{"id":139292,"date":"2023-01-20T14:07:55","date_gmt":"2023-01-20T19:07:55","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/secrets-management\/"},"modified":"2025-10-16T05:00:38","modified_gmt":"2025-10-16T09:00:38","slug":"secrets-management","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/products\/secrets-management\/","title":{"rendered":"Secrets Management"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 int-hero dark&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243;][vc_column_text]<\/p>\n<h1>Secrets Management<\/h1>\n<h2>Vereinfachen Sie die Sicherung nicht-menschlicher Identit\u00e4ten f\u00fcr alle Anwendungen, DevOps-Pipelines und Cloud-Workloads.<\/h2>\n<p>[\/vc_column_text][vc_btn title=&#8220;Eine Demo anfragen&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Ftry-buy%2Fsecrets-manager-enterprise-demo%2F|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-2&#8243;][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_fxr5ooh7ak videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad-top overview-vt&#8220; css=&#8220;.vc_custom_1756222421494{background-color: #FFFFFF !important;}&#8220;][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;head-box&#8220;][vc_column_text]<\/p>\n<h3>Zentrale Verwaltung von Secrets f\u00fcr alle Identit\u00e4ten in Anwendungen<\/h3>\n<p>Anmeldedaten im Anwendungscode und in der gesamten Software Supply Chain sind zunehmend Ziel von Cyber-Angriffen. Mit CyberArk k\u00f6nnen Sie Anmeldedaten zentral rotieren und verwalten, die Verbreitung von Tresoren beseitigen und \u00c4nderungen an den Arbeitsabl\u00e4ufen der Entwickler vermeiden. \u200b<\/p>\n<p>SaaS Secrets Management Solutions vereinfachen die Bedienung und beschleunigen die Sicherung aller Arten von Anwendungen im gesamten Unternehmen.[\/vc_column_text][\/vc_column][vc_column width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=&#8220;cta-box&#8220;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-109203\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Enable-the-Digital-Business-icon.svg\" alt=\"Digital Business-Symbol aktivieren\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Digitale Transformation sichern<\/h4>\n<p>Sichern Sie Anwendungs- und Automatisierungs-Tools, ohne die Entwickler auszubremsen.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;cta-box&#8220;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-109195\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Defend-Against-Attacks-icon.svg\" alt=\"Symbol Vor Angriffen sch\u00fctzen \" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Reduzierung des Cyberrisikos<\/h4>\n<p>Geben Sie Anwendungen einfachen Zugriff auf die Zugangsdaten, die diese ben\u00f6tigen, w\u00e4hrend Sie vertrauliche Zugangsdaten f\u00fcr Angreifer unzug\u00e4nglich halten.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;cta-box&#8220;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-109211\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Drive-Operational-Efficiency-icon.svg\" alt=\"Symbol f\u00fcr bessere Betriebseffizienz\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Betriebliche Effizienz erm\u00f6glichen<\/h4>\n<p>Reduzieren Sie die Komplexit\u00e4t und Belastung von Entwicklern und verbessern Sie gleichzeitig die Agilit\u00e4t und den Schutz des Unternehmens.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 cybv2-pad info-graphic&#8220;][vc_column el_class=&#8220;text-center&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;head-box&#8220;]<\/p>\n<h3>CyberArk als Gesamtf\u00fchrer im KuppingerCole Analysts Leadership Compass 2025 f\u00fcr Enterprise Secrets Management benannt<\/h3>\n<p>[\/vc_column_text][vc_btn title=&#8220;Lesen Sie den ganzen Bericht&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fanalyst-reports%2F2025-kuppingercole-leadership-compass-for-enterprise-secrets-management|title:Jetzt%20lesen|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215672\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Combined-Leadership-1.png\" alt=\"Gemeinsame F\u00fchrung\" width=\"1533\" height=\"569\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Combined-Leadership-1.png 1533w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Combined-Leadership-1-300x111.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Combined-Leadership-1-1024x380.png 1024w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Combined-Leadership-1-768x285.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Combined-Leadership-1-150x56.png 150w\" sizes=\"auto, (max-width: 1533px) 100vw, 1533px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad-top overview-hz dark&#8220; css=&#8220;.vc_custom_1756391981739{background-color: #082233 !important;}&#8220;][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;head-box&#8220;][vc_column_text css=&#8220;.vc_custom_1756237673240{margin-bottom: 40px !important;}&#8220;]<\/p>\n<h3>Multi-Cloud, CI\/CD und containerisierte Anwendungen<\/h3>\n<p>SaaS- und Self-Hosted-L\u00f6sungen, die die Flexibilit\u00e4t bieten, Secrets in jeder Cloud-, On-Premise-, Container-, CI\/CD-Pipeline- oder DevOps-Umgebung zu sichern.[\/vc_column_text][\/vc_column][vc_column width=&#8220;2\/3&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_row_inner equal_height=&#8220;yes&#8220;][vc_column_inner width=&#8220;5\/12&#8243;][vc_column_text css=&#8220;.vc_custom_1756240819783{margin-bottom: 30px !important;}&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215691\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group.png\" alt=\"Frau\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group.png 200w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-150x150.png 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>Secrets Manager, SaaS\u200b<\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;alt-cta&#8220;]<a style=\"color: #d6f77a !important;\" href=\"https:\/\/www.cyberark.com\/de\/product-name-updates\/\">Conjur Cloud Secrets Manager ist jetzt Secrets Manager, SaaS.<\/a><i class=\"fa fa-long-arrow-right\" style=\"color: #d6f77a !important;\"><\/i>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;pt-4&#8243;]Modernes SaaS-basiertes Secrets Management mit einer ansprechenden Benutzeroberfl\u00e4che und einer schnellen Wertsch\u00f6pfung, unterst\u00fctzt von der CyberArk Identity Security Plattform. Plattformunabh\u00e4ngiges SaaS-Secrets-Management, das den nicht-menschlichen Zugriff und die maschinelle Identit\u00e4t in Multi-Cloud- und Hybridumgebungen verwaltet und ein einheitliches Erlebnis f\u00fcr Sicherheit und Entwickler bietet, ganz gleich, wo sich Ihre Secrets befinden.[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right pt-4&#8243;]<a href=\"https:\/\/www.cyberark.com\/de\/products\/secrets-manager-saas\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_column_text css=&#8220;.vc_custom_1756240852635{margin-bottom: 30px !important;}&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215700\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-1.png\" alt=\"Mann\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-1.png 200w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-1-150x150.png 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>Secrets Manager, Self-Hosted\u200b<\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;alt-cta&#8220;]<a style=\"color: #d6f77a !important;\" href=\"https:\/\/www.cyberark.com\/de\/product-name-updates\/\">Conjur Secrets Manager Enterprise ist jetzt Secrets Manager, Self-Hosted.<\/a><i class=\"fa fa-long-arrow-right\" style=\"color: #d6f77a !important;\"><\/i>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;pt-4&#8243;]Sichere Authentifizierung, zentrale Kontrolle und Pr\u00fcfung, wie Anwendungen, DevOps und Automatisierungs-Tools vertrauliche und privilegierte Anmeldedaten f\u00fcr den Zugriff auf Datenbanken, Cloud-Umgebungen und andere sensible Ressourcen verwenden.[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right pt-4&#8243;]<a href=\"https:\/\/www.cyberark.com\/de\/products\/secrets-manager-self-hosted\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8220;5\/12&#8243; css=&#8220;.vc_custom_1736362437897{margin-top: 40px !important;}&#8220;][vc_column_text css=&#8220;.vc_custom_1756240878019{margin-bottom: 30px !important;}&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215709\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-2.png\" alt=\"Mann\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-2.png 200w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-2-150x150.png 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>Conjur Secrets Manager Open Source<\/h4>\n<p>Eine frei verf\u00fcgbare Open-Source-L\u00f6sung zur sicheren Authentifizierung und Kontrolle, wie Anwendungen und DevOps-Tools vertrauliche Zugangsdaten und privilegierte Anmeldedaten f\u00fcr den Zugriff auf Datenbanken, Cloud-Umgebungen und andere sensible Ressourcen verwenden.[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right pt-4&#8243;]<a href=\"https:\/\/www.conjur.org\/\" target=\"_blank\" rel=\"noopener\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad-top overview-hz dark&#8220;][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;head-box&#8220;][vc_column_text css=&#8220;.vc_custom_1756238266827{margin-bottom: 40px !important;}&#8220;]<\/p>\n<h3>F\u00fcr den integrierten Secrets Manager des Cloudanbieters<\/h3>\n<p>SaaS-L\u00f6sungen, die es Sicherheitsteams erm\u00f6glichen, Secrets zentral zu verwalten, w\u00e4hrend Entwickler weiterhin die integrierten Secrets-Management-Funktionen des Cloud-Anbieters nutzen.[\/vc_column_text][\/vc_column][vc_column width=&#8220;2\/3&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_row_inner equal_height=&#8220;yes&#8220;][vc_column_inner width=&#8220;5\/12&#8243;][vc_column_text css=&#8220;.vc_custom_1756240906485{margin-bottom: 30px !important;}&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215718\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-3.png\" alt=\"Frau\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-3.png 200w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-3-150x150.png 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>Secrets Hub<\/h4>\n<p>Unternehmen, die den AWS Secrets Manager in Anspruch genommen haben, k\u00f6nnen alle Vorteile des zentralen Secrets-Managements von CyberArk nutzen, ohne die Arbeitsabl\u00e4ufe der Entwickler zu beeintr\u00e4chtigen.<\/p>\n<p><em>SaaS-basiertes Secrets Management, unterst\u00fctzt von der CyberArk Identity Security Platform<\/em>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right pt-4&#8243;]<a href=\"https:\/\/www.cyberark.com\/de\/products\/secrets-hub\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad-top overview-hz dark&#8220;][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;head-box&#8220;][vc_column_text css=&#8220;.vc_custom_1756238398075{margin-bottom: 40px !important;}&#8220;]<\/p>\n<h3>F\u00fcr statische Anwendungen<\/h3>\n<p>L\u00f6sungen zur Verwaltung und Rotation von Anmeldedaten f\u00fcr eine Vielzahl von statischen Anwendungen und Software von Drittanbietern.\u200b[\/vc_column_text][\/vc_column][vc_column width=&#8220;2\/3&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_row_inner equal_height=&#8220;yes&#8220; el_class=&#8220;pb-8&#8243;][vc_column_inner width=&#8220;5\/12&#8243;][vc_column_text css=&#8220;.vc_custom_1756240930372{margin-bottom: 30px !important;}&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215727\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-4.png\" alt=\"Mann\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-4.png 200w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/Mask-group-4-150x150.png 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>Credential Provider<\/h4>\n<p>Sichern Sie statische Anwendungen, Software von Drittanbietern, RPA, Automatisierungstools und IT-Managementplattformen, indem Sie die nicht-menschlichen Anmeldedaten verwalten, die f\u00fcr den sicheren Zugriff auf Ressourcen erforderlich sind. Die umfangreiche Palette an Integrationen von CyberArk vereinfacht die Sicherung von Anmeldedaten f\u00fcr eine einzelne Anwendung bis hin zu gesch\u00e4ftskritischen Anwendungen, die in gro\u00dfem Ma\u00dfstab betrieben werden.[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right pt-4&#8243;]<a href=\"https:\/\/www.cyberark.com\/de\/products\/credential-providers\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 customer-stories cybv2-pad&#8220;][vc_column width=&#8220;2\/3&#8243;][vc_column_text el_class=&#8220;pb-4&#8243;]<\/p>\n<h3>Unterst\u00fctzung von Kunden weltweit bei der Sicherung von Identit\u00e4ten f\u00fcr Cloud-Workloads und -Apps.<\/h3>\n<h6>CyberArk Kunden nutzen den CyberArk Secrets Manager und die  Identity Security Plattform, um alle ihre menschlichen und nicht-menschlichen Identit\u00e4ten zu sichern.<\/h6>\n<p>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/?post_type=customer_story&#038;p=128197\">Weitere Kundenberichte anzeigen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cyb-pad-btm featured-video-overflow&#8220; css=&#8220;.vc_custom_1671212795028{background-color: #ffffff !important;}&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;pb-6&#8243;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215681\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/dz-bank-logo-block.jpg\" alt=\"dz bank logo\" width=\"638\" height=\"622\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/dz-bank-logo-block.jpg 638w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/dz-bank-logo-block-300x292.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/dz-bank-logo-block-150x146.jpg 150w\" sizes=\"auto, (max-width: 638px) 100vw, 638px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;pb-4&#8243;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-201899\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/01\/double-quotes.svg\" alt=\"doppelte Anf\u00fchrungszeichen\" width=\"87\" height=\"64\" \/><\/p>\n<p><span class=\"large-quote\" style=\"font-size: 22px;\">\u201eWenn es um Identity Security und insbesondere Privileged Access Management geht, ist CyberArk der entscheidende Service, den die DZ BANK zum Schutz unserer IT-Infrastruktur einsetzt. Seit der Integration von CyberArk in unsere Umgebung haben sich Privilege Management und Sicherheit definitiv verbessert. Im Grunde genommen kommt es immer darauf an, die Kontrolle \u00fcber Privilegien zu haben und Secrets verwalten zu k\u00f6nnen.\u201c<\/span><\/p>\n<p><strong>Kurt Sand<\/strong>,\u00a0GM, Machine Identity Security bei CyberArk[\/vc_column_text][vc_row_inner el_class=&#8220;resource-button-sand&#8220;][vc_column_inner column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-business-value-of-cyberark|title:Das%20Whitepaper%20lesen|&#8220; offset=&#8220;vc_col-lg-10 vc_col-md-10 vc_col-xs-11&#8243;][vc_column_text css=&#8220;&#8220;]Whitepaper[\/vc_column_text][vc_column_text css=&#8220;&#8220;]Der State of Maschinen Identity Security-Report 2025 <i class=\"fa-solid fa-circle-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 cybv2-pad-btm&#8220;][vc_column][vc_raw_html]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0iY3VzdG9tZXJfc3RvcnkiIHBvc3RzX3Blcl9wYWdlPSI0IiBjb2x1bW5zX2xhcmdlPSIzIiBzaG93X2F1dGhvcj0iZmFsc2UiIHNob3dfZXhjZXJwdD0iZmFsc2UiIHBvczFfaWQ9IjEzODQzNCIgcG9zMl9pZD0iMTM1NDc2IiBwb3MzX2lkPSIxODIzNTMiIHBvczRfaWQ9IjEyODQ2MSJdCg==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 promo-image&#8220; css=&#8220;.vc_custom_1756391477950{background-color: #D6F77A !important;}&#8220;][vc_column][vc_row_inner][vc_column_inner width=&#8220;1\/12&#8243; offset=&#8220;vc_col-md-offset-2&#8243;][vc_single_image image=&#8220;213091&#8243; img_size=&#8220;full&#8220; css=&#8220;&#8220;][\/vc_column_inner][vc_column_inner width=&#8220;3\/4&#8243;][vc_column_text css=&#8220;&#8220;]<u>GRUNDLAGEN DER IDENTITY SECURITY<\/u><\/p>\n<h3>Identity Security: Warum ist sie wichtig und warum jetzt?<\/h3>\n<p>Geben Sie Identity Security Priorit\u00e4t, ohne die Produktivit\u00e4t zu beeintr\u00e4chtigen.[\/vc_column_text][vc_btn title=&#8220;E-Book herunterladen&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; align=&#8220;center&#8220; css=&#8220;&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Febooks%2Fidentity-security|title:Jetzt%20lesen|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 cybv2-pad-top content-callout-resource electric-cyan&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;img-box&#8220; css=&#8220;.vc_custom_1747687180604{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/woman-reading-tablet-770&#215;530-1.jpg?id=208423) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;content-column&#8220;][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220; width=&#8220;5\/6&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h3>Live-Demo anfordern<\/h3>\n<ul>\n<li>Sicherer und verwalteter Zugriff f\u00fcr Anwendungen und andere nicht-menschliche Identit\u00e4ten<\/li>\n<li>Beschleunigung digitaler Gesch\u00e4ftsinitiativen<\/li>\n<li>Gest\u00e4rktes Vertrauen durch Minimierung des Datenverlustrisikos<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_btn title=&#8220;Kontaktieren Sie uns&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;.vc_custom_1738879063751{margin-left: 30px !important;}&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fcontact%2F|title:Kontaktieren%20Sie%20uns|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_resources&#8220; css=&#8220;.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8220;][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;no-break&#8220;][vc_column_text el_class=&#8220;no-break&#8220;]<\/p>\n<h3>Verwandte Ressourcen erkunden<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/secure-devops-pipelines-and-cloud-native-apps\">Alle Ressourcen anzeigen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_resources_uberflip&#8220;][vc_column el_class=&#8220;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8220;.vc_custom_1671461545553{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;new_hpstyle_section8_uberflip&#8220;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]JTNDc2NyaXB0JTNFJTBBJTA5alF1ZXJ5JTI4JTI3LmN5YnYyX3Jlc291cmNlc191YmVyZmxpcCUyNyUyOS5vbiUyOCUyN0RPTVN1YnRyZWVNb2RpZmllZCUyNyUyQyUyMGZ1bmN0aW9uJTI4JTI5JTdCJTBBJTA5JTA5JTJGJTJGZGVidWdnZXIlM0IlMEElMDklMDklMjR0aWxlcyUyMCUzRCUyMGpRdWVyeSUyOCUyNy5jeWJ2Ml9yZXNvdXJjZXNfdWJlcmZsaXAlMjAudGlsZS5zaW5nbGUlMjclMjklM0IlMEElMDklMDl2YXIlMjB1cGRhdGVkJTIwJTNEJTIwZmFsc2UlM0IlMEElMDklMDlpZiUyOCUyNHRpbGVzLmxlbmd0aCUyMCUzRSUyMDAlMjklN0IlMEElMDklMDklMDl2YXIlMjBhbGxBdmFpbGFibGUlMjAlM0QlMjB0cnVlJTNCJTBBJTA5JTA5JTA5alF1ZXJ5LmVhY2glMjglMjR0aWxlcyUyQyUyMGZ1bmN0aW9uJTI4JTIwaW5kZXglMkMlMjBlbGVtJTIwJTI5JTIwJTdCJTBBJTA5JTA5JTA5JTA5JTI0dGlsZSUyMCUzRCUyMGpRdWVyeSUyOGVsZW0lMjklM0IlMEElMDklMDklMDklMDlpZiUyOCUyNHRpbGUuZmluZCUyOCUyNy5vYi1jdXN0b20tbGFiZWwlMjclMjkuaHRtbCUyOCUyOSUyMCUzRCUzRCUyMHVuZGVmaW5lZCUyMCUyNiUyNiUyMCUyNHRpbGUuYXR0ciUyOCUyN2lkJTI3JTI5JTIwJTIxJTNEJTIwJTI3bG9hZGluZy1ub3RpZmllciUyNyUyOSU3QiUwQSUwOSUwOSUwOSUwOSUwOWFsbEF2YWlsYWJsZSUyMCUzRCUyMGZhbHNlJTNCJTBBJTA5JTA5JTA5JTA5JTdEJTBBJTA5JTA5JTA5JTdEJTI5JTNCJTBBJTA5JTA5JTA5aWYlMjhhbGxBdmFpbGFibGUlMjklN0IlMEElMDklMDklMDklMDlqUXVlcnkuZWFjaCUyOCUyNHRpbGVzJTJDJTIwZnVuY3Rpb24lMjglMjBpbmRleCUyQyUyMGVsZW0lMjAlMjklMjAlN0IlMEElMDklMDklMDklMDklMDklMjR0aWxlJTIwJTNEJTIwalF1ZXJ5JTI4ZWxlbSUyOSUzQiUwQSUwOSUwOSUwOSUwOSUwOXZhciUyMHVwZGF0ZWQlMjAlM0QlMjBmYWxzZSUzQiUwQSUwOSUwOSUwOSUwOSUwOWlmJTI4JTI0dGlsZS5maW5kJTI4JTI3Lm9iLWN1c3RvbS1sYWJlbCUyNyUyOS5odG1sJTI4JTI5JTIwJTIxJTNEJTIwdW5kZWZpbmVkJTIwJTI2JTI2JTIwJTI0dGlsZS5kYXRhJTI4JTI3dXBkYXRlZCUyNyUyOSUyMCUzRCUzRCUyMHVuZGVmaW5lZCUyOSU3QiUwQSUwOSUwOSUwOSUwOSUwOSUwOWpRdWVyeSUyOCUyNy5jeWJ2Ml9yZXNvdXJjZXNfdWJlcmZsaXAlMjclMjkub2ZmJTI4JTI3RE9NU3VidHJlZU1vZGlmaWVkJTI3JTI5JTNCJTBBJTA5JTA5JTA5JTA5JTA5JTA5JTI0dGFncyUyMCUzRCUyMCUyNHRpbGUuZGF0YSUyOCUyN3RhZ3MlMjclMjkuc3BsaXQlMjglMjclMkMlMjclMjklM0IlMEElMDklMDklMDklMDklMDklMDklMjR0YWclMjAlM0QlMjAlMjR0aWxlLmZpbmQlMjglMjcub2ItY3VzdG9tLWxhYmVsJTI3JTI5Lmh0bWwlMjglMjklM0IlMEElMEElMDklMDklMDklMDklMDklMDlpZiUyOHN0cmluZ190b19zbHVnJTI4JTI0dGFnJTI5JTIwJTNEJTNEJTIwJTI3YW5hbHlzdC1yZXBvcnQlMjclMjklN0IlMEElMDklMDklMDklMDklMDklMDklMDklMjR0aWxlLmZpbmQlMjglMjcuaXRlbS1saW5rLnZpZXclMjclMjkuaHRtbCUyOCUyN0Rvd25sb2FkJTIwQW5hbHlzdCUyMFJlcG9ydCUyNyUyOSUzQiUwQSUwOSUwOSUwOSUwOSUwOSUwOSU3RCUwQSUwQSUwOSUwOSUwOSUwOSUwOSUwOWlmJTI4c3RyaW5nX3RvX3NsdWclMjglMjR0YWclMjklMjAlM0QlM0QlMjAlMjdibG9nJTI3JTI5JTdCJTBBJTA5JTA5JTA5JTA5JTA5JTA5JTA5JTI0dGlsZS5maW5kJTI4JTI3Lml0ZW0tbGluay52aWV3JTI3JTI5Lmh0bWwlMjglMjdSZWFkJTIwQmxvZyUyNyUyOSUzQiUwQSUwOSUwOSUwOSUwOSUwOSUwOSU3RCUwQSUwQSUwOSUwOSUwOSUwOSUwOSUwOWlmJTI4c3RyaW5nX3RvX3NsdWclMjglMjR0YWclMjklMjAlM0QlM0QlMjAlMjdjYXNlLXN0dWR5JTI3JTI5JTdCJTBBJTA5JTA5JTA5JTA5JTA5JTA5JTA5JTI0dGlsZS5maW5kJTI4JTI3Lml0ZW0tbGluay52aWV3JTI3JTI5Lmh0bWwlMjglMjdEb3dubG9hZCUyMENhc2UlMjBTdHVkeSUyNyUyOSUzQiUwQSUwOSUwOSUwOSUwOSUwOSUwOSU3RCUwQSUwQSUwOSUwOSUwOSUwOSUwOSUwOWlmJTI4c3RyaW5nX3RvX3NsdWclMjglMjR0YWclMjklMjAlM0QlM0QlMjAlMjdlYm9vayUyNyUyOSU3QiUwQSUwOSUwOSUwOSUwOSUwOSUwOSUwOSUyNHRpbGUuZmluZCUyOCUyNy5pdGVtLWxpbmsudmlldyUyNyUyOS5jc3MlMjglMjd0ZXh0LXRyYW5zZm9ybSUyNyUyQyUyMCUyN25vbmUlMjclMjklM0IlMEElMDklMDklMDklMDklMDklMDklMDklMjR0aWxlLmZpbmQlMjglMjcub2ItY3VzdG9tLWxhYmVsJTI3JTI5LmNzcyUyOCUyN3RleHQtdHJhbnNmb3JtJTI3JTJDJTIwJTI3bm9uZSUyNyUyOSUzQiUwQSUwOSUwOSUwOSUwOSUwOSUwOSUwOSUyNHRpbGUuZmluZCUyOCUyNy5pdGVtLWxpbmsudmlldyUyNyUyOS5odG1sJTI4JTI3RG93bmxvYWQlMjBlQm9vayUyNyUyOSUzQiUwQSUwOSUwOSUwOSUwOSUwOSUwOSUwOSUyNHRhZyUyMCUzRCUyMCUyNHRpbGUuZmluZCUyOCUyNy5vYi1jdXN0b20tbGFiZWwlMjclMjkuaHRtbCUyOCUyN2VCb29rJTI3JTI5JTNCJTBBJTA5JTA5JTA5JTA5JTA5JTA5JTdEJTBBJTBBJTA5JTA5JTA5JTA5JTA5JTA5aWYlMjhzdHJpbmdfdG9fc2x1ZyUyOCUyNHRhZyUyOSUyMCUzRCUzRCUyMCUyN2luZm9ncmFwaGljJTI3JTI5JTdCJTBBJTA5JTA5JTA5JTA5JTA5JTA5JTA5JTI0dGlsZS5maW5kJTI4JTI3Lml0ZW0tbGluay52aWV3JTI3JTI5Lmh0bWwlMjglMjdEb3dubG9hZCUyMEluZm9ncmFwaGljJTI3JTI5JTNCJTBBJTA5JTA5JTA5JTA5JTA5JTA5JTdEJTBBJTBBJTA5JTA5JTA5JTA5JTA5JTA5aWYlMjhzdHJpbmdfdG9fc2x1ZyUyOCUyNHRhZyUyOSUyMCUzRCUzRCUyMCUyN3dlYmluYXIlMjclMjklN0IlMEElMDklMDklMDklMDklMDklMDklMDklMjR0aWxlLmZpbmQlMjglMjcuaXRlbS1saW5rLnZpZXclMjclMjkuaHRtbCUyOCUyN1dhdGNoJTIwV2ViaW5hciUyNyUyOSUzQiUwQSUwOSUwOSUwOSUwOSUwOSUwOSU3RCUwQSUwQSUwOSUwOSUwOSUwOSUwOSUwOWlmJTI4c3RyaW5nX3RvX3NsdWclMjglMjR0YWclMjklMjAlM0QlM0QlMjAlMjdwcm9kdWN0LWRhdGFzaGVldCUyNyUyOSU3QiUwQSUwOSUwOSUwOSUwOSUwOSUwOSUwOSUyNHRpbGUuZmluZCUyOCUyNy5pdGVtLWxpbmsudmlldyUyNyUyOS5odG1sJTI4JTI3RG93bmxvYWQlMjBQcm9kdWN0JTIwRGF0YXNoZWV0JTI3JTI5JTNCJTBBJTA5JTA5JTA5JTA5JTA5JTA5JTdEJTBBJTBBJTA5JTA5JTA5JTA5JTA5JTA5aWYlMjhzdHJpbmdfdG9fc2x1ZyUyOCUyNHRhZyUyOSUyMCUzRCUzRCUyMCUyN3NvbHV0aW9uLWJyaWVmJTI3JTI5JTdCJTBBJTA5JTA5JTA5JTA5JTA5JTA5JTA5JTI0dGlsZS5maW5kJTI4JTI3Lml0ZW0tbGluay52aWV3JTI3JTI5Lmh0bWwlMjglMjdEb3dubG9hZCUyMFNvbHV0aW9uJTIwQnJpZWYlMjclMjklM0IlMEElMDklMDklMDklMDklMDklMDklN0QlMEElMEElMDklMDklMDklMDklMDklMDlpZiUyOHN0cmluZ190b19zbHVnJTI4JTI0dGFnJTI5JTIwJTNEJTNEJTIwJTI3dmlkZW8lMjclMjklN0IlMEElMDklMDklMDklMDklMDklMDklMDklMjR0aWxlLmZpbmQlMjglMjcuaXRlbS1saW5rLnZpZXclMjclMjkuaHRtbCUyOCUyN1dhdGNoJTIwVmlkZW8lMjclMjklM0IlMEElMDklMDklMDklMDklMDklMDklN0QlMEElMEElMDklMDklMDklMDklMDklMDlpZiUyOHN0cmluZ190b19zbHVnJTI4JTI0dGFnJTI5JTIwJTNEJTNEJTIwJTI3d2hpdGVwYXBlciUyNyUyOSU3QiUwQSUwOSUwOSUwOSUwOSUwOSUwOSUwOSUyNHRpbGUuZmluZCUyOCUyNy5pdGVtLWxpbmsudmlldyUyNyUyOS5odG1sJTI4JTI3RG93bmxvYWQlMjBXaGl0ZXBhcGVyJTI3JTI5JTNCJTBBJTA5JTA5JTA5JTA5JTA5JTA5JTdEJTBBJTBBJTA5JTA5JTA5JTA5JTA5JTA5aWYlMjglMjR0aWxlLmhhc0NsYXNzJTI4JTI3YmxvZ3Bvc3QlMjclMjklMjklN0IlMEElMDklMDklMDklMDklMDklMDklMDklMjR0aWxlLmZpbmQlMjglMjcuaXRlbS1saW5rLnZpZXclMjclMjkuaHRtbCUyOCUyN1JlYWQlMjBCbG9nJTI3JTI5JTNCJTBBJTA5JTA5JTA5JTA5JTA5JTA5JTdEJTBBJTBBJTA5JTA5JTA5JTA5JTA5JTA5aWYlMjh1cGRhdGVkJTIwJTNEJTNEJTIwZmFsc2UlMjklN0IlMEElMDklMDklMDklMDklMDklMDklMDl1cGRhdGVkJTIwJTNEJTIwdHJ1ZSUzQiUwQSUwOSUwOSUwOSUwOSUwOSUwOSUwOSUyNHRpbGUuZGF0YSUyOCUyN3VwZGF0ZWQlMjclMkMlMjB0cnVlJTI5JTNCJTBBJTA5JTA5JTA5JTA5JTA5JTA5JTdEJTBBJTA5JTA5JTA5JTA5JTA5JTdEJTBBJTA5JTA5JTA5JTA5JTdEJTI5JTNCJTBBJTA5JTA5JTA5JTdEJTBBJTA5JTA5JTdEJTBBJTA5JTdEJTI5JTNCJTBBJTBBJTA5ZnVuY3Rpb24lMjBzdHJpbmdfdG9fc2x1ZyUyMCUyOHN0ciUyOSUyMCU3QiUwQSUwOSUwOWlmJTIwJTI4dHlwZW9mJTIwc3RyJTIwJTNEJTNEJTNEJTIwJTI3c3RyaW5nJTI3JTIwJTdDJTdDJTIwc3RyJTIwaW5zdGFuY2VvZiUyMFN0cmluZyUyOSU3QiUwQSUwOSUwOSUwOXN0ciUyMCUzRCUyMHN0ci5yZXBsYWNlJTI4JTJGJTVFJTVDcyUyQiU3QyU1Q3MlMkIlMjQlMkZnJTJDJTIwJTI3JTI3JTI5JTNCJTIwJTJGJTJGJTIwdHJpbSUwQSUwOSUwOSUyMCUyMCUyMCUyMHN0ciUyMCUzRCUyMHN0ci50b0xvd2VyQ2FzZSUyOCUyOSUzQiUwQSUwOSUwOSUyMCUyMCUwQSUwOSUwOSUyMCUyMCUyMCUyMCUyRiUyRiUyMHJlbW92ZSUyMGFjY2VudHMlMkMlMjBzd2FwJTIwJUMzJUIxJTIwZm9yJTIwbiUyQyUyMGV0YyUwQSUwOSUwOSUyMCUyMCUyMCUyMHZhciUyMGZyb20lMjAlM0QlMjAlMjIlQzMlQTAlQzMlQTElQzMlQTQlQzMlQTIlQzMlQTglQzMlQTklQzMlQUIlQzMlQUElQzMlQUMlQzMlQUQlQzMlQUYlQzMlQUUlQzMlQjIlQzMlQjMlQzMlQjYlQzMlQjQlQzMlQjklQzMlQkElQzMlQkMlQzMlQkIlQzMlQjElQzMlQTclQzIlQjclMkZfJTJDJTNBJTNCJTIyJTNCJTBBJTA5JTA5JTIwJTIwJTIwJTIwdmFyJTIwdG8lMjAlMjAlMjAlM0QlMjAlMjJhYWFhZWVlZWlpaWlvb29vdXV1dW5jLS0tLS0tJTIyJTNCJTBBJTA5JTA5JTIwJTIwJTIwJTIwZm9yJTIwJTI4dmFyJTIwaSUzRDAlMkMlMjBsJTNEZnJvbS5sZW5ndGglMjAlM0IlMjBpJTNDbCUyMCUzQiUyMGklMkIlMkIlMjklMjAlN0IlMEElMDklMDklMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjBzdHIlMjAlM0QlMjBzdHIucmVwbGFjZSUyOG5ldyUyMFJlZ0V4cCUyOGZyb20uY2hhckF0JTI4aSUyOSUyQyUyMCUyN2clMjclMjklMkMlMjB0by5jaGFyQXQlMjhpJTI5JTI5JTNCJTBBJTA5JTA5JTIwJTIwJTIwJTIwJTdEJTBBJTBBJTA5JTA5JTIwJTIwJTIwJTIwc3RyJTIwJTNEJTIwc3RyLnJlcGxhY2UlMjglMkYlNUIlNUVhLXowLTklMjAtJTVEJTJGZyUyQyUyMCUyNyUyNyUyOSUyMCUyRiUyRiUyMHJlbW92ZSUyMGludmFsaWQlMjBjaGFycyUwQSUwOSUwOSUyMCUyMCUyMCUyMCUyMCUyMCUyMCUyMC5yZXBsYWNlJTI4JTJGJTVDcyUyQiUyRmclMkMlMjAlMjctJTI3JTI5JTIwJTJGJTJGJTIwY29sbGFwc2UlMjB3aGl0ZXNwYWNlJTIwYW5kJTIwcmVwbGFjZSUyMGJ5JTIwLSUwQSUwOSUwOSUyMCUyMCUyMCUyMCUyMCUyMCUyMCUyMC5yZXBsYWNlJTI4JTJGLSUyQiUyRmclMkMlMjAlMjctJTI3JTI5JTNCJTIwJTJGJTJGJTIwY29sbGFwc2UlMjBkYXNoZXMlMEElMDklMDklN0QlMEElMEElMDklMjAlMjAlMjAlMjByZXR1cm4lMjBzdHIlM0IlMEElMDklN0QlMEElM0MlMkZzY3JpcHQlM0U=[\/vc_raw_js][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":32304,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27774],"class_list":["post-139292","page","type-page","status-publish","hentry","product_category-devsecops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Secrets Management | CyberArk<\/title>\n<meta name=\"description\" content=\"Sicherung maschineller Identit\u00e4ten f\u00fcr alle Arten von Anwendungen und in DevOps-Pipelines vereinfachen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/products\/secrets-management\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secrets Management\" \/>\n<meta property=\"og:description\" content=\"Sicherung maschineller Identit\u00e4ten f\u00fcr alle Arten von Anwendungen und in DevOps-Pipelines vereinfachen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/products\/secrets-management\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-16T09:00:38+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/products\/secrets-management\/\",\"url\":\"https:\/\/www.cyberark.com\/products\/secrets-management\/\",\"name\":\"Secrets Management | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/secrets-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/secrets-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Enable-the-Digital-Business-icon.svg\",\"datePublished\":\"2023-01-20T19:07:55+00:00\",\"dateModified\":\"2025-10-16T09:00:38+00:00\",\"description\":\"Sicherung maschineller Identit\u00e4ten f\u00fcr alle Arten von Anwendungen und in DevOps-Pipelines vereinfachen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/secrets-management\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/products\/secrets-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/products\/secrets-management\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Enable-the-Digital-Business-icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Enable-the-Digital-Business-icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/products\/secrets-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Produkte\",\"item\":\"https:\/\/www.cyberark.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Secrets Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Secrets Management | CyberArk","description":"Sicherung maschineller Identit\u00e4ten f\u00fcr alle Arten von Anwendungen und in DevOps-Pipelines vereinfachen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/products\/secrets-management\/","og_locale":"de_DE","og_type":"article","og_title":"Secrets Management","og_description":"Sicherung maschineller Identit\u00e4ten f\u00fcr alle Arten von Anwendungen und in DevOps-Pipelines vereinfachen.","og_url":"https:\/\/www.cyberark.com\/products\/secrets-management\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-10-16T09:00:38+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"6 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/products\/secrets-management\/","url":"https:\/\/www.cyberark.com\/products\/secrets-management\/","name":"Secrets Management | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/products\/secrets-management\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/products\/secrets-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Enable-the-Digital-Business-icon.svg","datePublished":"2023-01-20T19:07:55+00:00","dateModified":"2025-10-16T09:00:38+00:00","description":"Sicherung maschineller Identit\u00e4ten f\u00fcr alle Arten von Anwendungen und in DevOps-Pipelines vereinfachen.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/products\/secrets-management\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/products\/secrets-management\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/products\/secrets-management\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Enable-the-Digital-Business-icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Enable-the-Digital-Business-icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/products\/secrets-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Produkte","item":"https:\/\/www.cyberark.com\/products\/"},{"@type":"ListItem","position":3,"name":"Secrets Management"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/139292","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=139292"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/139292\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32304"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=139292"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=139292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}