:22:44+00:00","dateModified":"2025-02-13T10:25:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/it\/blogpost\/securing-financial-institutions-with-the-help-of-pam-solutions\/"},"wordCount":3232,"publisher":{"@id":"https:\/\/www.wallix.com\/it\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/it\/blogpost\/securing-financial-institutions-with-the-help-of-pam-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/02\/AdobeStock_504360195-scaled.jpeg","articleSection":["BLOGPOST","FINANZA E ASSICURAZIONE","PRIVILEGED ACCESS MANAGEMENT"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/it\/blogpost\/securing-financial-institutions-with-the-help-of-pam-solutions\/","url":"https:\/\/www.wallix.com\/it\/blogpost\/securing-financial-institutions-with-the-help-of-pam-solutions\/","name":"La messa in sicurezza delle istituzioni finanziarie con le soluzioni PAM - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/it\/blogpost\/securing-financial-institutions-with-the-help-of-pam-solutions\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/it\/blogpost\/securing-financial-institutions-with-the-help-of-pam-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/02\/AdobeStock_504360195-scaled.jpeg","datePublished":"2024-09-16T11:22:44+00:00","dateModified":"2025-02-13T10:25:41+00:00","description":"Now more than ever, financial institutions are a favourite target for cybercriminals. This raises great concerns as an Accenture study...","inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/it\/blogpost\/securing-financial-institutions-with-the-help-of-pam-solutions\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.wallix.com\/it\/blogpost\/securing-financial-institutions-with-the-help-of-pam-solutions\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/02\/AdobeStock_504360195-scaled.jpeg","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/02\/AdobeStock_504360195-scaled.jpeg","width":2560,"height":1429,"caption":"Identity and Access Management Concept - IAM and IdAM - New Technologies to Ensure that the Right Users Within a Network Have Appropriate Access to Enterprise Resources - Users with IDs Within a Secure Perimeter - 3D Illustration"},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/it\/#website","url":"https:\/\/www.wallix.com\/it\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/it\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.wallix.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/it\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd","name":"WALLIX","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","caption":"WALLIX"},"url":"https:\/\/www.wallix.com\/it\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/posts\/62730","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/comments?post=62730"}],"version-history":[{"count":9,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/posts\/62730\/revisions"}],"predecessor-version":[{"id":68198,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/posts\/62730\/revisions\/68198"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/media\/52296"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/media?parent=62730"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/categories?post=62730"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/tags?post=62730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}