{"id":134369,"date":"2022-09-15T15:03:22","date_gmt":"2022-09-15T19:03:22","guid":{"rendered":"https:\/\/www.cyberark.com\/services-support\/strategische-beratung\/"},"modified":"2025-08-12T02:33:46","modified_gmt":"2025-08-12T06:33:46","slug":"strategic-consulting","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/services-support\/strategic-consulting\/","title":{"rendered":"Strategische Beratung"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 int-hero slate&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243;][vc_column_text]<\/p>\n<h1>Strategische Beratung<\/h1>\n<h2>Nutzen Sie unsere einzigartige Kombination aus Technologie und Fachkompetenz, um ein fortschrittliches und ausgereiftes Identit\u00e4tssicherheitsprogramm zu entwickeln.<\/h2>\n<p>[\/vc_column_text][vc_btn title=&#8220;Vertrieb kontaktieren&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fcontact%2F|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-2&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-121284\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Tech-asset.jpeg\" alt=\"Machine learning , artificial intelligence, ai, deep learning blockchain neural network concept\" width=\"770\" height=\"530\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Tech-asset.jpeg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Tech-asset-300x206.jpeg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Tech-asset-768x529.jpeg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Tech-asset-150x103.jpeg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 cybv2-pad-top overview-hz-no-hdr&#8220;][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-121082\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/planning-icon.svg\" alt=\"Planning Services \" \/>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4>Planung<\/h4>\n<p>Integrieren Sie Sicherheit in Gesch\u00e4fts- und Betriebsprozesse, ohne die Flexibilit\u00e4t des Unternehmens zu beeintr\u00e4chtigen.[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-121090\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Secure-Authentication-icon.svg\" alt=\"Design and Development Services \" \/>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4>Design und Entwicklung<\/h4>\n<p>Geben Sie der Sicherheit der zunehmenden Anzahl und Arten von Identit\u00e4ten den Vorrang[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-121138\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/workflow-icon.svg\" alt=\"Integration and Analysis Services\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4>Integration und Analyse<\/h4>\n<p>Strategischer Ansatz bei der Entwicklung von Arbeitsabl\u00e4ufen zur Sicherung von Cloud- und Legacy-Systemen[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 cyberark-blueprint dark&#8220;][vc_column width=&#8220;1\/4&#8243;][vc_column_text el_class=&#8220;new_hpstyle_section3_h4&#8243;]<\/p>\n<h3>Blueprint-Programm-Entwicklungsservice<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_column_text el_class=&#8220;new_hpstyle_section3_text&#8220;]<\/p>\n<h4>Erstellen Sie ein umfassendes und effektives Programm mit dem f\u00fchrenden Anbieter von Identit\u00e4tssicherheit und den Vorgaben des CyberArk-Blueprint.<\/h4>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243;][vc_btn title=&#8220;Mehr erfahren&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; align=&#8220;right&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fblueprint%2F&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2-pad cybv2 cybv2-background-oval tour&#8220;][vc_column][vc_row_inner el_class=&#8220;cyb-center&#8220;][vc_column_inner el_class=&#8220;cyb-pad-btm&#8220;][vc_column_text el_class=&#8220;left-mobile&#8220;]<\/p>\n<h3>Strategieempfehlungen<\/h3>\n<p>Entwickeln Sie ein fortschrittliches und ausgereiftes Identit\u00e4tssicherheitsprogramm f\u00fcr Ihr gesamtes Unternehmen.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=&#8220;square&#8220; active_section=&#8220;1&#8243; css_animation=&#8220;none&#8220;][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;L\u00f6sungen f\u00fcr Identit\u00e4tssicherheit&#8220; tab_id=&#8220;identity&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>L\u00f6sungen f\u00fcr Identit\u00e4tssicherheit<\/h4>\n<p>Ziehen Sie eine End-to-End-Identit\u00e4tssicherheitsl\u00f6sung in Betracht, um Ihren Benutzern einen nativen Zugriff zu erm\u00f6glichen auf alles, was sie ben\u00f6tigen. Geben Sie ihnen die Gewissheit, dass Ihre DevOps-, Hybrid- und Cloud-Umgebungen sicher sind.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/products\/\">CyberArk-Identit\u00e4tssicherheit<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-121106\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Products-Tour-StrategicConsulting-1.png\" alt=\"Identity Security\u00a0\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Products-Tour-StrategicConsulting-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Products-Tour-StrategicConsulting-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Products-Tour-StrategicConsulting-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;L\u00f6sungs- und Architekturdesign&#8220; tab_id=&#8220;sa-design&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>L\u00f6sungs- und Architekturdesign<\/h4>\n<p>Vergewissern Sie sich vor der Implementierung, dass Ihre neue L\u00f6sung mit Ihren Anforderungen an Verf\u00fcgbarkeit und Redundanz sowie mit Ihrer IT-Infrastruktur \u00fcbereinstimmt.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-121114\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Products-Tour-StrategicConsulting-2.png\" alt=\"Solution and Architecture Design \" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Products-Tour-StrategicConsulting-2.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Products-Tour-StrategicConsulting-2-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Products-Tour-StrategicConsulting-2-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;Strategien f\u00fcr die Einf\u00fchrung&#8220; tab_id=&#8220;strategies&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Strategien f\u00fcr die Einf\u00fchrung<\/h4>\n<p>Eine Risikominderung funktioniert nur, wenn sie auch f\u00fcr Ihre Teams funktioniert. Erleichterte unternehmensweite Akzeptanz mithilfe von Best Practices der Branche.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-121122\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Products-Tour-StrategicConsulting-3.png\" alt=\"Roll-out Strategies\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Products-Tour-StrategicConsulting-3.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Products-Tour-StrategicConsulting-3-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Products-Tour-StrategicConsulting-3-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;Assessment&#8220; tab_id=&#8220;assessment&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Assessment<\/h4>\n<p>Die Erzielung messbarer Ergebnisse beginnt mit einer klaren Vorstellung davon, wie Erfolg aussieht. Vergewissern Sie sich, dass Ihre Kennzahlen auf die Erwartungen und Bed\u00fcrfnisse Ihrer Projektmanager, Stakeholder und Partner abgestimmt sind.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-121130\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Products-Tour-StrategicConsulting-4.png\" alt=\"Assessment\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Products-Tour-StrategicConsulting-4.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Products-Tour-StrategicConsulting-4-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Products-Tour-StrategicConsulting-4-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]JTNDc2NyaXB0JTNFJTBBaWYlMjAlMjhqUXVlcnklMjh3aW5kb3clMjkud2lkdGglMjglMjklMjAlM0MlMjA3NjglMjklMjAlN0IlMEFqUXVlcnklMjglMjIudG91ciUyMC52Y190dGEtcGFuZWwlMjIlMjkub24lMjglMjJjbGljayUyMiUyQ2Z1bmN0aW9uJTI4JTI5JTIwJTdCJTBBJTA5JTBBJTA5aWYlMjhqUXVlcnklMjh0aGlzJTI5Lmhhc0NsYXNzJTI4JTIydmNfYWN0aXZlJTIyJTI5JTI5JTdCJTBBJTA5JTA5JTBBJTA5JTA5c2V0VGltZW91dCUyOGZ1bmN0aW9uJTI4JTI5JTdCJTBBJTA5JTA5JTA5alF1ZXJ5JTI4JTIyLnRvdXIlMjAudmNfdHRhLXBhbmVsJTIyJTI5LnJlbW92ZUNsYXNzJTI4JTIydmNfYWN0aXZlJTIyJTI5JTNCJTIwJTBBJTA5JTA5JTdEJTJDMTAwJTI5JTBBJTA5JTA5JTBBJTA5JTA5cmV0dXJuJTIwZmFsc2UlM0IlMEElMDklN0QlMEElN0QlMjklM0IlMEElN0QlMEElMEFqUXVlcnklMjglMjIudG91ciUyMC52Y190dGEtcGFuZWwlMjAud3BiX3RleHRfY29sdW1uJTIwYSUyMiUyOS5jbGljayUyOGZ1bmN0aW9uJTI4ZSUyOSUyMCU3QiUwQSUyMCUyMCUyMCUyRiUyRiUyMERvJTIwc29tZXRoaW5nJTBBJTIwJTIwJTIwZS5zdG9wUHJvcGFnYXRpb24lMjglMjklM0IlMEElN0QlMjklM0IlMEElM0MlMkZzY3JpcHQlM0U=[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_resources&#8220; css=&#8220;.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8220;][vc_column width=&#8220;1\/3&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;no-break&#8220;]<\/p>\n<h3>Verwandte<br \/>\nRessourcen<br \/>\nerkunden<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/resources\/\">Alle Ressourcen anzeigen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243;][\/vc_column][vc_column width=&#8220;1\/3&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column&#8220;][vc_column el_class=&#8220;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8220;.vc_custom_1627056072440{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;new_hpstyle_section8_uberflip&#8220;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 cybv2_customer_stories vc_tta-o-non-responsive&#8220; css=&#8220;.vc_custom_1629141775965{background-color: #ffffff !important;}&#8220;][vc_column][vc_raw_js]%3Clink%20rel%3D%22stylesheet%22%20type%3D%22text%2Fcss%22%20href%3D%22%2F%2Fcdn.jsdelivr.net%2Fnpm%2Fslick-carousel%401.8.1%2Fslick%2Fslick.css%22%2F%3E%0A%3Cscript%20type%3D%22text%2Fjavascript%22%20src%3D%22%2F%2Fcdn.jsdelivr.net%2Fnpm%2Fslick-carousel%401.8.1%2Fslick%2Fslick.min.js%22%3E%3C%2Fscript%3E%0A%3Cscript%3E%0AjQuery%28document%29.ready%28function%28%29%7B%0A%20%20%20%20%2F%2FAdd%20Active%20to%20tab%20on%20page%20load%0A%20%20%20%20%24panels%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-panels%20.vc_tta-panel%27%29%3B%0A%20%20%20%20%24tabs%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%20%20%20%20var%20index%20%3D%200%3B%0A%0A%20%20%20%20%2F%2FAlign%20Tabs%20with%20panels%0A%20%20%20%20%24panels.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20jQuery%28this%29.hasClass%28%27vc_active%27%29%3B%0A%20%20%20%20%20%20%20%20return%20false%3B%0A%20%20%20%20%20%20%20%20index%2B%2B%3B%0A%20%20%20%20%7D%29%0A%20%20%20%20var%20newIndex%20%3D%200%3B%0A%20%20%20%20%24tabs.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20if%28index%20%3D%3D%20newIndex%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20jQuery%28this%29.addClass%28%27vc_active%27%29%3B%0A%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20%20%20newIndex%2B%2B%3B%0A%20%20%20%20%7D%29%0A%0A%20%20%20%20%2F%2FAdd%20custom%20icon%20to%20tabs%0A%20%20%20%20var%20iconIndex%20%3D%201%3B%0A%20%20%20%20%24panels.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20%24this%20%3D%20jQuery%28this%29%3B%0A%20%20%20%20%20%20%20%20%24tab%20%3D%20%24this.find%28%27.tab-icon%27%29%3B%0A%20%20%20%20%20%20%20%20%24tab.find%28%27img%27%29.prependTo%28jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tab%3Anth-of-type%28%27%20%2B%20iconIndex%20%2B%20%27%29%20a%27%29%29%3B%0A%20%20%20%20%20%20%20%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tab%3Anth-of-type%28%27%20%2B%20iconIndex%20%2B%20%27%29%20a%20i%27%29.remove%28%29%0A%20%20%20%20%20%20%20%20%24tab.remove%28%29%3B%0A%20%20%20%20%20%20%20%20iconIndex%2B%2B%3B%0A%20%20%20%20%7D%29%0A%7D%29%3B%0AjQuery%28window%29.on%28%27load%20resize%20orientationchange%27%2C%20function%28%29%20%7B%0A%20%20%20%20var%20%24carousel%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%27%29%3B%0A%20%20%20%20var%20%24click%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%0A%20%20%20%20%2F%2FChange%20slide%20to%20selected%20panel%20for%20tabs%0A%20%20%20%20var%20slideGoTo%20%3D%20function%28%29%7B%0A%20%20%20%20%20%20%20%20if%20%28%24carousel.hasClass%28%27slick-initialized%27%29%29%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24carousel.slick%28%27slickGoTo%27%2C%20%2BjQuery%28this%29.attr%28%27data-slick-index%27%29%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20setTimeout%28function%28%29%7B%20%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%24click%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%24click.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20if%28jQuery%28this%29.hasClass%28%27vc_active%27%29%20%26%26%20%28%21jQuery%28this%29.hasClass%28%27slick-center%27%29%20%7C%7C%20%21jQuery%28this%29.hasClass%28%27slick-active%27%29%29%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jQuery%28this%29.removeClass%28%27vc_active%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%7D%29%0A%20%20%20%20%20%20%20%20%20%20%20%20%7D%2C%201000%29%3B%0A%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%7D%0A%0A%20%20%20%20%2F%2FUpdate%20panel%20for%20selected%20slide%20%28aka%20tab%29%0A%20%20%20%20var%20afterChangeFunction%20%3D%20function%28slick%2C%20currentSlide%29%7B%0A%20%20%20%20%20%20%20%20%24currentTab%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab.slick-center.slick-active%20a%27%29%3B%0A%20%20%20%20%20%20%20%20if%28%21%24currentTab.parent%28%29.hasClass%28%27vc_active%27%29%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24currentTab.trigger%28%27click%27%29%3B%0A%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20%20%20%2F%2AsetTimeout%28function%28%29%7B%20%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20if%28jQuery%28this%29.hasClass%28%27vc_active%27%29%20%26%26%20%28%21jQuery%28this%29.hasClass%28%27slick-center%27%29%20%7C%7C%20%21jQuery%28this%29.hasClass%28%27slick-active%27%29%29%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jQuery%28this%29.removeClass%28%27vc_active%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20%20%20%20%20%20%20%7D%29%0A%20%20%20%20%20%20%20%20%7D%2C%201000%29%3B%2A%2F%0A%20%20%20%20%7D%0A%0A%20%20%20%20%2F%2A%20Initializes%20a%20slick%20carousel%20only%20on%20mobile%20screens%20%2A%2F%0A%20%20%20%20%2F%2F%20slick%20on%20mobile%0A%20%20%20%20if%20%28jQuery%28window%29.width%28%29%20%3E%20768%29%20%7B%0A%20%20%20%20%20%20%20%20if%20%28%24carousel.hasClass%28%27slick-initialized%27%29%29%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24carousel.slick%28%27unslick%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click.unbind%28%27click%27%2C%20slideGoTo%29%0A%20%20%20%20%20%20%20%20%20%20%20%20%24carousel.unbind%28%27afterChange%27%2C%20afterChangeFunction%29%3B%0A%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%7D%0A%20%20%20%20else%7B%0A%20%20%20%20%20%20%20%20if%20%28%21%24carousel.hasClass%28%27slick-initialized%27%29%29%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24carousel.slick%28%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20slidesToShow%3A%203%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20slidesToScroll%3A%201%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mobileFirst%3A%20true%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20infinite%3A%20true%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20centerMode%3A%20true%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20centerPadding%3A%20%2750px%27%0A%20%20%20%20%20%20%20%20%20%20%20%20%7D%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click%20%3D%20jQuery%28%27.cybv2_customer_stories_tabs%20.vc_tta-tabs-container%20.vc_tta-tabs-list%20.vc_tta-tab%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click.bind%28%27click%27%2C%20slideGoTo%29%0A%20%20%20%20%20%20%20%20%20%20%20%20%24carousel.bind%28%27afterChange%27%2C%20afterChangeFunction%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%24click.each%28function%28%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20if%28jQuery%28this%29.hasClass%28%27vc_active%27%29%20%26%26%20%21jQuery%28this%29.hasClass%28%27slick-cloned%27%29%29%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jQuery%28this%29.trigger%28%27click%27%29%3B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%20%20%20%20%20%20%20%20%7D%29%0A%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%7D%0A%7D%29%3B%0A%3C%2Fscript%3E[\/vc_raw_js][vc_tta_tabs style=&#8220;flat&#8220; shape=&#8220;square&#8220; color=&#8220;white&#8220; spacing=&#8220;&#8220; gap=&#8220;20&#8243; alignment=&#8220;center&#8220; active_section=&#8220;&#8220; el_class=&#8220;cybv2_customer_stories_tabs&#8220; css=&#8220;.vc_custom_1608676900675{background-color: #ffffff !important;}&#8220;][vc_tta_section i_icon_fontawesome=&#8220;fas fa-piggy-bank&#8220; add_icon=&#8220;true&#8220; title=&#8220;Prof. Services&#8220; tab_id=&#8220;professional-services&#8220; el_class=&#8220;new_hpstyle_section6_tab1_icon vc_active&#8220;][vc_row_inner equal_height=&#8220;yes&#8220; el_class=&#8220;new_hpstyle_section6_maintab_row&#8220;][vc_column_inner el_class=&#8220;image-column&#8220; width=&#8220;1\/2&#8243; css=&#8220;.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_single_image image=&#8220;122055&#8243; img_size=&#8220;590&#215;500&#8243; alignment=&#8220;right&#8220; el_class=&#8220;new_hpstyle_section6_tab1_left_image&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;new_hpstyle_section6_tab1_right_bckgrd&#8220; width=&#8220;1\/2&#8243;][vc_single_image image=&#8220;122231&#8243; img_size=&#8220;full&#8220; el_class=&#8220;tab-icon&#8220;][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text1 text&#8220;]&#8220;Die Zusammenarbeit mit den Experten von CyberArk, die viel Erfahrung mit der Einrichtung von allem haben, war eine wirklich positive Erfahrung.&#8220;[\/vc_column_text][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text2&#8243;]<strong>Patrick Wake,<\/strong> Group Head of Information Security FDM Group[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/customer-stories\">Lesen Sie mehr Kundengeschichten<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=&#8220;fas fa-industry&#8220; add_icon=&#8220;true&#8220; title=&#8220;Fertigung&#8220; tab_id=&#8220;1607742495229-255d985e-6d0ceb66-6bf8a05e-944d&#8220; el_class=&#8220;new_hpstyle_section6_tab4_icon&#8220;][vc_row_inner equal_height=&#8220;yes&#8220; el_class=&#8220;new_hpstyle_section6_maintab_row&#8220;][vc_column_inner el_class=&#8220;image-column&#8220; width=&#8220;1\/2&#8243; css=&#8220;.vc_custom_1607653496575{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_single_image image=&#8220;122063&#8243; img_size=&#8220;590&#215;500&#8243; alignment=&#8220;right&#8220; el_class=&#8220;new_hpstyle_section6_tab1_left_image&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;new_hpstyle_section6_tab1_right_bckgrd&#8220; width=&#8220;1\/2&#8243;][vc_single_image image=&#8220;108271&#8243; img_size=&#8220;full&#8220; el_class=&#8220;tab-icon&#8220;][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text1 text&#8220;]&#8220;Das technische Know-how von CyberArk erm\u00f6glicht es unserem Team, unsere Sicherheitsprobleme auf neue und andere Weise zu betrachten.&#8220;[\/vc_column_text][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text2&#8243;]<strong>Jayne Little,<\/strong> Information Security Engineer (Privileged Access), Rockwell Automation[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/customer-stories\">Lesen Sie mehr Kundengeschichten<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_icon_fontawesome=&#8220;fas fa-piggy-bank&#8220; add_icon=&#8220;true&#8220; title=&#8220;Finanzbranche&#8220; tab_id=&#8220;1607742494616-60a6dced-32cfeb66-6bf8a05e-944d&#8220; el_class=&#8220;new_hpstyle_section6_tab3_icon&#8220;][vc_row_inner equal_height=&#8220;yes&#8220; el_class=&#8220;new_hpstyle_section6_maintab_row&#8220;][vc_column_inner el_class=&#8220;image-column&#8220; width=&#8220;1\/2&#8243; css=&#8220;.vc_custom_1607653481888{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_single_image image=&#8220;122071&#8243; img_size=&#8220;590&#215;500&#8243; alignment=&#8220;right&#8220; el_class=&#8220;new_hpstyle_section6_tab1_left_image&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;new_hpstyle_section6_tab1_right_bckgrd&#8220; width=&#8220;1\/2&#8243;][vc_single_image image=&#8220;108247&#8243; img_size=&#8220;full&#8220; el_class=&#8220;tab-icon&#8220;][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text1 text&#8220;]&#8220;CyberArk bietet einen Best-Practice-Ansatz f\u00fcr die Einhaltung von Richtlinien, der es uns erm\u00f6glicht, diese besser durchzusetzen und den Austausch von Passw\u00f6rtern zu automatisieren.&#8220;[\/vc_column_text][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text2&#8243;]<strong>Jethro Cornelissen,<\/strong> Global Lead &amp; Head of Global Security Operations Center, Rabobank International[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/customer-stories\">Lesen Sie mehr Kundengeschichten<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_talk_to_an_expert&#8220; css=&#8220;.vc_custom_1608677118624{background-color: #061b2b !important;}&#8220;][vc_column][vc_column_text el_class=&#8220;extra-space&#8220;]<\/p>\n<h2 style=\"text-align: center;\">Ihr Kontakt zum Vertrieb<\/h2>\n<p>[\/vc_column_text][vc_column_text el_class=&#8220;new_hpstyle_section9_text&#8220;]<\/p>\n<p style=\"text-align: center;\">Wir konzentrieren unsere Bem\u00fchungen darauf, unseren Kunden zu schnellen und nachhaltigen Ergebnissen zu verhelfen.<\/p>\n<p>[\/vc_column_text][vc_btn title=&#8220;Kontakt aufnehmen&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; align=&#8220;center&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fcontact%2F|&#8220; el_class=&#8220;cybv2-button-solid cyb-button-hpstyle_section5&#8243;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 int-hero slate&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243;][vc_column_text] Strategische Beratung Nutzen Sie unsere einzigartige Kombination aus Technologie und Fachkompetenz, um ein fortschrittliches und ausgereiftes Identit\u00e4tssicherheitsprogramm zu entwickeln. [\/vc_column_text][vc_btn title=&#8220;Vertrieb kontaktieren&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fcontact%2F|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][vc_column&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":32307,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-134369","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Strategische Beratungsdienstleistungen | CyberArk<\/title>\n<meta name=\"description\" content=\"Nutzen Sie die strategischen Beratungsdienste von CyberArk, eine einzigartige Kombination aus Technologie und Fachwissen, um ein fortschrittliches Identit\u00e4tssicherheitsprogramm zu entwickeln.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/de\/services-support\/strategic-consulting\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Strategische Beratung\" \/>\n<meta property=\"og:description\" content=\"Nutzen Sie die strategischen Beratungsdienste von CyberArk, eine einzigartige Kombination aus Technologie und Fachwissen, um ein fortschrittliches Identit\u00e4tssicherheitsprogramm zu entwickeln.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/de\/services-support\/strategic-consulting\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-12T06:33:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Tech-asset.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"530\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/de\/services-support\/strategic-consulting\/\",\"url\":\"https:\/\/www.cyberark.com\/de\/services-support\/strategic-consulting\/\",\"name\":\"Strategische Beratungsdienstleistungen | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/services-support\/strategic-consulting\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/services-support\/strategic-consulting\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Tech-asset.jpeg\",\"datePublished\":\"2022-09-15T19:03:22+00:00\",\"dateModified\":\"2025-08-12T06:33:46+00:00\",\"description\":\"Nutzen Sie die strategischen Beratungsdienste von CyberArk, eine einzigartige Kombination aus Technologie und Fachwissen, um ein fortschrittliches Identit\u00e4tssicherheitsprogramm zu entwickeln.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/services-support\/strategic-consulting\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/de\/services-support\/strategic-consulting\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/de\/services-support\/strategic-consulting\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Tech-asset.jpeg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Tech-asset.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/de\/services-support\/strategic-consulting\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service und Support\",\"item\":\"https:\/\/www.cyberark.com\/services-support\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Strategische Beratung\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Strategische Beratungsdienstleistungen | CyberArk","description":"Nutzen Sie die strategischen Beratungsdienste von CyberArk, eine einzigartige Kombination aus Technologie und Fachwissen, um ein fortschrittliches Identit\u00e4tssicherheitsprogramm zu entwickeln.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/de\/services-support\/strategic-consulting\/","og_locale":"de_DE","og_type":"article","og_title":"Strategische Beratung","og_description":"Nutzen Sie die strategischen Beratungsdienste von CyberArk, eine einzigartige Kombination aus Technologie und Fachwissen, um ein fortschrittliches Identit\u00e4tssicherheitsprogramm zu entwickeln.","og_url":"https:\/\/www.cyberark.com\/de\/services-support\/strategic-consulting\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-08-12T06:33:46+00:00","og_image":[{"width":770,"height":530,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Tech-asset.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"6 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/de\/services-support\/strategic-consulting\/","url":"https:\/\/www.cyberark.com\/de\/services-support\/strategic-consulting\/","name":"Strategische Beratungsdienstleistungen | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/de\/services-support\/strategic-consulting\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/de\/services-support\/strategic-consulting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Tech-asset.jpeg","datePublished":"2022-09-15T19:03:22+00:00","dateModified":"2025-08-12T06:33:46+00:00","description":"Nutzen Sie die strategischen Beratungsdienste von CyberArk, eine einzigartige Kombination aus Technologie und Fachwissen, um ein fortschrittliches Identit\u00e4tssicherheitsprogramm zu entwickeln.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/de\/services-support\/strategic-consulting\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/de\/services-support\/strategic-consulting\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/de\/services-support\/strategic-consulting\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Tech-asset.jpeg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Tech-asset.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/de\/services-support\/strategic-consulting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Service und Support","item":"https:\/\/www.cyberark.com\/services-support\/"},{"@type":"ListItem","position":3,"name":"Strategische Beratung"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/134369","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=134369"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/134369\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32307"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=134369"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=134369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}