{"id":115276,"date":"2021-02-03T16:03:39","date_gmt":"2021-02-03T21:03:39","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/"},"modified":"2025-11-03T01:14:38","modified_gmt":"2025-11-03T06:14:38","slug":"privileged-access-manager","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/products\/privileged-access-manager\/","title":{"rendered":"Privileged Access Manager"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 int-hero&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243;][vc_column_text el_class=&#8220;cyb-breadcrumb&#8220;]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/de\/products\/privileged-access\/\"> Zur\u00fcck zu Privileged Access<\/a>[\/vc_column_text][vc_column_text css=&#8220;&#8220;]<\/p>\n<h1>Privileged Access Manager<\/h1>\n<p><\/p>\n<h2>Modernisieren Sie Ihr PAM-Programm und bieten Sie umfassenden Schutz f\u00fcr Ihre gesamte IT-Umgebung in Hybrid- und Multi-Cloud-Umgebungen. Entdecken Sie neue Prozesse, Richtlinien und Kontrollen, um die Risiken von Privileged Access besser zu reduzieren.<\/h2>\n<p>\n[\/vc_column_text][vc_btn title=&#8220;Demo anfordern&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Ftry-buy%2Fprivileged-access-manager-demo%2F|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/lp.cyberark.com\/gartner-mq-pam-2024.html\">Gartner PAM Magic Quadrant<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-2&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_9rxkv5ry8y videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 cybv2_sticky_nav&#8220; css=&#8220;.vc_custom_1614201964540{background-color: #f7f7f7 !important;}&#8220;][vc_column width=&#8220;1\/4&#8243;][vc_column_text el_class=&#8220;sticky-nav-title&#8220;]<\/p>\n<h3><i class=\"fas fa-long-arrow-alt-up\"><\/i>Privileged Access Manager<\/h3>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243;][vc_raw_html el_class=&#8220;sticky-nav-buttons&#8220;]PCEtLSBBZGQgbGkgZm9yIHNlY3Rpb24gZGF0YS1zY3JvbGwtY2xhc3MgaXMgd2hlcmUgeW91IHB1dCB0aGUgc2VjdGlvbiBjbGFzcyB5b3Ugd2FudCB0byBzY3JvbGwgdG8gLS0+PGJyPjx1bD4NCjxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTEiPlZvcnRlaWxlPC9saT4NCjxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTIiPk3DtmdsaWNoa2VpdGVuPC9saT4NCjxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViLTMiPldpZSBlcyBmdW5rdGlvbmllcnQ8L2xpPg0KPGxpIGRhdGEtc2Nyb2xsLWNsYXNzPSJzdWItNCI+UmVzc291cmNlbjwvbGk+DQo8L3VsPg==[\/vc_raw_html][\/vc_column][vc_column width=&#8220;1\/4&#8243;][vc_btn title=&#8220;Demo anfordern&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Ftry-buy%2Fprivileged-access-manager-demo%2F|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;subnav-dropdown&#8220;][vc_column_text el_class=&#8220;sticky-nav-title&#8220;]<\/p>\n<h5 style=\"text-align: right;\">Gehen zu<i class=\"fas fa-chevron-circle-down\"><\/i><\/h5>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad-top overview-vt sub-1&#8243; css=&#8220;.vc_custom_1616705395082{background-color: #f7f7f7 !important;}&#8220;][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;head-box&#8220;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h3>Ihr Programm f\u00fcr das Privileged Access Management modernisieren<\/h3>\n<p>Erstklassiges Privileged Access Management\u00a0implementieren \u2013 von einer einzigen, einheitlichen Plattform aus.[\/vc_column_text][\/vc_column][vc_column width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=&#8220;cta-box&#8220;][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-118800\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg\" alt=\"Sich gegen Angriffe verteidigen\" \/><\/a>[\/vc_column_text][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>F\u00fcr eine messbare Reduzierung von Cyberrisiken sorgen<\/h4>\n<p>Risikoreiche Zugriffe in Ihrer gesamten IT-Umgebung sicher verwalten \u2013 mit Zero Standing Privileges oder gesch\u00fctzten Anmeldedaten in Multi-Cloud- und Hybrid-Umgebungen.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;cta-box&#8220;][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Satisfy-Audit-and-Compliance-icon.svg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-118792\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Satisfy-Audit-and-Compliance-icon.svg\" alt=\"Symbol Audit und Compliance sicherstellen\" \/><\/a>[\/vc_column_text][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>Audit und Compliance sicherstellen<\/h4>\n<p>Weisen Sie Auditoren, Aufsichtsbeh\u00f6rden und Anbietern von Cyberversicherungen gegen\u00fcber die volle Rechenschaftspflicht und Rechtfertigung f\u00fcr den gesamten Administratorzugriff nach.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;cta-box&#8220;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-118784\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Strong-Authentication.svg\" alt=\"Symbol Digitales Business erm\u00f6glichen\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>Betriebseffizienz erm\u00f6glichen<\/h4>\n<p>Skalieren Sie die Einf\u00fchrung und maximieren Sie die Risikominderung, indem Sie Ihr PAM-Programm modernisieren\u00a0\u2013 mit reduzierten Kosten f\u00fcr Infrastruktur und Betriebskosten.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;cta-box&#8220;][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-118800\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg\" alt=\"Sich gegen Angriffe verteidigen\" \/><\/a>[\/vc_column_text][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>Ihre digitale Transformation sch\u00fctzen<\/h4>\n<p>Zentraler und nativ sicherer Privileged Access f\u00fcr IT- und Cloud-Betriebsteams.\u200b[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 cybv2-pad cybv2-oval-left-background hv-cta-stats sub-2&#8243; css=&#8220;.vc_custom_1623075128105{background-color: #ff7600 !important;}&#8220;][vc_column el_class=&#8220;text-md-center head-box&#8220;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h3>Ihr PAM-Programm f\u00fcr eine Multi-Cloud-Welt modernisieren\u200b<\/h3>\n<p><\/p>\n<h5>Sichern Sie den Zugriff mit dem h\u00f6chsten Risiko im Unternehmen. Wo auch immer dieser existiert.<\/h5>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;img-box&#8220; css=&#8220;.vc_custom_1728385551415{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/PAM-program.jpg?id=198222) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;stat-column&#8220;][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; width=&#8220;11\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]Unbefugte Nutzer fernhalten[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; width=&#8220;11\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]Bedrohungen in Echtzeit erkennen und stoppen[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; width=&#8220;11\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]PAM einfach als Service bereitstellen oder in Ihrer eigenen Umgebung hosten[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8220;stat-row&#8220;][vc_column_inner el_class=&#8220;stat&#8220; width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-10&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>63%<\/h4>\n<p>der Unternehmen geben an, dass sie ihren Privileged Access mit dem h\u00f6chsten Risiko nicht angemessen sichern.*[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;stat&#8220; width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-0 vc_col-xs-offset-1 vc_col-xs-10&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>58%<\/h4>\n<p>der Unternehmen erwarten einen identit\u00e4tsbezogenen Sicherheitsvorfall als Teil einer Initiative zur digitalen Transformation oder zur Migration von Legacy-Apps*<\/p>\n<p><em>*CyberArk Threat Landscape Report 2024.<\/em><br \/>\u200b[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2-pad cybv2 cybv2-background-oval tour sub-3&#8243;][vc_column][vc_row_inner el_class=&#8220;cyb-center&#8220;][vc_column_inner el_class=&#8220;cyb-pad-btm&#8220;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h3>Erstklassiges Privileged Access Management\u00a0\u2013 auf einer einzigen, einheitlichen Plattform<\/h3>\n<p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=&#8220;square&#8220; active_section=&#8220;1&#8243; css_animation=&#8220;none&#8220;][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;Privileged Access und Anmeldedaten verwalten&#8220; tab_id=&#8220;manage&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>Privileged Access und Anmeldedaten verwalten\u200b<\/h4>\n<p>Entdecken Sie automatisch Konten, Anmeldedaten, IAM-Rollen und Secrets mit Privileged Access \u00fcber Endpoints und Infrastruktur in On-Premise-, Multi-Cloud- und OT\/ICS-Umgebungen. Integrieren Sie alle Anmeldedaten und Konten f\u00fcr eine sichere, richtlinienbasierte Verwaltung in einem manipulationssicheren Digital Vault. Die automatisierte, richtlinienbasierte Rotation von Anmeldedaten erh\u00f6ht die Sicherheit und eliminiert zeitaufw\u00e4ndige und fehleranf\u00e4llige manuelle Prozesse. \u200b[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&#8243;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-198159 size-full cyb-br\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/manage-privileged-access-and-credentials\u200b.jpg\" alt=\"Privileged Access Manager\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/manage-privileged-access-and-credentials\u200b.jpg 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/manage-privileged-access-and-credentials\u200b-300x203.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/manage-privileged-access-and-credentials\u200b-150x102.jpg 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;Zugriff mit Zero Standing Privileges&#8220; tab_id=&#8220;isolate&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>Zugriff mit Zero Standing Privileges<\/h4>\n<p>Stellen Sie den Zugriff auf langlebige Systeme, elastische Cloud-Workloads und Cloud-native Dienste auf Just-in-Time-Basis bereit \u2013 ohne st\u00e4ndige Anmeldedaten. Nutzen Sie ZSP in vollem Umfang, indem Sie Berechtigungen im Handumdrehen erstellen und nach der Verwendung entfernen, mit detaillierter Kontrolle \u00fcber die Einstellungen f\u00fcr Zeitdauer, Berechtigungen und Genehmigungen.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-198168 size-full cyb-br\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/zero-standing-privileges.jpg \" alt=\"Zero Standing Privileges\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/zero-standing-privileges.jpg 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/zero-standing-privileges-300x203.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/zero-standing-privileges-150x102.jpg 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;Sitzungen isolieren und \u00fcberwachen&#8220; tab_id=&#8220;threat&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>Sitzungen isolieren und \u00fcberwachen \u200b<\/h4>\n<p>Stellen Sie isolierte und \u00fcberwachte privilegierte Sitzungen bereit, ohne das native Nutzererlebnis zu beeintr\u00e4chtigen. Setzen Sie konsistente Richtlinien zur Sitzungsisolierung sowohl f\u00fcr gesch\u00fctzte Sitzungen als auch f\u00fcr Sitzungen mit Zero Standing Privileges durch. \u00dcberwachen Sie das gesamte Nutzerverhalten zentral f\u00fcr Forensik, Audit und Compliance-Zwecke.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-198177 size-full cyb-br\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/monitor-sessions-\u200b.jpg\" alt=\"Sitzungen \u00fcberwachen\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/monitor-sessions-\u200b.jpg 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/monitor-sessions-\u200b-300x203.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/monitor-sessions-\u200b-150x102.jpg 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;Erkennung und Reaktion auf Bedrohungen&#8220; tab_id=&#8220;nomadic&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>Erkennung und Reaktion auf Bedrohungen<\/h4>\n<p>\u00dcberwachen Sie das gesamte Nutzerverhalten zentral f\u00fcr Forensik-, Audit- und Compliance-Zwecke \u2013 \u00fcber eine einzige Anzeigefl\u00e4che. Analysieren Sie Nutzeraktivit\u00e4ten auf der CyberArk Identity Security Plattform, identifizieren Sie riskante Sitzungsaktivit\u00e4ten und reagieren Sie auf Empfehlungen.\u200b[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-198186 size-full cyb-br\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/threat-detection.jpg\" alt=\"Erkennung von Bedrohungen\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/threat-detection.jpg 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/threat-detection-300x203.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/threat-detection-150x102.jpg 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-up&#8220; add_icon=&#8220;true&#8220; title=&#8220;Lose verbundene Ger\u00e4te verwalten&#8220; tab_id=&#8220;remote&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>Lose verbundene Ger\u00e4te verwalten\u200b<\/h4>\n<p>Entfernen Sie lokale Administratorrechte und setzen Sie rollenspezifisches, richtlinienbasiertes Least Privilege auf Endpoints durch.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-198195 size-full cyb-br\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/connected-devices\u200b.jpg\" alt=\"Verbundene Ger\u00e4te\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/connected-devices\u200b.jpg 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/connected-devices\u200b-300x203.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/connected-devices\u200b-150x102.jpg 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8220;Remote Access und Drittparteienzugriff auf PAM&#8220; tab_id=&#8220;adaptive&#8220;][vc_row_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>Remote Access und Drittparteienzugriff auf PAM\u200b<\/h4>\n<p>Stellen Sie einen sicheren Remote Access f\u00fcr Mitarbeiter und Drittparteien mit passwort-, VPN- und agentenlosem Just-in-Time-Zugriff auf CyberArk PAM bereit. \u200b[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-198204 size-full cyb-br\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/third-party-access-to-PAM\u200b.jpg\" alt=\"Zugriff durch Drittparteien\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/third-party-access-to-PAM\u200b.jpg 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/third-party-access-to-PAM\u200b-300x203.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/third-party-access-to-PAM\u200b-150x102.jpg 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8220;Lifecycle Management, Zugriffszertifizierung und Authentication&#8220; tab_id=&#8220;certification&#8220;][vc_row_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>Lifecycle Management, Zugriffszertifizierung und Authentication\u200b\u200b<\/h4>\n<p>Erstellen Sie intelligente, automatisierte Prozesse f\u00fcr die Bereitstellung des Privileged Access.\u200b Zertifizieren Sie den Zugriff auf Ressourcen automatisch oder auf Abruf f\u00fcr Auditoren. Setzen Sie eine starke, adaptive Multi-Factor Authentication durch, um den gesamten Nutzerzugriff im Rahmen eines Zero-Trust-Frameworks zu validieren und den Zugriff auf Ressourcen mit Single Sign-On zu sichern.\u200b[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-198213 size-full cyb-br\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Lifecycle-management.jpg\" alt=\"Lifecycle Management\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Lifecycle-management.jpg 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Lifecycle-management-300x203.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Lifecycle-management-150x102.jpg 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]JTNDc2NyaXB0JTNFJTBBaWYlMjAlMjhqUXVlcnklMjh3aW5kb3clMjkud2lkdGglMjglMjklMjAlM0MlMjA3NjglMjklMjAlN0IlMEFqUXVlcnklMjglMjIudG91ciUyMC52Y190dGEtcGFuZWwlMjIlMjkub24lMjglMjJjbGljayUyMiUyQ2Z1bmN0aW9uJTI4JTI5JTIwJTdCJTBBJTA5JTBBJTA5aWYlMjhqUXVlcnklMjh0aGlzJTI5Lmhhc0NsYXNzJTI4JTIydmNfYWN0aXZlJTIyJTI5JTI5JTdCJTBBJTA5JTA5JTBBJTA5JTA5c2V0VGltZW91dCUyOGZ1bmN0aW9uJTI4JTI5JTdCJTBBJTA5JTA5JTA5alF1ZXJ5JTI4JTIyLnRvdXIlMjAudmNfdHRhLXBhbmVsJTIyJTI5LnJlbW92ZUNsYXNzJTI4JTIydmNfYWN0aXZlJTIyJTI5JTNCJTIwJTBBJTA5JTA5JTdEJTJDMTAwJTI5JTBBJTA5JTA5JTBBJTA5JTA5cmV0dXJuJTIwZmFsc2UlM0IlMEElMDklN0QlMEElN0QlMjklM0IlMEElN0QlMEElMEFqUXVlcnklMjglMjIudG91ciUyMC52Y190dGEtcGFuZWwlMjAud3BiX3RleHRfY29sdW1uJTIwYSUyMiUyOS5jbGljayUyOGZ1bmN0aW9uJTI4ZSUyOSUyMCU3QiUwQSUyMCUyMCUyMCUyRiUyRiUyMERvJTIwc29tZXRoaW5nJTBBJTIwJTIwJTIwZS5zdG9wUHJvcGFnYXRpb24lMjglMjklM0IlMEElN0QlMjklM0IlMEElM0MlMkZzY3JpcHQlM0U=[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; css=&#8220;.vc_custom_1622729877519{background-color: #f7f7f7 !important;}&#8220; el_class=&#8220;cybv2 cybv2-pad-paragraph&#8220;][vc_column width=&#8220;5\/6&#8243; offset=&#8220;vc_col-lg-offset-2 vc_col-lg-8&#8243; el_class=&#8220;text-md-center&#8220;][vc_column_text el_class=&#8220;text-md-center&#8220;]<\/p>\n<h3>Als SaaS oder selbst gehostet bereitstellen<\/h3>\n<p>PAM aus \u00dcberzeugung implementieren und erweitern. Der CyberArk Blueprint hat bereits Tausende von Kundenumgebungen erfolgreich gesichert, Tendenz steigend.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 paragraph-cta-list&#8220; css=&#8220;.vc_custom_1622730232307{background-color: #f7f7f7 !important;}&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;stat-column&#8220; css=&#8220;.vc_custom_1622733658584{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220; offset=&#8220;vc_col-sm-offset-0&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-118866\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/cloud.svg\" alt=\"Cloud\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>SaaS<\/h4>\n<p>Mit unserer PAM-as-a-Service-L\u00f6sung k\u00f6nnen Sie privilegierte Konten, Anmeldedaten und Secrets einfach sichern und verwalten.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; offset=&#8220;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]Automatisierte Upgrades und Patches senken die Gesamtbetriebskosten[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; offset=&#8220;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]Sichere, SOC 2 Typ 2-konforme Dienste mit einem zertifizierten 99,95% SLA f\u00fcr die Betriebszeit[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; offset=&#8220;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]Praktische Anleitung mit CyberArk Jump Start[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; offset=&#8220;vc_col-sm-offset-0&#8243;][vc_btn title=&#8220;Mehr erfahren&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fsolution-briefs%2Fjump-start-solution-brief|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;stat-column border-col&#8220;][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-118858\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/on-prem.svg\" alt=\"On-Premises \" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Selbst gehostet<\/h4>\n<p>Privileged Access sch\u00fctzen, \u00fcberwachen und kontrollieren durch Bereitstellung vor Ort.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; offset=&#8220;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]Stellen Sie es in Ihrem Rechenzentrum, Ihrer privaten oder \u00f6ffentlichen Cloud bereit, um die Einhaltung gesetzlicher Vorschriften oder organisatorischer Anforderungen zu erf\u00fcllen[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; offset=&#8220;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]Migrieren Sie sicher zu SaaS mit der Unterst\u00fctzung der bew\u00e4hrten Expertise von CyberArk[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; offset=&#8220;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]Skalierbare Bereitstellungen in mehreren Regionen[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row disable_element=&#8220;yes&#8220;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 cybv2_customer_stories vc_tta-o-non-responsive mt-12&#8243; css=&#8220;.vc_custom_1714763180252{background-color: #ffffff !important;}&#8220;][vc_column][vc_tta_tabs style=&#8220;flat&#8220; shape=&#8220;square&#8220; color=&#8220;white&#8220; spacing=&#8220;&#8220; gap=&#8220;20&#8243; alignment=&#8220;center&#8220; active_section=&#8220;&#8220; el_class=&#8220;cybv2_customer_stories_tabs&#8220; css=&#8220;.vc_custom_1608676900675{background-color: #ffffff !important;}&#8220;][vc_tta_section i_icon_fontawesome=&#8220;fas fa-piggy-bank&#8220; add_icon=&#8220;true&#8220; title=&#8220;Finanzbranche&#8220; tab_id=&#8220;1714765172150-a555e50f-a6c725de-5f58&#8243; el_class=&#8220;new_hpstyle_section6_tab1_icon vc_active&#8220;][vc_row_inner equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;new_hpstyle_section6_maintab_row&#8220;][vc_column_inner el_class=&#8220;image-column&#8220; width=&#8220;1\/2&#8243; css=&#8220;.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_single_image image=&#8220;108205&#8243; img_size=&#8220;590&#215;500&#8243; alignment=&#8220;right&#8220; el_class=&#8220;new_hpstyle_section6_tab1_left_image&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;new_hpstyle_section6_tab1_right_bckgrd&#8220; width=&#8220;1\/2&#8243;][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text1 text&#8220;]\u201eCyberArk war der beste Anbieter, mit dem ich in meiner \u00fcber 20-j\u00e4hrigen IT-Karriere zusammengearbeitet habe. CyberArk liefert gro\u00dfartige Produkte, die bei der Verwaltung des Privileged Access branchenf\u00fchrend sind.\u201c[\/vc_column_text][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text2&#8243;]<strong>IT Security Manager,<\/strong> Security and Risk Management[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/customer-stories\/\">Weitere Kundengeschichten lesen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=&#8220;fas fa-gavel&#8220; add_icon=&#8220;true&#8220; title=&#8220;\u00d6ffentlicher Sektor&#8220; tab_id=&#8220;1607742493330-265de97c-f2d9eb66-6bf825de-5f58&#8243; el_class=&#8220;new_hpstyle_section6_tab2_icon&#8220;][vc_row_inner equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;new_hpstyle_section6_maintab_row&#8220;][vc_column_inner el_class=&#8220;image-column&#8220; width=&#8220;1\/2&#8243;][vc_single_image image=&#8220;190453&#8243; img_size=&#8220;590X560&#8243; alignment=&#8220;right&#8220; el_class=&#8220;new_hpstyle_section6_tab1_left_image&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;new_hpstyle_section6_tab1_right_bckgrd&#8220; width=&#8220;1\/2&#8243;][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text1 text&#8220;]\u201eDie CyberArk Identity Security Plattform ist ein gro\u00dfartiges Tool, um unseren Mitarbeitern einen einfachen und sicheren Zugriff zu bieten. Indem wir den Aufwand f\u00fcr das Erstellen und Merken von Passw\u00f6rtern beseitigen und einen nahtlosen Zugriff mit nur einem Klick erm\u00f6glichen, steigern wir die Produktivit\u00e4t und verbessern unsere Sicherheitsposition.\u201c[\/vc_column_text][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text2&#8243;]<strong>John Vincent,<\/strong> Director of Technology, Chico Unified School District [\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/chico-unified-school-district\/\">Die Fallstudie lesen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=&#8220;fas fa-satellite-dish&#8220; add_icon=&#8220;true&#8220; title=&#8220;Telco&#8220; tab_id=&#8220;1607742494008-8c0fb98b-2b6beb66-6bf825de-5f58&#8243; el_class=&#8220;new_hpstyle_section6_tab3_icon&#8220;][vc_row_inner equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;new_hpstyle_section6_maintab_row&#8220;][vc_column_inner el_class=&#8220;image-column&#8220; width=&#8220;1\/2&#8243; css=&#8220;.vc_custom_1607653503563{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_single_image image=&#8220;108213&#8243; img_size=&#8220;590&#215;500&#8243; alignment=&#8220;right&#8220; el_class=&#8220;new_hpstyle_section6_tab1_left_image&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;new_hpstyle_section6_tab1_right_bckgrd&#8220; width=&#8220;1\/2&#8243;][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text1 text&#8220;]\u201eWir sind \u00fcberzeugt, dass wir mit CyberArk eine Technologie implementiert haben, die uns auch beim Wachstum und der Entwicklung unseres Unternehmens unterst\u00fctzen wird.\u201c[\/vc_column_text][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text2&#8243;]<strong>Jean-Pierre Blanc,<\/strong> Bouygues Telecom[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/bouygues-telecom\/\">Die Fallstudie lesen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=&#8220;fas fa-industry&#8220; add_icon=&#8220;true&#8220; title=&#8220;Fertigung&#8220; tab_id=&#8220;1607742495229-255d985e-6d0ceb66-6bf825de-5f58&#8243; el_class=&#8220;new_hpstyle_section6_tab5_icon&#8220;][vc_row_inner equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;new_hpstyle_section6_maintab_row&#8220;][vc_column_inner el_class=&#8220;image-column&#8220; width=&#8220;1\/2&#8243; css=&#8220;.vc_custom_1607653496575{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_single_image image=&#8220;110300&#8243; img_size=&#8220;590&#215;500&#8243; alignment=&#8220;right&#8220; el_class=&#8220;new_hpstyle_section6_tab1_left_image&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;new_hpstyle_section6_tab1_right_bckgrd&#8220; width=&#8220;1\/2&#8243;][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text1 text&#8220;]\u201eCyberArk hat uns die n\u00f6tige Transparenz und granulare Kontrolle gegeben, um sowohl Least Privilege als auch eine Anwendungskontrolle nach dem Standardablehnungsmodell bei minimalen Ver\u00e4nderungen im Unternehmen umzusetzen.\u201c[\/vc_column_text][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text2&#8243;]<strong>Ken Brown,<\/strong> CISO[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/milliken\/\">Die Fallstudie lesen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=&#8220;fas fa-university&#8220; add_icon=&#8220;true&#8220; title=&#8220;Versicherung&#8220; tab_id=&#8220;1607742495902-f2d9a00d-8e74eb66-6bf825de-5f58&#8243; el_class=&#8220;new_hpstyle_section6_tab6_icon&#8220;][vc_row_inner equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;new_hpstyle_section6_maintab_row&#8220;][vc_column_inner el_class=&#8220;image-column&#8220; width=&#8220;1\/2&#8243; css=&#8220;.vc_custom_1607653492933{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_single_image image=&#8220;108238&#8243; img_size=&#8220;590&#215;500&#8243; alignment=&#8220;right&#8220; el_class=&#8220;new_hpstyle_section6_tab1_left_image&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;new_hpstyle_section6_tab1_right_bckgrd&#8220; width=&#8220;1\/2&#8243;][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text1 text&#8220;]\u201eMit RPA- und Cloud-Migrationen verbreiten sich Anmeldedaten zunehmend von sogenannten normalen Kontrollen weg. CyberArk kann so ausgeweitet werden, dass es alle Szenarien standardm\u00e4\u00dfig abdeckt.\u201c[\/vc_column_text][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text2&#8243;]<strong>Information Security Consultant,<\/strong> Enterprise Cybersecurity Solutions Technologies[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/customer-stories\/\">Weitere Kundengeschichten lesen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][vc_raw_js]JTNDc2NyaXB0JTNFJTBBalF1ZXJ5JTI4ZG9jdW1lbnQlMjkucmVhZHklMjhmdW5jdGlvbiUyOCUyOSU3QiUwQSUyMCUyMCUyMCUyMCUyRiUyRkFkZCUyMEFjdGl2ZSUyMHRvJTIwdGFiJTIwb24lMjBwYWdlJTIwbG9hZCUwQSUyMCUyMCUyMCUyMCUyNHBhbmVscyUyMCUzRCUyMGpRdWVyeSUyOCUyNy5jeWJ2Ml9jdXN0b21lcl9zdG9yaWVzX3RhYnMlMjAudmNfdHRhLXBhbmVscyUyMC52Y190dGEtcGFuZWwlMjclMjklM0IlMEElMjAlMjAlMjAlMjAlMjR0YWJzJTIwJTNEJTIwalF1ZXJ5JTI4JTI3LmN5YnYyX2N1c3RvbWVyX3N0b3JpZXNfdGFicyUyMC52Y190dGEtdGFicy1saXN0JTIwLnZjX3R0YS10YWIlMjclMjklM0IlMEElMjAlMjAlMjAlMjB2YXIlMjBpbmRleCUyMCUzRCUyMDAlM0IlMEElMEElMjAlMjAlMjAlMjAlMkYlMkZBbGlnbiUyMFRhYnMlMjB3aXRoJTIwcGFuZWxzJTBBJTIwJTIwJTIwJTIwJTI0cGFuZWxzLmVhY2glMjhmdW5jdGlvbiUyOCUyOSU3QiUwQSUyMCUyMCUyMCUyMCUyMCUyMCUyMCUyMGpRdWVyeSUyOHRoaXMlMjkuaGFzQ2xhc3MlMjglMjd2Y19hY3RpdmUlMjclMjklM0IlMEElMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjByZXR1cm4lMjBmYWxzZSUzQiUwQSUyMCUyMCUyMCUyMCUyMCUyMCUyMCUyMGluZGV4JTJCJTJCJTNCJTBBJTIwJTIwJTIwJTIwJTdEJTI5JTBBJTIwJTIwJTIwJTIwdmFyJTIwbmV3SW5kZXglMjAlM0QlMjAwJTNCJTBBJTIwJTIwJTIwJTIwJTI0dGFicy5lYWNoJTI4ZnVuY3Rpb24lMjglMjklN0IlMEElMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjBpZiUyOGluZGV4JTIwJTNEJTNEJTIwbmV3SW5kZXglMjklN0IlMEElMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjBqUXVlcnklMjh0aGlzJTI5LmFkZENsYXNzJTI4JTI3dmNfYWN0aXZlJTI3JTI5JTNCJTBBJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTdEJTBBJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTIwbmV3SW5kZXglMkIlMkIlM0IlMEElMjAlMjAlMjAlMjAlN0QlMjklMEElN0QlMjklM0IlMEElM0MlMkZzY3JpcHQlM0U=[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_resources sub-4&#8243; css=&#8220;.vc_custom_1623075448667{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8220;][vc_column width=&#8220;1\/3&#8243;][vc_column_text]<\/p>\n<h3>Verwandte<br \/>\nRessourcen<br \/>\nerkunden<\/h3>\n<p>\n[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/resources\/\">Alle Ressourcen anzeigen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243;][\/vc_column][vc_column width=&#8220;1\/3&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column&#8220;][vc_column el_class=&#8220;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8220;.vc_custom_1698226957904{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;new_hpstyle_section8_uberflip&#8220;]PCEtLSBVYmVyZmxpcCBFbWJlZGRlZCBIdWIgV2lkZ2V0IC0tPjxicj48YnI+ICA8ZGl2IGlkPSJVZkVtYmVkZGVkSHViMTY5ODIyNjcxNjc2MCI+PC9kaXY+PGJyPjxicj4gIDxzY3JpcHQ+DQogIHdpbmRvdy5fdWZIdWJDb25maWcgPSB3aW5kb3cuX3VmSHViQ29uZmlnIHx8IFtdOw0KICB3aW5kb3cuX3VmSHViQ29uZmlnLnB1c2goew0KICAgICdjb250YWluZXJzJzp7J2FwcCc6JyNVZkVtYmVkZGVkSHViMTY5ODIyNjcxNjc2MCd9LA0KICAgICdjb2xsZWN0aW9uJzogJzExMzY3NTA4JywNCiAgICAnb3BlbkxpbmsnOmZ1bmN0aW9uKHVybCl7DQogICAgICB3aW5kb3cudG9wLmxvY2F0aW9uLmhyZWY9dXJsOw0KICAgIH0sDQogICAgJ2xhenlsb2FkZXInOnsNCiAgICAgICdpdGVtRGlzcGxheUxpbWl0JzoyMCwNCiAgICAgICdtYXhUaWxlc1BlclJvdyc6MywNCiAgICAgICdtYXhJdGVtc1RvdGFsJzogMA0KICAgIH0sDQogICAgJ3RpbGVTaXplJzogJ2xhcmdlJywNCiAgICAnZW5hYmxlUGFnZVRyYWNraW5nJzpmYWxzZSwNCiAgICAnYmFzZVVybCc6ICdodHRwczovL3d3dy5jeWJlcmFyay5jb20vcmVzb3VyY2VzLycsDQogICAgJ2ZpbGVzVXJsJzogJ2h0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS9yZXNvdXJjZXMvJywNCiAgICAnZ2VuZXJhdGVkQXRVVEMnOiAnMjAyMy0xMC0yNSAwOTozODoxNicsDQogIH0pOw0KICA8L3NjcmlwdD48YnI+PGJyPiAgPHNjcmlwdD4oZnVuY3Rpb24oZCx0LHUpIHsNCiAgICBmdW5jdGlvbiBsb2FkKCl7DQogICAgICB2YXIgcz1kLmNyZWF0ZUVsZW1lbnQodCk7cy5zcmM9dTtkLmJvZHkuYXBwZW5kQ2hpbGQocyk7DQogICAgfQ0KICAgIGlmICh3aW5kb3cuYWRkRXZlbnRMaXN0ZW5lcikgew0KICAgICAgd2luZG93LmFkZEV2ZW50TGlzdGVuZXIoJ2xvYWQnLGxvYWQsZmFsc2UpOw0KICAgIH0NCiAgICBlbHNlIGlmICh3aW5kb3cuYXR0YWNoRXZlbnQpIHsNCiAgICAgIHdpbmRvdy5hdHRhY2hFdmVudCgnb25sb2FkJyxsb2FkKTsNCiAgICB9DQogICAgZWxzZXsNCiAgICAgIHdpbmRvdy5vbmxvYWQ9bG9hZDsNCiAgICB9DQogIH0oZG9jdW1lbnQsJ3NjcmlwdCcsJ2h0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS9yZXNvdXJjZXMvaHVic0Zyb250L2VtYmVkX2NvbGxlY3Rpb24nKSk7DQogIDwvc2NyaXB0Pjxicj4gIDwhLS0gL0VuZCBVYmVyZmxpcCBFbWJlZGRlZCBIdWIgV2lkZ2V0IC0tPg==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; css=&#8220;.vc_custom_1616705788368{background-color: #f7f7f7 !important;}&#8220; el_class=&#8220;cybv2 cybv2-pad-top hv-cta sub-5&#8243;][vc_column width=&#8220;7\/12&#8243; el_class=&#8220;left-clmn&#8220;][vc_column_text]<\/p>\n<h2>Demo anfordern<\/h2>\n<p>\n[\/vc_column_text][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;head-box-text&#8220;]Die Offenlegung von Anmeldedaten verhindern, kritische Assets isolieren[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;head-box-text&#8220;]Sitzungen auf verd\u00e4chtige Aktivit\u00e4ten \u00fcberwachen und pr\u00fcfen[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;head-box-text&#8220;]Riskantes Verhalten automatisch beheben[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;head-box-text&#8220;]Anmeldedaten kontinuierlich verwalten und rotieren[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;head-box-text&#8220;]Sicherer Remote Access auf PAM[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;head-box-text&#8220;]Reibungsloser und sicherer Zugriff auf Unternehmensressourcen[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8220;1\/12&#8243; css=&#8220;.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}&#8220;][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;right-clmn cybv2-form&#8220;][vc_column_text el_class=&#8220;bold&#8220;]<\/p>\n<h4>Hier f\u00fcr eine pers\u00f6nliche Demo registrieren<\/h4>\n<p>\n[\/vc_column_text][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iODIzMyIgdHlfcGFnZV91cmw9Imh0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS90cnktYnV5L3RoYW5rLXlvdS1wcml2aWxlZ2VkLWFjY2Vzcy1tYW5hZ2VyLyJd[\/vc_raw_html][\/vc_column][\/vc_row][vc_row el_class=&#8220;cyb-pad cybv2&#8243;][vc_column][vc_column_text css=&#8220;&#8220; el_class=&#8220;tiny&#8220;]CyberArk Has Patent Rights Relating To This Technology &#8211; <a href=\"https:\/\/www.cyberark.com\/de\/patents\/\">https:\/\/www.cyberark.com\/patents<\/a>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":198,"featured_media":0,"parent":32304,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27777],"class_list":["post-115276","page","type-page","status-publish","hentry","product_category-privilege"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Privileged Access Management (PAM) | CyberArk<\/title>\n<meta name=\"description\" content=\"Nutzen Sie die branchenf\u00fchrende Privileged-Access-Management-L\u00f6sung, um die Ressourcen Ihres Unternehmens zu sch\u00fctzen, Bedrohungen zu erkennen und Angriffe in Echtzeit zu stoppen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privileged Access Manager\" \/>\n<meta property=\"og:description\" content=\"Nutzen Sie die branchenf\u00fchrende Privileged-Access-Management-L\u00f6sung, um die Ressourcen Ihres Unternehmens zu sch\u00fctzen, Bedrohungen zu erkennen und Angriffe in Echtzeit zu stoppen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-03T06:14:38+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/\",\"url\":\"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/\",\"name\":\"Privileged Access Management (PAM) | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg\",\"datePublished\":\"2021-02-03T21:03:39+00:00\",\"dateModified\":\"2025-11-03T06:14:38+00:00\",\"description\":\"Nutzen Sie die branchenf\u00fchrende Privileged-Access-Management-L\u00f6sung, um die Ressourcen Ihres Unternehmens zu sch\u00fctzen, Bedrohungen zu erkennen und Angriffe in Echtzeit zu stoppen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Produkte\",\"item\":\"https:\/\/www.cyberark.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Privileged Access Manager\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Privileged Access Management (PAM) | CyberArk","description":"Nutzen Sie die branchenf\u00fchrende Privileged-Access-Management-L\u00f6sung, um die Ressourcen Ihres Unternehmens zu sch\u00fctzen, Bedrohungen zu erkennen und Angriffe in Echtzeit zu stoppen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/","og_locale":"de_DE","og_type":"article","og_title":"Privileged Access Manager","og_description":"Nutzen Sie die branchenf\u00fchrende Privileged-Access-Management-L\u00f6sung, um die Ressourcen Ihres Unternehmens zu sch\u00fctzen, Bedrohungen zu erkennen und Angriffe in Echtzeit zu stoppen.","og_url":"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-11-03T06:14:38+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"11 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/","url":"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/","name":"Privileged Access Management (PAM) | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg","datePublished":"2021-02-03T21:03:39+00:00","dateModified":"2025-11-03T06:14:38+00:00","description":"Nutzen Sie die branchenf\u00fchrende Privileged-Access-Management-L\u00f6sung, um die Ressourcen Ihres Unternehmens zu sch\u00fctzen, Bedrohungen zu erkennen und Angriffe in Echtzeit zu stoppen.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/products\/privileged-access-manager\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/products\/privileged-access-manager\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Produkte","item":"https:\/\/www.cyberark.com\/products\/"},{"@type":"ListItem","position":3,"name":"Privileged Access Manager"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/115276","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/198"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=115276"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/115276\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32304"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=115276"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=115276"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}