{"id":132472,"date":"2022-07-11T12:03:46","date_gmt":"2022-07-11T16:03:46","guid":{"rendered":"https:\/\/www.cyberark.com\/identitaetssicherheit\/"},"modified":"2024-10-17T16:24:11","modified_gmt":"2024-10-17T20:24:11","slug":"identity-security","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/identity-security\/","title":{"rendered":"Identity Security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;.cybv2 .int-hero-noimg blue-gradient&#8220;][vc_column width=&#8220;5\/6&#8243; el_class=&#8220;column-1&#8243;][vc_column_text]<\/p>\n<h1><span class=\"font-green\">Die Zukunft der Sicherheit ist die Identit\u00e4t<\/span><\/h1>\n<h2>Die heutige Bedrohungslandschaft ist gepr\u00e4gt von neuen Identit\u00e4ten, neuen Umgebungen und neuen Angriffsmethoden. Die Verbreitung von Identit\u00e4ten in Verbindung mit der Migration in die Cloud und der zunehmenden Innovation von Angreifern f\u00fchrt zu einem Anstieg identit\u00e4tsbasierter Cyberangriffe. Der einzige Weg, wirklich sicherzustellen, dass die richtigen Nutzer zur richtigen Zeit auf die richtigen Ressourcen zugreifen, ist die Durchsetzung angemessener Berechtigungskontrollen f\u00fcr jede Identit\u00e4t.<\/h2>\n<p>[\/vc_column_text][vc_btn title=&#8220;Erfahren Sie, wie&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fblueprint%2F|&#8220; el_class=&#8220;cybv2-button-transp-green&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad-top info-graphic&#8220;][vc_column width=&#8220;5\/6&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_column_text el_class=&#8220;text-md-center head-box&#8220;]<\/p>\n<h3>Mehr als 8.000\u00a0Unternehmen vertrauen uns<\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 cybv2_customer_stories vc_tta-o-non-responsive&#8220; css=&#8220;.vc_custom_1686775642430{background-color: #ffffff !important;}&#8220;][vc_column][vc_tta_tabs style=&#8220;flat&#8220; shape=&#8220;square&#8220; color=&#8220;white&#8220; spacing=&#8220;&#8220; gap=&#8220;20&#8243; alignment=&#8220;center&#8220; active_section=&#8220;&#8220; el_class=&#8220;cybv2_customer_stories_tabs&#8220; css=&#8220;.vc_custom_1608676900675{background-color: #ffffff !important;}&#8220;][vc_tta_section title=&#8220;Healthfirst&#8220; tab_id=&#8220;healthfirst&#8220; el_class=&#8220;new_hpstyle_section6_tab1_icon vc_active&#8220;][vc_row_inner equal_height=&#8220;yes&#8220; el_class=&#8220;new_hpstyle_section6_maintab_row&#8220;][vc_column_inner el_class=&#8220;image-column&#8220; width=&#8220;1\/2&#8243; css=&#8220;.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_single_image image=&#8220;188758&#8243; img_size=&#8220;full&#8220; alignment=&#8220;right&#8220; css=&#8220;&#8220; el_class=&#8220;new_hpstyle_section6_tab1_left_image&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;new_hpstyle_section6_tab1_right_bckgrd&#8220; width=&#8220;1\/2&#8243;][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text1 text&#8220;]\u201eWenn wir die Identit\u00e4t unter Kontrolle haben, k\u00f6nnen wir die meisten modernen Angriffe stoppen. Und wenn man die Identit\u00e4t unter Kontrolle hat, hat man auch jeden Perimeter, jede Anwendung und jeden Container unter Kontrolle\u00a0\u2013 also jeden Teil der Umgebung. Das nenne ich echtes Zero Trust und deshalb setzen wir CyberArk ein. Das hilft mir, nachts ruhig zu schlafen.\u201c[\/vc_column_text][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text2&#8243;]Brian Miller, CISO, <strong>Healthfirst<\/strong>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/healthfirst-applies-an-identity-security-first-approach-to-implement-zero-trust\/\">Lesen Sie die Fallstudie<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8220;Glasgow Caledonian University&#8220; tab_id=&#8220;1711948553583-e7615151-2203&#8243; el_class=&#8220;new_hpstyle_section6_tab2_icon&#8220;][vc_row_inner equal_height=&#8220;yes&#8220; el_class=&#8220;new_hpstyle_section6_maintab_row&#8220;][vc_column_inner el_class=&#8220;image-column&#8220; width=&#8220;1\/2&#8243; css=&#8220;.vc_custom_1607653503563{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_single_image image=&#8220;188767&#8243; img_size=&#8220;full&#8220; alignment=&#8220;right&#8220; css=&#8220;&#8220; el_class=&#8220;new_hpstyle_section6_tab1_left_image&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;new_hpstyle_section6_tab1_right_bckgrd&#8220; width=&#8220;1\/2&#8243;][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text1 text&#8220;] \u201cIn den letzten Jahren wurden die GCU und andere Unternehmen des Sektors zunehmend zum Ziel von Cyberangriffen. Diese Risiken haben uns dazu veranlasst, unseren Ansatz f\u00fcr die Cybersicherheit im Allgemeinen und das Identit\u00e4ts- und Zugangsmanagement im Besonderen v\u00f6llig neu zu bewerten. Wir mussten jeden Aspekt unseres Sicherheitsstapels unter die Lupe nehmen. Wir haben uns f\u00fcr die CyberArk-Plattform entschieden, weil wir wussten, dass sie zus\u00e4tzliche Identit\u00e4tssicherheitsfunktionen bieten kann, wenn wir unsere Sicherheitsprogramme ausbauen und erweitern.\u201d[\/vc_column_text][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text2&#8243;]Tahir Yousaf, IT-Direktor bei <strong>Glasgow Caledonian University (GCU)<\/strong>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/press\/glasgow-caledonian-university-selects-cyberark-to-reduce-identity-security-risk-for-thousands-of-staff-and-students\/\">Pressemitteilung lesen <\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8220;CapCom&#8220; tab_id=&#8220;capcom&#8220; el_class=&#8220;new_hpstyle_section6_tab3_icon&#8220;][vc_row_inner equal_height=&#8220;yes&#8220; el_class=&#8220;new_hpstyle_section6_maintab_row&#8220;][vc_column_inner el_class=&#8220;image-column&#8220; width=&#8220;1\/2&#8243; css=&#8220;.vc_custom_1687286224685{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_single_image image=&#8220;185373&#8243; img_size=&#8220;full&#8220; alignment=&#8220;right&#8220; css=&#8220;&#8220; el_class=&#8220;new_hpstyle_section6_tab1_left_image&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;new_hpstyle_section6_tab1_right_bckgrd&#8220; width=&#8220;1\/2&#8243;][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text1 text&#8220;]\u201eNeben der Verbesserung technischer Ma\u00dfnahmen ist es unsere Mission, die Kompetenz der Endnutzer zu verbessern. Durch die Visualisierung der aktuellen Situation konnten wir einen Start hin zu einer besseren Umgebung machen. In diesem Sinne sind wir der Meinung, dass CyberArk Privileged Access Manager eine L\u00f6sung ist, f\u00fcr die es keine Alternative gibt.\u201c[\/vc_column_text][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text2&#8243;]Kohei Akiyama, Engine Development Support Section, R&amp;D Foundational Technology Department, <strong>CapCom<\/strong>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/customer-stories\/capcom\/\">Lesen Sie die Fallstudie<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad-top dark&#8220;][vc_column width=&#8220;2\/3&#8243; offset=&#8220;vc_col-sm-offset-2&#8243; el_class=&#8220;text-center&#8220;][vc_column_text]<\/p>\n<h3>Mit der <span class=\"font-green\">Zunahme von Identit\u00e4ten<\/span> steigen auch die Sicherheitsherausforderungen<\/h3>\n<p>Eine Umfrage im Jahr 2022 unter 1.500\u00a0Sicherheitsexperten* auf der ganzen Welt zeigt, dass die Herausforderungen bei der Sicherung von Identit\u00e4ten exponentiell zunehmen.[\/vc_column_text][vc_btn title=&#8220;Laden Sie die Umfrage herunter&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; align=&#8220;center&#8220; css=&#8220;.vc_custom_1687291468267{margin-top: 30px !important;}&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fanalyst-reports%2Fthe-holistic-identity-security-maturity-model|&#8220; el_class=&#8220;cybv2-button-transp&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 hz-stats dark&#8220;][vc_column width=&#8220;1\/4&#8243;][vc_column_text el_class=&#8220;stat-box dark&#8220;]<strong>Die Infrastruktur ist fragmentiert.<\/strong><\/p>\n<div class=\"stat\">\n<p>57\u00a0%<\/p>\n<\/div>\n<p>haben zwei Sicherheitsteams\u00a0\u2013 eines f\u00fcr On-Premise und eines f\u00fcr die Cloud.[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243;][vc_column_text el_class=&#8220;stat-box&#8220;]<strong>Identit\u00e4ten vervielfachen sich weiterhin.<\/strong><\/p>\n<div class=\"stat\">\n<p>79\u00a0%<\/p>\n<\/div>\n<p>erwarten, dass sich die Anzahl der Identit\u00e4ten im gesamten Unternehmen jedes Jahr mehr als verdoppeln wird.[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243;][vc_column_text el_class=&#8220;stat-box&#8220;]<strong>Automatisierung ist der Schl\u00fcssel.<\/strong><\/p>\n<div class=\"stat\">\n<p>61\u00a0%<\/p>\n<\/div>\n<p>f\u00e4llt es schwer, hybride Umgebungen mit \u00e4lteren und Cloud-nativen Tools zu automatisieren.[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243;][vc_column_text el_class=&#8220;stat-box&#8220;]<strong>Eine einheitliche Vorgehensweise ist vorzuziehen.<\/strong><\/p>\n<div class=\"stat\">\n<p>54\u00a0%<\/p>\n<\/div>\n<p>bevorzugen einheitliche Kontrollen von weniger Anbietern.[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2-pad cybv2 graphic-csb&#8220;][vc_column width=&#8220;7\/12&#8243; el_class=&#8220;blue-gradient-background cyb-br&#8220;][vc_column_text css=&#8220;.vc_custom_1711991903947{padding-top: 50px !important;padding-right: 50px !important;padding-bottom: 50px !important;padding-left: 50px !important;}&#8220; el_class=&#8220;text-center&#8220;]<img decoding=\"async\" class=\"alignnone size-full wp-image-188738\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg\" alt=\"CSB graphic\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;right-clmn&#8220; css=&#8220;.vc_custom_1711638016096{padding-top: 60px !important;}&#8220;][vc_column_text el_class=&#8220;head-box&#8220;]<\/p>\n<h3>Identit\u00e4tssicherheit erfordert einen ganzheitlichen Ansatz, in dessen Mittelpunkt die Kontrolle von Berechtigungen steht<\/h3>\n<p>Auf der Grundlage intelligenter Berechtigungskontrollen sichert Identity Security nahtlos menschliche und maschinelle Identit\u00e4ten, die auf Anwendungen, Infrastruktur und Daten zugreifen, und automatisiert flexibel den Identit\u00e4tslebenszyklus &#8211; alles mit einem einheitlichen Ansatz. Identity Security erm\u00f6glicht Zero Trust durch die Durchsetzung der geringsten Privilegien mit kontinuierlicher Erkennung und Schutz von Identit\u00e4tsbedrohungen.[\/vc_column_text][vc_btn title=&#8220;Erkunden Sie die Plattform&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;.vc_custom_1711991855874{margin-top: 40px !important;}&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fproducts%2F|title:Erkunden%20Sie%20die%20Plattform|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"templatera_shortcode\"><div data-vc-full-width=\"true\" data-vc-full-width-temp=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_full_width_resource\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_title\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h5 style=\"text-align: center;\">Identity security: identit\u00e4ten absichern<br \/>\nmit intelligenten Zugriffskontrollen<\/h5>\n<p><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section5_container\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_center   new_hpstyle_section5_gart_img\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1.jpg\" class=\"vc_single_image-img attachment-full\" alt=\"Professional woman with glasses standing confidently against a dark background with a glowing triangular frame\" title=\"gartner-300x300\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1-100x100.jpg 100w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>2025 Gartner\u00ae Magic Quadrant\u2122 f\u00fcr Privileged Access Managament<\/h4>\n<p><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_btn3-container  cybv2-button-solid cyb-button-hpstyle_section5 vc_btn3-inline\"  >\n\t<a class=\"vc_btn3-color-grey\" href=\"https:\/\/lp.cyberark.com\/gartner-mq-pam-2025-de.html\" title=\"\" target=\"_blank\">Zum Bericht<\/a><\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/a><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_resources sub4&#8243; css=&#8220;.vc_custom_1666797120002{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8220;][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;no-break&#8220;][vc_column_text el_class=&#8220;no-break&#8220;]<\/p>\n<h3>Verwandte Ressourcen erkunden<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/resources\/\">Alle Ressourcen anzeigen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column uf-height&#8220;][vc_column el_class=&#8220;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8220;.vc_custom_1710357149501{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;new_hpstyle_section8_uberflip&#8220;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_html]PGEgY2xhc3M9ImFuY2hvciIgbmFtZT0iZm9ybSI+PC9hPg==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; css=&#8220;.vc_custom_1729196153107{background-color: #f7f7f7 !important;}&#8220; el_class=&#8220;cybv2 cybv2-pad-top hv-cta&#8220;][vc_column width=&#8220;7\/12&#8243; el_class=&#8220;left-clmn&#8220;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h3>Sprechen Sie mit unseren Experten \u00fcber:<\/h3>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-145290 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/06\/icon-check.svg\" alt=\"\" width=\"23\" height=\"25\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;head-box-text&#8220;]Kontrolle \u00fcber nicht verwaltete Berechtigungen auf den Endger\u00e4ten erhalten[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-145290 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/06\/icon-check.svg\" alt=\"\" width=\"23\" height=\"25\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;head-box-text&#8220;]Schutz der Anmeldedaten von Mitarbeitern und Kunden[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-145290 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/06\/icon-check.svg\" alt=\"\" width=\"23\" height=\"25\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;head-box-text&#8220;]Sicherung von Identit\u00e4ten in Multi-Cloud-Umgebungen[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-145290 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/06\/icon-check.svg\" alt=\"\" width=\"23\" height=\"25\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;head-box-text&#8220;]Sicherung und Verwaltung von Secrets und Anmeldedaten, die von nicht-menschlichen Identit\u00e4ten verwendet werden[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-145290 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/06\/icon-check.svg\" alt=\"\" width=\"23\" height=\"25\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;head-box-text&#8220;]Sicherung von Identit\u00e4ten in Multi-Cloud-Umgebungen[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_single_image image=&#8220;145624&#8243; img_size=&#8220;full&#8220;][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;right-clmn cybv2-form&#8220; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_column_text el_class=&#8220;bold&#8220;]<\/p>\n<h4>Vereinbaren Sie ein Gespr\u00e4ch<\/h4>\n<p>[\/vc_column_text][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iOTE3MiIgdHlfcGFnZV91cmw9Imh0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS9kZS90aGFuay15b3UtY29udGFjdC8iXQ==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row el_class=&#8220;cyb-pad cybv2&#8243;][vc_column][vc_column_text el_class=&#8220;tiny&#8220;]* CyberArk sponserte die ESG-Umfrage zum Identity Security Maturity Model 2022 (N=1500 | 16\u00a0L\u00e4nder | 4\u00a0Regionen)[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27776],"class_list":["post-132472","page","type-page","status-publish","hentry","product_category-identity-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Identity Security | CyberArk<\/title>\n<meta name=\"description\" content=\"Sch\u00fctzen Sie Ihre Anwendungen, Infrastruktur und Daten mit CyberArk Identity Security, einem ganzheitlichen, risikobasierten Ansatz zur Sicherung menschlicher und maschineller Identit\u00e4ten.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/de\/identity-security\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity Security\" \/>\n<meta property=\"og:description\" content=\"Sch\u00fctzen Sie Ihre Anwendungen, Infrastruktur und Daten mit CyberArk Identity Security, einem ganzheitlichen, risikobasierten Ansatz zur Sicherung menschlicher und maschineller Identit\u00e4ten.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/de\/identity-security\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-17T20:24:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"13 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/de\/identity-security\/\",\"url\":\"https:\/\/www.cyberark.com\/de\/identity-security\/\",\"name\":\"Identity Security | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/identity-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/identity-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg\",\"datePublished\":\"2022-07-11T16:03:46+00:00\",\"dateModified\":\"2024-10-17T20:24:11+00:00\",\"description\":\"Sch\u00fctzen Sie Ihre Anwendungen, Infrastruktur und Daten mit CyberArk Identity Security, einem ganzheitlichen, risikobasierten Ansatz zur Sicherung menschlicher und maschineller Identit\u00e4ten.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/identity-security\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/de\/identity-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/de\/identity-security\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/de\/identity-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identity Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/de\/#website\",\"url\":\"https:\/\/www.cyberark.com\/de\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/de\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Identity Security | CyberArk","description":"Sch\u00fctzen Sie Ihre Anwendungen, Infrastruktur und Daten mit CyberArk Identity Security, einem ganzheitlichen, risikobasierten Ansatz zur Sicherung menschlicher und maschineller Identit\u00e4ten.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/de\/identity-security\/","og_locale":"de_DE","og_type":"article","og_title":"Identity Security","og_description":"Sch\u00fctzen Sie Ihre Anwendungen, Infrastruktur und Daten mit CyberArk Identity Security, einem ganzheitlichen, risikobasierten Ansatz zur Sicherung menschlicher und maschineller Identit\u00e4ten.","og_url":"https:\/\/www.cyberark.com\/de\/identity-security\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2024-10-17T20:24:11+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"13 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/de\/identity-security\/","url":"https:\/\/www.cyberark.com\/de\/identity-security\/","name":"Identity Security | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/de\/identity-security\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/de\/identity-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg","datePublished":"2022-07-11T16:03:46+00:00","dateModified":"2024-10-17T20:24:11+00:00","description":"Sch\u00fctzen Sie Ihre Anwendungen, Infrastruktur und Daten mit CyberArk Identity Security, einem ganzheitlichen, risikobasierten Ansatz zur Sicherung menschlicher und maschineller Identit\u00e4ten.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/de\/identity-security\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/de\/identity-security\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/de\/identity-security\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/03\/platform-graphic-outlined.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/de\/identity-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/de\/"},{"@type":"ListItem","position":2,"name":"Identity Security"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/de\/#website","url":"https:\/\/www.cyberark.com\/de\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/de\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/132472","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=132472"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/132472\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=132472"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=132472"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}