{"id":205524,"date":"2024-10-02T15:58:09","date_gmt":"2024-10-02T19:58:09","guid":{"rendered":"https:\/\/www.cyberark.com\/solutions\/managed-service-providers\/"},"modified":"2025-04-03T06:03:02","modified_gmt":"2025-04-03T10:03:02","slug":"managed-service-providers","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/solutions\/managed-service-providers\/","title":{"rendered":"Managed Service Provider"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 hero dark&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h1>CyberArk f\u00fcr Managed Service-Anbieter\u200b<\/h1>\n<p><\/p>\n<h2>Skalierung und Gesch\u00e4ftswachstum mit CyberArk MSP-L\u00f6sungen\u200b\u200b<\/h2>\n<p>\n[\/vc_column_text][vc_btn title=&#8220;Datenblatt herunterladen&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fproduct-datasheets%2Fcyberark-msp-solution|title:Datenblatt%20herunterladen|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-2&#8243; offset=&#8220;vc_hidden-xs&#8220;][vc_single_image image=&#8220;204656&#8243; img_size=&#8220;full&#8220; alignment=&#8220;center&#8220; css=&#8220;.vc_custom_1741326382889{border-radius: 5px !important;}&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad-top overview-icons&#8220; css=&#8220;.vc_custom_1679682470478{background-color: #f7f7f7 !important;}&#8220;][vc_column el_class=&#8220;text-md-center cyb-pad-btm&#8220;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h3>Entdecken Sie die MSP-L\u00f6sungen<\/h3>\n<p>Erfahren Sie mehr \u00fcber die flexible L\u00f6sung von CyberArk f\u00fcr Managed Service Provider \u200b[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"wp-image-144059 aligncenter\" style=\"width: 36px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-3.svg\" alt=\"Symbol \u00dcbersicht\" width=\"36\" height=\"36\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 style=\"text-align: center;\"><span class=\"TextRun BCX0 SCXP7953244\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP7953244\">Zentralisiertes Management und <\/span><\/span><span class=\"TextRun BCX0 SCXP7953244\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP7953244\">Governance<\/span><\/span><\/h4>\n<p><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun BCX0 SCXP206533491\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP206533491\">Einheitliche Verwaltung aller <\/span><\/span><span class=\"TextRun BCX0 SCXP206533491\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP206533491\">Client-Umgebungen <\/span><\/span>und <span class=\"TextRun BCX0 SCXP206533491\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP206533491\">Lizenzen \u00fcber ein <\/span><\/span><span class=\"TextRun BCX0 SCXP206533491\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP206533491\">zentrales Portal. <\/span><\/span><\/p>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"wp-image-144051 size-medium aligncenter\" style=\"width: 36px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-2.svg\" alt=\"\" width=\"300\" height=\"300\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 style=\"text-align: center;\"><span class=\"TextRun SCXP207810095 BCX0\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP207810095 BCX0\">Optimierte Servicelieferung<\/span><\/span><\/h4>\n<p><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun BCX0 SCXP51829789\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP51829789\">Verbesserte Betriebseffizienz <\/span><\/span><span class=\"TextRun BCX0 SCXP51829789\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP51829789\">mit automatisierten Prozessen und <\/span><\/span><span class=\"TextRun BCX0 SCXP51829789\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP51829789\">genauer <\/span><\/span><span class=\"TextRun BCX0 SCXP51829789\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP51829789\">Berichterstattung \u00fcber<\/span><\/span> das<span class=\"TextRun BCX0 SCXP51829789\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP51829789\"> Programm f\u00fcr Identity Security<\/span><\/span><span class=\"TextRun BCX0 SCXP51829789\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP51829789\"> eines <\/span><\/span><span class=\"TextRun BCX0 SCXP51829789\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP51829789\"><\/span><\/span> <span class=\"TextRun BCX0 SCXP51829789\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP51829789\">Kunden.<\/span><\/span><\/p>\n<p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"wp-image-144043 size-medium aligncenter\" style=\"width: 36px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-1.svg\" alt=\"\" width=\"300\" height=\"300\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 style=\"text-align: center;\"><span class=\"TextRun BCX0 SCXP234840141\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX0 SCXP234840141\">Verbesserte Sicherheit und Skalierbarkeit<\/span><\/span><\/h4>\n<p><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXP54661066 BCX0\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP54661066 BCX0\">Verbessern Sie die Sicherheit f\u00fcr Endkunden mit <\/span><\/span><span class=\"TextRun SCXP54661066 BCX0\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP54661066 BCX0\">effizientem Session-Monitoring und <\/span><\/span><span class=\"TextRun SCXP54661066 BCX0\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP54661066 BCX0\">-Management. Leitlinien und Best <\/span><\/span><span class=\"TextRun SCXP54661066 BCX0\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP54661066 BCX0\">Practices zur Erreichung der Ziele des Programms f\u00fcr Identity Security bereitstellen.<\/span><\/span><\/p>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 cybv2_customer_stories vc_tta-o-non-responsive cyb-pad-top&#8220; css=&#8220;.vc_custom_1701205658071{background-color: #ffffff !important;}&#8220;][vc_column][vc_tta_tabs style=&#8220;flat&#8220; shape=&#8220;square&#8220; color=&#8220;white&#8220; spacing=&#8220;&#8220; gap=&#8220;20&#8243; alignment=&#8220;center&#8220; active_section=&#8220;&#8220; el_class=&#8220;cybv2_customer_stories_tabs&#8220; css=&#8220;.vc_custom_1703194702840{background-color: #ffffff !important;}&#8220;][vc_tta_section title=&#8220;Deloitte&#8220; tab_id=&#8220;cisco&#8220; el_class=&#8220;new_hpstyle_section6_tab1_icon vc_active&#8220;][vc_row_inner equal_height=&#8220;yes&#8220; el_class=&#8220;new_hpstyle_section6_maintab_row&#8220;][vc_column_inner el_class=&#8220;image-column&#8220; width=&#8220;1\/2&#8243; css=&#8220;.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_single_image image=&#8220;194536&#8243; img_size=&#8220;full&#8220; alignment=&#8220;right&#8220; css=&#8220;&#8220; el_class=&#8220;new_hpstyle_section6_tab1_left_image&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;new_hpstyle_section6_tab1_right_bckgrd&#8220; width=&#8220;1\/2&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;new_hpstyle_section6_tab1_text1 text&#8220;]\u201eIn der heutigen digital vernetzten Welt ist die Wahl des richtigen MSP \u00e4hnlich wie die Auswahl eines vertrauensw\u00fcrdigen Beraters f\u00fcr Ihre Gesch\u00e4ftst\u00e4tigkeit. Diese Entscheidung wirkt sich nicht nur auf die Effizienz Ihrer t\u00e4glichen Gesch\u00e4ftst\u00e4tigkeit aus, sondern auch auf Ihre Widerstandsf\u00e4higkeit gegen\u00fcber der sich st\u00e4ndig weiterentwickelnden Landschaft der Bedrohungen f\u00fcr Cybersecurity.\u00a0<a href=\"https:\/\/www.deloitte.com\/global\/en\/services\/risk-advisory\/services\/digital-identity-by-deloitte.html\" target=\"_blank\" rel=\"noopener\">Digital Identity von Deloitte<\/a>, unsere vollst\u00e4ndig verwaltete L\u00f6sung f\u00fcr Identity Security, reduziert in Kombination mit den CyberArk MSP-L\u00f6sungen <span class=\"TextRun Highlight SCXP193857762 BCX0\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP193857762 BCX0\">die Wartungszeiten und -kosten f\u00fcr das Management der Identity Security<\/span><\/span> erheblich, so dass wir uns auf die Einf\u00fchrung von Vorteilen der Identity Security auf neuen und breiteren M\u00e4rkten konzentrieren k\u00f6nnen.\u201c[\/vc_column_text][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text2&#8243;]Jan Vanhaecht, Global Digital Identity Leader bei <strong>Deloitte<\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8220;Optiv&#8220; tab_id=&#8220;tiaa&#8220; el_class=&#8220;new_hpstyle_section6_tab2_icon&#8220;][vc_row_inner equal_height=&#8220;yes&#8220; el_class=&#8220;new_hpstyle_section6_maintab_row&#8220;][vc_column_inner el_class=&#8220;image-column&#8220; width=&#8220;1\/2&#8243; css=&#8220;.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_single_image image=&#8220;194545&#8243; img_size=&#8220;full&#8220; alignment=&#8220;right&#8220; css=&#8220;&#8220; el_class=&#8220;new_hpstyle_section6_tab1_left_image&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;new_hpstyle_section6_tab1_right_bckgrd&#8220; width=&#8220;1\/2&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;new_hpstyle_section6_tab1_text1 text&#8220;]\u201eIn der heutigen digital vernetzten Welt ist die Wahl des richtigen MSP \u00e4hnlich wie die Auswahl eines vertrauensw\u00fcrdigen Beraters f\u00fcr Ihre Gesch\u00e4ftst\u00e4tigkeit. Diese Entscheidung wirkt sich nicht nur auf die Effizienz Ihrer t\u00e4glichen Gesch\u00e4ftst\u00e4tigkeit aus, sondern auch auf Ihre Widerstandsf\u00e4higkeit gegen\u00fcber der sich st\u00e4ndig weiterentwickelnden Landschaft der Bedrohungen f\u00fcr Cybersecurity. Durch die Implementierung der CyberArk MSP-<span class=\"TextRun Highlight SCXP193857762 BCX0\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP193857762 BCX0\">L\u00f6sungen<\/span><\/span> k\u00f6nnen wir die Wartungszeiten deutlich reduzieren, unsere Effizienz erheblich steigern und uns auf die Bereitstellung der Vorteile der Identity Security f\u00fcr jeden unserer Partnerkunden konzentrieren.\u201c[\/vc_column_text][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text2&#8243;]Micheal Steele, Senior Security Operations Manager, <strong>Optiv.<\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8220;blueAPACHE&#8220; tab_id=&#8220;capcom&#8220; el_class=&#8220;new_hpstyle_section6_tab3&#8243;][vc_row_inner equal_height=&#8220;yes&#8220; el_class=&#8220;new_hpstyle_section6_maintab_row&#8220;][vc_column_inner el_class=&#8220;image-column&#8220; width=&#8220;1\/2&#8243; css=&#8220;.vc_custom_1607653500231{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_single_image image=&#8220;194733&#8243; img_size=&#8220;full&#8220; alignment=&#8220;right&#8220; css=&#8220;&#8220; el_class=&#8220;new_hpstyle_section6_tab1_left_image&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;new_hpstyle_section6_tab1_right_bckgrd&#8220; width=&#8220;1\/2&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;new_hpstyle_section6_tab1_text1 text&#8220;]\u201eIn der jetzigen \u00c4ra, die von der beschleunigten technologischen Entwicklung und der anhaltenden Bedrohung durch zunehmende Cyberangriffe gepr\u00e4gt ist, ist die Auswahl des richtigen MSP-Partners von entscheidender Bedeutung f\u00fcr die Sicherheit der t\u00e4glichen Gesch\u00e4ftst\u00e4tigkeit. Die richtige L\u00f6sung wird zu einem vertrauensw\u00fcrdigen Berater f\u00fcr Ihren Gesch\u00e4ftsbetrieb, der Ihre wichtigsten Ressourcen sch\u00fctzt und Ihre Abwehrkr\u00e4fte gegen die dynamische Landschaft digitaler Risiken st\u00e4rkt. Bei blueAPACHE haben wir die CyberArk MSP-L\u00f6sungen <span class=\"TextRun Highlight SCXP193857762 BCX0\" data-scheme-color=\"@0C1E37,,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP193857762 BCX0\"> <\/span><\/span>in unser Serviceangebot integriert und erhebliche Verbesserungen bei Zeitmanagement, Skalierbarkeit und Betriebseffizienz erzielt, um die wichtigsten Ressourcen unserer Kunden zu sch\u00fctzen.\u201c[\/vc_column_text][vc_column_text el_class=&#8220;new_hpstyle_section6_tab1_text2&#8243;]Michael Zuppa, General Manager \u2013 Technology,\u00a0<strong>blueAPACHE<\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][vc_raw_js]JTNDc2NyaXB0JTNFJTBBalF1ZXJ5JTI4ZG9jdW1lbnQlMjkucmVhZHklMjhmdW5jdGlvbiUyOCUyOSU3QiUwQSUyMCUyMCUyMCUyMCUyRiUyRkFkZCUyMEFjdGl2ZSUyMHRvJTIwdGFiJTIwb24lMjBwYWdlJTIwbG9hZCUwQSUyMCUyMCUyMCUyMCUyNHBhbmVscyUyMCUzRCUyMGpRdWVyeSUyOCUyNy5jeWJ2Ml9jdXN0b21lcl9zdG9yaWVzX3RhYnMlMjAudmNfdHRhLXBhbmVscyUyMC52Y190dGEtcGFuZWwlMjclMjklM0IlMEElMjAlMjAlMjAlMjAlMjR0YWJzJTIwJTNEJTIwalF1ZXJ5JTI4JTI3LmN5YnYyX2N1c3RvbWVyX3N0b3JpZXNfdGFicyUyMC52Y190dGEtdGFicy1saXN0JTIwLnZjX3R0YS10YWIlMjclMjklM0IlMEElMjAlMjAlMjAlMjB2YXIlMjBpbmRleCUyMCUzRCUyMDAlM0IlMEElMEElMjAlMjAlMjAlMjAlMkYlMkZBbGlnbiUyMFRhYnMlMjB3aXRoJTIwcGFuZWxzJTBBJTIwJTIwJTIwJTIwJTI0cGFuZWxzLmVhY2glMjhmdW5jdGlvbiUyOCUyOSU3QiUwQSUyMCUyMCUyMCUyMCUyMCUyMCUyMCUyMGpRdWVyeSUyOHRoaXMlMjkuaGFzQ2xhc3MlMjglMjd2Y19hY3RpdmUlMjclMjklM0IlMEElMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjByZXR1cm4lMjBmYWxzZSUzQiUwQSUyMCUyMCUyMCUyMCUyMCUyMCUyMCUyMGluZGV4JTJCJTJCJTNCJTBBJTIwJTIwJTIwJTIwJTdEJTI5JTBBJTIwJTIwJTIwJTIwdmFyJTIwbmV3SW5kZXglMjAlM0QlMjAwJTNCJTBBJTIwJTIwJTIwJTIwJTI0dGFicy5lYWNoJTI4ZnVuY3Rpb24lMjglMjklN0IlMEElMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjBpZiUyOGluZGV4JTIwJTNEJTNEJTIwbmV3SW5kZXglMjklN0IlMEElMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjAlMjBqUXVlcnklMjh0aGlzJTI5LmFkZENsYXNzJTI4JTI3dmNfYWN0aXZlJTI3JTI5JTNCJTBBJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTdEJTBBJTIwJTIwJTIwJTIwJTIwJTIwJTIwJTIwbmV3SW5kZXglMkIlMkIlM0IlMEElMjAlMjAlMjAlMjAlN0QlMjklMEElN0QlMjklM0IlMEElM0MlMkZzY3JpcHQlM0U=[\/vc_raw_js][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]JTNDc2NyaXB0JTNFJTBBaWYlMjAlMjhqUXVlcnklMjh3aW5kb3clMjkud2lkdGglMjglMjklMjAlM0MlMjA3NjglMjklMjAlN0IlMEFqUXVlcnklMjglMjIudG91ciUyMC52Y190dGEtcGFuZWwtaGVhZGluZyUyMiUyOS5vbiUyOCUyMmNsaWNrJTIyJTJDZnVuY3Rpb24lMjglMjklMjAlN0IlMEElMDklMEElMDlpZiUyOGpRdWVyeSUyOHRoaXMlMjkuY2xvc2VzdCUyOCUyMi52Y190dGEtcGFuZWwlMjIlMjkuaGFzQ2xhc3MlMjglMjJ2Y19hY3RpdmUlMjIlMjklMjklN0IlMEElMDklMDklMEElMDklMDlzZXRUaW1lb3V0JTI4ZnVuY3Rpb24lMjglMjklN0IlMEElMDklMDklMDlqUXVlcnklMjglMjIudG91ciUyMC52Y190dGEtcGFuZWwlMjIlMjkucmVtb3ZlQ2xhc3MlMjglMjJ2Y19hY3RpdmUlMjIlMjklM0IlMjAlMEElMDklMDklN0QlMkMxMDAlMjklMEElMDklMDklMEElMDklMDlyZXR1cm4lMjBmYWxzZSUzQiUwQSUwOSU3RCUwQSU3RCUyOSUzQiUwQSU3RCUwQSUwQWpRdWVyeSUyOCUyMi50b3VyJTIwLnZjX3R0YS1wYW5lbCUyMC53cGJfdGV4dF9jb2x1bW4lMjBhJTIyJTI5LmNsaWNrJTI4ZnVuY3Rpb24lMjhlJTI5JTIwJTdCJTBBJTIwJTIwJTIwJTJGJTJGJTIwRG8lMjBzb21ldGhpbmclMEElMjAlMjAlMjBlLnN0b3BQcm9wYWdhdGlvbiUyOCUyOSUzQiUwQSU3RCUyOSUzQiUwQSUzQyUyRnNjcmlwdCUzRQ==[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; css=&#8220;.vc_custom_1733233028486{background-color: #f7f7f7 !important;}&#8220; el_class=&#8220;cybv2 cybv2-pad-paragraph&#8220;][vc_column width=&#8220;5\/6&#8243; offset=&#8220;vc_col-lg-offset-2 vc_col-lg-8&#8243; el_class=&#8220;text-md-center&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;text-md-center&#8220;]<\/p>\n<h3>Mit CyberArk k\u00f6nnen MSPs ihren Betrieb skalieren und dabei kosteng\u00fcnstig und effizient bleiben.\u200b<\/h3>\n<p>Die L\u00f6sungen bieten MSPs eine zentralisierte Ansicht ihrer verwalteten CyberArk Umgebungen und erm\u00f6glichen eine einheitliche Kontrolle \u00fcber alle Instanzen hinweg. Die L\u00f6sungen erm\u00f6glichen <strong>Governance<\/strong>, das Management von Client-Umgebungen, Lizenzen sowie Automatisierung. <strong>Die Bereitstellung<\/strong> erm\u00f6glicht ein rationalisiertes, sicheres Onboarding und die Wartung von Konten. <strong>Betrieb mit<\/strong> Single-Sign-On, zentraler Suche, \u00dcberwachung von Komponenten, Verwaltung von Audits und Protokollen.\u200b[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 paragraph-cta-list&#8220; css=&#8220;.vc_custom_1622730232307{background-color: #f7f7f7 !important;}&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;stat-column border-col&#8220; css=&#8220;.vc_custom_1734014475267{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220; offset=&#8220;vc_col-sm-offset-0&#8243;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-125619 size-thumbnail\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/remote-work-icon.svg\" alt=\"Symbol Remote-Arbeit\" width=\"150\" height=\"150\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>Sichern Sie Ihr Unternehmen mit den MSP-Partnern von CyberArk\u200b<\/h4>\n<p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; offset=&#8220;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;list-text&#8220;]Reduzieren Sie Kosten und technischen Overhead mit einem unserer MSP-Partner.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; offset=&#8220;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;list-text&#8220;]Profitieren Sie von CyberArks f\u00fchrenden L\u00f6sungen f\u00fcr Identity Security.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; offset=&#8220;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;list-text&#8220;]Sch\u00fctzen Sie Ihre Umgebungen und wichtigen Ressourcen und verhindern Sie Sicherheitsrisiken. [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_btn title=&#8220;Demo anfordern&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Frequest-demo%2F|title:Demo%20anfordern|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;stat-column border-col&#8220;][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-126829 size-thumbnail\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/bulb-icon.svg\" alt=\"Nachhaltige B\u00fcrol\u00f6sungen\" width=\"150\" height=\"150\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>Nehmen Sie am CyberArk MSP-Programm teil\u200b<\/h4>\n<p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; offset=&#8220;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;list-text&#8220;]Skalieren Sie Ihr Unternehmen mit den f\u00fchrenden L\u00f6sungen f\u00fcr Identity Security von CyberArk.\u200b<br \/>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; offset=&#8220;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;list-text&#8220;]Optimieren Sie die Betriebseffizienz mit zentralisiertem Kundenmanagement und Transparenz.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; offset=&#8220;vc_col-sm-offset-0&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;list-text&#8220;]Reduzieren Sie Overhead, Wartungszeit und Kosten durch Automatisierung.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; offset=&#8220;vc_col-sm-offset-0&#8243;][vc_btn title=&#8220;Jetzt teilnehmen&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fpartners%2Fbecome-a-partner%2F|title:%20Jetzt%20teilnehmen%E2%80%8B|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_resources&#8220; css=&#8220;.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8220;][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;no-break&#8220;][vc_column_text el_class=&#8220;no-break&#8220;]<\/p>\n<h3>Verwandte<br \/>\nRessourcen<br \/>\nerkunden<\/h3>\n<p>\n[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/resources\/\">Alle Ressourcen anzeigen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243;][\/vc_column][vc_column width=&#8220;1\/3&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column&#8220;][vc_column el_class=&#8220;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8220;.vc_custom_1720763936471{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;new_hpstyle_section8_uberflip&#8220;]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[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 hero dark&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243;][vc_column_text css=&#8220;&#8220;] CyberArk f\u00fcr Managed Service-Anbieter\u200b Skalierung und Gesch\u00e4ftswachstum mit CyberArk MSP-L\u00f6sungen\u200b\u200b [\/vc_column_text][vc_btn title=&#8220;Datenblatt herunterladen&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fproduct-datasheets%2Fcyberark-msp-solution|title:Datenblatt%20herunterladen|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-2&#8243; offset=&#8220;vc_hidden-xs&#8220;][vc_single_image image=&#8220;204656&#8243; img_size=&#8220;full&#8220; alignment=&#8220;center&#8220;&#8230;<\/p>\n","protected":false},"author":253,"featured_media":0,"parent":32302,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-205524","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Managed Service Provider | CyberArk<\/title>\n<meta name=\"description\" content=\"Ein einziger Punkt f\u00fcr die Verwaltung von Managed Service Providers (MSPs), um \u00fcber ein einheitliches Portal auf die Umgebung ihres Kunden zuzugreifen, einschlie\u00dflich Telemetrie-, Berichts- und Bereitstellungsfunktionen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/de\/solutions\/managed-service-providers\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managed Service Provider\" \/>\n<meta property=\"og:description\" content=\"Ein einziger Punkt f\u00fcr die Verwaltung von Managed Service Providers (MSPs), um \u00fcber ein einheitliches Portal auf die Umgebung ihres Kunden zuzugreifen, einschlie\u00dflich Telemetrie-, Berichts- und Bereitstellungsfunktionen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/de\/solutions\/managed-service-providers\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-03T10:03:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-3.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/de\/solutions\/managed-service-providers\/\",\"url\":\"https:\/\/www.cyberark.com\/de\/solutions\/managed-service-providers\/\",\"name\":\"Managed Service Provider | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/solutions\/managed-service-providers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/solutions\/managed-service-providers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-3.svg\",\"datePublished\":\"2024-10-02T19:58:09+00:00\",\"dateModified\":\"2025-04-03T10:03:02+00:00\",\"description\":\"Ein einziger Punkt f\u00fcr die Verwaltung von Managed Service Providers (MSPs), um \u00fcber ein einheitliches Portal auf die Umgebung ihres Kunden zuzugreifen, einschlie\u00dflich Telemetrie-, Berichts- und Bereitstellungsfunktionen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/solutions\/managed-service-providers\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/de\/solutions\/managed-service-providers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/de\/solutions\/managed-service-providers\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-3.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-3.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/de\/solutions\/managed-service-providers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L\u00f6sungen f\u00fcr Identity Security\",\"item\":\"https:\/\/www.cyberark.com\/de\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Managed Service Provider\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/de\/#website\",\"url\":\"https:\/\/www.cyberark.com\/de\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/de\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Managed Service Provider | CyberArk","description":"Ein einziger Punkt f\u00fcr die Verwaltung von Managed Service Providers (MSPs), um \u00fcber ein einheitliches Portal auf die Umgebung ihres Kunden zuzugreifen, einschlie\u00dflich Telemetrie-, Berichts- und Bereitstellungsfunktionen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/de\/solutions\/managed-service-providers\/","og_locale":"de_DE","og_type":"article","og_title":"Managed Service Provider","og_description":"Ein einziger Punkt f\u00fcr die Verwaltung von Managed Service Providers (MSPs), um \u00fcber ein einheitliches Portal auf die Umgebung ihres Kunden zuzugreifen, einschlie\u00dflich Telemetrie-, Berichts- und Bereitstellungsfunktionen.","og_url":"https:\/\/www.cyberark.com\/de\/solutions\/managed-service-providers\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-04-03T10:03:02+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-3.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"7 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/de\/solutions\/managed-service-providers\/","url":"https:\/\/www.cyberark.com\/de\/solutions\/managed-service-providers\/","name":"Managed Service Provider | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/de\/solutions\/managed-service-providers\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/de\/solutions\/managed-service-providers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-3.svg","datePublished":"2024-10-02T19:58:09+00:00","dateModified":"2025-04-03T10:03:02+00:00","description":"Ein einziger Punkt f\u00fcr die Verwaltung von Managed Service Providers (MSPs), um \u00fcber ein einheitliches Portal auf die Umgebung ihres Kunden zuzugreifen, einschlie\u00dflich Telemetrie-, Berichts- und Bereitstellungsfunktionen.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/de\/solutions\/managed-service-providers\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/de\/solutions\/managed-service-providers\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/de\/solutions\/managed-service-providers\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-3.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/05\/overview-img-3.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/de\/solutions\/managed-service-providers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/de\/"},{"@type":"ListItem","position":2,"name":"L\u00f6sungen f\u00fcr Identity Security","item":"https:\/\/www.cyberark.com\/de\/solutions\/"},{"@type":"ListItem","position":3,"name":"Managed Service Provider"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/de\/#website","url":"https:\/\/www.cyberark.com\/de\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/de\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/205524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/253"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=205524"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/205524\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32302"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=205524"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=205524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}