{"id":17089,"date":"2017-01-05T16:04:41","date_gmt":"2017-01-05T16:04:41","guid":{"rendered":"https:\/\/www.cyberark.com\/homepage\/"},"modified":"2026-02-11T07:32:41","modified_gmt":"2026-02-11T12:32:41","slug":"homepage-3","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/","title":{"rendered":"Startseite"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row_content_no_spaces&#8220;][vc_column][vc_raw_html css=&#8220;&#8220;]W2N5YmVyX25vdGlmaWNhdGlvbl9iYXIgbWVzc2FnZT0iUGFsbyBBbHRvIE5ldHdvcmtzIENvbXBsZXRlcyBBY3F1aXNpdGlvbiBvZiBDeWJlckFyayB0byBTZWN1cmUgdGhlIEFJIEVyYS4gPGEgaHJlZj0naGh0dHBzOi8vd3d3LnBhbG9hbHRvbmV0d29ya3MuY29tL2NvbXBhbnkvcHJlc3MvMjAyNi9wYWxvLWFsdG8tbmV0d29ya3MtY29tcGxldGVzLWFjcXVpc2l0aW9uLW9mLWN5YmVyYXJrLXRvLXNlY3VyZS10aGUtYWktZXJhJyB0YXJnZXQ9J19ibGFuayc+UmVhZCBwcmVzcyByZWxlYXNlPC9hPi4iXQ==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; css=&#8220;.vc_custom_1770812187465{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2026\/02\/HP-PANW-bg_2000x680.jpg?id=224105) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;new-hero&#8220;][vc_column][vc_row_inner el_class=&#8220;cybv2 cybv2-pad-top&#8220;][vc_column_inner el_class=&#8220;mb-2&#8243; offset=&#8220;vc_col-lg-8 vc_col-sm-offset-0&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h1>CyberArk is now a Palo Alto Networks company.<\/h1>\n<p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner offset=&#8220;vc_col-lg-8&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;pb-8&#8243;]Together, we are building the next generation identity security platform for the AI era.[\/vc_column_text][vc_btn title=&#8220;Learn why we are better together&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;&#8220; link=&#8220;url:https%3A%2F%2Fwww.paloaltonetworks.com%2Fidentity-security|title:Mehr%20erfahren|target:_blank|&#8220; el_class=&#8220;cybv2-button-solid-chartreuse&#8220;][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8220;yes&#8220; el_class=&#8220;hp-hero-row&#8220;][vc_column_inner el_class=&#8220;hp-hero-tile&#8220; width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-4&#8243; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fpress%2Fcyberark-announces-record-fourth-quarter-and-full-year-2025-results%2F|title:Jetzt%20registrieren|target:_blank|&#8220;][vc_single_image image=&#8220;223784&#8243; img_size=&#8220;full&#8220; css=&#8220;&#8220;][vc_column_text css=&#8220;&#8220;]CyberArk Announces Record Q4\/FY25 Results[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<span class=\"link-style\">Pressemitteilung lesen <i class=\"fa fa-long-arrow-right\"><\/i><\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;hp-hero-tile&#8220; width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-4&#8243; column_link=&#8220;url:https%3A%2F%2Flp.cyberark.com%2Fgartner-mq-pam-2025-de.html|title:Mehr%20erfahren|target:_blank|&#8220;][vc_single_image image=&#8220;218459&#8243; img_size=&#8220;full&#8220; css=&#8220;&#8220;][vc_column_text css=&#8220;&#8220;]Zum siebten Mal Leader im Gartner MQ f\u00fcr PAM 2025[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<span class=\"link-style\">Kostenloses Exemplar herunterladen <i class=\"fa fa-long-arrow-right\"><\/i><\/span><br \/>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;hp-hero-tile&#8220; width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-4&#8243; column_link=&#8220;url:https%3A%2F%2Freg.impact.cyberark.com%2Fflow%2Fcyberevents%2Fisu26%2Fmainevent%2Fpage%2Fimpacthomepage|title:Jetzt%20anmelden|target:_blank|&#8220;][vc_single_image image=&#8220;216900&#8243; img_size=&#8220;full&#8220; css=&#8220;&#8220;][vc_column_text css=&#8220;&#8220;]Anmeldung f\u00fcr IMPACT 2026 jetzt m\u00f6glich![\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<span class=\"link-style\">Jetzt anmelden und sparen <i class=\"fa fa-long-arrow-right\"><\/i><\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; disable_element=&#8220;yes&#8220; css=&#8220;.vc_custom_1762263140413{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/10\/hp-hero-bg.jpg?id=217785) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;new-hero&#8220;][vc_column][vc_row_inner el_class=&#8220;cybv2 cybv2-pad-top&#8220;][vc_column_inner el_class=&#8220;column-1 mb-2&#8243; width=&#8220;2\/3&#8243; offset=&#8220;vc_col-sm-offset-0&#8243;][vc_single_image image=&#8220;217677&#8243; img_size=&#8220;full&#8220; css=&#8220;&#8220; el_class=&#8220;pb-6&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h1><span class=\"ice\">7x f\u00fchrend<\/span><br \/>\nWeitreichendste &#8222;Vision&#8220;<\/h1>\n<p>\n[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;pb-8&#8243;]2025 Gartner\u00ae Magic Quadrant\u2122 f\u00fcr Privileged Access Managament[\/vc_column_text][vc_btn title=&#8220;Bericht abrufen&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;&#8220; link=&#8220;url:https%3A%2F%2Flp.cyberark.com%2Fgartner-mq-pam-2025-de.html|title:Bericht%20abrufen|&#8220; el_class=&#8220;cybv2-button-solid-chartreuse&#8220; data_tracking=&#8220;Button Test&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;column-2 d-none d-sm-block&#8220; width=&#8220;1\/3&#8243;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-217772 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/10\/gartner-chart.png\" alt=\"Gartner image\" width=\"444\" height=\"457\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/10\/gartner-chart.png 444w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/10\/gartner-chart-291x300.png 291w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/10\/gartner-chart-150x154.png 150w\" sizes=\"auto, (max-width: 444px) 100vw, 444px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8220;yes&#8220; el_class=&#8220;hp-hero-row&#8220;][vc_column_inner el_class=&#8220;hp-hero-tile&#8220; width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-4&#8243; column_link=&#8220;url:https%3A%2F%2Flp.cyberark.com%2Fsecuring-the-new-frontier-of-agentic-ai.html%3Futm_source%3Dcyberark_website%26amp%3Butm_medium%3Dreferral%26amp%3Butm_content%3Dai_agents_summit%26amp%3Butm_campaign%3Dsecuring_agentic_ai%26amp%3Bcq_plac%3D%257bplacement%257d%26amp%3Bcq_net%3D%257bnetwork%257d%26amp%3Bcq_plt%3Dgp|title:Jetzt%20registrieren|target:_blank|&#8220; data_tracking=&#8220;Column Test&#8220;][vc_single_image image=&#8220;216247&#8243; img_size=&#8220;full&#8220; css=&#8220;&#8220;][vc_column_text css=&#8220;&#8220;]Sichern Sie die n\u00e4chste KI-Grenze[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<span class=\"link-style\">Jetzt anmelden <i class=\"fa fa-long-arrow-right\"><\/i><\/span> [\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;hp-hero-tile&#8220; width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-4&#8243; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fcyber-unit%2F|title:Mehr%20erfahren|&#8220;][vc_single_image image=&#8220;216256&#8243; img_size=&#8220;full&#8220; css=&#8220;&#8220;][vc_column_text css=&#8220;&#8220;]CYBR-Einheit Identit\u00e4ts Sicherheitsdienste<br \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<span class=\"link-style\">Erfahren Sie mehr <i class=\"fa fa-long-arrow-right\"><\/i><\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;hp-hero-tile&#8220; width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-4&#8243; column_link=&#8220;url:https%3A%2F%2Freg.impact.cyberark.com%2Fflow%2Fcyberevents%2Fisu26%2Fmainevent%2Fpage%2Fimpacthomepage|title:Jetzt%20anmelden|target:_blank|&#8220;][vc_single_image image=&#8220;216900&#8243; img_size=&#8220;full&#8220; css=&#8220;&#8220;][vc_column_text css=&#8220;&#8220;]Anmeldung f\u00fcr IMPACT 2026 jetzt m\u00f6glich![\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<span class=\"link-style\">Jetzt anmelden und sparen <i class=\"fa fa-long-arrow-right\"><\/i><\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; disable_element=&#8220;yes&#8220; css=&#8220;.vc_custom_1763067654610{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/AI-hero-homepage-revised.jpg?id=216684) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;new-hero&#8220;][vc_column][vc_row_inner el_class=&#8220;cybv2 cybv2-pad-top&#8220;][vc_column_inner el_class=&#8220;text-md-center mb-2&#8243; offset=&#8220;vc_col-md-offset-1 vc_col-md-10 vc_col-sm-offset-0&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h1><span class=\"ice\">Die ersten Privilegienkontrollen f\u00fcr KI-Agenten in der Branche<\/span><\/h1>\n<p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;text-md-center&#8220; offset=&#8220;vc_col-md-offset-1 vc_col-md-10&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;pb-8&#8243;]Auf bew\u00e4hrter Identity Security aufgebaut, bietet die CyberArk Secure AI Agents Solution kontinuierliches Monitoring und Least-Privilege-Durchsetzung, um jeden KI-Agenten abzusichern.[\/vc_column_text][vc_btn title=&#8220;Mehr erfahren&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fpress%2Fcyberark-introduces-first-identity-security-solution-purpose-built-to-protect-ai-agents-with-privilege-controls%2F|title:Mehr%20erfahren|&#8220; el_class=&#8220;cybv2-button-solid-chartreuse&#8220;][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8220;yes&#8220; el_class=&#8220;hp-hero-row&#8220;][vc_column_inner el_class=&#8220;hp-hero-tile&#8220; width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-4&#8243; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fpress%2Fcyberark-announces-strong-third-quarter-2025-results%2F|title:Jetzt%20registrieren|&#8220; data_tracking=&#8220;Column Test&#8220;][vc_single_image image=&#8220;218860&#8243; img_size=&#8220;full&#8220; css=&#8220;&#8220;][vc_column_text css=&#8220;&#8220;]CyberArk erzielt starkes Ergebnis im dritten Quartal[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<span class=\"link-style\">Pressemitteilung lesen <i class=\"fa fa-long-arrow-right\"><\/i><\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;hp-hero-tile&#8220; width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-4&#8243; column_link=&#8220;url:https%3A%2F%2Flp.cyberark.com%2Fgartner-mq-pam-2025-de.html|title:Mehr%20erfahren|target:_blank|&#8220;][vc_single_image image=&#8220;218459&#8243; img_size=&#8220;full&#8220; css=&#8220;&#8220;][vc_column_text css=&#8220;&#8220;]Zum siebten Mal Leader im Gartner MQ f\u00fcr PAM 2025[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<span class=\"link-style\">Kostenloses Exemplar herunterladen <i class=\"fa fa-long-arrow-right\"><\/i><\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;hp-hero-tile&#8220; width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-4&#8243; column_link=&#8220;url:https%3A%2F%2Freg.impact.cyberark.com%2Fflow%2Fcyberevents%2Fisu26%2Fmainevent%2Fpage%2Fimpacthomepage|title:Jetzt%20anmelden|target:_blank|&#8220;][vc_single_image image=&#8220;216900&#8243; img_size=&#8220;full&#8220; css=&#8220;&#8220;][vc_column_text css=&#8220;&#8220;]Anmeldung f\u00fcr IMPACT 2026 jetzt m\u00f6glich![\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<span class=\"link-style\">Jetzt anmelden und sparen <i class=\"fa fa-long-arrow-right\"><\/i><\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 split-cta bg-gray cyb-reverse&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;left-column ca-border bg-blue copy-column&#8220; css=&#8220;.vc_custom_1706306299964{background-color: #212930 !important;}&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;mb-8&#8243;]<\/p>\n<h3><span style=\"color: #fff;\">Intelligente Berechtigungskontrollen<\/span> <span style=\"color: #d4eb33;\"> f\u00fcr menschliche und maschinelle Identit\u00e4ten.<\/span><\/h3>\n<p>[\/vc_column_text][vc_raw_html css=&#8220;.vc_custom_1715959369965{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;]PGRpdiBjbGFzcz0iZmlyc3QgdmNfYnRuMy1jb250YWluZXIgY3lidjItYnV0dG9uLWdyZWVuIHZjX2J0bjMtaW5saW5lIj48YSBjbGFzcz0idmNfYnRuMy1jb2xvci1ncmV5IiB0aXRsZT0iIj5WaWRlbyBhbnNlaGVuPC9hPjwvZGl2Pjxicj48c2NyaXB0Pg0KalF1ZXJ5KCIuZmlyc3QiKS5jbGljayhmdW5jdGlvbigpew0KICAgIGpRdWVyeSgiLnNlY29uZCIpLmNsaWNrKCk7IA0KICAgIHJldHVybiBmYWxzZTsNCn0pOw0KPC9zY3JpcHQ+[\/vc_raw_html][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;right-column ca-border image-column inner-flex-center&#8220; css=&#8220;.vc_custom_1706306910421{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/01\/second-component-hero.jpg?id=186921) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 v3 cybv2-pad overview-vt&#8220;][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;head-box&#8220;][vc_single_image image=&#8220;187220&#8243; img_size=&#8220;full&#8220; el_class=&#8220;pb-4 rounded-6&#8243;][vc_column_text el_class=&#8220;pb-4&#8243;]<\/p>\n<h3>Identit\u00e4ten absichern.<br \/>\nAttacken abwehren.<\/h3>\n<p>Nahtlose Sicherung von Identit\u00e4ten w\u00e4hrend des gesamten Angriffs-Zyklus auf jede Ressource in jeder Infrastruktur, einschlie\u00dflich Hybrid, SaaS und Multi-Cloud. Die CyberArk Identity Security Platform ist die erste Verteidigungslinie gegen b\u00f6swillige Akteure und unbefugten Zugriff, um das zu sch\u00fctzen, was am Wichtigsten ist.[\/vc_column_text][vc_btn title=&#8220;Demo anfordern&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Frequest-demo%2F|title:Demo%20anfordern|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][vc_column width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=&#8220;cta-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-144043\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-1.svg\" alt=\"\" width=\"45\" height=\"45\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Nahtlose Absicherung von Zugriffen f\u00fcr alle Identit\u00e4ten<\/h4>\n<p>Durch die Kombination von sicherem SSO, adaptiver MFA, Lebenszyklusmanagement, Verzeichnisdiensten und Analysen des Benutzerverhaltens helfen wir Ihnen, Abl\u00e4ufe zu optimieren und Benutzern einen einfachen und sicheren Zugriff auf Ressourcen zu erm\u00f6glichen \u2013 ob vor Ort, in der Cloud oder in einem hybriden System \u2013 von jedem Standort und mit jedem Ger\u00e4t.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;cta-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-144051\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-2.svg\" alt=\"\" width=\"45\" height=\"45\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Intelligentes Privilegien-Management<\/h4>\n<p>Bewerben Sie sich bietet weltweit intelligente Berechtigungskontrollen f\u00fcr den gesamten IT-Bereich sowie differenzierte Kontrollen, um die besonderen Anforderungen von Mitarbeitern, Drittanbietern, Endger\u00e4ten und Maschinenidentit\u00e4ten beim Zugriff auf sensible Daten zu sch\u00fctzen.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;cta-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-144059\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-3.svg\" alt=\"\" width=\"45\" height=\"45\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Flexible Automatisierung und Orchestrierung von Identit\u00e4ten<\/h4>\n<p>Optimieren Sie HR-Prozesse, stellen Sie sicher, dass Benutzer den richtigen Zugriff auf die richtigen Ressourcen haben, erm\u00f6glichen Sie die Einhaltung von Branchen- oder gesetzlichen Vorschriften und verbessern Sie die Effizienz in allen Bereichen mit Orchestrierungs- und Lebenszyklusmanagement, Berechtigungen und Anspr\u00fcchen sowie Verzeichnis- und Verbunddiensten.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2-pad cyan-gradient font-white cyb-br cybv2 info-graphic sub2 cybv2-margin-btm-120&#8243; css=&#8220;.vc_custom_1755617397407{margin-bottom: 50px !important;}&#8220;][vc_column width=&#8220;2\/3&#8243; offset=&#8220;vc_col-sm-offset-2&#8243; el_class=&#8220;text-center&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;text-md-center head-box&#8220;]<\/p>\n<h3>Identity Security erfordert einen ganzheitlichen Ansatz, der sich auf Privilegienkontrollen konzentriert<\/h3>\n<p>Identity Security konzentriert sich auf Intelligente Privilegienkontrollen und sichert nahtlos menschliche und maschinelle Identit\u00e4ten, die auf Anwendungen, Infrastruktur und Daten zugreifen, und automatisiert flexibel den Identit\u00e4tslebenszyklus. \u2013 alles mit einem einheitlichen Konzept. Identity Security erm\u00f6glicht Zero Trust, indem sie Least-Privilege-Prinzipien mit kontinuierlicher Erkennung und Schutz von Identit\u00e4tsbedrohungen durchsetzt.[\/vc_column_text][vc_btn title=&#8220;Erkunden Sie die Plattform&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;.vc_custom_1711632716423{margin-bottom: 80px !important;}&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fproducts%2F|title:Erkunden%20Sie%20die%20Plattform|&#8220; el_class=&#8220;cybv2-button-transp-green&#8220;][vc_column_text css=&#8220;.vc_custom_1755617343657{border-bottom-width: 50px !important;}&#8220; el_class=&#8220;text-center&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-195168 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/PG-final-2025.svg\" alt=\"CyberArk Platform Graphic\" width=\"1680\" height=\"1691\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 v3 products cybv2-pad box-row&#8220;][vc_column][vc_row_inner el_class=&#8220;d-flex justify-content-center&#8220;][vc_column_inner el_class=&#8220;cyb-center&#8220; width=&#8220;5\/6&#8243;][vc_column_text]<\/p>\n<h2>Implementierung <span class=\"chartreuse\">intelligenter Berechtigungskontrollen<\/span> \u00fcber den gesamten Identit\u00e4tslebenszyklus hinweg<\/h2>\n<p><\/p>\n<h5>Erweitern Sie intelligente Berechtigungskontrollen, auf ein breiteres Spektrum von menschlichen und maschinellen Identit\u00e4ten, wann immer ein st\u00e4ndiger oder zeitlich begrenzter Zugriff erforderlich ist.<\/h5>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 cyb-pad-top&#8220;][vc_column_inner el_class=&#8220;icon-box&#8220; width=&#8220;1\/3&#8243; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fproducts%2Faccess-management%2F|title:Mehr%20erfahren|&#8220;][vc_column_text css=&#8220;&#8220;]<img decoding=\"async\" class=\"alignnone size-full wp-image-144075\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/card-icon-1.svg\" alt=\"\" width=\"32px\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Workforce &amp; Customer Access<\/h4>\n<p>Stellen Sie sicher, dass die richtigen Benutzer zur richtigen Zeit sicheren Zugriff auf die richtigen Ressourcen haben, indem Sie die Anmeldedaten von Mitarbeitern und Kunden sch\u00fctzen und den Zugriff auf lokale und Cloud-basierte Anwendungen, Dienste und IT-Infrastrukturen streng kontrollieren.[\/vc_column_text][vc_column_text el_class=&#8220;chartreuse link-arrow-right pt-5&#8243;]<a href=\"https:\/\/www.cyberark.com\/de\/products\/access-management\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;icon-box&#8220; width=&#8220;1\/3&#8243; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fproducts%2Fendpoint-privilege-security%2F|title:Mehr%20erfahren|&#8220;][vc_column_text css=&#8220;&#8220;]<img decoding=\"async\" class=\"alignnone size-full wp-image-144083\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/card-icon-2.svg\" alt=\"\" width=\"32px\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Endpoint Privilege Security<\/h4>\n<p>\u00dcbernehmen Sie die Kontrolle \u00fcber nicht verwaltete Berechtigungen auf Endpoints, um die Angriffsfl\u00e4che deutlich zu verringern und Bedrohungen abzuwehren, indem Sie lokale Administratorrechte entfernen, rollenspezifische minimale Berechtigungen durchsetzen und die Audit-Bereitschaft verbessern.[\/vc_column_text][vc_column_text el_class=&#8220;chartreuse link-arrow-right pt-5&#8243;]<a href=\"https:\/\/www.cyberark.com\/de\/products\/endpoint-privilege-security\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;icon-box&#8220; width=&#8220;1\/3&#8243; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fproducts%2Fprivileged-access%2F|title:Mehr%20erfahren|&#8220;][vc_column_text css=&#8220;&#8220;]<img decoding=\"async\" class=\"alignnone size-full wp-image-144091\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/card-icon-3.svg\" alt=\"\" width=\"32px\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Privileged Access Management<\/h4>\n<p>Sichern Sie privilegierte Anmeldeinformationen und Geheimnisse mit umfassenden Funktionen f\u00fcr Betriebssysteme, Endpoints, Cloud-Infrastrukturen und -Workloads, Server, Datenbanken, Anwendungen, Hypervisoren, Netzwerkger\u00e4te, Sicherheitsanwendungen und mehr.[\/vc_column_text][vc_column_text el_class=&#8220;chartreuse link-arrow-right pt-5&#8243;]<a href=\"https:\/\/www.cyberark.com\/de\/products\/privileged-access\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8220;yes&#8220;][vc_column_inner el_class=&#8220;icon-box&#8220; width=&#8220;1\/3&#8243; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fproducts%2Fsecrets-management%2F|title:Mehr%20erfahren|&#8220;][vc_column_text css=&#8220;&#8220;]<img decoding=\"async\" class=\"alignnone size-full wp-image-144099\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/card-icon-4.svg\" alt=\"\" width=\"32px\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Secrets Management<\/h4>\n<p>Sichern und verwalten Sie die Geheimnisse und Berechtigungsnachweise, die von Anwendungen, Maschinen und anderen nicht-menschlichen Identit\u00e4ten f\u00fcr den Zugriff auf IT- und andere sensible Ressourcen in unternehmensweiten und externen IT-Umgebungen verwendet werden.[\/vc_column_text][vc_column_text el_class=&#8220;chartreuse link-arrow-right pt-5&#8243;]<a href=\"https:\/\/www.cyberark.com\/de\/products\/secrets-management\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;icon-box&#8220; width=&#8220;1\/3&#8243; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fproducts%2Fcloud-security%2F|title:Mehr%20erfahren|&#8220;][vc_column_text css=&#8220;&#8220;]<img decoding=\"async\" class=\"alignnone size-full wp-image-144107\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/card-icon-5.svg\" alt=\"\" width=\"32px\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Cloud Security<\/h4>\n<p>Erweitern Sie die Kontrolle von Berechtigungen auf Cloud-Umgebungen, indem Sie den Zugriff analysieren, sichern und \u00fcberwachen. Entdecken und entfernen Sie \u00fcberm\u00e4\u00dfige Berechtigungen, indem Sie den Zugriff f\u00fcr menschliche, maschinelle und f\u00f6derierte Identit\u00e4ten visualisieren.[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;chartreuse link-arrow-right pt-5&#8243;]<a href=\"https:\/\/www.cyberark.com\/de\/products\/secure-cloud-access\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;icon-box&#8220; width=&#8220;1\/3&#8243; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fproducts%2Fidentity-management%2F|title:Mehr%20erfahren|&#8220;][vc_column_text css=&#8220;&#8220;]<img decoding=\"async\" class=\"alignnone size-full wp-image-144115\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/card-icon-6.svg\" alt=\"\" width=\"32px\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Identity Management<\/h4>\n<p>Automatisieren Sie die Verwaltung digitaler Identit\u00e4ten in unternehmensweiten IT-Umgebungen und erstellen, verwalten und analysieren Sie den Zugriff zentral, um die Berechtigungen auf dem Weg zu Least-Privilege richtig anzupassen.[\/vc_column_text][vc_column_text el_class=&#8220;chartreuse link-arrow-right pt-5&#8243;]<a href=\"https:\/\/www.cyberark.com\/de\/products\/identity-management\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad labs v3 dark&#8220; css=&#8220;.vc_custom_1684521475737{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_column width=&#8220;3\/4&#8243;][vc_column_text el_class=&#8220;pb-4&#8243;]<\/p>\n<h3>Threat Research and Innovation: <span class=\"chartreuse\">CyberArk Labs<\/span><\/h3>\n<p><\/p>\n<h6 class=\"cybv2-white\">Ein Experten Team, das sich der Untersuchung neuer Angriffstechniken widmet, damit Unternehmen \u00fcberall ihre Sicherheitslage verbessern k\u00f6nnen.<\/h6>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; offset=&#8220;vc_col-sm-offset-0&#8243;][vc_raw_html]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0idGhyZWF0X3Jlc2VhcmNoX2Jsb2ciIHBvc3RzX3Blcl9wYWdlPSIxIiBjb2x1bW5zX2xhcmdlPSIxMiIgY29sdW1uc19zbWFsbD0iMTIiIHNob3dfYXV0aG9yPSJmYWxzZSIgZmVhdHVyZWRfcm93PSJ0cnVlIl0=[\/vc_raw_html][\/vc_column][vc_column width=&#8220;1\/3&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_raw_html]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0idGhyZWF0X3Jlc2VhcmNoX2Jsb2ciIHZlcnRpY2FsX3Jvdz0idHJ1ZSIgcG9zdHNfcGVyX3BhZ2U9IjQiIHNob3dfYXV0aG9yPSJmYWxzZSIgb2Zmc2V0PSIxIl0=[\/vc_raw_html][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 customer-stories cybv2-pad&#8220;][vc_column width=&#8220;5\/6&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;pb-4&#8243;]<\/p>\n<h3>Absicherung von Milliarden von Identit\u00e4ten auf der ganzen Welt<\/h3>\n<p><\/p>\n<h6>Fast 10,000 Unternehmen auf der ganzen Welt vertrauen auf CyberArk, um ihre wertvollsten Ressourcen und Unternehmen zu sch\u00fctzen.<\/h6>\n<p>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/customer-stories\/\">Was unsere Kunden sagen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cyb-pad-btm&#8220; css=&#8220;.vc_custom_1724858791288{background-color: #ffffff !important;}&#8220;][vc_column width=&#8220;1\/2&#8243;][vc_raw_html css=&#8220;&#8220;]PGRpdiBjbGFzcz0idmlkZW8td2luZG93Ij5bd2lzdGlhX3ZpZGVvIGlkPSJvbzRnc2VrdXRnIl08L2Rpdj4=[\/vc_raw_html][\/vc_column][vc_column width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_column_text el_class=&#8220;pb-4&#8243;]<span class=\"large-quote\">\u201cIf we can control identity, we can stop most modern attacks. That is what I call true Zero Trust and that is why we use CyberArk. This is what helps me sleep at night.\u201d<\/span><br \/><strong><span style=\"color: #061b2b;\">Brian Miller,<\/span> CISO, HealthFirst<\/strong>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/healthfirst-applies-an-identity-security-first-approach-to-implement-zero-trust\/\">Case Study lesen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 cybv2-pad-btm&#8220;][vc_column][vc_raw_html]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0iY3VzdG9tZXJfc3RvcnkiIHBvc3RzX3Blcl9wYWdlPSI0IiBjb2x1bW5zX2xhcmdlPSIzIiBzaG93X2F1dGhvcj0iZmFsc2UiIHNob3dfZXhjZXJwdD0iZmFsc2UiXQ==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 partners cybv2-pad-btm box-row cyb-background-lt bgimg-hide-mobile&#8220; css=&#8220;.vc_custom_1684416783387{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_column][vc_row_inner el_class=&#8220;d-flex justify-content-center division-line-top cybv2-pad-top&#8220;][vc_column_inner el_class=&#8220;cyb-center&#8220; width=&#8220;3\/4&#8243;][vc_column_text el_class=&#8220;cyb-center pb-4&#8243;]<\/p>\n<h2>Weltweit gr\u00f6\u00dftes Identity Security Partner Netzwerk<\/h2>\n<p><\/p>\n<h5>Mit mehr als 200 Partnern und 300 sofort einsetzbaren Integrationen ist unser Partnernetzwerk bereit, Ihnen dabei zu helfen, die Leistungsf\u00e4higkeit von CyberArk in Ihrem Unternehmen optimal zu nutzen.<\/h5>\n<p>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.cyberark.com\/de\/partners\/\">Partner kennenlernen<\/a><i class=\"fa fa-long-arrow-right\"><\/i><\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 cybv2-pad-top&#8220;][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;137621&#8243; alignment=&#8220;center&#8220; el_class=&#8220;partner-logo&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;137541&#8243; alignment=&#8220;center&#8220; el_class=&#8220;partner-logo&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;137597&#8243; alignment=&#8220;center&#8220; el_class=&#8220;partner-logo&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;137549&#8243; el_class=&#8220;partner-logo&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;137629&#8243; el_class=&#8220;partner-logo&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;137573&#8243; el_class=&#8220;partner-logo&#8220;][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 mt-4&#8243;][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;137605&#8243;][\/vc_column_inner][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;137613&#8243;][\/vc_column_inner][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;137565&#8243;][\/vc_column_inner][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;137589&#8243;][\/vc_column_inner][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;137557&#8243;][\/vc_column_inner][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;137581&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 news cybv2-pad v3 box-row&#8220; css=&#8220;.vc_custom_1706640036731{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_column][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner width=&#8220;3\/4&#8243;][vc_column_text el_class=&#8220;pb-4&#8243;]<\/p>\n<h3>Neues von CyberArk<\/h3>\n<p><\/p>\n<h6>Erfahren Sie mehr zu unseren aktuellen Events, News und Ressourcen.<\/h6>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner][vc_raw_html]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0icG9zdCIgcG9zdHNfcGVyX3BhZ2U9IjEiIGNvbHVtbnNfbGFyZ2U9IjEyIiBwb3MxX2lkIjEzMjE0MyIgaG9yaXpvbnRhbF9jb2x1bW49InRydWUiIHNob3dfYXV0aG9yPSJmYWxzZSJd[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8220;1\/2&#8243;][vc_raw_html]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0icHJlc3MiIHBvc3RzX3Blcl9wYWdlPSIyIiBjb2x1bW5zX2xhcmdlPSI2IiBzaG93X2F1dGhvcj0iZmFsc2UiIHNob3dfZXhjZXJwdD0iZmFsc2UiXQ==[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8220;1\/2&#8243;][vc_raw_html]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0icG9zdCIgcG9zdHNfcGVyX3BhZ2U9IjIiIGNvbHVtbnNfbGFyZ2U9IjYiIHNob3dfYXV0aG9yPSJmYWxzZSIgb2Zmc2V0PSIxIiBzaG93X2V4Y2VycHQ9ImZhbHNlIl0=[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 get-started cybv2-pad dark&#8220; css=&#8220;.vc_custom_1706302169617{margin-top: 80px !important;margin-bottom: 80px !important;}&#8220;][vc_column width=&#8220;2\/3&#8243; el_class=&#8220;stat-column text-center&#8220; offset=&#8220;vc_col-md-offset-2&#8243;][vc_column_text el_class=&#8220;extra-space chartreuse&#8220;]<\/p>\n<h3 style=\"color: #d4eb33 !important;\">Lass uns anfangen.<\/h3>\n<p>\n[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1706301837478{padding-top: 20px !important;padding-bottom: 20px !important;}&#8220; el_class=&#8220;new_hpstyle_section9_text&#8220;]<\/p>\n<h6>Es ist an der Zeit zu erfahren, wie Identity Security Ihr Unternehmen sicherer und widerstandsf\u00e4higer gegen Cyberangriffe machen kann.<\/h6>\n<p><\/p>\n<h6>Kontaktieren Sie uns f\u00fcr eine Demo oder Meeting.<\/h6>\n<p>[\/vc_column_text][vc_btn title=&#8220;Kontakt&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fcontact%2F|title:Kontakt|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8220;stretch_row_content_no_spaces&#8220;][vc_column][vc_raw_html css=&#8220;&#8220;]W2N5YmVyX25vdGlmaWNhdGlvbl9iYXIgbWVzc2FnZT0iUGFsbyBBbHRvIE5ldHdvcmtzIENvbXBsZXRlcyBBY3F1aXNpdGlvbiBvZiBDeWJlckFyayB0byBTZWN1cmUgdGhlIEFJIEVyYS4gPGEgaHJlZj0naGh0dHBzOi8vd3d3LnBhbG9hbHRvbmV0d29ya3MuY29tL2NvbXBhbnkvcHJlc3MvMjAyNi9wYWxvLWFsdG8tbmV0d29ya3MtY29tcGxldGVzLWFjcXVpc2l0aW9uLW9mLWN5YmVyYXJrLXRvLXNlY3VyZS10aGUtYWktZXJhJyB0YXJnZXQ9J19ibGFuayc+UmVhZCBwcmVzcyByZWxlYXNlPC9hPi4iXQ==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; css=&#8220;.vc_custom_1770812187465{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2026\/02\/HP-PANW-bg_2000x680.jpg?id=224105) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;new-hero&#8220;][vc_column][vc_row_inner el_class=&#8220;cybv2 cybv2-pad-top&#8220;][vc_column_inner el_class=&#8220;mb-2&#8243; offset=&#8220;vc_col-lg-8 vc_col-sm-offset-0&#8243;][vc_column_text css=&#8220;&#8220;] CyberArk is now a Palo Alto Networks company. [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner offset=&#8220;vc_col-lg-8&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;pb-8&#8243;]Together, we are building&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27776],"class_list":["post-17089","page","type-page","status-publish","hentry","product_category-identity-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>F\u00fchrend bei Bereich Identit\u00e4ts- und Access-Management | CyberArk<\/title>\n<meta name=\"description\" content=\"Erhalten Sie die umfassendsten L\u00f6sungen f\u00fcr Identit\u00e4tssicherheit und Zugriffsmanagement, die sicheren Zugriff auf jedem Ger\u00e4t, \u00fcberall und zur richtigen Zeit erm\u00f6glichen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Startseite\" \/>\n<meta property=\"og:description\" content=\"Erhalten Sie die umfassendsten L\u00f6sungen f\u00fcr Identit\u00e4tssicherheit und Zugriffsmanagement, die sicheren Zugriff auf jedem Ger\u00e4t, \u00fcberall und zur richtigen Zeit erm\u00f6glichen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-11T12:32:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"F\u00fchrend bei Bereich Identit\u00e4ts- und Access-Management | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/10\/gartner-chart.png\",\"datePublished\":\"2017-01-05T16:04:41+00:00\",\"dateModified\":\"2026-02-11T12:32:41+00:00\",\"description\":\"Erhalten Sie die umfassendsten L\u00f6sungen f\u00fcr Identit\u00e4tssicherheit und Zugriffsmanagement, die sicheren Zugriff auf jedem Ger\u00e4t, \u00fcberall und zur richtigen Zeit erm\u00f6glichen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/10\/gartner-chart.png\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/10\/gartner-chart.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Startseite\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"F\u00fchrend bei Bereich Identit\u00e4ts- und Access-Management | CyberArk","description":"Erhalten Sie die umfassendsten L\u00f6sungen f\u00fcr Identit\u00e4tssicherheit und Zugriffsmanagement, die sicheren Zugriff auf jedem Ger\u00e4t, \u00fcberall und zur richtigen Zeit erm\u00f6glichen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/","og_locale":"de_DE","og_type":"article","og_title":"Startseite","og_description":"Erhalten Sie die umfassendsten L\u00f6sungen f\u00fcr Identit\u00e4tssicherheit und Zugriffsmanagement, die sicheren Zugriff auf jedem Ger\u00e4t, \u00fcberall und zur richtigen Zeit erm\u00f6glichen.","og_url":"https:\/\/www.cyberark.com\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-02-11T12:32:41+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"10 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/","url":"https:\/\/www.cyberark.com\/","name":"F\u00fchrend bei Bereich Identit\u00e4ts- und Access-Management | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/10\/gartner-chart.png","datePublished":"2017-01-05T16:04:41+00:00","dateModified":"2026-02-11T12:32:41+00:00","description":"Erhalten Sie die umfassendsten L\u00f6sungen f\u00fcr Identit\u00e4tssicherheit und Zugriffsmanagement, die sicheren Zugriff auf jedem Ger\u00e4t, \u00fcberall und zur richtigen Zeit erm\u00f6glichen.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/10\/gartner-chart.png","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/10\/gartner-chart.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Startseite"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/17089","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=17089"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/17089\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=17089"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=17089"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}