{"id":219225,"date":"2025-11-18T01:41:51","date_gmt":"2025-11-18T06:41:51","guid":{"rendered":"https:\/\/www.cyberark.com\/trust\/saas-sicherheit\/"},"modified":"2025-11-18T01:41:54","modified_gmt":"2025-11-18T06:41:54","slug":"saas-security","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/trust\/saas-security\/","title":{"rendered":"SaaS-Sicherheit"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 int-hero-noimg&#8220;][vc_column width=&#8220;3\/4&#8243; el_class=&#8220;column-1&#8243;][vc_column_text el_class=&#8220;cyb-breadcrumb&#8220;]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/de\/trust\/\">Zur\u00fcck zum Trust Center<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>SAAS-Sicherheit<\/h1>\n<p><\/p>\n<h2>Unsere L\u00f6sungen sind so konzipiert, dass Kundeninformationen in jeglicher Form vor unbefugtem Zugriff, \u00c4nderung, Offenlegung oder L\u00f6schung gesch\u00fctzt sind.<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 cybv2-pad cybv2-oval-left-background hv-cta-stats&#8220; css=&#8220;.vc_custom_1611886714437{background-color: #ff7600 !important;}&#8220;][vc_column el_class=&#8220;text-md-center head-box&#8220;][vc_column_text]<\/p>\n<h3>Sicherheit durch Design<\/h3>\n<p><\/p>\n<h5>Bei CyberArk sind wir entschlossen, die Sicherheit unserer Produkte und Dienstleistungen zu gew\u00e4hrleisten und diese Sicherheit in jeden Schritt der Entwicklung zu integrieren.<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;img-box&#8220; css=&#8220;.vc_custom_1625853377094{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/benefit-stat-Security-by-design1.jpeg?id=120517) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;stat-column&#8220;][vc_row_inner el_class=&#8220;stat-row&#8220;][vc_column_inner el_class=&#8220;stat&#8220; width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-10&#8243;][vc_column_text][\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;stat&#8220; width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-0 vc_col-xs-offset-1 vc_col-xs-10&#8243;][vc_column_text][\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; width=&#8220;11\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]Unternehmen setzen weltweit die in der Branche f\u00fchrenden Sicherheitsprodukte und -dienstleistungen von CyberArk ein.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; width=&#8220;11\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]Wir sind bestrebt, Produkte und SaaS-Dienstleistungen anzubieten, die hochgradig skalierbar, stabil und sicher sind.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; width=&#8220;11\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]Unsere Produkte basieren auf erstklassigen Kerntechnologien und sind auf hohe Leistung und Verf\u00fcgbarkeit ausgelegt.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8220;stat-row&#8220;][vc_column_inner el_class=&#8220;stat&#8220; width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-10&#8243;][vc_column_text][\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;stat&#8220; width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-0 vc_col-xs-offset-1 vc_col-xs-10&#8243;][vc_column_text][\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2-pad cybv2 cybv2-background-oval tour&#8220;][vc_column][vc_row_inner el_class=&#8220;cyb-center&#8220;][vc_column_inner el_class=&#8220;cyb-pad-btm&#8220;][vc_column_text el_class=&#8220;left-mobile&#8220;]<\/p>\n<h3>SAAS-L\u00f6sungen<\/h3>\n<p>Erfahren Sie mehr \u00fcber die spezifischen Sicherheitsma\u00dfnahmen, die wir im Rahmen unserer SaaS-Angebote ergreifen.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=&#8220;square&#8220; active_section=&#8220;1&#8243; css_animation=&#8220;none&#8220;][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;Privilege Cloud&#8220; tab_id=&#8220;privilege-cloud&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Privilege Cloud<\/h4>\n<p><a href=\"https:\/\/www.cyberark.com\/resources\/product-datasheets\/cyberark-privilege-cloud-datasheet-3\">CyberArk Privilege Cloud<\/a> ist das PAM-as-a-Service-Angebot von CyberArk, das zum Schutz, zur Kontrolle und zur \u00dcberwachung privilegierter Zugriffe in lokalen, Cloud- und hybriden Infrastrukturen entwickelt wurde.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/privacy-and-data-protection-faqs\/\" rel=\"noopener\">Datenschutz und Datensicherheit \u2013 H\u00e4ufig gestellte Fragen von Kunden<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/cyberark-privilege-cloud\/cyberark-privilege-cloud-security-datasheet\" rel=\"noopener\">\u00dcbersicht \u00fcber die Sicherheit von Privilege Cloud<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/docs.cyberark.com\/Product-Doc\/OnlineHelp\/PrivCloud-ss\/Latest\/en\/Content\/Security\/Security%20Fundamentals-Introduction.htm\" target=\"_blank\" rel=\"noopener\">Grundlagen der Sicherheit<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-120311\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-Center-Tour-SaaS-Security-1.png\" alt=\"Privilege Cloud\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-Center-Tour-SaaS-Security-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-Center-Tour-SaaS-Security-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-Center-Tour-SaaS-Security-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;Endpoint Privilege Manager&#8220; tab_id=&#8220;epm&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Endpoint Privilege Manager<\/h4>\n<p><a href=\"https:\/\/www.cyberark.com\/de\/products\/endpoint-privilege-manager\/\">Endpoint Privilege Manager<\/a> Endpoint Privilege Manager bietet eine L\u00f6sung f\u00fcr die Anwendungskontrolle, das Privilege Management und den Schutz vor Bedrohungen am Endpunkt und den Servern. Diese umfassenden Funktionen erm\u00f6glichen eine granulare Kontrolle f\u00fcr eine sichere Desktop- und Serverumgebung.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/privacy-and-data-protection-faqs\/\" rel=\"noopener\">Datenschutz und Datensicherheit \u2013 H\u00e4ufig gestellte Fragen von Kunden<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/docs.cyberark.com\/Product-Doc\/OnlineHelp\/EPM\/Latest\/en\/Content\/Security\/Security%20Best%20Practices.htm\" target=\"_blank\" rel=\"noopener\">Best Practices f\u00fcr die Sicherheit<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/docs.cyberark.com\/Product-Doc\/OnlineHelp\/EPM\/Latest\/en\/Content\/Intro\/SAAS%20Technical%20Datasheet.htm\" target=\"_blank\" rel=\"noopener\">Technisches Datenblatt<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/status.epm.cyberark.com\/\" target=\"_blank\" rel=\"noopener\">Service Status Page<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-120319\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-Center-Tour-SaaS-Security-2.png\" alt=\"Endpoint Privilege Manager\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-Center-Tour-SaaS-Security-2.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-Center-Tour-SaaS-Security-2-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-Center-Tour-SaaS-Security-2-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;Remote Access (ehemals alero)&#8220; tab_id=&#8220;remote-access&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Remote Access (ehemals alero)<\/h4>\n<p><a href=\"https:\/\/www.cyberark.com\/de\/products\/remote-access\/\">CyberArk Remote Access<\/a> ist eine L\u00f6sung, mit der Unternehmen externe Anbieter und Remote-Mitarbeiter, die Zugriff auf kritische interne Systeme ben\u00f6tigen, ohne VPNs, Passw\u00f6rter oder Agenten sch\u00fctzen k\u00f6nnen.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/privacy-and-data-protection-faqs\/\" rel=\"noopener\">Datenschutz und Datensicherheit \u2013 H\u00e4ufig gestellte Fragen von Kunden<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/status.alero.io\/\" target=\"_blank\" rel=\"noopener\">Service Status Page<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-120327\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-Center-Tour-SaaS-Security-3.png\" alt=\"Remote Access\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-Center-Tour-SaaS-Security-3.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-Center-Tour-SaaS-Security-3-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-Center-Tour-SaaS-Security-3-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;Identity (ehemals Idaptive)&#8220; tab_id=&#8220;identity&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Identity (ehemals Idaptive)<\/h4>\n<p>CyberArk Identity umfasst <a href=\"https:\/\/www.cyberark.com\/de\/products\/adaptive-multi-factor-authentication\/\">adaptive Multi-Factor Authentication<\/a>, <a href=\"https:\/\/www.cyberark.com\/de\/products\/single-sign-on\/\">Single Sign-On<\/a>, <a href=\"https:\/\/www.cyberark.com\/de\/products\/lifecycle-management\/\">Lifecycle Management<\/a> und mehr und bietet eine zus\u00e4tzliche Schutzebene, bevor der Zugriff auf Unternehmensanwendungen gew\u00e4hrt wird, ohne die Produktivit\u00e4t der Endnutzer zu beeintr\u00e4chtigen.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/trust.idaptive.com\/\" target=\"_blank\" rel=\"noopener\">Service Statius Page<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/privacy-and-data-protection-faqs\/\" rel=\"noopener\">Datenschutz und Datensicherheit \u2013 H\u00e4ufig gestellte Fragen von Kunden<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-120335\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-Center-Tour-SaaS-Security-4.png\" alt=\"Workforce and Customer Identity\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-Center-Tour-SaaS-Security-4.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-Center-Tour-SaaS-Security-4-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-Center-Tour-SaaS-Security-4-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-up&#8220; add_icon=&#8220;true&#8220; title=&#8220;Cloud Entitlements Manager&#8220; tab_id=&#8220;cem&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Cloud Entitlements Manager<\/h4>\n<p>CyberArk <a href=\"https:\/\/www.cyberark.com\/de\/products\/secure-cloud-access\/\">Cloud Entitlements Manager<\/a> ist eine KI-gest\u00fctzte L\u00f6sung, die durch die Implementierung von Least Privilege in Cloud-Umgebungen eine messbare Risikominderung erm\u00f6glicht.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/privacy-and-data-protection-faqs\/\" rel=\"noopener\">Datenschutz und Datensicherheit \u2013 H\u00e4ufig gestellte Fragen von Kunden<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-120343\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-Center-Tour-SaaS-Security-5.png\" alt=\"Cloud Entitlements Manager\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-Center-Tour-SaaS-Security-5.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-Center-Tour-SaaS-Security-5-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-Center-Tour-SaaS-Security-5-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad-top overview-hz&#8220; css=&#8220;.vc_custom_1625777458033{background-color: #f7f7f7 !important;}&#8220;][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;head-box&#8220;][vc_column_text]<\/p>\n<h3>Haben Sie noch Fragen zur Sicherheit?<\/h3>\n<p>Erfahren Sie mehr mit den unterst\u00fctzenden Ressourcen.[\/vc_column_text][\/vc_column][vc_column width=&#8220;2\/3&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_row_inner equal_height=&#8220;yes&#8220;][vc_column_inner el_class=&#8220;cta-box&#8220; width=&#8220;5\/12&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-120351\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/ContactSupport-technicalcommunity.svg\" alt=\"CyberArk Technical Support\" \/>[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1710230240973{padding-bottom: 20px !important;}&#8220;]<\/p>\n<h4>Support-Community f\u00fcr Technologie<\/h4>\n<p>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/customer-support\/\">Technischer Support<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;cta-box&#8220; width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-120359\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Product-Documentation.svg\" alt=\"CyberArk Technical Documentation\" \/>[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1710230248271{padding-bottom: 20px !important;}&#8220;]<\/p>\n<h4>Zus\u00e4tzliche Dokumentation<\/h4>\n<p>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/docs.cyberark.com\/\" target=\"_blank\" rel=\"noopener\">CyberArk Docs<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 int-hero-noimg&#8220;][vc_column width=&#8220;3\/4&#8243; el_class=&#8220;column-1&#8243;][vc_column_text el_class=&#8220;cyb-breadcrumb&#8220;]Zur\u00fcck zum Trust Center[\/vc_column_text][vc_column_text] SAAS-Sicherheit Unsere L\u00f6sungen sind so konzipiert, dass Kundeninformationen in jeglicher Form vor unbefugtem Zugriff, \u00c4nderung, Offenlegung oder L\u00f6schung gesch\u00fctzt sind. [\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 cybv2-pad&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":131028,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-219225","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SaaS-Sicherheit | CyberArk<\/title>\n<meta name=\"description\" content=\"CyberArk hat es sich zum Ziel gesetzt, SaaS-L\u00f6sungen anzubieten, die hochgradig skalierbar, stabil und sicher sind und unseren Kunden gleichzeitig ein H\u00f6chstma\u00df an Datenschutz bieten.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/trust\/saas-security\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SaaS-Sicherheit\" \/>\n<meta property=\"og:description\" content=\"CyberArk hat es sich zum Ziel gesetzt, SaaS-L\u00f6sungen anzubieten, die hochgradig skalierbar, stabil und sicher sind und unseren Kunden gleichzeitig ein H\u00f6chstma\u00df an Datenschutz bieten.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/trust\/saas-security\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-18T06:41:54+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/trust\/saas-security\/\",\"url\":\"https:\/\/www.cyberark.com\/trust\/saas-security\/\",\"name\":\"SaaS-Sicherheit | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/trust\/saas-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/trust\/saas-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\",\"datePublished\":\"2025-11-18T06:41:51+00:00\",\"dateModified\":\"2025-11-18T06:41:54+00:00\",\"description\":\"CyberArk hat es sich zum Ziel gesetzt, SaaS-L\u00f6sungen anzubieten, die hochgradig skalierbar, stabil und sicher sind und unseren Kunden gleichzeitig ein H\u00f6chstma\u00df an Datenschutz bieten.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/trust\/saas-security\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/trust\/saas-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/trust\/saas-security\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/trust\/saas-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trust Center\",\"item\":\"https:\/\/www.cyberark.com\/trust\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SaaS-Sicherheit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SaaS-Sicherheit | CyberArk","description":"CyberArk hat es sich zum Ziel gesetzt, SaaS-L\u00f6sungen anzubieten, die hochgradig skalierbar, stabil und sicher sind und unseren Kunden gleichzeitig ein H\u00f6chstma\u00df an Datenschutz bieten.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/trust\/saas-security\/","og_locale":"de_DE","og_type":"article","og_title":"SaaS-Sicherheit","og_description":"CyberArk hat es sich zum Ziel gesetzt, SaaS-L\u00f6sungen anzubieten, die hochgradig skalierbar, stabil und sicher sind und unseren Kunden gleichzeitig ein H\u00f6chstma\u00df an Datenschutz bieten.","og_url":"https:\/\/www.cyberark.com\/trust\/saas-security\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-11-18T06:41:54+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"7 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/trust\/saas-security\/","url":"https:\/\/www.cyberark.com\/trust\/saas-security\/","name":"SaaS-Sicherheit | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/trust\/saas-security\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/trust\/saas-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg","datePublished":"2025-11-18T06:41:51+00:00","dateModified":"2025-11-18T06:41:54+00:00","description":"CyberArk hat es sich zum Ziel gesetzt, SaaS-L\u00f6sungen anzubieten, die hochgradig skalierbar, stabil und sicher sind und unseren Kunden gleichzeitig ein H\u00f6chstma\u00df an Datenschutz bieten.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/trust\/saas-security\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/trust\/saas-security\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/trust\/saas-security\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/trust\/saas-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Trust Center","item":"https:\/\/www.cyberark.com\/trust\/"},{"@type":"ListItem","position":3,"name":"SaaS-Sicherheit"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/219225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=219225"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/219225\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/131028"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=219225"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=219225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}