{"id":7871,"date":"2022-03-27T11:16:07","date_gmt":"2022-03-27T08:16:07","guid":{"rendered":"https:\/\/www.almtoolbox.com\/blog_he\/?p=7871"},"modified":"2022-03-27T11:59:12","modified_gmt":"2022-03-27T08:59:12","slug":"akeyless-case-study-stash","status":"publish","type":"post","link":"https:\/\/www.almtoolbox.com\/blog_he\/akeyless-case-study-stash\/","title":{"rendered":"\u05e1\u05d9\u05e4\u05d5\u05e8 \u05dc\u05e7\u05d5\u05d7: \u05de\u05d3\u05d5\u05e2 \u05d7\u05d1\u05e8\u05ea Stash \u05d1\u05d7\u05e8\u05d4 \u05d1\u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05e9\u05dc Akeyless"},"content":{"rendered":"<p>Gavin Grisamore , \u05d4- CISO \u05e9\u05dc \u05d7\u05d1\u05e8\u05ea Stash (\u05d7\u05d1\u05e8\u05d4 \u05d0\u05de\u05e8\u05d9\u05e7\u05d0\u05d9\u05ea \u05de\u05e0\u05d9\u05d5 \u05d9\u05d5\u05e8\u05e7 \u05e9\u05e2\u05d5\u05e1\u05e7\u05ea \u05d1- finance \u05d5\u05d4\u05e9\u05e7\u05e2\u05d5\u05ea) \u05de\u05e1\u05d1\u05d9\u05e8 \u05d1\u05d4\u05e7\u05dc\u05d8\u05d4 \u05d4\u05de\u05e6\u05d5\u05e8\u05e4\u05ea \u05de\u05d3\u05d5\u05e2 \u05d1\u05d7\u05e8\u05d5 \u05d1\u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05d4- <em>Secrets Management <\/em>\u05d5- <em>Remote Access<\/em>\u00a0\u05e9\u05dc Akeyless<br \/>\n\u05d5\u05db\u05d9\u05e6\u05d3 \u05d6\u05d4 \u05e2\u05d5\u05d6\u05e8 \u05dc\u05d4\u05dd \u05d2\u05dd \u05dc\u05de\u05de\u05e9 \u05e4\u05ea\u05e8\u05d5\u05df \u05d4\u05ea\u05d7\u05d1\u05e8\u05d5\u05ea \u05de\u05e8\u05d7\u05d5\u05e7 \u05dc\u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05d5\u05e4\u05ea\u05e8\u05d5\u05df \u05dc\u05d0\u05ea\u05d2\u05e8\u05d9 \u05d4- &quot; Zero Trust&quot; .<\/p>\n<h3>\u05d4\u05d5\u05d9\u05d3\u05d0\u05d5 \u05dc\u05e6\u05e4\u05d9\u05d4 \u05db\u05d0\u05df (6 \u05d3\u05e7\u05d5\u05ea):<\/h3>\n<div style=\"padding: 56.25% 0 0 0; position: relative;\"><iframe style=\"position: absolute; top: 0; left: 0; width: 100%; height: 100%;\" title=\"stash-akeyless-case-study\" src=\"https:\/\/player.vimeo.com\/video\/692730690?h=9d87ddc08a&amp;badge=0&amp;autopause=0&amp;player_id=0&amp;app_id=58479\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div>\n<p><script src=\"https:\/\/player.vimeo.com\/api\/player.js\"><\/script><\/p>\n<p>\u05dc\u05e0\u05d5\u05d7\u05d9\u05d5\u05ea\u05db\u05dd \u05d4\u05d5\u05e1\u05e4\u05e0\u05d5 \u05d2\u05dd \u05db\u05ea\u05d5\u05d1\u05d9\u05d5\u05ea \u05d1\u05d0\u05e0\u05d2\u05dc\u05d9\u05ea \u05d1\u05d2\u05d5\u05e3 \u05d4\u05d5\u05d9\u05d3\u05d0\u05d5,<br \/>\n\u05d5\u05d4\u05d8\u05e7\u05e1\u05d8 \u05d4\u05de\u05dc\u05d0 \u05e0\u05de\u05e6\u05d0 \u05d2\u05dd <span style=\"text-decoration: underline;\">\u05db\u05d0\u05df<\/span>.<\/p>\n<div class=\"alm-box\">\n<h4><em>\u05d0\u05e0\u05d5 \u05de\u05d9\u05d9\u05e6\u05d2\u05d9\u05dd \u05e8\u05e9\u05de\u05d9\u05ea \u05d0\u05ea \u05d7\u05d1\u05e8\u05ea Akeyless \u05d1\u05d9\u05e9\u05e8\u05d0\u05dc \u05d5\u05d1\u05e2\u05d5\u05dc\u05dd \u05d5\u05de\u05ea\u05de\u05d7\u05d9\u05dd \u05d1\u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05d4\u05d7\u05d1\u05e8\u05d4 \u05d5\u05d1- DevSecOps,<br \/>\n\u05d5\u05e0\u05e9\u05de\u05d7 \u05dc\u05e2\u05e0\u05d5\u05ea \u05e2\u05dc \u05e9\u05d0\u05dc\u05d5\u05ea \u05d1\u05e0\u05d5\u05d2\u05e2 \u05dc\u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05d4\u05d7\u05d1\u05e8\u05d4,<br \/>\n\u05d5\u05db\u05df \u05e0\u05e9\u05de\u05d7 \u05dc\u05e2\u05d6\u05d5\u05e8 \u05d1\u05d1\u05d7\u05d9\u05e0\u05ea \u05d4\u05de\u05d5\u05e6\u05e8 \u05d5\u05d1\u05d4\u05d8\u05de\u05e2\u05d4 \u05e0\u05db\u05d5\u05e0\u05d4 \u05e9\u05dc\u05d5 \u05d1\u05d0\u05e8\u05d2\u05d5\u05df.<\/em><br \/>\n<em>\u05dc\u05e4\u05e8\u05d8\u05d9\u05dd \u05e0\u05d5\u05e1\u05e4\u05d9\u05dd \u05e4\u05e0\u05d5 \u05d0\u05dc\u05d9\u05e0\u05d5:\u00a0 <a href=\"mailto:akeyless@almtoolbox.com\" target=\"_blank\" rel=\"noopener\">akeyless@almtoolbox.com<\/a> \u05d0\u05d5 \u05d8\u05dc\u05e4\u05d5\u05e0\u05d9\u05ea: 072-240-5222<\/em><\/h4>\n<\/div>\n<h3>\u05e7\u05d9\u05e9\u05d5\u05e8\u05d9\u05dd \u05e8\u05dc\u05d1\u05e0\u05d8\u05d9\u05dd:<\/h3>\n<ul>\n<li>\u05d0\u05d5\u05d3\u05d5\u05ea <a href=\"https:\/\/www.almtoolbox.com\/akeyless-vault\" target=\"_blank\" rel=\"noopener\">\u05e4\u05ea\u05e8\u05d5\u05df Secrets Management \u05e9\u05dc Akeyless<\/a><\/li>\n<li>\u05d0\u05d5\u05d3\u05d5\u05ea <a href=\"https:\/\/www.almtoolbox.com\/akeyless-remote-access\" target=\"_blank\" rel=\"noopener\">\u05e4\u05ea\u05e8\u05d5\u05df Secure Remote Access \u05e9\u05dc Akeyless<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Gavin Grisamore , \u05d4- CISO \u05e9\u05dc \u05d7\u05d1\u05e8\u05ea Stash (\u05d7\u05d1\u05e8\u05d4 \u05d0\u05de\u05e8\u05d9\u05e7\u05d0\u05d9\u05ea \u05de\u05e0\u05d9\u05d5 \u05d9\u05d5\u05e8\u05e7 \u05e9\u05e2\u05d5\u05e1\u05e7\u05ea \u05d1- finance \u05d5\u05d4\u05e9\u05e7\u05e2\u05d5\u05ea) \u05de\u05e1\u05d1\u05d9\u05e8 \u05d1\u05d4\u05e7\u05dc\u05d8\u05d4 \u05d4\u05de\u05e6\u05d5\u05e8\u05e4\u05ea \u05de\u05d3\u05d5\u05e2 \u05d1\u05d7\u05e8\u05d5 \u05d1\u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05d4- Secrets Management \u05d5- Remote Access\u00a0\u05e9\u05dc Akeyless \u05d5\u05db\u05d9\u05e6\u05d3 \u05d6\u05d4 \u05e2\u05d5\u05d6\u05e8 \u05dc\u05d4\u05dd \u05d2\u05dd \u05dc\u05de\u05de\u05e9 \u05e4\u05ea\u05e8\u05d5\u05df \u05d4\u05ea\u05d7\u05d1\u05e8\u05d5\u05ea \u05de\u05e8\u05d7\u05d5\u05e7 \u05dc\u05e2\u05d5\u05d1\u05d3\u05d9\u05dd \u05d5\u05e4\u05ea\u05e8\u05d5\u05df \u05dc\u05d0\u05ea\u05d2\u05e8\u05d9 \u05d4- &quot; Zero Trust&quot; . \u05d4\u05d5\u05d9\u05d3\u05d0\u05d5 \u05dc\u05e6\u05e4\u05d9\u05d4 \u05db\u05d0\u05df (6 \u05d3\u05e7\u05d5\u05ea): \u05dc\u05e0\u05d5\u05d7\u05d9\u05d5\u05ea\u05db\u05dd \u05d4\u05d5\u05e1\u05e4\u05e0\u05d5 \u05d2\u05dd \u05db\u05ea\u05d5\u05d1\u05d9\u05d5\u05ea [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":7884,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[670,64,189,684,683],"tags":[],"class_list":["post-7871","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-akeyless","category-case-studies","category-devsecops","category-remote-access","category-secrets-management"],"_links":{"self":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/7871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/comments?post=7871"}],"version-history":[{"count":13,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/7871\/revisions"}],"predecessor-version":[{"id":7877,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/7871\/revisions\/7877"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/media\/7884"}],"wp:attachment":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/media?parent=7871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/categories?post=7871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/tags?post=7871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}