{"id":179363,"date":"2023-01-30T20:06:40","date_gmt":"2023-01-31T01:06:40","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/b2b-identity\/"},"modified":"2025-04-03T03:59:20","modified_gmt":"2025-04-03T07:59:20","slug":"b2b-identity","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/products\/b2b-identity\/","title":{"rendered":"B2B Identity"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 int-hero&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243;][vc_column_text el_class=&#8220;cyb-breadcrumb&#8220;]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/de\/products\/customer-identity\/\">Zur\u00fcck zu Customer Identity<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>B2B Identity<\/h1>\n<h2>Bieten Sie Ihren Gesch\u00e4ftspartnern, Lieferanten und Kunden sichere und nahtlose Erlebnisse, indem Sie schnellen und reibungslosen Zugriff auf Ihre SaaS-Anwendungen erm\u00f6glichen und gleichzeitig gesch\u00e4ftskritische Systeme vor b\u00f6sartigen Angriffen und Datenschutzverletzungen sch\u00fctzen.<\/h2>\n<p>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/try-buy\/b2b-identity-free-trial\/\">Kostenloser Test<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-2&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-139638\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2.jpg\" alt=\"B2B Identity Management-L\u00f6sung\" width=\"640\" height=\"430\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2.jpg 640w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2-300x202.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2-150x101.jpg 150w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 cybv2_sticky_nav&#8220; css=&#8220;.vc_custom_1614201964540{background-color: #f7f7f7 !important;}&#8220;][vc_column width=&#8220;1\/4&#8243;][vc_column_text el_class=&#8220;sticky-nav-title&#8220;]<\/p>\n<h3><i class=\"fas fa-long-arrow-alt-up\"><\/i>B2B Identity<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243;][vc_raw_html el_class=&#8220;sticky-nav-buttons&#8220;]PCEtLSBBZGQgbGkgZm9yIHNlY3Rpb24gZGF0YS1zY3JvbGwtY2xhc3MgaXMgd2hlcmUgeW91IHB1dCB0aGUgc2VjdGlvbiBjbGFzcyB5b3Ugd2FudCB0byBzY3JvbGwgdG8gLS0+Cjx1bD4KPGxpIGRhdGEtc2Nyb2xsLWNsYXNzPSJzdWIxIj5Wb3J0ZWlsZTwvbGk+CjxsaSBkYXRhLXNjcm9sbC1jbGFzcz0ic3ViMiI+TcO2Z2xpY2hrZWl0ZW48L2xpPgo8bGkgZGF0YS1zY3JvbGwtY2xhc3M9InN1YjMiPldpZSBlcyBmdW5rdGlvbmllcnQ8L2xpPgo8L3VsPg==[\/vc_raw_html][\/vc_column][vc_column width=&#8220;1\/4&#8243;][vc_btn title=&#8220;Kostenloser Test&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Ftry-buy%2Fb2b-identity-free-trial%2F|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;subnav-dropdown&#8220;][vc_column_text el_class=&#8220;sticky-nav-title&#8220;]<\/p>\n<h5 style=\"text-align: right;\">Gehen zu<i class=\"fas fa-chevron-circle-down\"><\/i><\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad-top overview-hz sub1&#8243; css=&#8220;.vc_custom_1673964635551{background-color: #f7f7f7 !important;}&#8220;][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;head-box&#8220;][vc_column_text]<\/p>\n<h3>Externen Zugriff sichern, Gesch\u00e4ftsrisiken mindern<\/h3>\n<p>Geben Sie sicheren Zugriff auf Ihre Unternehmensanwendungen und -dienste frei und behalten Sie gleichzeitig die Kontrolle \u00fcber Ihre Unternehmensdaten.[\/vc_column_text][\/vc_column][vc_column width=&#8220;2\/3&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_row_inner equal_height=&#8220;yes&#8220;][vc_column_inner el_class=&#8220;cta-box&#8220; width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-121090\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Secure-Authentication-icon.svg\" alt=\"Design- und Entwicklungsdienste\" \/>[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1731310042711{padding-bottom: 20px !important;}&#8220;]<\/p>\n<h4>Sichern Sie Ihr Unternehmen und Ihre Identit\u00e4ten<\/h4>\n<p>Sicherer Zugriff auf B2B-Web- und mobile Anwendungen mit einer FIDO2-zertifizierten Identity-Plattform[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;cta-box&#8220; width=&#8220;5\/12&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-114833\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/Optimize-Investment.svg\" alt=\"Symbol Investition optimieren\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Optimieren Sie die Erfahrung externer Nutzer<\/h4>\n<p>Bieten Sie eine einheitliche markenspezifische Omni-Channel-Authentifizierung auf jedem Ger\u00e4t[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;cta-box&#8220; width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-119142\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Enable-Digital-Business-correct.svg\" alt=\"Symbol Digitales Business erm\u00f6glichen\" \/>[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1695967791663{padding-bottom: 20px !important;}&#8220;]<\/p>\n<h4>Digitales Business erm\u00f6glichen<\/h4>\n<p>B2B-externe Nutzeridentit\u00e4tsprofile und Anwendungsauthentifizierung zentralisieren[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;cta-box&#8220; width=&#8220;5\/12&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-118944\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Efficiencies2.svg\" alt=\"Symbol Betriebliche Effizienz steigern\" \/>[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1695967825713{padding-bottom: 20px !important;}&#8220;]<\/p>\n<h4>Betriebliche Effizienz steigern<\/h4>\n<p>Optimieren Sie Ihren B2B-On- und Offboarding-Prozess, um Ihre Partner schnell einzubinden[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 cybv2-pad cybv2-oval-left-background hv-cta-stats sub2&#8243; css=&#8220;.vc_custom_1673964665260{background-color: #ff7600 !important;}&#8220;][vc_column el_class=&#8220;text-md-center head-box&#8220;][vc_column_text]<\/p>\n<h3>Warum CyberArk B2B Identity<\/h3>\n<h5>Erweitern Sie Ihr Gesch\u00e4ft digital und sicher.<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;img-box&#8220; css=&#8220;.vc_custom_1612319508305{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/Privilege-Access-Manager-Benefits-Stats-770&#215;550-1.jpg?id=110671) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;stat-column&#8220;][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; width=&#8220;11\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]Erweitern Sie Ihren Markteinfluss: Erschlie\u00dfen Sie den Markt \u00fcber Partnerorganisationen, Drittanbieter und Klienten, um die Konsumentenreichweite zu vervielfachen[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; width=&#8220;11\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]Entwickeln Sie neue Einnahmequellen: Monetarisieren Sie Ihre Dienste und Daten, indem Sie diese anderen Unternehmen auf sichere Art und Weise zug\u00e4nglich machen[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; width=&#8220;11\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]Priorisieren Sie Identity Security: Erm\u00f6glichen Sie Ihren Partnern ein reibungsloses Erlebnis, auf die richtigen Informationen zur richtigen Zeit zuzugreifen [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2-pad cybv2 cybv2-background-oval tour sub3&#8243;][vc_column][vc_row_inner el_class=&#8220;cyb-center&#8220;][vc_column_inner el_class=&#8220;cyb-pad-btm&#8220;][vc_column_text]<\/p>\n<h3>Authentifizieren, autorisieren und verwalten Sie Ihre B2B-Identit\u00e4ten<\/h3>\n<p>Bieten Sie Ihren Gesch\u00e4ftspartnern, Lieferanten und Kunden schnellen und reibungslosen Zugriff auf Ihre SaaS-Anwendungen.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=&#8220;square&#8220; active_section=&#8220;1&#8243; css_animation=&#8220;none&#8220;][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;Authentifizieren &amp; Anmelden&#8220; tab_id=&#8220;authenticate&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Authentifizieren &amp; Anmelden<\/h4>\n<p>Binden Sie Ihre externen Nutzer mit einer starken Authentifizierung f\u00fcr Ihre Web- und mobilen Apps in Minutenschnelle ein.[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-139514\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/authenticate-signup-tour.png\" alt=\"Authentifizieren und Anmelden\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/authenticate-signup-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/authenticate-signup-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/authenticate-signup-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/authenticate-signup-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;Gew\u00e4hren Sie sicheren Zugriff auf Anwendungen&#8220; tab_id=&#8220;grant&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Gew\u00e4hren Sie sicheren Zugriff auf Anwendungen<\/h4>\n<p>F\u00fcgen Sie Anwendungen oder sensiblen Step-up-Workflows mithilfe von Standards wie OAUTH, OIDC und SAML eine zus\u00e4tzliche Schutzebene hinzu[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-128967\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/03\/single-sign-on-application-catalog-tour.png\" alt=\"Anwendungskatalog\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/03\/single-sign-on-application-catalog-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/03\/single-sign-on-application-catalog-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/03\/single-sign-on-application-catalog-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/03\/single-sign-on-application-catalog-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;Delegierte Administration und F\u00f6derierung&#8220; tab_id=&#8220;delegate&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Delegierte Administration und F\u00f6derierung<\/h4>\n<p>Einfache und sichere Skalierung der Identit\u00e4tsverwaltung f\u00fcr Partneradministratoren[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-139522\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/delegate-administration-tour.png\" alt=\"Delegieren Sie die Verwaltung\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/delegate-administration-tour.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/delegate-administration-tour-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/delegate-administration-tour-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/delegate-administration-tour-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;IAM entwickeln und integrieren&#8220; tab_id=&#8220;develop&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>IAM entwickeln und integrieren<\/h4>\n<p>Erstellen Sie Ihre eigene Nutzeroberfl\u00e4che mit Low-Code-Widgets und Entwickler-Toolkits[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-139530\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/develop-integrate-iam.png\" alt=\"IAM entwickeln und integrieren\" width=\"770\" height=\"500\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/develop-integrate-iam.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/develop-integrate-iam-300x195.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/develop-integrate-iam-768x499.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/develop-integrate-iam-150x97.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]JTNDc2NyaXB0JTNFJTBBaWYlMjAlMjhqUXVlcnklMjh3aW5kb3clMjkud2lkdGglMjglMjklMjAlM0MlMjA3NjglMjklMjAlN0IlMEFqUXVlcnklMjglMjIudG91ciUyMC52Y190dGEtcGFuZWwlMjIlMjkub24lMjglMjJjbGljayUyMiUyQ2Z1bmN0aW9uJTI4JTI5JTIwJTdCJTBBJTA5JTBBJTA5aWYlMjhqUXVlcnklMjh0aGlzJTI5Lmhhc0NsYXNzJTI4JTIydmNfYWN0aXZlJTIyJTI5JTI5JTdCJTBBJTA5JTA5JTBBJTA5JTA5c2V0VGltZW91dCUyOGZ1bmN0aW9uJTI4JTI5JTdCJTBBJTA5JTA5JTA5alF1ZXJ5JTI4JTIyLnRvdXIlMjAudmNfdHRhLXBhbmVsJTIyJTI5LnJlbW92ZUNsYXNzJTI4JTIydmNfYWN0aXZlJTIyJTI5JTNCJTIwJTBBJTA5JTA5JTdEJTJDMTAwJTI5JTBBJTA5JTA5JTBBJTA5JTA5cmV0dXJuJTIwZmFsc2UlM0IlMEElMDklN0QlMEElN0QlMjklM0IlMEElN0QlMEElMEFqUXVlcnklMjglMjIudG91ciUyMC52Y190dGEtcGFuZWwlMjAud3BiX3RleHRfY29sdW1uJTIwYSUyMiUyOS5jbGljayUyOGZ1bmN0aW9uJTI4ZSUyOSUyMCU3QiUwQSUyMCUyMCUyMCUyRiUyRiUyMERvJTIwc29tZXRoaW5nJTBBJTIwJTIwJTIwZS5zdG9wUHJvcGFnYXRpb24lMjglMjklM0IlMEElN0QlMjklM0IlMEElM0MlMkZzY3JpcHQlM0U=[\/vc_raw_js][\/vc_column][\/vc_row][vc_row equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 cybv2-pad-top featured-integrations&#8220;][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;box-heading&#8220;][vc_column_text]<\/p>\n<h3>CyberArk Produkte, die sich in B2B Identity integrieren lassen<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;cta-box&#8220; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fproducts%2Fdirectory-services%2F|&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-139538\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/cloud-directory.png\" alt=\"Cloud Directory\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/cloud-directory.png 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/cloud-directory-300x122.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/cloud-directory-150x61.png 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>Cloud Directory<\/h4>\n<p>Speichern Sie die Daten des Identity Management f\u00fcr alle Ihre Anwendungen zentral in einem gemeinsamen Repository[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right pt-5&#8243;]<a href=\"https:\/\/www.cyberark.com\/de\/products\/directory-services\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;cta-box&#8220; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fproducts%2Fdirectory-user-management%2F|&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-139546\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/user-management.jpg\" alt=\"Nutzerverwaltung\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/user-management.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/user-management-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/user-management-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>Nutzerverwaltung<\/h4>\n<p>Einfaches Onboarding und Offboarding Ihrer Nutzer \u00fcber die Verwaltungskonsole [\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right pt-5&#8243;]<a href=\"https:\/\/www.cyberark.com\/de\/products\/directory-user-management\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;cta-box&#8220; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fproducts%2Fadaptive-multi-factor-authentication%2F|&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-139554\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/adaptiva-mfa.jpg\" alt=\"Adaptive MFA\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/adaptiva-mfa.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/adaptiva-mfa-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/adaptiva-mfa-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>Adaptive MFA<\/h4>\n<p>Sicherer Zugriff auf Web- und mobile Anwendungen durch mehrere Verifizierungsfaktoren[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right pt-5&#8243;]<a href=\"https:\/\/www.cyberark.com\/de\/products\/adaptive-multi-factor-authentication\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;cta-box&#8220; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fproducts%2Fuser-behavior-analytics%2F|&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-139562\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/user-behavior-analytics.jpg\" alt=\"Analyse des Nutzerverhaltens\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/user-behavior-analytics.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/user-behavior-analytics-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/user-behavior-analytics-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>Analyse des Nutzerverhaltens<\/h4>\n<p>Risiken mit Echtzeitwarnungen bewerten, um Administratoren \u00fcber verd\u00e4chtige Aktivit\u00e4ten zu informieren[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right pt-5&#8243;]<a href=\"https:\/\/www.cyberark.com\/de\/products\/user-behavior-analytics\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;cta-box&#8220; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fproducts%2Fidentity-flows%2F|&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-139570\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/flows.jpg\" alt=\"Flows\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/flows.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/flows-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/flows-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>Flows<\/h4>\n<p>Richtlinien implementieren, um die Flow-Identit\u00e4tsdaten, Reaktionen und Ereignisse zu automatisieren [\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right pt-5&#8243;]<a href=\"https:\/\/www.cyberark.com\/de\/products\/identity-flows\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; css=&#8220;.vc_custom_1616705788368{background-color: #f7f7f7 !important;}&#8220; el_class=&#8220;cybv2 cybv2-pad-top hv-cta sub-5&#8243;][vc_column width=&#8220;7\/12&#8243; el_class=&#8220;left-clmn&#8220;][vc_column_text]<\/p>\n<h2>Demo anfordern<\/h2>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;head-box-text&#8220;]Binden Sie Ihre Gesch\u00e4ftskunden reibungslos ein[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;head-box-text&#8220;]Erleichtern Sie die Zusammenarbeit mit Lieferanten[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;head-box-text&#8220;]Erlauben Sie Brokern, Ihre Kunden zu verwalten[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;head-box-text&#8220;]Integrieren Sie alles in Ihre Wertsch\u00f6pfungskette[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;head-box-text&#8220;]Seien Sie bereit f\u00fcr die Gig-Economy[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;head-box-text&#8220;]Erm\u00f6glichen Sie Vollmachten[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;head-box-text&#8220;]Reduzieren Sie die Verwaltungskosten[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;head-box-text&#8220;]Erstellen Sie skalierbare Apps und Portale[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_single_image image=&#8220;108699&#8243; img_size=&#8220;full&#8220; el_class=&#8220;d-none d-md-block&#8220;][\/vc_column][vc_column width=&#8220;1\/12&#8243; css=&#8220;.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}&#8220;][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;right-clmn cybv2-form&#8220;][vc_column_text el_class=&#8220;bold&#8220;]<\/p>\n<h4>Registrieren Sie sich hier f\u00fcr eine pers\u00f6nliche Demo<\/h4>\n<p>[\/vc_column_text][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iODIzNCIgdHlfcGFnZV91cmw9Imh0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS90cnktYnV5L3RoYW5rLXlvdS1iMmItaWRlbnRpdHkvIl0=[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 int-hero&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243;][vc_column_text el_class=&#8220;cyb-breadcrumb&#8220;]Zur\u00fcck zu Customer Identity[\/vc_column_text][vc_column_text] B2B Identity Bieten Sie Ihren Gesch\u00e4ftspartnern, Lieferanten und Kunden sichere und nahtlose Erlebnisse, indem Sie schnellen und reibungslosen Zugriff auf Ihre SaaS-Anwendungen erm\u00f6glichen und gleichzeitig&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":32304,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-179363","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>B2B Identity Management | CyberArk<\/title>\n<meta name=\"description\" content=\"CyberArk B2B Identity sichert den externen Zugriff auf Ihre Gesch\u00e4ftsanwendungen und -dienste und sch\u00fctzt gleichzeitig vor b\u00f6swilligen Angriffen und Datenschutzverletzungen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/products\/b2b-identity\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"B2B Identity\" \/>\n<meta property=\"og:description\" content=\"CyberArk B2B Identity sichert den externen Zugriff auf Ihre Gesch\u00e4ftsanwendungen und -dienste und sch\u00fctzt gleichzeitig vor b\u00f6swilligen Angriffen und Datenschutzverletzungen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/products\/b2b-identity\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-03T07:59:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"430\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/products\/b2b-identity\/\",\"url\":\"https:\/\/www.cyberark.com\/products\/b2b-identity\/\",\"name\":\"B2B Identity Management | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/b2b-identity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/b2b-identity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2.jpg\",\"datePublished\":\"2023-01-31T01:06:40+00:00\",\"dateModified\":\"2025-04-03T07:59:20+00:00\",\"description\":\"CyberArk B2B Identity sichert den externen Zugriff auf Ihre Gesch\u00e4ftsanwendungen und -dienste und sch\u00fctzt gleichzeitig vor b\u00f6swilligen Angriffen und Datenschutzverletzungen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/b2b-identity\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/products\/b2b-identity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/products\/b2b-identity\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/products\/b2b-identity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Produkte\",\"item\":\"https:\/\/www.cyberark.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"B2B Identity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"B2B Identity Management | CyberArk","description":"CyberArk B2B Identity sichert den externen Zugriff auf Ihre Gesch\u00e4ftsanwendungen und -dienste und sch\u00fctzt gleichzeitig vor b\u00f6swilligen Angriffen und Datenschutzverletzungen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/products\/b2b-identity\/","og_locale":"de_DE","og_type":"article","og_title":"B2B Identity","og_description":"CyberArk B2B Identity sichert den externen Zugriff auf Ihre Gesch\u00e4ftsanwendungen und -dienste und sch\u00fctzt gleichzeitig vor b\u00f6swilligen Angriffen und Datenschutzverletzungen.","og_url":"https:\/\/www.cyberark.com\/products\/b2b-identity\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-04-03T07:59:20+00:00","og_image":[{"width":640,"height":430,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"9 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/products\/b2b-identity\/","url":"https:\/\/www.cyberark.com\/products\/b2b-identity\/","name":"B2B Identity Management | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/products\/b2b-identity\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/products\/b2b-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2.jpg","datePublished":"2023-01-31T01:06:40+00:00","dateModified":"2025-04-03T07:59:20+00:00","description":"CyberArk B2B Identity sichert den externen Zugriff auf Ihre Gesch\u00e4ftsanwendungen und -dienste und sch\u00fctzt gleichzeitig vor b\u00f6swilligen Angriffen und Datenschutzverletzungen.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/products\/b2b-identity\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/products\/b2b-identity\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/products\/b2b-identity\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/b2b-hero-v2.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/products\/b2b-identity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Produkte","item":"https:\/\/www.cyberark.com\/products\/"},{"@type":"ListItem","position":3,"name":"B2B Identity"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/179363","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=179363"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/179363\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32304"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=179363"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=179363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}