{"id":198123,"date":"2024-10-07T04:05:26","date_gmt":"2024-10-07T08:05:26","guid":{"rendered":"https:\/\/www.cyberark.com\/solutions\/finanzdienstleistungen\/"},"modified":"2025-12-04T04:24:26","modified_gmt":"2025-12-04T09:24:26","slug":"financial-services","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/solutions\/financial-services\/","title":{"rendered":"Finanzdienstleistungen"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 hero dark&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243; offset=&#8220;vc_col-md-6&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h1>CyberArk Identity Security f\u00fcr Finanzdienstleistungen<\/h1>\n<p><\/p>\n<h2>Sicherheit, auf die Sie sich verlassen k\u00f6nnen, um Ihren Erfolg zu sichern.<\/h2>\n<p>[\/vc_column_text][vc_btn title=&#8220;Webinar ansehen&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwebinars%2Fidentity-security-trailblazer-automating-identity-security-in-finance-with-erste-digital|title:Jetzt%20ansehen|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/global-financial-services-firm\/\">Lesen Sie die Kundenstory<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-2&#8243;][vc_single_image image=&#8220;183554&#8243; img_size=&#8220;full&#8220; alignment=&#8220;center&#8220; css=&#8220;&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 v3 cybv2-pad overview-vt&#8220;][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;head-box&#8220;][vc_column_text]<\/p>\n<h3>Zukunftssichere finanzielle Sicherheit mit Identity Security\u200b<\/h3>\n<p>Sicherer Zugriff f\u00fcr alle Identit\u00e4ten in Ihrer Einrichtung und innerhalb von Kunden-Apps, um sich vor der wachsenden Anzahl von Bedrohungen f\u00fcr pers\u00f6nliche und propriet\u00e4re Daten zu sch\u00fctzen und gleichzeitig die digitale Innovation zu beschleunigen, um mit den sich \u00e4ndernden Verbraucherbed\u00fcrfnissen Schritt zu halten.\u200b[\/vc_column_text][\/vc_column][vc_column width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_row_inner][vc_column_inner el_class=&#8220;cta-box&#8220;][vc_column_text css=&#8220;&#8220;]<img decoding=\"async\" class=\"alignnone wp-image-129798 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/secure-desktop-credential-icon.svg\" alt=\"Die Integration zwischen Endpoint Privilege Manager und CyberArk Identity adaptive MFA tr\u00e4gt zur St\u00e4rkung der Endpoint Security bei\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Diebstahl von Anmeldedaten minimieren &#038; Angriffe verhindern<\/h4>\n<p>Verwenden Sie eine starke Identity Security ein und setzen Sie Privileged Access Management ein, um sich vor Bedrohungen f\u00fcr PII und propriet\u00e4re Informationen zu sch\u00fctzen.\u200b[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;cta-box&#8220;][vc_column_text css=&#8220;&#8220;]<img decoding=\"async\" class=\"alignnone wp-image-126434 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/partner-handshake-icon.svg\" alt=\"Community-Verbindungen\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Kundenvertrauen aufbauen und sichern\u200b<\/h4>\n<p>Verringern Sie das Risiko von Datenverlusten und die Beeintr\u00e4chtigung erfolgreicher Kundenerlebnisse und nutzen Sie DevOps-Tools, um auf einfache Weise Sicherheit in Kundenanwendungen einzubauen \u2013 entscheidend f\u00fcr Ihre digitale Transformation.\u200b[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;cta-box&#8220;][vc_column_text css=&#8220;&#8220;]<img decoding=\"async\" class=\"alignnone wp-image-118792 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Satisfy-Audit-and-Compliance-icon.svg\" alt=\"Symbol Audit und Compliance sicherstellen\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Compliance erf\u00fcllen\u200b<\/h4>\n<p>Ber\u00fccksichtigen Sie wichtige Vorschriften wie Sarbanes Oxley, PCI-DSS, MAS TRM, NAIC, IFRS, IDD, DSGVO und mehr.\u200b[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 cybv2-pad-top overview-more-col&#8220;][vc_column width=&#8220;5\/6&#8243; el_class=&#8220;text-md-center heading&#8220; offset=&#8220;vc_col-md-offset-1 vc_col-sm-offset-1&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h2>Sichere Transaktionen in einer digitalen Welt\u200b<\/h2>\n<p><\/p>\n<h5>Hier sind einige M\u00f6glichkeiten, wie wir Ihnen helfen k\u00f6nnen, ohne Sorgen voranzukommen.\u200b<\/h5>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;pb-6&#8243;]<img decoding=\"async\" class=\"alignnone wp-image-129945 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/3_MachineIdentitiesIcon-01.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4>Digitales Business erm\u00f6glichen<\/h4>\n<p>Sicherer Zugang zu Gesch\u00e4ftsanwendungen f\u00fcr menschliche und maschinelle Identit\u00e4ten.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/de\/solutions\/digital-business-transformation\/\">Starten Sie noch heute<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;pb-6&#8243;]<img decoding=\"async\" class=\"alignnone wp-image-118800 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Defend-Against-Attacks-icon.svg\" alt=\"Cybersicherheit\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4>Vor Ransomware sch\u00fctzen\u200b<\/h4>\n<p>Sch\u00fctzen Sie sich zuverl\u00e4ssig vor Angriffen, einschlie\u00dflich Ransomware und Anmeldedatendiebstahl, und halten Sie gleichzeitig die betriebliche Effizienz aufrecht.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/de\/solutions\/defend-against-attacks\/\"> Entdecken Sie, wie<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;pb-6&#8243;]<img decoding=\"async\" class=\"alignnone wp-image-125619 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/remote-work-icon.svg\" alt=\"Symbol Remote-Arbeit\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4>Sichere Remote-Arbeit<\/h4>\n<p>Verbinden Sie Ihre Remote-Mitarbeiter schnell und effizient mit dem, was sie ben\u00f6tigen.\u200b<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/de\/solutions\/secure-your-workforce\/\"> Herausfinden<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;pb-6&#8243;]<img decoding=\"async\" class=\"alignnone wp-image-130803 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/05\/cv-unmatchedexpertise-icon.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4>Audit und Compliance sicherstellen\u200b<\/h4>\n<p>Bleiben Sie \u00fcber eine Vielzahl von Vorschriften, Frameworks und Standards auf dem Laufenden.<\/p>\n<p>\u200b<a href=\"https:\/\/www.cyberark.com\/de\/solutions\/audit-compliance\/\"> Erfahren Sie, wie<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 cybv2-pad text-md-center&#8220;][vc_column el_class=&#8220;pb-4&#8243;][vc_column_text]<\/p>\n<h2>Trends bei der Identity Security im Bereich Finanzdienstleistungen\u200b<\/h2>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 seesaw cyb-reverse&#8220;][vc_column width=&#8220;7\/12&#8243; el_class=&#8220;below-left&#8220;][vc_column_text el_class=&#8220;dark&#8220;]<\/p>\n<h4>Folge 51 \u2013 Balance zwischen Innovation und Sicherheit im FinTech-Bereich\u200b<\/h4>\n<p>In dieser Folge von Trust Issues interviewt Gastgeber David Puner Eric Hussey, SVP, Chief Information Security Officer (CISO) bei Finastra, einem f\u00fchrenden Anbieter von Finanzsoftwarel\u00f6sungen und -dienstleistungen. Hussey gibt Einblicke in die sich entwickelnde Rolle des CISO, in die Herausforderungen, mit neuen und sich entwickelnden Cybersicherheitsvorschriften Schritt zu halten, und in die Bedeutung der Balance zwischen Innovation und Sicherheit in der FinTech-Branche. \u200b[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1721310959841{margin-top: 20px !important;}&#8220; el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/podcasts\/ep-51-balancing-innovation-and-security-in-fintech\/\">Jetzt anh\u00f6ren\u200b<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;above&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-114312 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1.jpg\" alt=\"Access Management\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/03\/EnableDigital-Business-seeSaw-01-770x515-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 seesaw&#8220;][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;above wistia_embed&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-112224 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/EnableDigital-Business-HV_CTA-770x550-1.jpg\" alt=\"Hochwertigen CTA f\u00fcr ein digitales Gesch\u00e4ft erm\u00f6glichen\" width=\"770\" height=\"550\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/EnableDigital-Business-HV_CTA-770x550-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/EnableDigital-Business-HV_CTA-770x550-1-300x214.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/EnableDigital-Business-HV_CTA-770x550-1-768x549.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/EnableDigital-Business-HV_CTA-770x550-1-150x107.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8220;7\/12&#8243; el_class=&#8220;below-right&#8220;][vc_column_text el_class=&#8220;dark&#8220;]<\/p>\n<h4>Finanzieller Drahtseilakt: Die kritische Rolle der Identity Security im Finanzwesen\u200b<\/h4>\n<p>Im Drahtseilakt des Finanzdienstleistungssektors dient die Identity Security als wesentliches Sicherheitsnetz, das sorgf\u00e4ltig entwickelt wurde, um Fehltritte abzufangen, bevor sie zu einem Absturz f\u00fchren.\u200b[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1721311145485{margin-top: 20px !important;}&#8220; el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/blog\/financial-highwire-the-critical-role-of-identity-security-in-finance\">Mehr dazu lesen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 customer-stories cybv2-pad-top&#8220;][vc_column width=&#8220;2\/3&#8243; offset=&#8220;vc_col-md-offset-2&#8243; el_class=&#8220;text-center&#8220;][vc_column_text el_class=&#8220;pb-4&#8243;]<\/p>\n<h3>Kundenberichte aus dem Bereich Finanzdienstleistungen\u200b<\/h3>\n<p><\/p>\n<h6>\u00dcber 8.000\u00a0Unternehmen weltweit vertrauen CyberArk.\u200b<\/h6>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 cybv2_customer_stories vc_tta-o-non-responsive&#8220; css=&#8220;.vc_custom_1686775642430{background-color: #ffffff !important;}&#8220;][vc_column][vc_tta_tabs style=&#8220;flat&#8220; shape=&#8220;square&#8220; color=&#8220;white&#8220; spacing=&#8220;&#8220; gap=&#8220;20&#8243; alignment=&#8220;center&#8220; active_section=&#8220;&#8220; el_class=&#8220;cybv2_customer_stories_tabs&#8220; css=&#8220;.vc_custom_1608676900675{background-color: #ffffff !important;}&#8220;][vc_tta_section title=&#8220;Rabobank International&#8220; tab_id=&#8220;rabobank-international&#8220; el_class=&#8220;new_hpstyle_section6_tab1_icon vc_active&#8220;][vc_row_inner equal_height=&#8220;yes&#8220; el_class=&#8220;new_hpstyle_section6_maintab_row&#8220;][vc_column_inner el_class=&#8220;image-column&#8220; width=&#8220;1\/2&#8243; css=&#8220;.vc_custom_1607653503563{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_single_image image=&#8220;191689&#8243; img_size=&#8220;590X560&#8243; alignment=&#8220;right&#8220; el_class=&#8220;new_hpstyle_section6_tab1_left_image&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;new_hpstyle_section6_tab1_right_bckgrd&#8220; width=&#8220;1\/2&#8243;][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text1 text&#8220;]\u201eSeit wir CyberArk einsetzen, k\u00f6nnen wir fast f\u00fcnfmal so viele Konten verwalten wie urspr\u00fcnglich.\u201c[\/vc_column_text][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text2&#8243;]Alexa Glynn, Manager Security Integration &#038; Tooling, Global bei <strong>Rabobank International\u200b<\/strong>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/rabobank\/\">Kundenbericht lesen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8220;National Australia Bank&#8220; tab_id=&#8220;national-australia-bank&#8220; el_class=&#8220;new_hpstyle_section6_tab2_icon&#8220;][vc_row_inner equal_height=&#8220;yes&#8220; el_class=&#8220;new_hpstyle_section6_maintab_row&#8220;][vc_column_inner el_class=&#8220;image-column&#8220; width=&#8220;1\/2&#8243; css=&#8220;.vc_custom_1687286224685{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_single_image image=&#8220;128574&#8243; img_size=&#8220;590X560&#8243; alignment=&#8220;right&#8220; el_class=&#8220;new_hpstyle_section6_tab1_left_image&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;new_hpstyle_section6_tab1_right_bckgrd&#8220; width=&#8220;1\/2&#8243;][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text1 text&#8220;]\u201eDie automatisierte, unternehmenstaugliche Privileged Identity Management-L\u00f6sung und das engagierte Team von CyberArk waren entscheidend f\u00fcr den Erfolg unseres komplexen, weltweiten Rollouts. Das Team war in der Lage, die schiere Gr\u00f6\u00dfe und Komplexit\u00e4t des Projekts zu bew\u00e4ltigen und gleichzeitig unsere Anforderungen an eine h\u00f6here Produktivit\u00e4t und Verantwortlichkeit zu erf\u00fcllen.\u201c[\/vc_column_text][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text2&#8243;]Security Manager, <strong>National Australia Bank\u200b<\/strong>[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1724047013074{margin-top: 20px !important;}&#8220; el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/national-australia-bank\/\">Read Customer Story\u200b<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8220;TIAA&#8220; tab_id=&#8220;tiaa&#8220; el_class=&#8220;new_hpstyle_section6_tab3_icon&#8220;][vc_row_inner equal_height=&#8220;yes&#8220; el_class=&#8220;new_hpstyle_section6_maintab_row&#8220;][vc_column_inner el_class=&#8220;image-column&#8220; width=&#8220;1\/2&#8243; css=&#8220;.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_single_image image=&#8220;129822&#8243; img_size=&#8220;590X560&#8243; alignment=&#8220;right&#8220; el_class=&#8220;new_hpstyle_section6_tab1_left_image&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;new_hpstyle_section6_tab1_right_bckgrd&#8220; width=&#8220;1\/2&#8243;][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text1 text&#8220;]\u201eEs war beeindruckend: Wir haben die Anzahl der Anwendungen und Secrets verglichen, die CyberArk Conjur derzeit im Vergleich zu konkurrierenden L\u00f6sungen verwalten kann, und der Kostenvorteil war absolut \u00fcberzeugend.\u201c[\/vc_column_text][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text2&#8243;]Adam Powers, Lead Info Security Engineering Manager, <strong>TIAA\u200b<\/strong>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/tiaa\/\">Read Customer Story\u200b<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8220;Finanzdienstleistungsunternehmen&#8220; tab_id=&#8220;financial-services-firm&#8220; el_class=&#8220;new_hpstyle_section6_tab4_icon&#8220;][vc_row_inner equal_height=&#8220;yes&#8220; el_class=&#8220;new_hpstyle_section6_maintab_row&#8220;][vc_column_inner el_class=&#8220;image-column&#8220; width=&#8220;1\/2&#8243; css=&#8220;.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_single_image image=&#8220;35775&#8243; img_size=&#8220;590X560&#8243; alignment=&#8220;right&#8220; el_class=&#8220;new_hpstyle_section6_tab1_left_image&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;new_hpstyle_section6_tab1_right_bckgrd&#8220; width=&#8220;1\/2&#8243;][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text1 text&#8220;]\u201eInsgesamt hat unser Team sehr von der Nutzerfreundlichkeit und der damit verbundenen Effizienz der CyberArk Privileged Access Manager L\u00f6sung profitiert. Da wir Konten schnell auschecken und viele der damit verbundenen Prozesse automatisieren konnten, konnten wir die manuellen Schritte \u00fcberfl\u00fcssig machen, die traditionell die Produktivit\u00e4t behindern.&#8220;[\/vc_column_text][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text2&#8243;]Security Manager, <strong>Finanzdienstleistungsunternehmen_<\/strong>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/customer-stories\/global-financial-services-firm\/\">Read Customer Story\u200b<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_resources&#8220; css=&#8220;.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8220;][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;no-break&#8220;][vc_column_text el_class=&#8220;no-break&#8220;]<\/p>\n<h3>Verwandte<br \/>\nressourcen<br \/>\nerkunden<\/h3>\n<p>\n[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/all-blog-posts\/securing-a-lifeline-why-identity-security-is-paramount-in-healthcare\">Alle Ressourcen anzeigen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column&#8220;][vc_column el_class=&#8220;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8220;.vc_custom_1721310776257{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;new_hpstyle_section8_uberflip&#8220;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 hero dark&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243; offset=&#8220;vc_col-md-6&#8243;][vc_column_text css=&#8220;&#8220;] CyberArk Identity Security f\u00fcr Finanzdienstleistungen Sicherheit, auf die Sie sich verlassen k\u00f6nnen, um Ihren Erfolg zu sichern. [\/vc_column_text][vc_btn title=&#8220;Webinar ansehen&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220;&#8230;<\/p>\n","protected":false},"author":255,"featured_media":0,"parent":32302,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-198123","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CyberArk Identity Security L\u00f6sungen f\u00fcr Finanzdienstleistungen\u200b<\/title>\n<meta name=\"description\" content=\"Wir kombinieren die Webseiten f\u00fcr Banken und Versicherungen, um eine neue Webseite f\u00fcr Finanzdienstleistungen in unserer neuen Marke zu erstellen.\u200b\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/financial-services\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Finanzdienstleistungen\" \/>\n<meta property=\"og:description\" content=\"Wir kombinieren die Webseiten f\u00fcr Banken und Versicherungen, um eine neue Webseite f\u00fcr Finanzdienstleistungen in unserer neuen Marke zu erstellen.\u200b\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/financial-services\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-04T09:24:26+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"13 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/financial-services\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/financial-services\/\",\"name\":\"CyberArk Identity Security L\u00f6sungen f\u00fcr Finanzdienstleistungen\u200b\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/financial-services\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/financial-services\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/secure-desktop-credential-icon.svg\",\"datePublished\":\"2024-10-07T08:05:26+00:00\",\"dateModified\":\"2025-12-04T09:24:26+00:00\",\"description\":\"Wir kombinieren die Webseiten f\u00fcr Banken und Versicherungen, um eine neue Webseite f\u00fcr Finanzdienstleistungen in unserer neuen Marke zu erstellen.\u200b\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/financial-services\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/financial-services\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/financial-services\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/secure-desktop-credential-icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/secure-desktop-credential-icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/financial-services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L\u00f6sungen f\u00fcr Identity Security\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Finanzdienstleistungen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CyberArk Identity Security L\u00f6sungen f\u00fcr Finanzdienstleistungen\u200b","description":"Wir kombinieren die Webseiten f\u00fcr Banken und Versicherungen, um eine neue Webseite f\u00fcr Finanzdienstleistungen in unserer neuen Marke zu erstellen.\u200b","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/financial-services\/","og_locale":"de_DE","og_type":"article","og_title":"Finanzdienstleistungen","og_description":"Wir kombinieren die Webseiten f\u00fcr Banken und Versicherungen, um eine neue Webseite f\u00fcr Finanzdienstleistungen in unserer neuen Marke zu erstellen.\u200b","og_url":"https:\/\/www.cyberark.com\/solutions\/financial-services\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-12-04T09:24:26+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"13 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/financial-services\/","url":"https:\/\/www.cyberark.com\/solutions\/financial-services\/","name":"CyberArk Identity Security L\u00f6sungen f\u00fcr Finanzdienstleistungen\u200b","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/solutions\/financial-services\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/solutions\/financial-services\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/secure-desktop-credential-icon.svg","datePublished":"2024-10-07T08:05:26+00:00","dateModified":"2025-12-04T09:24:26+00:00","description":"Wir kombinieren die Webseiten f\u00fcr Banken und Versicherungen, um eine neue Webseite f\u00fcr Finanzdienstleistungen in unserer neuen Marke zu erstellen.\u200b","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/financial-services\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/financial-services\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/solutions\/financial-services\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/secure-desktop-credential-icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/04\/secure-desktop-credential-icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/financial-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"L\u00f6sungen f\u00fcr Identity Security","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Finanzdienstleistungen"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/198123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/255"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=198123"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/198123\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32302"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=198123"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=198123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}