{"id":210396,"date":"2025-05-08T12:30:40","date_gmt":"2025-05-08T16:30:40","guid":{"rendered":"https:\/\/www.cyberark.com\/try-buy\/epm-interactive-tour\/"},"modified":"2025-10-07T03:23:06","modified_gmt":"2025-10-07T07:23:06","slug":"epm-interactive-tour","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/try-buy\/epm-interactive-tour\/","title":{"rendered":"Interaktive Produkttour zum Endpoint Privilege Manager"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; css=&#8220;.vc_custom_1609868130755{background-color: #f7f7f7 !important;}&#8220; el_class=&#8220;cybv2 cybv2-pad-top hv-cta&#8220;][vc_column width=&#8220;7\/12&#8243; el_class=&#8220;left-clmn&#8220;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h1>Interaktive Produkttour zum Endpoint Privilege Manager <\/h1>\n<p><\/p>\n<h5>Erfahren Sie, wie der Endpoint Privilege Manager Ihrem Unternehmen helfen kann, das Risiko identit\u00e4tsbasierter Angriffe auf Endpunkte zu reduzieren, unter anderem durch:<\/h5>\n<p>\n[\/vc_column_text][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;head-box-text&#8220;]Erkennung und Entfernung lokaler Administratorrechte und flexibles Richtlinienmanagement zur Sicherung des Unternehmens bei gleichzeitiger Optimierung des IT-Betriebs[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;head-box-text&#8220;]Durchsetzung von Least-Privilege-Kontrollen, um Identity Security und Zero Trust auf Endpunkte zu erweitern[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;head-box-text&#8220;]Abwehrma\u00dfnahmen gegen Ransomware mit sofort einsatzbereiten Schutzrichtlinien<br \/>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;head-box-text&#8220;]Berichterstattung f\u00fcr bessere Transparenz und zur Erf\u00fcllung von Audit- und Compliance-Standards[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_column_text css=&#8220;&#8220;]Mit unserer interaktiven Produkttour erfahren Sie aus erster Hand, wie EPM als Teil der Strategie f\u00fcr Endpoint Identity Security Ihr Unternehmen bei der Sicherung von Endpunkten und Servern unterst\u00fctzen kann, ohne die Produktivit\u00e4t zu beeintr\u00e4chtigen.<\/p>\n<p><strong>Melden Sie sich jetzt an, um sofortigen Zugriff auf unsere interaktive EPM-Produkttour zu erhalten!<\/strong>[\/vc_column_text][vc_single_image image=&#8220;205230&#8243; img_size=&#8220;full&#8220; css=&#8220;&#8220; el_class=&#8220;d-none d-md-block&#8220;][\/vc_column][vc_column width=&#8220;1\/12&#8243; css=&#8220;.vc_custom_1609282896657{margin-right: 45px !important;border-right-width: 1px !important;border-right-color: #717171 !important;border-right-style: solid !important;}&#8220;][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;right-clmn cybv2-form&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;bold&#8220;]<\/p>\n<h4>Hier registrieren, um auf die interaktive Produkttour-Demo des Endpoint Privilege Managers zuzugreifen<\/h4>\n<p>\n[\/vc_column_text][vc_raw_html css=&#8220;&#8220;]W21hcmtldG9fZm9ybSBpZD0iMTMyODQiIHR5X3BhZ2VfdXJsPSJodHRwczovL3d3dy5jeWJlcmFyay5jb20vdHJ5LWJ1eS90aGFuay15b3UtZXBtLWludGVyYWN0aXZlLXRvdXIvIl0=[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"templatera_shortcode\"><div class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_customer_stories vc_tta-o-non-responsive mt-12 vc_custom_1712005154560 vc_row-has-fill vc_row-o-equal-height vc_row-flex\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_tta-container\" data-vc-action=\"collapse\"><div class=\"vc_general vc_tta vc_tta-tabs vc_tta-color-white vc_tta-style-flat vc_tta-shape-square vc_tta-o-shape-group vc_tta-gap-20  cybv2_customer_stories_tabs cybv2_customer_stories_tabs_no_links vc_tta-tabs-position-top vc_tta-controls-align-center vc_custom_1612899720421\"><div class=\"vc_tta-tabs-container\"><ul class=\"vc_tta-tabs-list\" role=\"tablist\"><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742493330-265de97c-f2d9eb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742493330-265de97c-f2d9eb66-6bf8\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Finanzielles<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742494008-8c0fb98b-2b6beb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742494008-8c0fb98b-2b6beb66-6bf8\"><i class=\"vc_tta-icon fas fa-satellite-dish\"><\/i><span class=\"vc_tta-title-text\">Telco<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742494616-60a6dced-32cfeb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742494616-60a6dced-32cfeb66-6bf8\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Finanzielles<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742495229-255d985e-6d0ceb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742495229-255d985e-6d0ceb66-6bf8\"><i class=\"vc_tta-icon fas fa-industry\"><\/i><span class=\"vc_tta-title-text\">Fertigung<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1607742495902-f2d9a00d-8e74eb66-6bf8\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1607742495902-f2d9a00d-8e74eb66-6bf8\"><i class=\"vc_tta-icon fas fa-university\"><\/i><span class=\"vc_tta-title-text\">Versicherung<\/span><\/a><\/li><\/ul><\/div><div class=\"vc_tta-panels-container\"><div class=\"vc_tta-panels\"><div class=\"vc_tta-panel new_hpstyle_section6_tab1_icon vc_active\" id=\"1607742493330-265de97c-f2d9eb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742493330-265de97c-f2d9eb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Finanzielles<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653500231\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Finance-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Finance\" title=\"Finance-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Finance.svg\" class=\"vc_single_image-img attachment-full\" alt=\"Finance\" title=\"Finance\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\u201eCyberArk war der beste Anbieter, mit dem ich in meiner \u00fcber 20-j\u00e4hrigen IT-Karriere zusammengearbeitet habe. CyberArk liefert gro\u00dfartige Produkte, die bei der Verwaltung privilegierter Zugriffe branchenf\u00fchrend sind.\u201c<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>IT Security Manager<\/strong>, Security and Risk Management<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_js\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<script>\njQuery(document).ready(function(){\n    \/\/Add Active to tab on page load\n    $panels = jQuery('.cybv2_customer_stories_tabs .vc_tta-panels .vc_tta-panel');\n    $tabs = jQuery('.cybv2_customer_stories_tabs .vc_tta-tabs-list .vc_tta-tab');\n    var index = 0;\n\n    \/\/Align Tabs with panels\n    $panels.each(function(){\n        jQuery(this).hasClass('vc_active');\n        return false;\n        index++;\n    })\n    var newIndex = 0;\n    $tabs.each(function(){\n        if(index == newIndex){\n            jQuery(this).addClass('vc_active');\n        }\n        newIndex++;\n    })\n});\n<\/script>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab2_icon\" id=\"1607742494008-8c0fb98b-2b6beb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742494008-8c0fb98b-2b6beb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-satellite-dish\"><\/i><span class=\"vc_tta-title-text\">Telco<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653503563\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Telecom-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Telecom\" title=\"Telecom-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Telecom-1.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"Telecom\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\u201eMit CyberArk k\u00f6nne wir uns darauf verlassen, dass wir Technologie implementiert haben, die mit uns zusammenarbeitet, wenn unser Unternehmen w\u00e4chst und sich weiterentwickelt.\u201c<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Jean-Pierre Blanc<\/strong>, Bouygues Telecom<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab3_icon\" id=\"1607742494616-60a6dced-32cfeb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742494616-60a6dced-32cfeb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-piggy-bank\"><\/i><span class=\"vc_tta-title-text\">Finanzielles<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653481888\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Finance-02-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Finance-02-590x500\" title=\"Finance-02-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Finance.svg\" class=\"vc_single_image-img attachment-full\" alt=\"Finance\" title=\"Finance\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\u201eEs geht nicht blo\u00df darum Compliance-Kontrollk\u00e4stchen anzukreuzen, wir entwickeln Richtlinien, die wir aktiv an Best Practices f\u00fcr Cybersicherheit ausrichten, um unsere allgemeine Sicherheitsposition zu st\u00e4rken und interne Teams aufeinander abzustimmen.\u201c<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Joel Harris<\/strong>, Manager<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab4_icon\" id=\"1607742495229-255d985e-6d0ceb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742495229-255d985e-6d0ceb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-industry\"><\/i><span class=\"vc_tta-title-text\">Fertigung<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653496575\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Customer-Identities-770x550-1-590x500.jpg\" width=\"590\" height=\"500\" alt=\"Customer-Identities----770x550\" title=\"Customer-Identities----770x550\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Manufactoring.svg\" class=\"vc_single_image-img attachment-full\" alt=\"Manufacturing\" title=\"Manufactoring\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\u201eCyberArk hat uns die n\u00f6tige Transparenz und granulare Kontrolle gegeben, um sowohl Least Privilege als auch eine Anwendungskontrolle nach dem Standardablehnungsmodell bei minimalen Ver\u00e4nderungen im Unternehmen umzusetzen.\u201c<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Ken Brown<\/strong>, CISO<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"vc_tta-panel new_hpstyle_section6_tab5_icon\" id=\"1607742495902-f2d9a00d-8e74eb66-6bf8\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1607742495902-f2d9a00d-8e74eb66-6bf8\" data-vc-accordion data-vc-container=\".vc_tta-container\"><i class=\"vc_tta-icon fas fa-university\"><\/i><span class=\"vc_tta-title-text\">Versicherung<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid new_hpstyle_section6_maintab_row vc_row-o-equal-height vc_row-flex\"><div  class=\"image-column wpb_column vc_column_container vc_col-sm-6 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1607653492933\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_right   new_hpstyle_section6_tab1_left_image\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" class=\"vc_single_image-img \" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Insurance-590x500-1.jpg\" width=\"590\" height=\"500\" alt=\"Insurance-590x500\" title=\"Insurance-590x500\" loading=\"lazy\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/a><\/div><\/div><div  class=\"new_hpstyle_section6_tab1_right_bckgrd wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div   class=\"wpb_single_image wpb_content_element vc_align_left   tab-icon\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Insurance-1.svg\" class=\"vc_single_image-img attachment-full\" alt=\"insurance\" title=\"Insurance\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text1 text\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>\u201eMit RPA- und Cloud-Migrationen verbreiten sich Anmeldedaten zunehmend von sogenannten normalen Kontrollen weg. Mit CyberArk k\u00f6nnen alle Szenarien einheitlich abgedeckt werden.\u201c<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section6_tab1_text2\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Information Security Consultant<\/strong>, Enterprise Cybersecurity Solutions Technologies<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/a><\/div><\/div><\/div><\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"templatera_shortcode\"><div data-vc-full-width=\"true\" data-vc-full-width-temp=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_logos cybv2_logos_no_link vc_custom_1612899289143 vc_row-has-fill\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section7_carou_text extra-space link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4 style=\"text-align: center;\">CyberArk Marketplace<\/h4>\n<p style=\"text-align: center; font-weight: 300; padding-bottom: 0px;\">Durchsuchen Sie unseren Online-Marketplace, um Integrationen zu finden.<\/p>\n<p><style>\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69e90b9d52570 .sp-lcp-item img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69e90b9d52570 .sp-lcp-item:hover img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv#sp-logo-carousel-pro69e90b9d52570.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69e90b9d52570.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\tpadding: 0px;\n\t\t\t\tbackground: rgba(10,10,10,0.01);\n\t\t\t}\n\t\t\tdiv#sp-logo-carousel-pro69e90b9d52570.sp-logo-carousel-pro-area .sp-lcp-item:hover .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69e90b9d52570.sp-logo-carousel-pro-area .sp-lcp-item:hover.sp-lcp-item-border{\n\t\t\t\tbackground: rgba(0,0,0,0.01);\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section.layout-carousel div#sp-logo-carousel-pro69e90b9d52570 .slick-slide {\n\t\t\t\tfloat: none !important;\n\t\t\t\tdisplay: inline-block;\n\t\t\t\tvertical-align: middle;\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69e90b9d52570 [class*=\"lcp-col\"]{\n\t\t\t\tvertical-align: middle;\n\t\t\t\tmargin: 0;\n\t\t\t\tbox-shadow: none;\n\t\t\t}.sp-logo-carousel-pro-section #sp-logo-carousel-pro69e90b9d52570 .sp-lcpro-readmore-area{\n\t\t\t\t\ttext-align: center;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69e90b9d52570 .sp-lcpro-readmore-area .sp-lcpro-readmore{\n\t\t\t\t\tbackground: transparent;\n\t\t\t\t\tcolor: #05b3c6;\n\t\t\t\t\tpadding: 5px 13px;\n\t\t\t\t\tmargin-bottom: 18px;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tborder-radius: 2px;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t\tfont-size: 14px;font-family: Ubuntu;\n\t\t\t\t\t\tfont-style: normal; font-weight: 400;line-height:20px;\n\t\t\t\t\tletter-spacing: normal;\n\t\t\t\t\ttext-transform: none;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69e90b9d52570 .sp-lcpro-readmore-area .sp-lcpro-readmore:hover{\n\t\t\t\t\tbackground: #05b3c6;\n\t\t\t\t\tcolor: #ffffff;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t}div.sp-logo-section-id-69e90b9d52570 .bx-viewport.bx-viewport { height: auto !important; }\n\t\t\t\tdiv#sp-logo-carousel-pro69e90b9d52570.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69e90b9d52570.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\t\tborder-radius: 100%;\n\t\t\t\t\tz-index: 1;\n\t\t\t\t\toverflow: hidden;\n\t\t\t\t}\n\t\t\t\t\tdiv#sp-logo-carousel-pro69e90b9d52570.sp-logo-carousel-pro-area .sp-lcp-item{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tfloat: none !important;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tvertical-align: middle;}\n\t\t\t\tdiv#sp-logo-carousel-pro69e90b9d52570.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69e90b9d52570.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\t\t-webkit-box-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\t-moz-box-shadow:: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tbox-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tmargin-top: 6px;\n\t\t\t\t\tmargin-bottom:6px;\n\t\t\t\t}\n\t\t\t\tdiv#sp-logo-carousel-pro69e90b9d52570.sp-logo-carousel-pro-area .sp-lcp-item:hover .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69e90b9d52570.sp-logo-carousel-pro-area .sp-lcp-item:hover.sp-lcp-item-border{\n\t\t\t\t\t-webkit-box-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\t-moz-box-shadow:: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tbox-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-carousel.lcp_horizontal div#sp-logo-carousel-pro69e90b9d52570.sp-logo-carousel-pro-area .slick-list{\n\t\t\t\t\tmargin-left: 0;\n\t\t\t\t\tmargin-right: 0;\n\t\t\t\t}\n\t\t\t\tdiv#sp-logo-carousel-pro69e90b9d52570.sp-logo-carousel-pro-area [class*=\"lcp-col-\"]{\n\t\t\t\t\tmargin-bottom: 6px;\n\t\t\t\t}div.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69e90b9d52570 [class*=\"lcp-col\"]{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tbox-shadow: none;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69e90b9d52570.sp-logo-carousel-pro-area [class*=\"lcp-col\"],\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69e90b9d52570.sp-logo-carousel-pro-area [class*=\"lcp-col\"]{\n\t\t\t\t\tpadding-left: 10px;\n\t\t\t\t\tpadding-right: 10px;\n\t\t\t\t\tpadding-bottom: 20px;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69e90b9d52570.sp-logo-carousel-pro-area.lcp-container,\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69e90b9d52570.sp-logo-carousel-pro-area.lcp-container{\n\t\t\t\t\tmargin-left: -10px;\n\t\t\t\t\tmargin-right: -10px;\n\t\t\t\t\tmargin-bottom: -20px;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\t.sp-logo-carousel-pro-section.sp-lcpro-id-105685{\n\t\t\t\t\tposition: relative;\n\t\t\t\t}\n\t\t\t\t#lcp-preloader-105685{\n\t\t\t\t\tposition: absolute;\n\t\t\t\t\tleft: 0;\n\t\t\t\t\ttop: 0;\n\t\t\t\t\theight: 100%;\n\t\t\t\t\twidth: 100%;\n\t\t\t\t\ttext-align: center;\n\t\t\t\t\tdisplay: flex;\n\t\t\t\t\talign-items: center;\n\t\t\t\t\tjustify-content: center;\n\t\t\t\t\tbackground: #fff;\n\t\t\t\t\tz-index: 9999;\n\t\t\t\t}\n\t\t\t\t<\/style><div class=\"sp-logo-carousel-pro-section layout-carousel sp-lcpro-id-105685 sp-logo-section-id-69e90b9d52570 nav_position_top_right title_position_bottom sp-lcpro-clear lcp_horizontal\"><div id=\"lcp-preloader-105685\" class=\"sp-logo-carousel-pro-preloader\"><img decoding=\"async\" src=\" https:\/\/www.cyberark.com\/wp-content\/plugins\/logo-carousel-pro\/public\/assets\/css\/images\/bx_loader.gif \"\/><\/div><div id=\"sp-logo-carousel-pro69e90b9d52570\" class=\"sp-logo-carousel-pro-area lcp-preloader mode_ticker \" data-minslide=\"1\" data-maxslide=\"1\" data-slidewidth=\"\" data-slidemargin=\"20\" data-speed=\"30000\" data-mode=\"horizontal\" data-direction=\"next\" data-tickerhover=\"false\"><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/aws.png\" alt=\"aws logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/crowdstrike.png\" alt=\"crowdstrike logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Google.png\" alt=\"Google logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/microsoft-logo.png\" alt=\"Microsoft logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/paloalto.png\" alt=\"paloalto logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Proofpoint.png\" alt=\"Proofpoint logo\" ><\/div><\/div><\/div><\/div><\/div><br \/>\n<style>\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69e90b9d5891c .sp-lcp-item img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69e90b9d5891c .sp-lcp-item:hover img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv#sp-logo-carousel-pro69e90b9d5891c.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69e90b9d5891c.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\tpadding: 0px;\n\t\t\t\tbackground: rgba(10,10,10,0.01);\n\t\t\t}\n\t\t\tdiv#sp-logo-carousel-pro69e90b9d5891c.sp-logo-carousel-pro-area .sp-lcp-item:hover .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69e90b9d5891c.sp-logo-carousel-pro-area .sp-lcp-item:hover.sp-lcp-item-border{\n\t\t\t\tbackground: rgba(0,0,0,0.01);\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section.layout-carousel div#sp-logo-carousel-pro69e90b9d5891c .slick-slide {\n\t\t\t\tfloat: none !important;\n\t\t\t\tdisplay: inline-block;\n\t\t\t\tvertical-align: middle;\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69e90b9d5891c [class*=\"lcp-col\"]{\n\t\t\t\tvertical-align: middle;\n\t\t\t\tmargin: 0;\n\t\t\t\tbox-shadow: none;\n\t\t\t}\n\t\t\t\tdiv.sp-logo-section-id-69e90b9d5891c .bx-viewport{\n\t\t\t\tdirection: ltr;\n\t\t\t\t}.sp-logo-carousel-pro-section #sp-logo-carousel-pro69e90b9d5891c .sp-lcpro-readmore-area{\n\t\t\t\t\ttext-align: center;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69e90b9d5891c .sp-lcpro-readmore-area .sp-lcpro-readmore{\n\t\t\t\t\tbackground: transparent;\n\t\t\t\t\tcolor: #05b3c6;\n\t\t\t\t\tpadding: 5px 13px;\n\t\t\t\t\tmargin-bottom: 18px;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tborder-radius: 2px;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t\tfont-size: 14px;font-family: Ubuntu;\n\t\t\t\t\t\tfont-style: normal; font-weight: 400;line-height:20px;\n\t\t\t\t\tletter-spacing: normal;\n\t\t\t\t\ttext-transform: none;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69e90b9d5891c .sp-lcpro-readmore-area .sp-lcpro-readmore:hover{\n\t\t\t\t\tbackground: #05b3c6;\n\t\t\t\t\tcolor: #ffffff;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t}div.sp-logo-section-id-69e90b9d5891c .bx-viewport.bx-viewport { height: auto !important; }\n\t\t\t\tdiv#sp-logo-carousel-pro69e90b9d5891c.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69e90b9d5891c.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\t\tborder-radius: 100%;\n\t\t\t\t\tz-index: 1;\n\t\t\t\t\toverflow: hidden;\n\t\t\t\t}\n\t\t\t\t\tdiv#sp-logo-carousel-pro69e90b9d5891c.sp-logo-carousel-pro-area .sp-lcp-item{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tfloat: none !important;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tvertical-align: middle;}\n\t\t\t\tdiv#sp-logo-carousel-pro69e90b9d5891c.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69e90b9d5891c.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\t\t-webkit-box-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\t-moz-box-shadow:: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tbox-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tmargin-top: 6px;\n\t\t\t\t\tmargin-bottom:6px;\n\t\t\t\t}\n\t\t\t\tdiv#sp-logo-carousel-pro69e90b9d5891c.sp-logo-carousel-pro-area .sp-lcp-item:hover .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69e90b9d5891c.sp-logo-carousel-pro-area .sp-lcp-item:hover.sp-lcp-item-border{\n\t\t\t\t\t-webkit-box-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\t-moz-box-shadow:: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tbox-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-carousel.lcp_horizontal div#sp-logo-carousel-pro69e90b9d5891c.sp-logo-carousel-pro-area .slick-list{\n\t\t\t\t\tmargin-left: 0;\n\t\t\t\t\tmargin-right: 0;\n\t\t\t\t}\n\t\t\t\tdiv#sp-logo-carousel-pro69e90b9d5891c.sp-logo-carousel-pro-area [class*=\"lcp-col-\"]{\n\t\t\t\t\tmargin-bottom: 6px;\n\t\t\t\t}div.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69e90b9d5891c [class*=\"lcp-col\"]{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tbox-shadow: none;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69e90b9d5891c.sp-logo-carousel-pro-area [class*=\"lcp-col\"],\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69e90b9d5891c.sp-logo-carousel-pro-area [class*=\"lcp-col\"]{\n\t\t\t\t\tpadding-left: 10px;\n\t\t\t\t\tpadding-right: 10px;\n\t\t\t\t\tpadding-bottom: 20px;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69e90b9d5891c.sp-logo-carousel-pro-area.lcp-container,\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69e90b9d5891c.sp-logo-carousel-pro-area.lcp-container{\n\t\t\t\t\tmargin-left: -10px;\n\t\t\t\t\tmargin-right: -10px;\n\t\t\t\t\tmargin-bottom: -20px;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\t.sp-logo-carousel-pro-section.sp-lcpro-id-105741{\n\t\t\t\t\tposition: relative;\n\t\t\t\t}\n\t\t\t\t#lcp-preloader-105741{\n\t\t\t\t\tposition: absolute;\n\t\t\t\t\tleft: 0;\n\t\t\t\t\ttop: 0;\n\t\t\t\t\theight: 100%;\n\t\t\t\t\twidth: 100%;\n\t\t\t\t\ttext-align: center;\n\t\t\t\t\tdisplay: flex;\n\t\t\t\t\talign-items: center;\n\t\t\t\t\tjustify-content: center;\n\t\t\t\t\tbackground: #fff;\n\t\t\t\t\tz-index: 9999;\n\t\t\t\t}\n\t\t\t\t<\/style><div class=\"sp-logo-carousel-pro-section layout-carousel sp-lcpro-id-105741 sp-logo-section-id-69e90b9d5891c nav_position_top_right title_position_bottom sp-lcpro-clear lcp_horizontal\"><div id=\"sp-logo-carousel-pro69e90b9d5891c\" class=\"sp-logo-carousel-pro-area lcp-preloader mode_ticker \" data-minslide=\"1\" data-maxslide=\"1\" data-slidewidth=\"\" data-slidemargin=\"20\" data-speed=\"30000\" data-mode=\"horizontal\" data-direction=\"prev\" data-tickerhover=\"false\"><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/RedHat.png\" alt=\"RedHat Logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Sailpoint.png\" alt=\"Sailpoint logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/sap.png\" alt=\"sap logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Servicenow.png\" alt=\"Servicenow logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Tenable.png\" alt=\"Tenable\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/UIPath.png\" alt=\"UiPath\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/vmware-1.png\" alt=\"vmware logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/vmware-tanzu.png\" alt=\"vmware-tanzu logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Workday.png\" alt=\"Workday logo\" ><\/div><\/div><\/div><\/div><\/div>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div><\/div><\/a><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><div data-vc-full-width=\"true\" data-vc-full-width-temp=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid vc_custom_1611095281474 vc_row-has-fill\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<style>\r\n.page-id-105338 #hero-logo-container{\r\n    display: none;\r\n}\r\n\/* General *\/\r\n.cybv2 .link-arrow-right a {\r\n\tmargin-right: 6px;\r\n}\r\n.cybv2 h4 {\r\n\tline-height: 1.3em;\r\n}\r\n.cybv2 a.big_link {\r\n\tmargin: 0;\r\n}\r\n@media only screen and (max-device-width: 767px) {\r\n.cybv2 h2 {\r\n\tfont-size: 40px;\r\n}\r\n}\r\n.page-id-105338 .vc_btn3-color-grey{\r\n    font-weight: 600 !important;\r\n}\r\n\/* End General *\/\r\n\r\n\/* Section 7 *\/\r\n.cybv2.cybv2_logos h4 {\r\n\tcolor: #ffffff !important;\r\n}\r\n.cybv2.cybv2_logos .extra-space {\r\n\tmargin-bottom: 50px;\r\n}\r\n.cybv2_logos {\r\n    padding: 75px 100px 90px 100px;\r\n}\r\n.new_hpstyle_section7_carou_text p {\r\n    font-size: 20px;\r\n    color: #fff;\r\n    padding-bottom: 60px;\r\n}\r\n.cybv2_logos_no_link .new_hpstyle_section7_carou_text p{\r\n    padding-bottom: 15px;\r\n}\r\n.new_hpstyle_section7_carousel1 {\r\n    padding: 50px 0 30px 500px;\r\n}\r\n.new_hpstyle_section7_carousel2 {\r\n    padding: 20px 500px 30px 0;\r\n}\r\n.cybv2_logos .sp-logo-carousel-pro-section.sp-lcpro-id-105685{\r\n    margin-bottom: 20px;\r\n}\r\n.cybv2_logos .link-arrow-right .wpb_wrapper:hover p a,\r\n.cybv2_logos .link-arrow-right .wpb_wrapper:hover p i{\r\n    color: #0095A9 !important;\r\n    border-bottom-color: #0095A9 !important;\r\n}\r\n.cybv2_logos .link-arrow-right .wpb_wrapper p a:hover,\r\n.cybv2_logos .link-arrow-right .wpb_wrapper p a:hover i{\r\n    color: #0E6F85 !important;\r\n    border-bottom-color: #0E6F85 !important;\r\n}\r\n@media only screen and (max-width: 1024px) {\r\n.new_hpstyle_section7_carousel1 {\r\n    padding: 50px 0 30px 300px;\r\n}\r\n.new_hpstyle_section7_carousel2 {\r\n    padding: 20px 300px 30px 0;\r\n}\r\n}\r\n@media only screen and (max-width: 767px) {\r\n.cybv2.cybv2_logos .extra-space {\r\n\tmargin-bottom: 30px;\r\n}\r\n.cybv2_logos .sp-logo-carousel-pro-area .sp-lcp-item {\r\n\tmax-width: 82px;\r\n\tmargin-right: 10px !important;\r\n}\r\n.cybv2_logos {\r\n\tpadding: 40px 100px 50px 100px;\r\n}\r\n}\r\n\/* End section 7 *\/\r\n\r\n<\/style>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/div>[\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":115041,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"t_cybv2_nomenus.php","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-210396","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Interaktive Produkttour zum Endpoint Privilege Manager | CyberArk<\/title>\n<meta name=\"description\" content=\"Erleben Sie aus erster Hand, wie EPM die Endpunkte und Server Ihres Unternehmens sichert, ohne die Produktivit\u00e4t zu beeintr\u00e4chtigen. Machen Sie noch heute eine interaktive Tour.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/try-buy\/epm-interactive-tour\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Interaktive Produkttour zum Endpoint Privilege Manager\" \/>\n<meta property=\"og:description\" content=\"Erleben Sie aus erster Hand, wie EPM die Endpunkte und Server Ihres Unternehmens sichert, ohne die Produktivit\u00e4t zu beeintr\u00e4chtigen. Machen Sie noch heute eine interaktive Tour.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/try-buy\/epm-interactive-tour\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-07T07:23:06+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/try-buy\/epm-interactive-tour\/\",\"url\":\"https:\/\/www.cyberark.com\/try-buy\/epm-interactive-tour\/\",\"name\":\"Interaktive Produkttour zum Endpoint Privilege Manager | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/try-buy\/epm-interactive-tour\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/try-buy\/epm-interactive-tour\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\",\"datePublished\":\"2025-05-08T16:30:40+00:00\",\"dateModified\":\"2025-10-07T07:23:06+00:00\",\"description\":\"Erleben Sie aus erster Hand, wie EPM die Endpunkte und Server Ihres Unternehmens sichert, ohne die Produktivit\u00e4t zu beeintr\u00e4chtigen. Machen Sie noch heute eine interaktive Tour.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/try-buy\/epm-interactive-tour\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/try-buy\/epm-interactive-tour\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/try-buy\/epm-interactive-tour\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/try-buy\/epm-interactive-tour\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Testen und kaufen\",\"item\":\"https:\/\/www.cyberark.com\/try-buy\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Interaktive Produkttour zum Endpoint Privilege Manager\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Interaktive Produkttour zum Endpoint Privilege Manager | CyberArk","description":"Erleben Sie aus erster Hand, wie EPM die Endpunkte und Server Ihres Unternehmens sichert, ohne die Produktivit\u00e4t zu beeintr\u00e4chtigen. Machen Sie noch heute eine interaktive Tour.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/try-buy\/epm-interactive-tour\/","og_locale":"de_DE","og_type":"article","og_title":"Interaktive Produkttour zum Endpoint Privilege Manager","og_description":"Erleben Sie aus erster Hand, wie EPM die Endpunkte und Server Ihres Unternehmens sichert, ohne die Produktivit\u00e4t zu beeintr\u00e4chtigen. Machen Sie noch heute eine interaktive Tour.","og_url":"https:\/\/www.cyberark.com\/try-buy\/epm-interactive-tour\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-10-07T07:23:06+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"2 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/try-buy\/epm-interactive-tour\/","url":"https:\/\/www.cyberark.com\/try-buy\/epm-interactive-tour\/","name":"Interaktive Produkttour zum Endpoint Privilege Manager | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/try-buy\/epm-interactive-tour\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/try-buy\/epm-interactive-tour\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg","datePublished":"2025-05-08T16:30:40+00:00","dateModified":"2025-10-07T07:23:06+00:00","description":"Erleben Sie aus erster Hand, wie EPM die Endpunkte und Server Ihres Unternehmens sichert, ohne die Produktivit\u00e4t zu beeintr\u00e4chtigen. Machen Sie noch heute eine interaktive Tour.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/try-buy\/epm-interactive-tour\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/try-buy\/epm-interactive-tour\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/try-buy\/epm-interactive-tour\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/try-buy\/epm-interactive-tour\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Testen und kaufen","item":"https:\/\/www.cyberark.com\/try-buy\/"},{"@type":"ListItem","position":3,"name":"Interaktive Produkttour zum Endpoint Privilege Manager"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/210396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=210396"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/210396\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/115041"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=210396"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=210396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}