{"id":191249,"date":"2024-05-21T09:21:51","date_gmt":"2024-05-21T13:21:51","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/cora-ai\/"},"modified":"2026-02-09T11:49:56","modified_gmt":"2026-02-09T16:49:56","slug":"cora-ai","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/products\/cora-ai\/","title":{"rendered":"Cora AI"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 int-hero-full impact-hero&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243; css=&#8220;.vc_custom_1623332891297{margin-bottom: 50px !important;}&#8220;][vc_column_text]<\/p>\n<h2>Wir stellen vor: CyberArk <span style=\"color: #d4eb33 !important;\">CORA AI<sup>\u2122<\/sup><\/span><\/h2>\n<p><\/p>\n<h3>CyberArk CORA AI ist Ihr zentraler Dreh- und Angelpunkt f\u00fcr KI-Funktionen, die sich auf Identity Security konzentrieren\u00a0\u2013 sie helfen Ihnen, intelligenter zu arbeiten und die Identity Security im gesamten Unternehmen zu beschleunigen.\u200b<\/h3>\n<p>\n[\/vc_column_text][vc_btn title=&#8220;mehr erfahren&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fcontact%2F|title:mehr%20erfahren|&#8220; el_class=&#8220;cybv2-button-green&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad-top&#8220;][vc_column width=&#8220;5\/6&#8243; offset=&#8220;vc_col-lg-offset-2 vc_col-lg-8&#8243; el_class=&#8220;text-md-center&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;text-md-center&#8220;]<\/p>\n<h2>Transformieren Sie Identity Security mit beispielloser Intelligenz\u200b<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 cybv2-pad-btm text-md-center&#8220;][vc_column width=&#8220;2\/3&#8243; offset=&#8220;vc_col-sm-offset-2&#8243; el_class=&#8220;pt-3&#8243;][vc_column_text]<\/p>\n<h5>Nutzen Sie die Leistungsf\u00e4higkeit von CORA AI, um Identit\u00e4tsbedrohungen zu erkennen und darauf zu reagieren, bessere datengesteuerte Entscheidungen zu treffen und jede Identit\u00e4t in Ihrem Unternehmen zu sichern\u00a0\u2013 Mensch und Maschine.\u200b<\/h5>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2&#8243;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;above wistia_embed&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-190802 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/05\/Mask-group-1.jpg\" alt=\"\" width=\"641\" height=\"375\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;below-right&#8220;][vc_column_text el_class=&#8220;dark pt-1&#8243;]<\/p>\n<h3>Alle Identit\u00e4ten sichern\u200b<\/h3>\n<p>CyberArk CORA AI ist in jeden Aspekt der CyberArk Identity Security Plattform integriert und unterst\u00fctzt Nutzer bei der effizienten Sicherung des Privileged Access in allen Umgebungen und bietet Support und Anleitung in Echtzeit. Mit CORA AI k\u00f6nnen Sie schnell gegen aktive Bedrohungen vorgehen und riskantes Verhalten in Ihrem Unternehmen analysieren, indem Sie Milliarden von Datenpunkten in wichtige Erkenntnisse umwandeln.\u200b[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right mt-4&#8243;]<a href=\"https:\/\/www.cyberark.com\/resources\/product-datasheets\/cyberark-cora-ai\">Entdecken Sie CORA AI<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 cyb-reverse pad-xlarge-y&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;below-right&#8220;][vc_column_text el_class=&#8220;dark pt-1&#8243;]<\/p>\n<h3>Sprechen wie ein Mensch\u200b<\/h3>\n<p>F\u00fchren Sie mehrstufige Aktionen in nat\u00fcrlicher Sprache aus. Es ist nicht notwendig, sich bestimmte Befehle oder Syntax zu merken; sprechen Sie mit CyberArk CORA AI wie mit einem Kollegen.\u200b[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;above&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-190793\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/05\/woman-looking-at-tablet.jpg\" alt=\"Frau schaut auf Bildschirm\" width=\"641\" height=\"375\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 pad-xlarge-bottom&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;above&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-190811\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/05\/man-looking-at-laptop-1.png\" alt=\"Mann schaut auf Laptop\" width=\"771\" height=\"552\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;below-right&#8220;][vc_column_text el_class=&#8220;dark&#8220;]<\/p>\n<h3>Entdecken Sie Identity Insights\u200b<\/h3>\n<p>Analysieren und verstehen Sie die Aktivit\u00e4ten von Nutzern auf der Identity Security Plattform und entdecken Sie verborgene Risiken.\u00a0CORA AI kann Erkenntnisse vermitteln, Reaktionsempfehlungen abgeben und bei Bedarf automatisierte Ma\u00dfnahmen ergreifen. Sie m\u00fcssen keine Stunden damit verbringen, aufgezeichnete Sitzungen zu \u00fcberpr\u00fcfen, CORA AI erkennt und reagiert f\u00fcr Sie und hebt die wichtigsten Informationen hervor, die Sie ben\u00f6tigen.\u200b[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_resources&#8220; css=&#8220;.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8220;][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;no-break&#8220;][vc_column_text el_class=&#8220;no-break&#8220;]<\/p>\n<h3>Verwandte Ressourcen erkunden<\/h3>\n<p>\n[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/resources\/\">Alle Ressourcen anzeigen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_resources_uberflip&#8220;][vc_column el_class=&#8220;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8220;.vc_custom_1715884472059{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;new_hpstyle_section8_uberflip&#8220;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 cybv2-pad cybv2-oval-left-background hv-cta-list&#8220; css=&#8220;.vc_custom_1611885567532{background-color: #ff7600 !important;}&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;img-box cyb-clm-background-rc&#8220; css=&#8220;.vc_custom_1612492474039{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/IdentitySolutionsPlatform-HighValue-CTA.jpg?id=108944) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;stat-column&#8220;][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220; width=&#8220;3\/4&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text]<\/p>\n<h2>Sprechen sie mit einem experten<\/h2>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; width=&#8220;11\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]Erkennung privilegierter Accounts und Anmeldedaten[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; width=&#8220;11\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]Sichere Mitarbeiter- und Kundenidentit\u00e4ten[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; width=&#8220;11\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]Sicherer und verwalteter Zugriff f\u00fcr Anwendungen und andere nicht-menschliche Identit\u00e4ten<br \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; width=&#8220;11\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_btn title=&#8220;Vertrieb kontaktieren&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fcontact%2F|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 int-hero-full impact-hero&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243; css=&#8220;.vc_custom_1623332891297{margin-bottom: 50px !important;}&#8220;][vc_column_text] Wir stellen vor: CyberArk CORA AI\u2122 CyberArk CORA AI ist Ihr zentraler Dreh- und Angelpunkt f\u00fcr KI-Funktionen, die sich auf Identity Security konzentrieren\u00a0\u2013&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":32304,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-191249","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CORA AI | CyberArk<\/title>\n<meta name=\"description\" content=\"CORA AI ist Ihr zentraler Dreh- und Angelpunkt f\u00fcr KI-Funktionen, die sich auf Identity Security konzentrieren und Ihnen helfen, intelligenter zu arbeiten und Identity Security im gesamten Unternehmen zu beschleunigen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/products\/cora-ai\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cora AI\" \/>\n<meta property=\"og:description\" content=\"CORA AI ist Ihr zentraler Dreh- und Angelpunkt f\u00fcr KI-Funktionen, die sich auf Identity Security konzentrieren und Ihnen helfen, intelligenter zu arbeiten und Identity Security im gesamten Unternehmen zu beschleunigen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/products\/cora-ai\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-09T16:49:56+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/products\/cora-ai\/\",\"url\":\"https:\/\/www.cyberark.com\/products\/cora-ai\/\",\"name\":\"CORA AI | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/cora-ai\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/cora-ai\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/05\/Mask-group-1.jpg\",\"datePublished\":\"2024-05-21T13:21:51+00:00\",\"dateModified\":\"2026-02-09T16:49:56+00:00\",\"description\":\"CORA AI ist Ihr zentraler Dreh- und Angelpunkt f\u00fcr KI-Funktionen, die sich auf Identity Security konzentrieren und Ihnen helfen, intelligenter zu arbeiten und Identity Security im gesamten Unternehmen zu beschleunigen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/cora-ai\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/products\/cora-ai\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/products\/cora-ai\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/05\/Mask-group-1.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/05\/Mask-group-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/products\/cora-ai\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Produkte\",\"item\":\"https:\/\/www.cyberark.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cora AI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CORA AI | CyberArk","description":"CORA AI ist Ihr zentraler Dreh- und Angelpunkt f\u00fcr KI-Funktionen, die sich auf Identity Security konzentrieren und Ihnen helfen, intelligenter zu arbeiten und Identity Security im gesamten Unternehmen zu beschleunigen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/products\/cora-ai\/","og_locale":"de_DE","og_type":"article","og_title":"Cora AI","og_description":"CORA AI ist Ihr zentraler Dreh- und Angelpunkt f\u00fcr KI-Funktionen, die sich auf Identity Security konzentrieren und Ihnen helfen, intelligenter zu arbeiten und Identity Security im gesamten Unternehmen zu beschleunigen.","og_url":"https:\/\/www.cyberark.com\/products\/cora-ai\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-02-09T16:49:56+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"3 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/products\/cora-ai\/","url":"https:\/\/www.cyberark.com\/products\/cora-ai\/","name":"CORA AI | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/products\/cora-ai\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/products\/cora-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/05\/Mask-group-1.jpg","datePublished":"2024-05-21T13:21:51+00:00","dateModified":"2026-02-09T16:49:56+00:00","description":"CORA AI ist Ihr zentraler Dreh- und Angelpunkt f\u00fcr KI-Funktionen, die sich auf Identity Security konzentrieren und Ihnen helfen, intelligenter zu arbeiten und Identity Security im gesamten Unternehmen zu beschleunigen.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/products\/cora-ai\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/products\/cora-ai\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/products\/cora-ai\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/05\/Mask-group-1.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/05\/Mask-group-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/products\/cora-ai\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Produkte","item":"https:\/\/www.cyberark.com\/products\/"},{"@type":"ListItem","position":3,"name":"Cora AI"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/191249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=191249"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/191249\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32304"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=191249"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=191249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}