{"id":209134,"date":"2025-04-30T16:46:36","date_gmt":"2025-04-30T20:46:36","guid":{"rendered":"https:\/\/www.cyberark.com\/?page_id=209134"},"modified":"2025-07-10T17:41:07","modified_gmt":"2025-07-10T21:41:07","slug":"passwordless","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/products\/passwordless\/","title":{"rendered":"Passwortlos"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 int-hero dark&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243; offset=&#8220;vc_col-md-6&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h1>Passwortloses Erlebnis<\/h1>\n<h2>Transformieren Sie die Unternehmenssicherheit und Mitarbeiterproduktivit\u00e4t mit einem durchg\u00e4ngig passwortlosen Erlebnis, das \u00fcber die herk\u00f6mmliche Authentifizierung hinausgeht.<\/h2>\n<p>[\/vc_column_text][vc_btn title=&#8220;E-Book herunterladen&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Febooks%2Fstreamline-your-passwordless-journey-with-cyberark|title:Jetzt%20lesen|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-2&#8243;][vc_single_image image=&#8220;205230&#8243; img_size=&#8220;full&#8220; alignment=&#8220;center&#8220; css=&#8220;&#8220;][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 dark stat-component&#8220;][vc_column][vc_row_inner el_class=&#8220;heading&#8220;][vc_column_inner width=&#8220;11\/12&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h3><span style=\"color: #d6f77a;\">Passw\u00f6rter sind mehr als nur ein Sicherheitsrisiko<\/span> \u2013 sie sind eine kostspielige und ineffiziente Belastung f\u00fcr IT-Teams und Mitarbeiter.<\/h3>\n<p>Von Phishing-Angriffen bis hin zu st\u00e4ndigen Resets und Kontensperren\u00a0\u2013 die passwortbasierte Authentifizierung schafft Schwachstellen, verbraucht Ressourcen und behindert die Produktivit\u00e4t.\u00a0[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8220;progress-component&#8220;][vc_column_inner width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-4&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;text-lg&#8220;]<\/p>\n<h2>70%<\/h2>\n<p>der Sicherheitsverletzungen sind mit Phishing und kompromittierten Anmeldedaten verbunden[\/vc_column_text][vc_raw_html css=&#8220;&#8220;]PGRpdiBjbGFzcz0icHJvZ3Jlc3MtYmFyLWNvbnRhaW5lciI+CiAgPGRpdiBjbGFzcz0icHJvZ3Jlc3MtYmFyIHByb2dyZXNzLWJhci1wdXJwbGUiIGRhdGEtcGVyY2VudGFnZT0iNzAiPjwvZGl2Pgo8L2Rpdj4=[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-4&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;text-lg&#8220;]<\/p>\n<h2>50%<\/h2>\n<p>aller Helpdesk-Anrufe sind Passwortr\u00fccksetzungen, mit durchschnittlichen Kosten von 70 US-Dollar pro R\u00fccksetzung[\/vc_column_text][vc_raw_html css=&#8220;&#8220;]PGRpdiBjbGFzcz0icHJvZ3Jlc3MtYmFyLWNvbnRhaW5lciI+CiAgPGRpdiBjbGFzcz0icHJvZ3Jlc3MtYmFyIHByb2dyZXNzLWJhci1ncmVlbiIgZGF0YS1wZXJjZW50YWdlPSI1MCI+PC9kaXY+CjwvZGl2Pg==[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-4&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;text-lg&#8220;]<\/p>\n<h2>346 US-Dollar<\/h2>\n<p>Durchschnittliche j\u00e4hrliche Kosten f\u00fcr das Aufheben von Kontosperren pro Mitarbeiter, eine versteckte Kostenfalle[\/vc_column_text][vc_raw_html css=&#8220;&#8220;]PGRpdiBjbGFzcz0icHJvZ3Jlc3MtYmFyLWNvbnRhaW5lciI+CiAgPGRpdiBjbGFzcz0icHJvZ3Jlc3MtYmFyIHByb2dyZXNzLWJhci1ibHVlIiBkYXRhLXBlcmNlbnRhZ2U9IjM0Ij48L2Rpdj4KPC9kaXY+Cg==[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad overview-vt&#8220; css=&#8220;.vc_custom_1701205350215{background-color: #f7f7f7 !important;}&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;head-box&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h3>Die n\u00e4chste \u00c4ra der Arbeit beginnt passwortlos<\/h3>\n<p>Das Vertrauen auf Passw\u00f6rter zum Schutz vor modernen Bedrohungen geh\u00f6rt der Vergangenheit an. Erleben Sie die Zukunft der Cybersicherheit mit integrierter Sicherheit vom Endger\u00e4t bis zur Anwendung, die einen konsistenten Schutz und ein nahtloses Erlebnis gew\u00e4hrleistet.[\/vc_column_text][vc_single_image image=&#8220;208413&#8243; img_size=&#8220;full&#8220; css=&#8220;&#8220; el_class=&#8220;pt-6&#8243;][\/vc_column][vc_column width=&#8220;1\/2&#8243;][vc_row_inner][vc_column_inner el_class=&#8220;cta-box&#8220;][vc_column_text css=&#8220;&#8220;]<img decoding=\"async\" class=\"alignnone size-full wp-image-121784\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/ITsecurity-Icon.svg\" alt=\"CyberArk Red Team Services\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>Anmeldedatenbasierte Bedrohungen beseitigen<\/h4>\n<p>Nutzen Sie modernste Methoden wie Biometrie, FIDO2-Hardware-Token und Passkeys, um Phishing-, Brute-Force- und Credential-Stuffing-Angriffe abzuwehren.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;cta-box&#8220;][vc_column_text css=&#8220;&#8220;]<img decoding=\"async\" class=\"alignnone size-full wp-image-135019\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/10\/bolt-icon.svg\" alt=\"Symbol Blitz\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>Mitarbeiter effizient arbeiten lassen<\/h4>\n<p>Vermeiden Sie das l\u00e4stige R\u00fccksetzen von Passw\u00f6rtern und steigern Sie die Produktivit\u00e4t durch ein reibungsloses, intuitives Nutzererlebnis.\u00a0\u00a0[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;cta-box&#8220;][vc_column_text css=&#8220;&#8220;]<img decoding=\"async\" class=\"alignnone size-full wp-image-119709\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/increased-automation.svg\" alt=\"Gesteigerte Automatisierung\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220;]<\/p>\n<h4>IT-Abl\u00e4ufe rationalisieren<\/h4>\n<p>Automatisieren Sie das Identity Management und senken Sie Helpdesk-Kosten, damit Sie IT-Ressourcen f\u00fcr strategische Sicherheitsinitiativen freisetzen k\u00f6nnen.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;seesaw-v2 cybv2-pad-120 cyb-reverse cybv2&#8243;][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;column&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;pb-8&#8243;]<\/p>\n<h3>Einheitlicher Zugriff \u00fcber alle Apps hinweg<\/h3>\n<p><strong>Bieten Sie ein nahtloses passwortloses Erlebnis \u00fcber alle Apps hinweg<\/strong><\/p>\n<p>Erweitern Sie den passwortlosen Zugriff auf Legacy-, On-Premises- und anwenderspezifische Apps und sorgen Sie so f\u00fcr konsistente Sicherheit in Hybridumgebungen.[\/vc_column_text][vc_btn title=&#8220;Mehr erfahren&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fproducts%2Fworkforce-password-management%2F|title:Mehr%20erfahren|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][vc_column width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-offset-1&#8243;][vc_single_image image=&#8220;205257&#8243; img_size=&#8220;full&#8220; css=&#8220;&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;seesaw-v2 cybv2&#8243;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;d-flex align-items-start&#8220;][vc_single_image image=&#8220;208188&#8243; img_size=&#8220;full&#8220; css=&#8220;&#8220;][\/vc_column][vc_column width=&#8220;5\/12&#8243; offset=&#8220;vc_col-lg-offset-1&#8243; el_class=&#8220;column&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;pb-8&#8243;]<\/p>\n<h3>Kontinuierliche Authentifizierung<\/h3>\n<p><strong>Stellen sie ein durchg\u00e4ngiges passwortloses Erlebnis bereit<\/strong><\/p>\n<p>Nutzen Sie dynamische Risikosignale, die Zugriffe in jeder Phase sch\u00fctzen\u00a0\u2013 vor, w\u00e4hrend und nach dem Login\u00a0\u2013 unterst\u00fctzt durch die einheitliche Identity Security-Plattform von CyberArk.[\/vc_column_text][vc_btn title=&#8220;Mehr erfahren&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fsolutions%2Fsecure-your-workforce%2F|title:Mehr%20erfahren|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;seesaw-v2 cybv2-pad-120 cyb-reverse cybv2&#8243;][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;column&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;pb-8&#8243;]<\/p>\n<h3>In Aktion erleben<\/h3>\n<p><strong>Mitarbeiterzugriffe transformieren\u00a0<\/strong><\/p>\n<p>Verbessern Sie die Sicherheit und Produktivit\u00e4t Ihrer Mitarbeiter mit phishing-resistenten Methoden zur passwortlosen Authentifizierung.[\/vc_column_text][vc_btn title=&#8220;Demo ansehen&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;&#8220; custom_onclick=&#8220;true&#8220; el_class=&#8220;cybv2-button-solid&#8220; custom_onclick_code=&#8220;Storylane.Play({type: &#8218;popup&#8216;, demo_type: &#8218;image&#8216;, width: 1538, height: 923, scale: &#8218;0.95&#8216;, demo_url: &#8218; https:\/\/app.storylane.io\/share\/yjwj0bkmbhw9?embed=popup&#8216; , padding_bottom: &#8218;calc(60.01% + 25px)&#8216;})&#8220; link=&#8220;url:%23|&#8220;][\/vc_column][vc_column width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-offset-1&#8243;][vc_single_image image=&#8220;208953&#8243; img_size=&#8220;full&#8220; css=&#8220;&#8220;][\/vc_column][\/vc_row][vc_row el_class=&#8220;dark blue-border cybv2 cybv2-pad info-graphic&#8220;][vc_column][vc_row_inner][vc_column_inner width=&#8220;2\/3&#8243; offset=&#8220;vc_col-sm-offset-2&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;text-md-center head-box&#8220;]<\/p>\n<h3>Methoden passwortloser Authentifizierung<\/h3>\n<p>Verbessern Sie die Einf\u00fchrung passwortloser Authentifizierung in Ihrem Unternehmen durch Unterst\u00fctzung verschiedener Authentifizierungsmethoden, die f\u00fcr verschiedene Arten von Nutzern und Anwendungsf\u00e4llen geeignet sind.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8220;5\/6&#8243; offset=&#8220;vc_col-lg-offset-1&#8243;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-208179\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/diagram2.svg\" alt=\"Diagramm\" width=\"1084\" height=\"616\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 cybv2-pad quote-component white&#8220; css=&#8220;.vc_custom_1737658121182{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/01\/blue-dota-background.jpg?id=201917) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;img-box&#8220; css=&#8220;.vc_custom_1745605319552{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/04\/hengstyle-cs-img.jpg?id=208251) !important;}&#8220;][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;content-column&#8220;][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-201899\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/01\/double-quotes.svg\" alt=\"double quotes\" width=\"87\" height=\"64\" \/><\/p>\n<h4>CyberArk MFA erm\u00f6glicht uns in Kombination mit CyberArk SSO, unseren Mitarbeitern passwortlosen Zugriff zu bieten. Indem wir die Notwendigkeit, Passw\u00f6rter zu merken und einzugeben, eliminieren, verbessern wir das Nutzererlebnis, reduzieren das Risiko von Identity Theft und vereinfachen das Identit\u00e4tsmanagement.&#8220;<\/h4>\n<p><strong>Timo Lu<\/strong>, Head of Information Technology Heng Leong Hang[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad-top overview-hz&#8220; css=&#8220;.vc_custom_1745277941190{background-color: #E8E8E3 !important;}&#8220;][vc_column width=&#8220;2\/3&#8243; el_class=&#8220;text-center cyb-pad-btm&#8220; offset=&#8220;vc_col-sm-offset-2&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h3>Die passwortlose Reise<\/h3>\n<h4>Der \u00dcbergang zu einem passwortlosen Arbeitsplatz geschieht nicht \u00fcber Nacht. CyberArk weist unseren Kunden den Weg zum Erfolg durch Anleitung und Best Practices.<\/h4>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;cta-box text-center&#8220;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"39\" height=\"45\" class=\"alignnone size-medium wp-image-208215\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/04\/key-blue-icon.svg\" alt=\"Symbol\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4>Authentifizierung zentralisieren<\/h4>\n<p>SSO vereinheitlichen und adaptive MFA bereitstellen[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;cta-box text-center&#8220;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-208224\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/04\/password-blue-icon.svg\" alt=\"Symbol\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4>Unterst\u00fctzt alle Anwendungen<\/h4>\n<p>Passwortlosen Zugriff \u00fcber alle Anwendungen hinweg implementieren[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;cta-box text-center&#8220;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-208233\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/04\/arrow-compare-blue-icon.svg\" alt=\"Symbol\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4>Von Anfang bis Ende passwortlos<\/h4>\n<p>Einheitliches passwortloses Erlebnis vom Endger\u00e4t bis zur Anwendung[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;cta-box text-center&#8220;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-208242\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/04\/verified-blue-icon.svg\" alt=\"Symbol\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4>Passwortlos f\u00fcr alle Nutzer<\/h4>\n<p>Nahtlose passwortlose Methoden f\u00fcr IT- und Entwicklungsteams erm\u00f6glichen[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_resources&#8220; css=&#8220;.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8220;][vc_column width=&#8220;1\/3&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;no-break&#8220;]<\/p>\n<h3>Verwandte Ressourcen erkunden<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/resources\/\">Alle Ressourcen anzeigen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column&#8220;][vc_column el_class=&#8220;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8220;.vc_custom_1745605493391{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;new_hpstyle_section8_uberflip&#8220;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220;][vc_column][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]JTNDc2NyaXB0JTIwYXN5bmMlMjBzcmMlM0QlMjJodHRwcyUzQSUyRiUyRmpzLnN0b3J5bGFuZS5pbyUyRmpzJTJGdjIlMkZzdG9yeWxhbmUuanMlMjIlM0UlM0MlMkZzY3JpcHQlM0U=[\/vc_raw_js][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 int-hero dark&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243; offset=&#8220;vc_col-md-6&#8243;][vc_column_text css=&#8220;&#8220;] Passwortloses Erlebnis Transformieren Sie die Unternehmenssicherheit und Mitarbeiterproduktivit\u00e4t mit einem durchg\u00e4ngig passwortlosen Erlebnis, das \u00fcber die herk\u00f6mmliche Authentifizierung hinausgeht. [\/vc_column_text][vc_btn title=&#8220;E-Book herunterladen&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220;&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":32304,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-209134","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Passwortlos | CyberArk<\/title>\n<meta name=\"description\" content=\"Transformieren Sie die Unternehmenssicherheit und Mitarbeiterproduktivit\u00e4t mit einem durchg\u00e4ngig passwortlosen Erlebnis, das \u00fcber die herk\u00f6mmliche Authentifizierung hinausgeht.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/products\/passwordless\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Passwortlos\" \/>\n<meta property=\"og:description\" content=\"Transformieren Sie die Unternehmenssicherheit und Mitarbeiterproduktivit\u00e4t mit einem durchg\u00e4ngig passwortlosen Erlebnis, das \u00fcber die herk\u00f6mmliche Authentifizierung hinausgeht.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/products\/passwordless\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-10T21:41:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/ITsecurity-Icon.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/products\/passwordless\/\",\"url\":\"https:\/\/www.cyberark.com\/products\/passwordless\/\",\"name\":\"Passwortlos | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/passwordless\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/passwordless\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/ITsecurity-Icon.svg\",\"datePublished\":\"2025-04-30T20:46:36+00:00\",\"dateModified\":\"2025-07-10T21:41:07+00:00\",\"description\":\"Transformieren Sie die Unternehmenssicherheit und Mitarbeiterproduktivit\u00e4t mit einem durchg\u00e4ngig passwortlosen Erlebnis, das \u00fcber die herk\u00f6mmliche Authentifizierung hinausgeht.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/passwordless\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/products\/passwordless\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/products\/passwordless\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/ITsecurity-Icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/ITsecurity-Icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/products\/passwordless\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Produkte\",\"item\":\"https:\/\/www.cyberark.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Passwortlos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Passwortlos | CyberArk","description":"Transformieren Sie die Unternehmenssicherheit und Mitarbeiterproduktivit\u00e4t mit einem durchg\u00e4ngig passwortlosen Erlebnis, das \u00fcber die herk\u00f6mmliche Authentifizierung hinausgeht.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/products\/passwordless\/","og_locale":"de_DE","og_type":"article","og_title":"Passwortlos","og_description":"Transformieren Sie die Unternehmenssicherheit und Mitarbeiterproduktivit\u00e4t mit einem durchg\u00e4ngig passwortlosen Erlebnis, das \u00fcber die herk\u00f6mmliche Authentifizierung hinausgeht.","og_url":"https:\/\/www.cyberark.com\/products\/passwordless\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-07-10T21:41:07+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/ITsecurity-Icon.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"6 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/products\/passwordless\/","url":"https:\/\/www.cyberark.com\/products\/passwordless\/","name":"Passwortlos | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/products\/passwordless\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/products\/passwordless\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/ITsecurity-Icon.svg","datePublished":"2025-04-30T20:46:36+00:00","dateModified":"2025-07-10T21:41:07+00:00","description":"Transformieren Sie die Unternehmenssicherheit und Mitarbeiterproduktivit\u00e4t mit einem durchg\u00e4ngig passwortlosen Erlebnis, das \u00fcber die herk\u00f6mmliche Authentifizierung hinausgeht.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/products\/passwordless\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/products\/passwordless\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/products\/passwordless\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/ITsecurity-Icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/08\/ITsecurity-Icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/products\/passwordless\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Produkte","item":"https:\/\/www.cyberark.com\/products\/"},{"@type":"ListItem","position":3,"name":"Passwortlos"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/209134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=209134"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/209134\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32304"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=209134"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=209134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}