{"id":201013,"date":"2025-01-07T02:31:25","date_gmt":"2025-01-07T07:31:25","guid":{"rendered":"https:\/\/www.cyberark.com\/access-management-neu-denken\/"},"modified":"2025-01-07T02:31:31","modified_gmt":"2025-01-07T07:31:31","slug":"reimagine-access-management","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/reimagine-access-management\/","title":{"rendered":"Access-Management neu denken"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 hero dark&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243; offset=&#8220;vc_col-md-6&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h1>Access-Management neu denken<\/h1>\n<h2>Umfassender Schutz vom Endger\u00e4t bis zur Anwendung mit Workforce Identity Security.<\/h2>\n<p>Herk\u00f6mmliche Sicherheitsmodelle versagen. Angreifer wissen das und Sie auch. CyberArk denkt die Zugriffsverwaltung mit mehrschichtigen intelligenten Berechtigungskontrollen neu, die kritische Ressourcen sch\u00fctzen, w\u00e4hrend sich die Bedrohungslandschaft weiterentwickelt. Und das alles, ohne Ihre Belegschaft auszubremsen. Beginnen Sie jetzt, Ihre Zukunft zu sichern. [\/vc_column_text][vc_btn title=&#8220;Demo anfordern&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;&#8220; link=&#8220;url:%23form|title:Demo%20anfordern|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;cybv2 impact-cards column-2&#8243;][vc_row_inner el_class=&#8220;justify-content-center&#8220;][vc_column_inner el_class=&#8220;single-card&#8220; width=&#8220;2\/3&#8243; offset=&#8220;vc_col-sm-offset-2&#8243;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-199646 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/resource-image-hero.jpg\" alt=\"Mann arbeitet am Computer\" width=\"768\" height=\"393\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/resource-image-hero.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/resource-image-hero-300x154.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/resource-image-hero-150x77.jpg 150w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;date&#8220;]Whitepaper[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;location mb-8&#8243;]<\/p>\n<h4>Den Zugriff der Belegschaft mit einer Identity-first-Sicherheitsstrategie neu gestalten<\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right location&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/reimagine-workforce-access-with-an-identity-first-security-strategy\">Das Whitepaper lesen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column cybv2-pad&#8220;][vc_column el_class=&#8220;new_hpstyle_section8_col1 cybv2 cybv2-pad&#8220;][vc_row_inner][vc_column_inner width=&#8220;5\/6&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;py-4&#8243;]<\/p>\n<h3>Das Risiko endet nicht beim Login. Ihre Sicherheit sollte das auch nicht.<\/h3>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_raw_html css=&#8220;.vc_custom_1732169946747{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;new_hpstyle_section8_uberflip&#8220;]PCEtLSBVYmVyZmxpcCBFbWJlZGRlZCBIdWIgV2lkZ2V0IC0tPgoKICA8ZGl2IGlkPSJVZkVtYmVkZGVkSHViMTczMjE2OTkxODA4MSI+PC9kaXY+CgogIDxzY3JpcHQgbm9uY2U9Ijw\/PSAkbm9uY2UgPz4iPgogIHdpbmRvdy5fdWZIdWJDb25maWcgPSB3aW5kb3cuX3VmSHViQ29uZmlnIHx8IFtdOwogIHdpbmRvdy5fdWZIdWJDb25maWcucHVzaCh7CiAgICAnY29udGFpbmVycyc6eydhcHAnOicjVWZFbWJlZGRlZEh1YjE3MzIxNjk5MTgwODEnfSwKICAgICdjb2xsZWN0aW9uJzogJzExOTA4MzkzJywKICAgICdvcGVuTGluayc6ZnVuY3Rpb24odXJsKXsKICAgICAgd2luZG93LnRvcC5sb2NhdGlvbi5ocmVmPXVybDsKICAgIH0sCiAgICAnbGF6eWxvYWRlcic6ewogICAgICAnaXRlbURpc3BsYXlMaW1pdCc6MjAsCiAgICAgICdtYXhUaWxlc1BlclJvdyc6MCwKICAgICAgJ21heEl0ZW1zVG90YWwnOiAwCiAgICB9LAogICAgJ3RpbGVTaXplJzogJ2xhcmdlJywKICAgICdlbmFibGVQYWdlVHJhY2tpbmcnOmZhbHNlLAogICAgJ2Jhc2VVcmwnOiAnaHR0cHM6Ly93d3cuY3liZXJhcmsuY29tL3Jlc291cmNlcy8nLAogICAgJ2ZpbGVzVXJsJzogJ2h0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS9yZXNvdXJjZXMvJywKICAgICdnZW5lcmF0ZWRBdFVUQyc6ICcyMDI0LTExLTIxIDA2OjE4OjIxJywKICB9KTsKICA8L3NjcmlwdD4KCiAgPHNjcmlwdCBub25jZT0iPD89ICRub25jZSA\/PiI+KGZ1bmN0aW9uKGQsdCx1KSB7CiAgICBmdW5jdGlvbiBsb2FkKCl7CiAgICAgIHZhciBzPWQuY3JlYXRlRWxlbWVudCh0KTtzLnNyYz11O2QuYm9keS5hcHBlbmRDaGlsZChzKTsKICAgIH0KICAgIGlmICh3aW5kb3cuYWRkRXZlbnRMaXN0ZW5lcikgewogICAgICB3aW5kb3cuYWRkRXZlbnRMaXN0ZW5lcignbG9hZCcsbG9hZCxmYWxzZSk7CiAgICB9CiAgICBlbHNlIGlmICh3aW5kb3cuYXR0YWNoRXZlbnQpIHsKICAgICAgd2luZG93LmF0dGFjaEV2ZW50KCdvbmxvYWQnLGxvYWQpOwogICAgfQogICAgZWxzZXsKICAgICAgd2luZG93Lm9ubG9hZD1sb2FkOwogICAgfQogIH0oZG9jdW1lbnQsJ3NjcmlwdCcsJ2h0dHBzOi8vd3d3LmN5YmVyYXJrLmNvbS9yZXNvdXJjZXMvaHVic0Zyb250L2VtYmVkX2NvbGxlY3Rpb24nKSk7CiAgPC9zY3JpcHQ+CiAgPCEtLSAvRW5kIFViZXJmbGlwIEVtYmVkZGVkIEh1YiBXaWRnZXQgLS0+[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_html css=&#8220;&#8220;]PGEgY2xhc3M9ImFuY2hvciIgbmFtZT0iZm9ybSI+PC9hPg==[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; css=&#8220;.vc_custom_1609868130755{background-color: #f7f7f7 !important;}&#8220; el_class=&#8220;cybv2 cybv2-pad-top hv-cta&#8220;][vc_column width=&#8220;7\/12&#8243; el_class=&#8220;left-clmn&#8220;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h2>Demo-Anfrage f\u00fcr Workforce Identity Security<\/h2>\n<h5>Bei CyberArk stellen wir den Status quo im Access Management in Frage.<\/h5>\n<p>Unsere L\u00f6sung Workforce Identity Security umfasst wichtige Sicherheitsfunktionen wie MFA, SSO und Lebenszyklusautomatisierung sowie zus\u00e4tzliche Sicherheitsebenen f\u00fcr Endger\u00e4te, Browser, Passw\u00f6rter und Websitzungen, um einen umfassenden Schutz vor identit\u00e4tsbasierten Bedrohungen zu bieten, sowohl vor als auch nach der Authentifizierung.<\/p>\n<p>Entwickelt, um den sich st\u00e4ndig weiterentwickelnden Cyberbedrohungen zu begegnen, indem die Identit\u00e4t jedes Mitarbeiters durch einen ma\u00dfgeschneiderten Zugriff und das richtige Ma\u00df an intelligenten Berechtigungskontrollen auf der Grundlage des Benutzerrisikos gesch\u00fctzt wird. So wird die gesamte Benutzererfahrung gesichert \u2013 von der ersten Anmeldung des Endger\u00e4ts bis zur letzten Sitzungsinteraktion<\/p>\n<p>Verlassen Sie sich nicht nur darauf, was wir sagen. \u00dcberzeugen Sie sich jetzt selbst. Fordern Sie noch heute Ihre pers\u00f6nliche Demo an.[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/12&#8243; css=&#8220;.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}&#8220;][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;right-clmn cybv2-form&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;bold&#8220;]<\/p>\n<h4>Registrieren Sie sich hier f\u00fcr eine pers\u00f6nliche Demo<\/h4>\n<p>[\/vc_column_text][vc_raw_html css=&#8220;&#8220;]W21hcmtldG9fZm9ybSBpZD0iMTMxMzYiIHR5X3BhZ2VfdXJsPSJodHRwczovL3d3dy5jeWJlcmFyay5jb20vdHJ5LWJ1eS90aGFuay15b3Utd29ya2ZvcmNlLWlkZW50aXR5LXNlY3VyaXR5LWRlbW8vIl0=[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 hero dark&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243; offset=&#8220;vc_col-md-6&#8243;][vc_column_text css=&#8220;&#8220;] Access-Management neu denken Umfassender Schutz vom Endger\u00e4t bis zur Anwendung mit Workforce Identity Security. Herk\u00f6mmliche Sicherheitsmodelle versagen. Angreifer wissen das und Sie auch. CyberArk&#8230;<\/p>\n","protected":false},"author":253,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-201013","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Access-Management neu denken | CyberArk<\/title>\n<meta name=\"description\" content=\"Umfassender Schutz vom Endger\u00e4t bis zur Anwendung mit Workforce Identity Security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/reimagine-access-management\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Access-Management neu denken\" \/>\n<meta property=\"og:description\" content=\"Umfassender Schutz vom Endger\u00e4t bis zur Anwendung mit Workforce Identity Security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/reimagine-access-management\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-07T07:31:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/resource-image-hero.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"393\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/reimagine-access-management\/\",\"url\":\"https:\/\/www.cyberark.com\/reimagine-access-management\/\",\"name\":\"Access-Management neu denken | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/reimagine-access-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/reimagine-access-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/resource-image-hero.jpg\",\"datePublished\":\"2025-01-07T07:31:25+00:00\",\"dateModified\":\"2025-01-07T07:31:31+00:00\",\"description\":\"Umfassender Schutz vom Endger\u00e4t bis zur Anwendung mit Workforce Identity Security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/reimagine-access-management\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/reimagine-access-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/reimagine-access-management\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/resource-image-hero.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/resource-image-hero.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/reimagine-access-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Access-Management neu denken\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Access-Management neu denken | CyberArk","description":"Umfassender Schutz vom Endger\u00e4t bis zur Anwendung mit Workforce Identity Security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/reimagine-access-management\/","og_locale":"de_DE","og_type":"article","og_title":"Access-Management neu denken","og_description":"Umfassender Schutz vom Endger\u00e4t bis zur Anwendung mit Workforce Identity Security.","og_url":"https:\/\/www.cyberark.com\/reimagine-access-management\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-01-07T07:31:31+00:00","og_image":[{"width":768,"height":393,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/resource-image-hero.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"7 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/reimagine-access-management\/","url":"https:\/\/www.cyberark.com\/reimagine-access-management\/","name":"Access-Management neu denken | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/reimagine-access-management\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/reimagine-access-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/resource-image-hero.jpg","datePublished":"2025-01-07T07:31:25+00:00","dateModified":"2025-01-07T07:31:31+00:00","description":"Umfassender Schutz vom Endger\u00e4t bis zur Anwendung mit Workforce Identity Security.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/reimagine-access-management\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/reimagine-access-management\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/reimagine-access-management\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/resource-image-hero.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/resource-image-hero.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/reimagine-access-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Access-Management neu denken"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/201013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/253"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=201013"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/201013\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=201013"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=201013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}