{"id":187028,"date":"2023-12-06T16:22:30","date_gmt":"2023-12-06T21:22:30","guid":{"rendered":"https:\/\/www.cyberark.com\/solutions\/government\/"},"modified":"2025-09-22T14:34:09","modified_gmt":"2025-09-22T18:34:09","slug":"government","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/solutions\/government\/","title":{"rendered":"\u00d6ffentliche Verwaltung"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 int-hero-noimg blue-gradient&#8220;][vc_column width=&#8220;5\/6&#8243; el_class=&#8220;column-1&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h1>Sicherung von Identit\u00e4ten f\u00fcr alle Ebenen der \u00f6ffentlichen Verwaltung<\/h1>\n<p><\/p>\n<h2>Gew\u00e4hrleisten Sie sicheren und automatisierten Zugriff f\u00fcr Identit\u00e4ten auf jedem Ger\u00e4t, \u00fcberall und zur richtigen Zeit. Sch\u00fctzen Sie sensible Daten und kritische Infrastrukturen auf allen Ebenen der \u00f6ffentlichen Verwaltung mit einem Zero-Trust-Ansatz, der Effizienz und Compliance Priorit\u00e4t einr\u00e4umt.<\/h2>\n<p>\n[\/vc_column_text][vc_btn title=&#8220;Demo anfordern&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; custom_onclick=&#8220;true&#8220; link=&#8220;url:%23form|&#8220; el_class=&#8220;cybv2-button-transp-green&#8220; custom_onclick_code=&#8220;data-scroll-class&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/addressing-zero-trust-for-government-the-role-of-identity-security\">Das Whitepaper lesen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad-top overview-vt&#8220; css=&#8220;.vc_custom_1611617874123{background-color: #f7f7f7 !important;}&#8220;][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;head-box&#8220;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h3>Identity Security: Der Eckpfeiler einer effizienten Zero-Trust-Implementierung<\/h3>\n<p>\u201eNie vertrauen, immer kontrollieren\u201c ist ein Prinzip, das ma\u00dfgeblich durch Automatisierung bei der Bew\u00e4ltigung von Schwachstellen unterst\u00fctzt wird, die durch zahlreiche Eintrittspunkte entstehen. Die umfassende <a href=\"https:\/\/www.cyberark.com\/de\/products\/\">Plattform f\u00fcr Identity Security<\/a> von CyberArk verbessert <a href=\"https:\/\/www.cyberark.com\/de\/solutions\/zero-trust\/\">Zero-Trust-Architekturen<\/a>, indem sie die Sicherheitsposition st\u00e4rkt und den Verifizierungsprozess rationalisiert, wodurch die Produktivit\u00e4t gesteigert und Fehler in dem gesamten Betrieb der \u00f6ffentlichen Verwaltung reduziert werden.[\/vc_column_text][\/vc_column][vc_column width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=&#8220;cta-box&#8220;][vc_column_text]<a href=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-143134\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg\" alt=\"Risiko\" width=\"300\" height=\"259\" \/><\/a>[\/vc_column_text][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>Risiken mit proaktiver Sicherheitsautomatisierung reduzieren<\/h4>\n<p>Automatisierte Sicherheitsma\u00dfnahmen minimieren Risiken und steigern die Betriebseffizienz in allen Bereichen der \u00f6ffentlichen Verwaltung.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;cta-box&#8220;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-129953\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/4_Secretsicon-01.svg\" alt=\"Engagieren\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>Mit optimierten Identit\u00e4tskontrollen Angriffe eind\u00e4mmen<\/h4>\n<p>Strategische Privilegienkontrollen verhindern Angriffe und minimieren betriebliche St\u00f6rungen durch Automatisierung.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;cta-box&#8220;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-143628\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/Compliance_test-01.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>Optimierte Compliance gew\u00e4hrleisten<\/h4>\n<p>Erf\u00fcllen Sie m\u00fchelos wichtige Standards wie NIST, NERC und FIPS mit rationalisierten Prozessen, die den manuellen Aufwand reduzieren.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;cta-box&#8220;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-199824 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/digital-health.svg\" alt=\"Symbol Digitale Gesundheit\" width=\"40\" height=\"46\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>Modernisierung voranbringen<\/h4>\n<p>Fortschrittliche Sicherheitstechnologien erm\u00f6glichen erhebliche Kosteneinsparungen und Betriebseffizienz und treiben die IT-Modernisierung in der \u00f6ffentlichen Verwaltung voran.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_talk_to_an_expert&#8220; css=&#8220;.vc_custom_1608677118624{background-color: #061b2b !important;}&#8220;][vc_column el_class=&#8220;text-center&#8220;][vc_column_text el_class=&#8220;extra-space&#8220;]<\/p>\n<h2>Zero Trust f\u00fcr staatliche Beh\u00f6rden thematisieren:<\/h2>\n<p>\n[\/vc_column_text][vc_column_text el_class=&#8220;new_hpstyle_section9_text&#8220;]Sichern Sie den Zugriff f\u00fcr alle Identit\u00e4ten auf jedem Ger\u00e4t und sch\u00fctzen Sie sensible beh\u00f6rdliche Daten und Infrastruktur f\u00fcr Bundesagenturen.[\/vc_column_text][vc_btn title=&#8220;Mehr erfahren&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; align=&#8220;center&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fsolutions%2Ffederal%2F|&#8220; el_class=&#8220;cybv2-button-solid cyb-button-hpstyle_section5&#8243;][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 cybv2-pad-top&#8220;][vc_column width=&#8220;2\/3&#8243; offset=&#8220;vc_col-sm-offset-2&#8243;][vc_column_text el_class=&#8220;text-md-center head-box&#8220;]<\/p>\n<h3>Einhaltung von Vorschriften und Compliance-Standards mit CyberArk<\/h3>\n<p>CyberArk ist der weltweit f\u00fchrende Anbieter im Bereich Identity Security, dem mehr als 8.000\u00a0Kunden weltweit vertrauen, ein NIAP-zertifizierter Anbieter, Teil der DoD UC APL und Inhaber eines von der US-Armee ausgestellten Networthiness-Zertifikats (CoN). Folgen Sie dem <a href=\"https:\/\/www.cyberark.com\/de\/blueprint\/\">CyberArk Blueprint Framework,<\/a> um eine effektive Roadmap f\u00fcr Identity Security zu entwerfen und wichtige Vorschriften einzuhalten.[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 cybv2-pad-top featured-integrations&#8220;][vc_column width=&#8220;1\/5&#8243; el_class=&#8220;cta-box&#8220; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fpublic-sector-government%2Faddressing-the-australian-essential-eight-cyber-security-maturity-model|&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143175\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/acsc-featured-grey.jpg\" alt=\"ACSC\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/acsc-featured-grey.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/acsc-featured-grey-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/acsc-featured-grey-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>AUS \u2013 ACSC Essential Eight<\/h4>\n<p>Erfahren Sie, wie die CyberArk Identity Security Plattform die Essential Eight Risikomanagementstrategien unterst\u00fctzt.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/public-sector-government\/addressing-the-australian-essential-eight-cyber-security-maturity-model\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/5&#8243; el_class=&#8220;cta-box&#8220; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fgetting-ready-for-nis2|&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-180886 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-star.jpg\" alt=\"FED Logo\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-star.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-star-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-star-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>EU \u2013 NIS2-Richtlinie<\/h4>\n<p>Erfahren Sie, wie sich NIS2 auf Ihr Unternehmen auswirken kann und wie Sie sich vorbereiten k\u00f6nnen.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/getting-ready-for-nis2\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/5&#8243; el_class=&#8220;cta-box&#8220; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fpublic-sector-government%2Fcybersecurity-in-a-digitalised-world|&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-143183 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/ncsc-featured.jpg\" alt=\"NSCS\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/ncsc-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/ncsc-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/ncsc-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>UK\u00a0\u2013 NCSC CAF<\/h4>\n<p>Erfahren Sie mehr dar\u00fcber, wie Sie mit CyberArk die Ziele der Cybersicherheitsstrategie der britischen Regierung erreichen k\u00f6nnen.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/public-sector-government\/cybersecurity-in-a-digitalised-world\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/5&#8243; el_class=&#8220;cta-box&#8220; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fblog%2Fcisa-cpg-report-ids-top-cybersecurity-steps-for-smb-critical-infrastructure-entities|&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143231\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cisa-featured-grey.jpg\" alt=\"CISA\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cisa-featured-grey.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cisa-featured-grey-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/cisa-featured-grey-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>USA\u00a0\u2013 CISA CPG<\/h4>\n<p>Erfahren Sie, wie Funktionen zur Identity Security dazu beitragen k\u00f6nnen, die sektor\u00fcbergreifenden Cybersicherheitsziele von CISA zu erreichen.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/blog\/cisa-cpg-report-ids-top-cybersecurity-steps-for-smb-critical-infrastructure-entities\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/5&#8243; el_class=&#8220;cta-box&#8220; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fsolution-briefs%2Fdepartment-of-homeland-security-s-continuous-diagnostics-and-mitigation-cdm-phase-2-privilege-management-requirements|&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143191\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/dhs-featured.jpg\" alt=\"DHS\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/dhs-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/dhs-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/dhs-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>USA\u00a0\u2013 DHS CDM<\/h4>\n<p>Erfahren Sie mehr \u00fcber die Rolle des Privileged Access Management in US-Bundesbeh\u00f6rden und wie es dazu beitr\u00e4gt, die beiden Phasen des CDM-Programms anzugehen.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\" https:\/\/www.cyberark.com\/resources\/solution-briefs\/department-of-homeland-security-s-continuous-diagnostics-and-mitigation-cdm-phase-2-privilege-management-requirements \">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/5&#8243; el_class=&#8220;cta-box&#8220; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fpress%2Fcyberark-achieves-fedramp-high-authorization%2F%20|&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-180895 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-ramp.jpg\" alt=\"FedRAMP Logo\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-ramp.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-ramp-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fed-ramp-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>FedRAMP\u00ae High Authorization<\/h4>\n<p>Erfahren Sie mehr \u00fcber die f\u00fchrenden SaaS-Angebote von CyberArk, CyberArk Endpoint Privilege Manager und CyberArk Workforce Identity, die FedRAMP High Authorization erreichen und die Sicherheit f\u00fcr Bundesbeh\u00f6rden im Einklang mit den Zero-Trust-Prinzipien verbessern.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/press\/cyberark-achieves-fedramp-high-authorization\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/5&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-180868 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fips-140-2.jpg\" alt=\"FIPS 140\u00a0Logo\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fips-140-2.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fips-140-2-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/fips-140-2-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>USA\u00a0\u2013 FIPS 140\u00a0\u2013 2<\/h4>\n<p>CyberArk PAM\u00a0\u2013 FIPS-Compliance und verbesserte Erkennung.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/product-announcements-blog\/cyberark-privileged-access-manager-self-hosted-v13-0-release-fips-compliance-and-improved-discovery\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/5&#8243; el_class=&#8220;cta-box&#8220; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fprotecting-the-grid-addressing-nerc-cip-requirements-for-securing-privileged-access|&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143199\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nerc-featured.jpg\" alt=\"NERC\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nerc-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nerc-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nerc-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>USA\u00a0\u2013 NERC CIP<\/h4>\n<p>Erfahren Sie, wie L\u00f6sungen von CyberArk die spezifischen NERC CIP-Anforderungen erf\u00fcllen.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/protecting-the-grid-addressing-nerc-cip-requirements-for-securing-privileged-access\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/5&#8243; el_class=&#8220;cta-box&#8220; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Faddressing-the-department-of-defenses-zero-trust-framework-with-the-cyberark-identity-security-platform%20|&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-180859 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/us-fed-3-recovered.jpg\" alt=\"Logo Verteidigungsministerium\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/us-fed-3-recovered.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/us-fed-3-recovered-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/07\/us-fed-3-recovered-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>DoD Zero-Trust-Richtlinien<\/h4>\n<p>Ein technischer \u00dcberblick dar\u00fcber, wie die \u00f6ffentliche Verwaltung Identity Security-L\u00f6sungen von CyberArk nutzen kann, um sich an der Zero Trust Reference Architecture des DoD auszurichten.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/addressing-the-department-of-defenses-zero-trust-framework-with-the-cyberark-identity-security-platform\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/5&#8243; el_class=&#8220;cta-box&#8220; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Faddressing-zero-trust-for-government-the-role-of-identity-security%20|&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143215\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured.jpg\" alt=\"NIST\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>USA\u00a0\u2013 NIST SP 800\u2013171<\/h4>\n<p>Dies umfasst Auftragnehmer von US-Bundesbeh\u00f6rden mit Richtlinien zum Schutz von Controlled Unclassified Information und behandelt die Anforderungen der NIST 800-171 in Bezug auf die Sicherheit von privilegiertem Zugang.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/addressing-the-nist-sp-800-171-cui-requirements-with-cyberark\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/5&#8243; el_class=&#8220;cta-box&#8220; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fhome%2Fput-privileged-access-management-at-the-core-of-nist-zero-trust-architecture|&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143215\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured.jpg\" alt=\"NIST\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nist-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>USA\u00a0\u2013 NIST SP 800\u2013207<\/h4>\n<p>Privileged Access Management in den Mittelpunkt der NIST Zero-Trust-Architektur stellen.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\" https:\/\/www.cyberark.com\/resources\/home\/put-privileged-access-management-at-the-core-of-nist-zero-trust-architecture\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/5&#8243; el_class=&#8220;cta-box&#8220; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fpublic-sector-government%2Fmapping-cyberark-solutions-to-ksa-nca-ecc|&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-143207\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nca-featured.jpg\" alt=\"NCA\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nca-featured.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nca-featured-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/nca-featured-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>SA\u00a0\u2013 NCA ECC<\/h4>\n<p>Erfahren Sie, wie CyberArk dazu beitragen kann, diese grundlegenden Cybersicherheitskontrollen der National Cybersecurity Authority of the Kingdom of Saudi Arabia zu erf\u00fcllen.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/public-sector-government\/mapping-cyberark-solutions-to-ksa-nca-ecc\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/5&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-181863 size-medium\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso-27017-big-300x122.jpg\" alt=\"ISO 27017\" width=\"300\" height=\"122\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso-27017-big-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso-27017-big-150x61.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso-27017-big.jpg 742w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>ISO 27018<\/h4>\n<p>Dieser international anerkannte Standard konzentriert sich auf den Schutz personenbezogener Daten in Cloud-Computing-Umgebungen und zeigt die Priorit\u00e4t von CyberArk f\u00fcr den Datenschutz und die Aufrechterhaltung von Transparenz und Rechenschaftspflicht.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/trust\/compliance\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/5&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-189789 size-medium\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-300x122.png\" alt=\"DORA\" width=\"300\" height=\"122\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-300x122.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-150x61.png 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora.png 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>DORA<\/h4>\n<p>Die EU-Verordnung \u00fcber digitale operationale Resilienz im Finanzsektor (auch bekannt als DORA \u2013 abgeleitet von Digital Operational Resilience Act) soll Finanzunternehmen in der EU dabei helfen, ihre Widerstandsf\u00e4higkeit gegen Cyberangriffe zu verbessern. Insgesamt stellt DORA die Sicherung der Informations- und Kommunikationstechnologien (IKT) in den Mittelpunkt. Die Verordnung gilt nicht nur f\u00fcr Finanzunternehmen, sondern auch f\u00fcr Dritte, die den Unternehmen IKT-Systeme und -Dienstleistungen zur Verf\u00fcgung stellen.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/hybrid-and-multi-cloud-security\/dora-compliance-an-identity-security-guidebook\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/5&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-189780 size-medium\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-eu-1-300x122.png\" alt=\"\" width=\"300\" height=\"122\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-eu-1-300x122.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-eu-1-150x61.png 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dora-eu-1.png 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>DoDIN APL<\/h4>\n<p>CyberArk Privileged Access Manager Self-Hosted wurde offiziell als vertrauensw\u00fcrdige L\u00f6sung f\u00fcr Kunden des Verteidigungsministeriums (DoD) gelistet. CyberArk PAM Self-Hosted ist in der DoD Information Network Approved Product List (DoDIN APL) zu finden und erf\u00fcllt die Spezifikationen f\u00fcr das DoD.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/trust\/compliance\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/5&#8243; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fpress%2Fcyberark-achieves-qc1-certification-from-italian-national-cybersecurity-agency%2F%20|title:Mehr%20erfahren|&#8220; el_class=&#8220;cta-box&#8220;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215804\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/acn-logo.jpg\" alt=\"acn logo\" width=\"300\" height=\"122\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/acn-logo.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/08\/acn-logo-150x61.jpg 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;tiny&#8220;]<\/p>\n<h4>Italy: QC1 Certification from Italian National Cybersecurity Agency (ACN)<\/h4>\n<p>CyberArk SaaS products are now available in the ACN marketplace to any government organization in Italy looking to consume or deploy cloud-based services.[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/press\/cyberark-achieves-qc1-certification-from-italian-national-cybersecurity-agency\/\">Learn More<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/5&#8243; column_link=&#8220;url:https%3A%2F%2Finvestors.cyberark.com%2Fnews%2Fnews-details%2F2025%2FCyberArk-Achieves-Cloud-Service-Provider-Security-Standard-Certification-From-Dubai-Electronic-Security-Center%2Fdefault.aspx|title:Mehr%20erfahren|&#8220; el_class=&#8220;cta-box&#8220;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-215822\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/DESC-Logo.jpg\" alt=\"dubai logo\" width=\"300\" height=\"122\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;tiny&#8220;]<\/p>\n<h4>UAE &#8211; CSP Security Standard Certification from DESC<\/h4>\n<p>CyberArk receives Cloud Service Provider certification from Dubai Electronic Security Center (DESC).[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/investors.cyberark.com\/news\/news-details\/2025\/CyberArk-Achieves-Cloud-Service-Provider-Security-Standard-Certification-From-Dubai-Electronic-Security-Center\/default.aspx\" target=\"_blank\" rel=\"noopener\">Learn More<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_talk_to_an_expert&#8220; css=&#8220;.vc_custom_1608677118624{background-color: #061b2b !important;}&#8220;][vc_column el_class=&#8220;text-center&#8220;][vc_column_text el_class=&#8220;extra-space&#8220;]<\/p>\n<h2>Sicherung kritischer australischer Infrastrukturen damals, heute und in Zukunft<\/h2>\n<p>\n[\/vc_column_text][vc_column_text el_class=&#8220;new_hpstyle_section9_text&#8220;]<span class=\"TextRun SCXW70713111 BCX0\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW70713111 BCX0\">Erfahren Sie mehr \u00fcber das Management nationaler Sicherheitsrisiken durch <\/span><span class=\"NormalTextRun SCXW70713111 BCX0\">Sabotage, Spionage<\/span><span class=\"NormalTextRun SCXW70713111 BCX0\"> und Missbrauch der kritischen Infrastruktur Australiens.<\/span><\/span>[\/vc_column_text][vc_btn title=&#8220;Mehr lesen&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; align=&#8220;center&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fcritical-infrastructure-australia%2F|&#8220; el_class=&#8220;cybv2-button-solid cyb-button-hpstyle_section5&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2-pad cybv2 cybv2-background-oval tour&#8220;][vc_column][vc_row_inner el_class=&#8220;cyb-center&#8220;][vc_column_inner el_class=&#8220;cyb-pad-btm&#8220;][vc_column_text el_class=&#8220;left-mobile&#8220;]<\/p>\n<h3>Eine mehrschichtige Strategie f\u00fcr Identity Security implementieren<\/h3>\n<p>St\u00e4rken Sie Ihre Sicherheitsposition und reduzieren Sie die Exposition gegen\u00fcber dynamischen Bedrohungen.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=&#8220;square&#8220; active_section=&#8220;1&#8243; css_animation=&#8220;none&#8220;][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;Privileged Access sch\u00fctzen&#8220; tab_id=&#8220;privileged-access&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Privilegierten Zugang sichern<\/h4>\n<p>Dies erm\u00f6glicht es Unternehmen, sich von dem seit langem bestehenden hohen Niveaus des privilegierten Zugangs zu einer dynamischeren Just-in-Time-Methode f\u00fcr den Administratorzugriff zu bewegen. Dar\u00fcber hinaus sollte der Zugriff mit minimalen Berechtigungen gew\u00e4hrt werden, um die Angriffsfl\u00e4che und die Angriffswirkungen zu reduzieren, falls ein privilegiertes Konto von b\u00f6swilligen Akteuren angegriffen wird.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/products\/privileged-access\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119610\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-1.png\" alt=\"Amazon WorkSpaces sichern\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;Endger\u00e4te sichern&#8220; tab_id=&#8220;secure-endpoints&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Endger\u00e4te sichern<\/h4>\n<p>Kompromittierte Endger\u00e4te k\u00f6nnen von Angreifern verwendet werden, um eine starke Authentifizierung zu umgehen. Daher ist es wichtig, Kontrollen einzurichten, die sicherstellen, dass nur genehmigte Prozesse auf Anmeldedatenspeicher zugreifen k\u00f6nnen. Dies h\u00e4ngt von der grundlegenden Sicherheitsvorkehrung ab, Least Privilege zu implementieren und lokale Administratorrechte vom Endger\u00e4t zu entfernen.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/products\/endpoint-privilege-security\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119618\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-2.png\" alt=\"Least Privilege durchsetzen\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-2.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-2-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-2-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;Zugriff auf Anwendungen sichern&#8220; tab_id=&#8220;secure-application-access&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Sicherer Zugriff auf Anwendungen<\/h4>\n<p>Starke, anpassungsf\u00e4hige Authentifizierung und kontinuierliche Genehmigung und Autorisierung bilden die Grundlage f\u00fcr die Sicherung des Zugriffs des Personals auf Anwendungen. Diese Verlagerung von Netzwerkkontrollen zu Identit\u00e4tskontrollen schafft ein besseres Nutzererlebnis und steigert die Produktivit\u00e4t. Bef\u00e4higen Sie Ihr Personal und halten Sie gleichzeitig b\u00f6swillige Akteure fern.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/products\/access-management\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119626\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3.png\" alt=\"Starke Authentifizierung erm\u00f6glichen\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecurityStandardsandFrameworks-3-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;Nicht-menschliche Zugriffsanfragen sichern&#8220; tab_id=&#8220;secure-non-human-access-requests&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Nicht-menschliche Zugriffsanfragen sichern<\/h4>\n<p>Das Mantra \u201eNie vertrauen, immer kontrollieren\u201c von Zero Trust muss auch nicht-menschliche Identit\u00e4ten umfassen. Alle Aufrufe dieser Maschinenidentit\u00e4ten, die Zugriff auf Netzwerkressourcen suchen, sollten gesch\u00fctzt und Secrets in der gesamten DevOps-Pipeline entsprechend verwaltet werden.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/products\/secrets-management\/\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-119733\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecureBotsandVirtualAgents-1.png\" alt=\"Nicht-menschlicher Zugriff\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecureBotsandVirtualAgents-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecureBotsandVirtualAgents-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Products-Tour-SecureBotsandVirtualAgents-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]JTNDc2NyaXB0JTNFJTBBaWYlMjAlMjhqUXVlcnklMjh3aW5kb3clMjkud2lkdGglMjglMjklMjAlM0MlMjA3NjglMjklMjAlN0IlMEFqUXVlcnklMjglMjIudG91ciUyMC52Y190dGEtcGFuZWwtaGVhZGluZyUyMiUyOS5vbiUyOCUyMmNsaWNrJTIyJTJDZnVuY3Rpb24lMjglMjklMjAlN0IlMEElMDklMEElMDlpZiUyOGpRdWVyeSUyOHRoaXMlMjkuY2xvc2VzdCUyOCUyMi52Y190dGEtcGFuZWwlMjIlMjkuaGFzQ2xhc3MlMjglMjJ2Y19hY3RpdmUlMjIlMjklMjklN0IlMEElMDklMDklMEElMDklMDlzZXRUaW1lb3V0JTI4ZnVuY3Rpb24lMjglMjklN0IlMEElMDklMDklMDlqUXVlcnklMjglMjIudG91ciUyMC52Y190dGEtcGFuZWwlMjIlMjkucmVtb3ZlQ2xhc3MlMjglMjJ2Y19hY3RpdmUlMjIlMjklM0IlMjAlMEElMDklMDklN0QlMkMxMDAlMjklMEElMDklMDklMEElMDklMDlyZXR1cm4lMjBmYWxzZSUzQiUwQSUwOSU3RCUwQSU3RCUyOSUzQiUwQSU3RCUwQSUwQWpRdWVyeSUyOCUyMi50b3VyJTIwLnZjX3R0YS1wYW5lbCUyMC53cGJfdGV4dF9jb2x1bW4lMjBhJTIyJTI5LmNsaWNrJTI4ZnVuY3Rpb24lMjhlJTI5JTIwJTdCJTBBJTIwJTIwJTIwJTJGJTJGJTIwRG8lMjBzb21ldGhpbmclMEElMjAlMjAlMjBlLnN0b3BQcm9wYWdhdGlvbiUyOCUyOSUzQiUwQSU3RCUyOSUzQiUwQSUzQyUyRnNjcmlwdCUzRQ==[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 cyb-pad-btm&#8220;][vc_column width=&#8220;2\/3&#8243; el_class=&#8220;text-center&#8220; offset=&#8220;vc_col-sm-offset-2&#8243;][vc_column_text]<\/p>\n<h2>Kundengeschichten<\/h2>\n<p>Erfahren Sie von f\u00fchrenden Unternehmen und Beh\u00f6rden, wie sie mit CyberArk erfolgreich Identity Security betreiben.[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8220;cyb-pad-btm&#8220;][vc_column][vc_raw_html]W2N5YnYyX2Jsb2dzIHBvc3RfdHlwZT0iY3VzdG9tZXJfc3RvcnkiIHBvc3RzX3Blcl9wYWdlPSI0IiBjb2x1bW5zX2xhcmdlPSIzIiBzaG93X2F1dGhvcj0iZmFsc2UiIHNob3dfZXhjZXJwdD0iZmFsc2UiIHBvczFfaWQ9IjEzMTA4NiIgcG9zMl9pZD0iMTI4MzE0IiBwb3MzX2lkPSIxMjg0NTAiIHBvczRfaWQ9IjEzNTYyMSJd[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"templatera_shortcode\"><div data-vc-full-width=\"true\" data-vc-full-width-temp=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_full_width_resource\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_title\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h5 style=\"text-align: center;\">Identity security: identit\u00e4ten absichern<br \/>\nmit intelligenten Zugriffskontrollen<\/h5>\n<p><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section5_container\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_center   new_hpstyle_section5_gart_img\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1.jpg\" class=\"vc_single_image-img attachment-full\" alt=\"Professional woman with glasses standing confidently against a dark background with a glowing triangular frame\" title=\"gartner-300x300\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/07\/gartner-300x300-1-100x100.jpg 100w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section5_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>2025 Gartner\u00ae Magic Quadrant\u2122 f\u00fcr Privileged Access Managament<\/h4>\n<p><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_btn3-container  cybv2-button-solid cyb-button-hpstyle_section5 vc_btn3-inline\"  >\n\t<a class=\"vc_btn3-color-grey\" href=\"https:\/\/lp.cyberark.com\/gartner-mq-pam-2025-de.html\" title=\"\" target=\"_blank\">Zum Bericht<\/a><\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/a><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_resources&#8220; css=&#8220;.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8220;][vc_column width=&#8220;1\/3&#8243;][vc_column_text el_class=&#8220;no-break&#8220;]<\/p>\n<h3>Verwandte<br \/>\nRessourcen<br \/>\nerkunden<\/h3>\n<p>\n[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/public-sector-government\">Alle Ressourcen anzeigen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column&#8220;][vc_column el_class=&#8220;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8220;.vc_custom_1691480099229{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;new_hpstyle_section8_uberflip&#8220;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_id=&#8220;Formular&#8220;][vc_column][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; css=&#8220;.vc_custom_1690896313684{background-color: #f7f7f7 !important;}&#8220; el_class=&#8220;cybv2 cybv2-pad-top hv-cta&#8220;][vc_column width=&#8220;7\/12&#8243; el_class=&#8220;left-clmn&#8220;][vc_column_text]<\/p>\n<h2>Ihre Reise zu Zero Trust starten<\/h2>\n<p>\n[\/vc_column_text][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;head-box-text&#8220;]Setzen Sie Zero Trust und Least Privilege durch und sichern Sie nahtlos den Zugriff f\u00fcr Menschen und Maschinen \u00fcber Ger\u00e4te und Umgebungen hinweg.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;head-box-text&#8220;]Anwendung intelligenter Privilegienkontrollen auf jede Form von Identit\u00e4t, um Angriffe zu isolieren und zu stoppen, kritische Ressourcen zu sch\u00fctzen und den Zugriff nur f\u00fcr den richtigen Zeitraum zu gew\u00e4hren.<br \/>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;head-box-text&#8220;]Automatisieren Sie das Identity Lifecycle Management durch nahtlose No-Code-App-Integrationen und Workflows, indem Sie die Kontrolle \u00fcber \u00fcberm\u00e4\u00dfige Berechtigungen \u00fcbernehmen. [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;head-box-text&#8220;]\u00dcberwachen Sie kontinuierlich Bedrohungen durch Identity Security Intelligence in Echtzeit, passen Sie die Kontrollen je nach Risiko an und nutzen Sie Echtzeit-Optionen zur Behebung.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_single_image image=&#8220;106859&#8243; img_size=&#8220;full&#8220; el_class=&#8220;d-none d-md-block&#8220;][\/vc_column][vc_column width=&#8220;1\/12&#8243; css=&#8220;.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}&#8220;][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;right-clmn cybv2-form&#8220;][vc_column_text el_class=&#8220;bold&#8220;]<\/p>\n<h4>Demo anfordern<\/h4>\n<p>\n[\/vc_column_text][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iNDUzMyIgdHlfcGFnZV91cmw9Imh0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS90aGFuay15b3UtcmVxdWVzdC1kZW1vLyJd[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":32302,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-187028","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\u00d6ffentliche Verwaltung | CyberArk<\/title>\n<meta name=\"description\" content=\"Sichern Sie den Zugriff f\u00fcr Identit\u00e4ten auf jedem Ger\u00e4t, \u00fcberall und zur richtigen Zeit. Sch\u00fctzen Sie sensible Daten und kritische Infrastrukturen auf allen Ebenen der \u00f6ffentlichen Verwaltung mit Zero Trust.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/government\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00d6ffentliche Verwaltung\" \/>\n<meta property=\"og:description\" content=\"Sichern Sie den Zugriff f\u00fcr Identit\u00e4ten auf jedem Ger\u00e4t, \u00fcberall und zur richtigen Zeit. Sch\u00fctzen Sie sensible Daten und kritische Infrastrukturen auf allen Ebenen der \u00f6ffentlichen Verwaltung mit Zero Trust.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/government\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-22T18:34:09+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/government\/\",\"name\":\"\u00d6ffentliche Verwaltung | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg\",\"datePublished\":\"2023-12-06T21:22:30+00:00\",\"dateModified\":\"2025-09-22T18:34:09+00:00\",\"description\":\"Sichern Sie den Zugriff f\u00fcr Identit\u00e4ten auf jedem Ger\u00e4t, \u00fcberall und zur richtigen Zeit. Sch\u00fctzen Sie sensible Daten und kritische Infrastrukturen auf allen Ebenen der \u00f6ffentlichen Verwaltung mit Zero Trust.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/government\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/government\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L\u00f6sungen f\u00fcr Identity Security\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u00d6ffentliche Verwaltung\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u00d6ffentliche Verwaltung | CyberArk","description":"Sichern Sie den Zugriff f\u00fcr Identit\u00e4ten auf jedem Ger\u00e4t, \u00fcberall und zur richtigen Zeit. Sch\u00fctzen Sie sensible Daten und kritische Infrastrukturen auf allen Ebenen der \u00f6ffentlichen Verwaltung mit Zero Trust.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/government\/","og_locale":"de_DE","og_type":"article","og_title":"\u00d6ffentliche Verwaltung","og_description":"Sichern Sie den Zugriff f\u00fcr Identit\u00e4ten auf jedem Ger\u00e4t, \u00fcberall und zur richtigen Zeit. Sch\u00fctzen Sie sensible Daten und kritische Infrastrukturen auf allen Ebenen der \u00f6ffentlichen Verwaltung mit Zero Trust.","og_url":"https:\/\/www.cyberark.com\/solutions\/government\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-09-22T18:34:09+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"11 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/government\/","url":"https:\/\/www.cyberark.com\/solutions\/government\/","name":"\u00d6ffentliche Verwaltung | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg","datePublished":"2023-12-06T21:22:30+00:00","dateModified":"2025-09-22T18:34:09+00:00","description":"Sichern Sie den Zugriff f\u00fcr Identit\u00e4ten auf jedem Ger\u00e4t, \u00fcberall und zur richtigen Zeit. Sch\u00fctzen Sie sensible Daten und kritische Infrastrukturen auf allen Ebenen der \u00f6ffentlichen Verwaltung mit Zero Trust.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/government\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/government\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/solutions\/government\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/04\/risk-icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/government\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"L\u00f6sungen f\u00fcr Identity Security","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"\u00d6ffentliche Verwaltung"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/187028","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=187028"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/187028\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32302"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=187028"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=187028"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}