{"id":"4719d6e4-93d0-47a3-ad0c-9e8665ccc291","timestamp":1775679264220,"matcher":{"static":{"/resources/2023-state-of-cloud-identities-and-privileges-report":{"redirect":"/resource/downloads/2023-state-of-cloud-identities-and-privileges-report"},"/resources/access-builder-solution-brief":{"redirect":"/resource/downloads/access-builder-solution-brief"},"/resources/cloud-pam-anywhere-solution-brief":{"redirect":"/resource/downloads/cloud-pam-anywhere-solution-brief"},"/resources/cloud-pam-for-aws-solution-brief":{"redirect":"/resource/downloads/cloud-pam-for-aws-solution-brief"},"/resources/cloud-pam-for-gcp-solution-brief":{"redirect":"/resource/downloads/cloud-pam-for-gcp-solution-brief"},"/resources/conquering-cloud-complexity":{"redirect":"/resource/downloads/conquering-cloud-complexity"},"/resources/dynamic-cloud-secrets-manager":{"redirect":"/resource/downloads/dynamic-cloud-secrets-manager"},"/resources/five-techniques-to-mitigate-the-risk-of-over-privileged-non-human-identities":{"redirect":"/resource/downloads/five-techniques-to-mitigate-the-risk-of-over-privileged-non-human-identities"},"/resources/kubernetes-k8s-integration-solution-brief":{"redirect":"/resource/downloads/kubernetes-k8s-integration-solution-brief"},"/resources/revolutionizing-security-with-true-dynamic-cloud-pam":{"redirect":"/resource/downloads/revolutionizing-security-with-true-dynamic-cloud-pam"},"/resources/modern-cloud-pam-guide":{"redirect":"/resource/downloads/modern-cloud-pam-guide"},"/resources/?post_types=post":{"redirect":"/resources/blog"},"/resources/?post_types=whitepaper":{"redirect":"/resources/downloads"},"/resources/?post_types=webinar":{"redirect":"/resources/events"},"/sitemap.xml":{"redirect":"/sitemap_index.xml"}},"wildcard":{},"dynamic":{}},"prerendered":[]}