{"id":220368,"date":"2022-02-24T09:30:20","date_gmt":"2022-02-24T14:30:20","guid":{"rendered":"https:\/\/www.cyberark.com\/partners\/alliance-partners\/redhat\/"},"modified":"2025-12-17T01:24:27","modified_gmt":"2025-12-17T06:24:27","slug":"redhat","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/partners\/alliance-partners\/redhat\/","title":{"rendered":"RedHat"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 int-hero&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243;][vc_column_text el_class=&#8220;cyb-breadcrumb&#8220;]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/de\/solutions\/devsecops-cloud-native-apps\/\">Zur\u00fcck zu Sichere DevOps-pipelines und native cloud-Apps<\/a>[\/vc_column_text][vc_column_text css=&#8220;&#8220;]<\/p>\n<h1>Anwendungssicherheit und Automatisierung mit Red Hat<\/h1>\n<p><\/p>\n<h2>Automatisieren und sichern Sie Ihre DevOps-Pipelines durch eine Verlagerung der Sicherheit nach links. Erfahren Sie, wie CyberArk Hand in Hand mit den Plattformen Red Hat Ansible und OpenShift arbeitet.<\/h2>\n<p>[\/vc_column_text][vc_btn title=&#8220;Jetzt lesen&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fsolution-briefs%2Fsecrets-management-for-red-hat-openshift-and-ansible-automation-platforms|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/cyberark.com\/resources\/conjur-secrets-manager-enterprise\/securing-red-hat-openshift-containerized-applications-at-enterprise-scale\">Webinar ansehen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-2&#8243;][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_x32kb5ua7z videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 cybv2-pad-top overview-hz&#8220;][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;head-box&#8220;][vc_column_text]<\/p>\n<h3>Shift Left und sichere DevOps<\/h3>\n<p>CyberArk und Red Hat arbeiten kontinuierlich an gemeinsamen L\u00f6sungen, um DevOps sicherer und agiler zu machen. Unser gemeinsames Ziel ist es, die <a href=\"https:\/\/www.cyberark.com\/what-is\/ci-cd-pipeline\/\">CI\/CD-Pipeline<\/a> zu sichern, indem wir die \u201eShift Left\u201c-Bewegung unterst\u00fctzen und fr\u00fchzeitig im DevOps-Zyklus sicherere Ans\u00e4tze bereitstellen.[\/vc_column_text][\/vc_column][vc_column width=&#8220;2\/3&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_row_inner equal_height=&#8220;yes&#8220;][vc_column_inner el_class=&#8220;cta-box&#8220; width=&#8220;5\/12&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-126167\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/webinar-video-icon.svg\" alt=\"Video Icon\" \/>[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1701168586157{padding-bottom: 20px !important;}&#8220;]<\/p>\n<h4>Entwicklerteams beim Shift Left unterst\u00fctzen<\/h4>\n<p>H\u00f6ren Sie sich an, wie Strategen von CyberArk und Red Hat \u00fcber die Verlagerung der Sicherheit nach links diskutieren.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/red-hat-cyberark\/helping-development-and-security-teams-collaborate-to-shift-security-left\" rel=\"noopener\">Video ansehen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;cta-box&#8220; width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-125342\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/lock-arrows-icon.svg\" alt=\"Container and Cluster Security\" \/>[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1701168595323{padding-bottom: 20px !important;}&#8220;]<\/p>\n<h4>Sicherung von Containern und Clustern<\/h4>\n<p>Erfahren Sie, wie CyberArk und Red Hat das Secrets Management zentralisieren und automatisieren.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/red-hat-cyberark\/simplify-cluster-security-at-scale-centralized-secrets-management-across-hybrid-multicloud-environments\">Whitepaper lesen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;cta-box&#8220; width=&#8220;5\/12&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-125350\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/vault-icon.svg\" alt=\"DevOps Secrets Management\" \/>[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1701168617679{padding-bottom: 20px !important;}&#8220;]<\/p>\n<h4>Umfassendes DevOps-Secrets-Management<\/h4>\n<p>Verbessern Sie die DevOps- und Containersicherheit durch die Integration von CyberArk mit Red Hat.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/red-hat-cyberark\/secrets-management-for-red-hat-openshift-and-ansible-automation-platforms\">L\u00f6sungs\u00fcbersicht lesen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;cta-box&#8220; width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-126268\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/roadmap-icon.svg\" alt=\"Technology Roadmap icon\" \/>[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1701168637546{padding-bottom: 20px !important;}&#8220;]<\/p>\n<h4>Gemeinsame Technologie-Roadmap<\/h4>\n<p>Erfahren Sie mehr \u00fcber praktische Implementierungsschritte zur Verbesserung Ihrer DevSecOps-Sicherheit.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/red-hat-cyberark\/secrets-management-roadmap-for-red-hat-openshift-with-cyberark\">Auf die Roadmap zugreifen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2-pad cybv2 cybv2-background-oval tour&#8220;][vc_column][vc_row_inner el_class=&#8220;cyb-center&#8220;][vc_column_inner el_class=&#8220;cyb-pad-btm&#8220;][vc_column_text el_class=&#8220;left-mobile&#8220;]<\/p>\n<h3>Unsere Partnerschaft erkunden<\/h3>\n<p>Erfahren Sie, wie Sie von unserer Zusammenarbeit und unseren Integrationen profitieren k\u00f6nnen.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_tta_tour shape=&#8220;square&#8220; active_section=&#8220;1&#8243; css_animation=&#8220;none&#8220;][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;Integrationen mit Ansible&#8220; tab_id=&#8220;ansible&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Integrationen mit Ansible<\/h4>\n<p>CyberArk l\u00e4sst sich in Red Hat Ansible Automation integrieren, um Unternehmen ein vereinfachtes, automatisiertes Secrets Management bereitzustellen, einschlie\u00dflich Integrationen mit CyberArk Conjur Secrets Manager Enterprise, CyberArk Conjur Secrets Manager Open Source und Credential Providers. [\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/solution-briefs\/secrets-management-for-red-hat-openshift-and-ansible-automation-platforms\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6 vc_col-sm-offset-0&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-126300\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-1.png\" alt=\"Red Hat Ansible\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-1.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-1-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-1-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;Integrationen mit OpenShift&#8220; tab_id=&#8220;openshift&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Integrationen mit OpenShift<\/h4>\n<p>CyberArk und Red Hat vereinfachen und st\u00e4rken die Containersicherheit, indem sie die Secrets von Anwendungen sch\u00fctzen, die in OpenShift ausgef\u00fchrt werden. Gemeinsam k\u00f6nnen CyberArk und Red Hat Teams dabei unterst\u00fctzen, Anwendungen einfacher und sicherer in gro\u00dfem Ma\u00dfstab bereitzustellen.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/blog\/ramp-up-container-security-with-red-hat-openshift-and-cyberark\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-126292\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-2.png\" alt=\"Red Hat OpenShift\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-2.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-2-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-2-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;Red Hat und CyberArk Conjur Secrets Manager&#8220; tab_id=&#8220;conjur&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Red Hat und CyberArk Conjur Secrets Manager<\/h4>\n<p>CyberArk Conjur l\u00e4sst sich in Ansible integrieren, um den Schutz von Secrets in der gesamten DevOps-Pipeline zu automatisieren. Durch die Integration von CyberArk Conjur in Ansible k\u00f6nnen DevOps- und Sicherheitsteams die von CI\/CD-Tools verwendeten Secrets automatisch sichern und verwalten.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.ansible.com\/integrations\/devops-tools\/cyberark\" target=\"_blank\" rel=\"noopener\">Mehr lesen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-126284\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-3.png\" alt=\"Ansible Integrations\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-3.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-3-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-3-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section i_position=&#8220;right&#8220; i_icon_fontawesome=&#8220;fas fa-chevron-circle-down&#8220; add_icon=&#8220;true&#8220; title=&#8220;Gemeinsame Integrationsarbeit&#8220; tab_id=&#8220;joint&#8220;][vc_row_inner el_class=&#8220;cybv2&#8243;][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-4&#8243;][vc_column_text]<\/p>\n<h4>Gemeinsame Integrationsarbeit<\/h4>\n<p>Sehen Sie sich unseren Katalog mit gemeinsamen Integrationen von CyberArk und Red Hat f\u00fcr die Plattformen Conjur, Ansible und OpenShift an.[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/cyberark.my.site.com\/mplace\/s\/#--red+hat\" target=\"_blank\" rel=\"noopener\">Katalog ansehen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-126276\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-4.png\" alt=\"CyberArk and Red Hat Integrations\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-4.png 665w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-4-300x203.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/redhat-tour-4-150x102.png 150w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][vc_raw_js]JTNDc2NyaXB0JTNFJTBBaWYlMjAlMjhqUXVlcnklMjh3aW5kb3clMjkud2lkdGglMjglMjklMjAlM0MlMjA3NjglMjklMjAlN0IlMEFqUXVlcnklMjglMjIudG91ciUyMC52Y190dGEtcGFuZWwlMjIlMjkub24lMjglMjJjbGljayUyMiUyQ2Z1bmN0aW9uJTI4JTI5JTIwJTdCJTBBJTA5JTBBJTA5aWYlMjhqUXVlcnklMjh0aGlzJTI5Lmhhc0NsYXNzJTI4JTIydmNfYWN0aXZlJTIyJTI5JTI5JTdCJTBBJTA5JTA5JTBBJTA5JTA5c2V0VGltZW91dCUyOGZ1bmN0aW9uJTI4JTI5JTdCJTBBJTA5JTA5JTA5alF1ZXJ5JTI4JTIyLnRvdXIlMjAudmNfdHRhLXBhbmVsJTIyJTI5LnJlbW92ZUNsYXNzJTI4JTIydmNfYWN0aXZlJTIyJTI5JTNCJTIwJTBBJTA5JTA5JTdEJTJDMTAwJTI5JTBBJTA5JTA5JTBBJTA5JTA5cmV0dXJuJTIwZmFsc2UlM0IlMEElMDklN0QlMEElN0QlMjklM0IlMEElN0QlMEElMEFqUXVlcnklMjglMjIudG91ciUyMC52Y190dGEtcGFuZWwlMjAud3BiX3RleHRfY29sdW1uJTIwYSUyMiUyOS5jbGljayUyOGZ1bmN0aW9uJTI4ZSUyOSUyMCU3QiUwQSUyMCUyMCUyMCUyRiUyRiUyMERvJTIwc29tZXRoaW5nJTBBJTIwJTIwJTIwZS5zdG9wUHJvcGFnYXRpb24lMjglMjklM0IlMEElN0QlMjklM0IlMEElM0MlMkZzY3JpcHQlM0U=[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; css=&#8220;.vc_custom_1615402724220{background-color: #f7f7f7 !important;}&#8220; el_class=&#8220;cybv2 cybv2-pad-top stckd-cllt flex-column-reverse flex-lg-row&#8220;][vc_column el_class=&#8220;left-clmn&#8220; offset=&#8220;vc_col-md-5&#8243;][vc_column_text el_class=&#8220;head-box&#8220;]<\/p>\n<h3>F\u00fchrendes Versicherungsunternehmen<\/h3>\n<p><\/p>\n<p class=\"cyb-quote\">\u201eUns hat gefallen, wie einfach es war, Secrets auf Red Hat OpenShift mit der Secrets-Management-Plattform von CyberArk zu verwalten.\u201c<\/p>\n<p>~ Gro\u00dfes nordamerikanisches Versicherungsunternehmen[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/case-studies\/case-study-leading-insurance-company-leverages-secrets-management-for-containerized-applications\">Fallstudie lesen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column el_class=&#8220;right-clmn&#8220; offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_single_image image=&#8220;126308&#8243; img_size=&#8220;full&#8220; el_class=&#8220;.border-shadow&#8220;][\/vc_column][\/vc_row][vc_row equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 cybv2-pad-top featured-integrations&#8220;][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;box-heading&#8220;][vc_column_text]<\/p>\n<h3>Ausgew\u00e4hlte Integrationen und Kataloge<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/catalog.redhat.com\/partners\/detail\/452dabf9cf1211ed8b8702e289077cf5\" target=\"_blank\" rel=\"noopener\">Red Hat Partnerkatalog<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/cyberark.my.site.com\/mplace\/s\/#--red+hat\" rel=\"noopener\">CyberArk Partnerkatalog<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;cta-box&#8220; column_link=&#8220;url:https%3A%2F%2Fcyberark-customers.force.com%2Fmplace%2Fs%2F%23a3550000000EiaKAAS-a3950000000jjcSAAQ|target:_blank|&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-126226\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/integrations-aws-console-access.jpg\" alt=\"Secure temporary console access with AWS Secure Token Service (STS)\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/integrations-aws-console-access.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/integrations-aws-console-access-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/integrations-aws-console-access-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>Red Hat OpenShift Dynamic Access Provider Integration<\/h4>\n<p>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/cyberark.my.site.com\/mplace\/s\/#a3550000000EiaKAAS-a3950000000jjcSAAQ\" target=\"_blank\" rel=\"noopener\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;cta-box&#8220; column_link=&#8220;url:https%3A%2F%2Fcyberark-customers.force.com%2Fmplace%2Fs%2F%23a352J000000pdrvQAA-a392J000001h4NsQAI|target:_blank|&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-126037\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/redhat-test-img-742w.jpeg\" alt=\"Red Hat Ansible\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/redhat-test-img-742w.jpeg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/redhat-test-img-742w-300x122.jpeg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/redhat-test-img-742w-150x61.jpeg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>Red Hat Ansible Security Automation Integration<\/h4>\n<p>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/cyberark.my.site.com\/mplace\/s\/#a352J000000pdrvQAA-a392J000001h4NsQAI\" target=\"_blank\" rel=\"noopener\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;cta-box&#8220; column_link=&#8220;url:https%3A%2F%2Fcyberark-customers.force.com%2Fmplace%2Fs%2F%23a3550000000EmKcAAK-a3950000000jjz7AAA|target:_blank|&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-126242\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/integrations-console-access-for-root.jpg\" alt=\"Create secure sessions to Amazon Web Services (AWS) for the root account.\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/integrations-console-access-for-root.jpg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/integrations-console-access-for-root-300x122.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/integrations-console-access-for-root-150x61.jpg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>Red Hat OpenShift Conjur Open Source<\/h4>\n<p>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/cyberark.my.site.com\/mplace\/s\/#a3550000000EmKcAAK-a3950000000jjz7AAA\" target=\"_blank\" rel=\"noopener\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;cta-box&#8220; column_link=&#8220;url:https%3A%2F%2Fcyberark-customers.force.com%2Fmplace%2Fs%2F%23a3550000000EiCDAA0-a3950000000jjUnAAI|&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-126037\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/redhat-test-img-742w.jpeg\" alt=\"Red Hat Ansible\" width=\"742\" height=\"302\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/redhat-test-img-742w.jpeg 742w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/redhat-test-img-742w-300x122.jpeg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/12\/redhat-test-img-742w-150x61.jpeg 150w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;tiny&#8220;]<\/p>\n<h4>Red Hat Ansible Secrets Manager Integration<\/h4>\n<p>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/cyberark.my.site.com\/mplace\/s\/#a3550000000EiCDAA0-a3950000000jjUnAAI\" target=\"_blank\" rel=\"noopener\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; css=&#8220;.vc_custom_1615402724220{background-color: #f7f7f7 !important;}&#8220; el_class=&#8220;cybv2 cybv2-pad-top stckd-cllt flex-column-reverse flex-lg-row&#8220;][vc_column el_class=&#8220;left-clmn&#8220; offset=&#8220;vc_col-md-5&#8243;][vc_column_text el_class=&#8220;head-box&#8220;]<\/p>\n<p class=\"cyb-quote\">CyberArk ist ein gesch\u00e4tzter Partner von Red Hat, und wir freuen uns, das Unternehmen mit dieser wohlverdienten Auszeichnung zu ehren. Wir freuen uns auf die weitere Zusammenarbeit mit CyberArk und darauf, das Unternehmen dabei zu unterst\u00fctzen, unseren gemeinsamen Kunden mit Hilfe der Open-Source-Technologie von Red Hat erstklassige Sicherheitsl\u00f6sungen anzubieten.<\/p>\n<p>~ Chris Gray, Vice President, North America Strategic Alliances, Red Hat[\/vc_column_text][\/vc_column][vc_column el_class=&#8220;right-clmn&#8220; offset=&#8220;vc_col-md-offset-1 vc_col-md-6&#8243;][vc_single_image image=&#8220;127527&#8243; img_size=&#8220;full&#8220; el_class=&#8220;.border-shadow&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 cyberark-blueprint dark&#8220;][vc_column width=&#8220;1\/4&#8243;][vc_column_text el_class=&#8220;new_hpstyle_section3_h4&#8243;]<\/p>\n<h3>Transformation Ihres Identity Managements<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_column_text el_class=&#8220;new_hpstyle_section3_text&#8220;]<\/p>\n<h4>CyberArk und Red Hat diskutieren in einem gemeinsamen Podcast, wie man legitime Nutzer von potenziellen Eindringlingen unterscheiden kann.<\/h4>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243;][vc_btn title=&#8220;Jetzt anh\u00f6ren&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; align=&#8220;right&#8220; link=&#8220;url:https%3A%2F%2Fwww.redhat.com%2Fen%2Fcode-comments-podcast%2Fseason-3%2Fcyberark|title:Jetzt%20anh%C3%B6ren|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_resources&#8220; css=&#8220;.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8220;][vc_column width=&#8220;1\/3&#8243;][vc_column_text el_class=&#8220;no-break&#8220;]<\/p>\n<h3>Ausgew\u00e4hlte Nachrichten und Ressourcen<\/h3>\n<p>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/resources\/\">Alle Ressourcen ansehen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_resources_uberflip&#8220;][vc_column el_class=&#8220;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8220;.vc_custom_1721289726635{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;new_hpstyle_section8_uberflip&#8220;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 int-hero&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243;][vc_column_text el_class=&#8220;cyb-breadcrumb&#8220;]Zur\u00fcck zu Sichere DevOps-pipelines und native cloud-Apps[\/vc_column_text][vc_column_text css=&#8220;&#8220;] Anwendungssicherheit und Automatisierung mit Red Hat Automatisieren und sichern Sie Ihre DevOps-Pipelines durch eine Verlagerung der Sicherheit nach links. Erfahren Sie,&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":73625,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-220368","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Applikationssicherheit und Automatisierung \u2013 CyberArk und Red Hat | CyberArk<\/title>\n<meta name=\"description\" content=\"Erfahren Sie, wie CyberArk und RedHat CI\/CD-Pipelines automatisieren und sichern, indem sie die Sicherheit nach links verlagern und bereits in einer fr\u00fcheren Phase des DevOps-Zyklus sicherere Ans\u00e4tze bereitstellen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/de\/partners\/alliance-partners\/redhat\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RedHat\" \/>\n<meta property=\"og:description\" content=\"Erfahren Sie, wie CyberArk und RedHat CI\/CD-Pipelines automatisieren und sichern, indem sie die Sicherheit nach links verlagern und bereits in einer fr\u00fcheren Phase des DevOps-Zyklus sicherere Ans\u00e4tze bereitstellen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/de\/partners\/alliance-partners\/redhat\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-17T06:24:27+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/de\/partners\/alliance-partners\/redhat\/\",\"url\":\"https:\/\/www.cyberark.com\/de\/partners\/alliance-partners\/redhat\/\",\"name\":\"Applikationssicherheit und Automatisierung \u2013 CyberArk und Red Hat | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/partners\/alliance-partners\/redhat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/partners\/alliance-partners\/redhat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/webinar-video-icon.svg\",\"datePublished\":\"2022-02-24T14:30:20+00:00\",\"dateModified\":\"2025-12-17T06:24:27+00:00\",\"description\":\"Erfahren Sie, wie CyberArk und RedHat CI\/CD-Pipelines automatisieren und sichern, indem sie die Sicherheit nach links verlagern und bereits in einer fr\u00fcheren Phase des DevOps-Zyklus sicherere Ans\u00e4tze bereitstellen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/partners\/alliance-partners\/redhat\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/de\/partners\/alliance-partners\/redhat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/de\/partners\/alliance-partners\/redhat\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/webinar-video-icon.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/webinar-video-icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/de\/partners\/alliance-partners\/redhat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Partner\",\"item\":\"https:\/\/www.cyberark.com\/de\/partners\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Alliance Partner\",\"item\":\"https:\/\/www.cyberark.com\/de\/partners\/alliance-partners\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"RedHat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/de\/#website\",\"url\":\"https:\/\/www.cyberark.com\/de\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/de\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Applikationssicherheit und Automatisierung \u2013 CyberArk und Red Hat | CyberArk","description":"Erfahren Sie, wie CyberArk und RedHat CI\/CD-Pipelines automatisieren und sichern, indem sie die Sicherheit nach links verlagern und bereits in einer fr\u00fcheren Phase des DevOps-Zyklus sicherere Ans\u00e4tze bereitstellen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/de\/partners\/alliance-partners\/redhat\/","og_locale":"de_DE","og_type":"article","og_title":"RedHat","og_description":"Erfahren Sie, wie CyberArk und RedHat CI\/CD-Pipelines automatisieren und sichern, indem sie die Sicherheit nach links verlagern und bereits in einer fr\u00fcheren Phase des DevOps-Zyklus sicherere Ans\u00e4tze bereitstellen.","og_url":"https:\/\/www.cyberark.com\/de\/partners\/alliance-partners\/redhat\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-12-17T06:24:27+00:00","twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"7 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/de\/partners\/alliance-partners\/redhat\/","url":"https:\/\/www.cyberark.com\/de\/partners\/alliance-partners\/redhat\/","name":"Applikationssicherheit und Automatisierung \u2013 CyberArk und Red Hat | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/de\/partners\/alliance-partners\/redhat\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/de\/partners\/alliance-partners\/redhat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/webinar-video-icon.svg","datePublished":"2022-02-24T14:30:20+00:00","dateModified":"2025-12-17T06:24:27+00:00","description":"Erfahren Sie, wie CyberArk und RedHat CI\/CD-Pipelines automatisieren und sichern, indem sie die Sicherheit nach links verlagern und bereits in einer fr\u00fcheren Phase des DevOps-Zyklus sicherere Ans\u00e4tze bereitstellen.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/de\/partners\/alliance-partners\/redhat\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/de\/partners\/alliance-partners\/redhat\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/de\/partners\/alliance-partners\/redhat\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/webinar-video-icon.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/01\/webinar-video-icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/de\/partners\/alliance-partners\/redhat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/de\/"},{"@type":"ListItem","position":2,"name":"Partner","item":"https:\/\/www.cyberark.com\/de\/partners\/"},{"@type":"ListItem","position":3,"name":"Alliance Partner","item":"https:\/\/www.cyberark.com\/de\/partners\/alliance-partners\/"},{"@type":"ListItem","position":4,"name":"RedHat"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/de\/#website","url":"https:\/\/www.cyberark.com\/de\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/de\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/220368","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=220368"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/220368\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/73625"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=220368"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=220368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}