{"id":115204,"date":"2021-02-03T18:07:38","date_gmt":"2021-02-03T23:07:38","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/customer-identity\/"},"modified":"2025-12-24T03:08:22","modified_gmt":"2025-12-24T08:08:22","slug":"customer-identity","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/products\/customer-identity\/","title":{"rendered":"Customer Identity"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 hero dark&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243;][vc_column_text el_class=&#8220;cyb-breadcrumb&#8220;]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/de\/products\/access-management\/\">Zur\u00fcck zum Access Management<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>Customer Identity<\/h1>\n<p><\/p>\n<h2>Begeistern Sie Ihre Kunden mit einfachem und sicherem Zugriff auf Ihre Websites und Apps, damit sie Ihrem Unternehmen die Treue halten.<\/h2>\n<p>\n[\/vc_column_text][vc_btn title=&#8220;Demo anfordern&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Ftry-buy%2Fworkforce-access-solutions-demo%2F|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-2&#8243; css=&#8220;.vc_custom_1701722019073{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/12\/businessman-forcefield-hero.png?id=184775) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 cybv2_sticky_nav&#8220; css=&#8220;.vc_custom_1614201964540{background-color: #f7f7f7 !important;}&#8220;][vc_column width=&#8220;1\/4&#8243;][vc_column_text el_class=&#8220;sticky-nav-title&#8220;]<\/p>\n<h3><i class=\"fas fa-long-arrow-alt-up\"><\/i>Customer Identity<\/h3>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243;][vc_raw_html el_class=&#8220;sticky-nav-buttons&#8220;]PCEtLSBBZGQgbGkgZm9yIHNlY3Rpb24gZGF0YS1zY3JvbGwtY2xhc3MgaXMgd2hlcmUgeW91IHB1dCB0aGUgc2VjdGlvbiBjbGFzcyB5b3Ugd2FudCB0byBzY3JvbGwgdG8gLS0+PGJyPjx1bD4NCjxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTEiPlZvcnRlaWxlPC9saT4NCjxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTIiPlByb2R1a3RlPC9saT4NCjxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTMiPkFud2VuZHVuZ3Nmw6RsbGU8L2xpPg0KPC91bD4=[\/vc_raw_html][\/vc_column][vc_column width=&#8220;1\/4&#8243;][vc_btn title=&#8220;Demo anfordern&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Ftry-buy%2Fworkforce-access-solutions-demo%2F|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;subnav-dropdown&#8220;][vc_column_text el_class=&#8220;sticky-nav-title&#8220;]<\/p>\n<h5 style=\"text-align: right;\">Gehen zu<i class=\"fas fa-chevron-circle-down\"><\/i><\/h5>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad-top overview-vt sub-1&#8243; css=&#8220;.vc_custom_1617032896465{background-color: #f7f7f7 !important;}&#8220;][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;head-box&#8220;][vc_column_text]<\/p>\n<h3>Gew\u00e4hren Sie Ihren Kunden Zugriff \u2013 und wehren Angreifer ab<\/h3>\n<p>Die Erwartungen an gro\u00dfartige digitale Erlebnisse sind auf einem Allzeithoch. Gleichzeitig ist die Angriffsfl\u00e4che por\u00f6ser denn je. Mit CyberArk Customer Identity k\u00f6nnen Sie Ihre Websites und Apps sicher und zuverl\u00e4ssig f\u00fcr Kunden zug\u00e4nglich machen.[\/vc_column_text][\/vc_column][vc_column width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=&#8220;cta-box&#8220;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-109267\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/SeamlessIntegration-Overview-Vertical-Customer-Identities.svg\" alt=\"Symbol f\u00fcr nahtlose Integration\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Benutzererfahrung<\/h4>\n<p>Nahtlose Integration, intuitive Zugriffskontrolle und reibungsloses Anmeldeerlebnis.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;cta-box&#8220;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-109275\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Privacy-Overview-Vertical-Customer-Identities.svg\" alt=\"Symbol Datenschutz\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Starke Sicherheit<\/h4>\n<p>Datenschutz, Einwilligung und Identit\u00e4tspr\u00fcfung auf einer Plattform.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;cta-box&#8220;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-109283\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/PreBuilt_OpenAPI-Overview-Vertical-Customer-Identities.svg\" alt=\"Symbol Sofort einsatzbereit\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Schnelle Amortisation<\/h4>\n<p>Vorgefertigte Widgets und offene APIs, um den Entwicklungsaufwand zu reduzieren.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 cybv2-pad-top text-md-center sub-2&#8243;][vc_column][vc_column_text]<\/p>\n<h2>Schaffen Sie einfache und sichere Benutzerfahrungen<\/h2>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 cybv2-pad-btm text-md-center&#8220;][vc_column width=&#8220;2\/3&#8243; offset=&#8220;vc_col-sm-offset-2&#8243;][vc_column_text]<\/p>\n<h5>Erm\u00f6glichen Sie Kunden, Transaktionen mit Zuversicht abzuwickeln.<\/h5>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 seesaw&#8220;][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;above wistia_embed&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-111750\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Authentication-Authorization-seesaw-1.jpg\" alt=\"Authentifizierung und Autorisierung\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Authentication-Authorization-seesaw-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Authentication-Authorization-seesaw-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Authentication-Authorization-seesaw-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Authentication-Authorization-seesaw-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8220;7\/12&#8243; el_class=&#8220;below-right&#8220;][vc_column_text el_class=&#8220;dark&#8220;]<\/p>\n<h4>Authentifizierung und Autorisierung<\/h4>\n<p>Integrieren Sie eine sichere <a href=\"https:\/\/www.cyberark.com\/de\/products\/single-sign-on\/\">Single Sign-On-Erfahrung<\/a> und steuern Sie den Zugriff mit feingranularen Richtlinien.[\/vc_column_text][vc_btn title=&#8220;Mehr erfahren&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fproducts%2Fauthentication-authorization%2F|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 seesaw cyb-reverse&#8220;][vc_column width=&#8220;7\/12&#8243; el_class=&#8220;below-left&#8220;][vc_column_text el_class=&#8220;dark&#8220;]<\/p>\n<h4>Multi-Faktor-Authentifizierung<\/h4>\n<p>Starke KI-gest\u00fctzte, risikobewusste und passwortfreie Authentifizierung.[\/vc_column_text][vc_btn title=&#8220;Mehr erfahren&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fproducts%2Fmulti-factor-authentication%2F|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;above&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-111774\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Multi-factor-Authentication-seesaw-1.jpg\" alt=\"Multi-Faktor-Authentifizierung\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Multi-factor-Authentication-seesaw-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Multi-factor-Authentication-seesaw-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Multi-factor-Authentication-seesaw-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Multi-factor-Authentication-seesaw-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 seesaw&#8220;][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;above&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-109307\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/DirectoryUserManagement-seesaw.jpg\" alt=\"Verzeichnis- und Nutzerverwaltung\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/DirectoryUserManagement-seesaw.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/DirectoryUserManagement-seesaw-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/DirectoryUserManagement-seesaw-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/DirectoryUserManagement-seesaw-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8220;7\/12&#8243; el_class=&#8220;below-right&#8220;][vc_column_text el_class=&#8220;dark&#8220;]<\/p>\n<h4>Verzeichnis- und Nutzerverwaltung<\/h4>\n<p>Vereinfachen Sie die Anmeldung und das Identity Management f\u00fcr Ihre Kunden.[\/vc_column_text][vc_btn title=&#8220;Mehr erfahren&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fproducts%2Fdirectory-user-management%2F|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 seesaw cyb-reverse&#8220;][vc_column width=&#8220;7\/12&#8243; el_class=&#8220;below-left&#8220;][vc_column_text el_class=&#8220;dark&#8220;]<\/p>\n<h4>Entwickler-Tools<\/h4>\n<p>Eine umfassende Sammlung von Ressourcen, Leitf\u00e4den und Tools, die Entwicklern bei der Integration der <a href=\"https:\/\/www.cyberark.com\/de\/products\/\">CyberArk Identity Security Plattform<\/a>helfen.[\/vc_column_text][vc_btn title=&#8220;Mehr erfahren&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fproducts%2Fdeveloper-tools%2F|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;above&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-109315\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Developer-Tools-seesaw.jpg\" alt=\"Entwickler-Tools\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Developer-Tools-seesaw.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Developer-Tools-seesaw-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Developer-Tools-seesaw-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Developer-Tools-seesaw-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 cybv2-pad-top overview-hz sub-3&#8243;][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;head-box&#8220;][vc_column_text]<\/p>\n<h3>Sicherheit, die f\u00fcr Sie arbeitet<\/h3>\n<p>Hier sind nur einige weitere M\u00f6glichkeiten, wie wir Ihnen helfen k\u00f6nnen, in einer digitalen Welt furchtlos voranzukommen.[\/vc_column_text][\/vc_column][vc_column width=&#8220;2\/3&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_row_inner equal_height=&#8220;yes&#8220;][vc_column_inner el_class=&#8220;cta-box&#8220; width=&#8220;5\/12&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-109323\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Enable-the-Digital-Business-icon-1.svg\" alt=\"Symbol Digitales Business erm\u00f6glichen\" \/>[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1695967928971{padding-bottom: 20px !important;}&#8220;]<\/p>\n<h4>Digitales Business erm\u00f6glichen<\/h4>\n<p>Sicherer Zugriff auf Business-Apps f\u00fcr menschliche und maschinelle Identit\u00e4ten.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/solutions\/digital-business-transformation\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;cta-box&#8220; width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-109331\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Secure-DevOps-Cloud-1.svg\" alt=\"Symbol Sichere DevOps-Cloud\" \/>[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1611856995498{padding-bottom: 20px !important;}&#8220;]<\/p>\n<h4>Sicheres DevOps und Cloud<\/h4>\n<p>Sicherer Zugriff f\u00fcr Maschinenidentit\u00e4ten innerhalb der DevOps-Pipeline.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/solutions\/devsecops-cloud-native-apps\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;cta-box&#8220; width=&#8220;5\/12&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-109339\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Drive-Operational-Efficiencies.svg\" alt=\"Symbol Betriebliche Effizienz steigern\" \/>[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1695968875589{padding-bottom: 20px !important;}&#8220;]<\/p>\n<h4>Betriebliche Effizienz steigern<\/h4>\n<p>Reduzieren Sie die Komplexit\u00e4t und Belastung der IT, w\u00e4hrend Sie den Schutz des Unternehmens verbessern.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/solutions\/operational-efficiencies\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 cybv2-pad cybv2-oval-left-background hv-cta-list&#8220; css=&#8220;.vc_custom_1611885567532{background-color: #ff7600 !important;}&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;img-box&#8220; css=&#8220;.vc_custom_1612379041757{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Customer-Identities-highvalueCTA.jpg?id=111993) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;stat-column&#8220;][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220; width=&#8220;3\/4&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text]<\/p>\n<h2>30-Tage-Test anfordern<\/h2>\n<p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; width=&#8220;11\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]Sicheren Single Sign-On-Zugriff auf Ihre Apps und Services bieten[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; width=&#8220;11\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]Starke KI-gest\u00fctzte, risikobewusste und passwortfreie Authentifizierung erhalten[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; width=&#8220;11\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]IT-Aufwand durch Self-Service-Funktionen reduzieren[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; width=&#8220;11\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_btn title=&#8220;Demo anfordern&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Ftry-buy%2Fworkforce-access-solutions-demo%2F|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8220;cyb-pad cybv2&#8243;][vc_column][vc_column_text css=&#8220;&#8220; el_class=&#8220;tiny&#8220;]CyberArk besitzt Patentrechte in Bezug auf diese Technologie \u2013 <a href=\"https:\/\/www.cyberark.com\/de\/patents\/\">https:\/\/www.cyberark.com\/de\/patents<\/a>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":32304,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27773],"class_list":["post-115204","page","type-page","status-publish","hentry","product_category-access"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Customer Identity and Access Management (CIAM) | CyberArk<\/title>\n<meta name=\"description\" content=\"Mit den Customer Identity-L\u00f6sungen von CyberArk k\u00f6nnen Sie Ihre Websites und Apps sicher und vertrauensvoll f\u00fcr Kunden \u00f6ffnen.\u00a0 Lassen Sie Kunden herein und halten Sie Angreifer fern!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/de\/products\/customer-identity\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Customer Identity\" \/>\n<meta property=\"og:description\" content=\"Mit den Customer Identity-L\u00f6sungen von CyberArk k\u00f6nnen Sie Ihre Websites und Apps sicher und vertrauensvoll f\u00fcr Kunden \u00f6ffnen.\u00a0 Lassen Sie Kunden herein und halten Sie Angreifer fern!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/de\/products\/customer-identity\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-24T08:08:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/de\/products\/customer-identity\/\",\"url\":\"https:\/\/www.cyberark.com\/de\/products\/customer-identity\/\",\"name\":\"Customer Identity and Access Management (CIAM) | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/products\/customer-identity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/products\/customer-identity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/SeamlessIntegration-Overview-Vertical-Customer-Identities.svg\",\"datePublished\":\"2021-02-03T23:07:38+00:00\",\"dateModified\":\"2025-12-24T08:08:22+00:00\",\"description\":\"Mit den Customer Identity-L\u00f6sungen von CyberArk k\u00f6nnen Sie Ihre Websites und Apps sicher und vertrauensvoll f\u00fcr Kunden \u00f6ffnen.\u00a0 Lassen Sie Kunden herein und halten Sie Angreifer fern!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/products\/customer-identity\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/de\/products\/customer-identity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/de\/products\/customer-identity\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/SeamlessIntegration-Overview-Vertical-Customer-Identities.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/SeamlessIntegration-Overview-Vertical-Customer-Identities.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/de\/products\/customer-identity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Produkte\",\"item\":\"https:\/\/www.cyberark.com\/de\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Customer Identity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/de\/#website\",\"url\":\"https:\/\/www.cyberark.com\/de\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/de\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Customer Identity and Access Management (CIAM) | CyberArk","description":"Mit den Customer Identity-L\u00f6sungen von CyberArk k\u00f6nnen Sie Ihre Websites und Apps sicher und vertrauensvoll f\u00fcr Kunden \u00f6ffnen.\u00a0 Lassen Sie Kunden herein und halten Sie Angreifer fern!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/de\/products\/customer-identity\/","og_locale":"de_DE","og_type":"article","og_title":"Customer Identity","og_description":"Mit den Customer Identity-L\u00f6sungen von CyberArk k\u00f6nnen Sie Ihre Websites und Apps sicher und vertrauensvoll f\u00fcr Kunden \u00f6ffnen.\u00a0 Lassen Sie Kunden herein und halten Sie Angreifer fern!","og_url":"https:\/\/www.cyberark.com\/de\/products\/customer-identity\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-12-24T08:08:22+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"5 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/de\/products\/customer-identity\/","url":"https:\/\/www.cyberark.com\/de\/products\/customer-identity\/","name":"Customer Identity and Access Management (CIAM) | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/de\/products\/customer-identity\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/de\/products\/customer-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/SeamlessIntegration-Overview-Vertical-Customer-Identities.svg","datePublished":"2021-02-03T23:07:38+00:00","dateModified":"2025-12-24T08:08:22+00:00","description":"Mit den Customer Identity-L\u00f6sungen von CyberArk k\u00f6nnen Sie Ihre Websites und Apps sicher und vertrauensvoll f\u00fcr Kunden \u00f6ffnen.\u00a0 Lassen Sie Kunden herein und halten Sie Angreifer fern!","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/de\/products\/customer-identity\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/de\/products\/customer-identity\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/de\/products\/customer-identity\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/SeamlessIntegration-Overview-Vertical-Customer-Identities.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/SeamlessIntegration-Overview-Vertical-Customer-Identities.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/de\/products\/customer-identity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/de\/"},{"@type":"ListItem","position":2,"name":"Produkte","item":"https:\/\/www.cyberark.com\/de\/products\/"},{"@type":"ListItem","position":3,"name":"Customer Identity"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/de\/#website","url":"https:\/\/www.cyberark.com\/de\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/de\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/115204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=115204"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/115204\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32304"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=115204"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=115204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}