{"id":223152,"date":"2026-01-22T14:23:54","date_gmt":"2026-01-22T19:23:54","guid":{"rendered":"https:\/\/www.cyberark.com\/solutions\/identity-governance\/"},"modified":"2026-02-19T09:53:11","modified_gmt":"2026-02-19T14:53:11","slug":"identity-governance","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/solutions\/identity-governance\/","title":{"rendered":"Identity Governance"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 hero dark&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h1>Identity Governance<\/h1>\n<p><\/p>\n<p class=\"lead\">Automatisieren Sie Least\u2011Privilege\u2011Zugriffe, erhalten Sie durchg\u00e4ngige Transparenz \u00fcber menschliche und maschinelle Identit\u00e4ten und eliminieren Sie manuellen Governance\u2011Aufwand.<\/p>\n<p>\n[\/vc_column_text][vc_btn title=&#8220;Demo anfordern&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Ftry-buy%2Fmodern-iga-demo%2F|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/choosing-the-right-iga-solution\">Buyer\u2019s Guide herunterladen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-2&#8243; offset=&#8220;vc_hidden-xs&#8220;][vc_column_text css=&#8220;&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"border-radius alignnone wp-image-221967 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/man-looking-at-data-on-laptop-optimized.jpg\" alt=\"Man looking at data on laptop\" width=\"528\" height=\"446\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 v3 products cybv2-pad box-row&#8220;][vc_column][vc_row_inner][vc_column_inner el_class=&#8220;mb-8&#8243; offset=&#8220;vc_col-lg-10&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<p class=\"head-content\">HERAUSFORDERUNGEN<\/p>\n<h2 class=\"h3\">Mit der rasanten Zunahme von Identit\u00e4ten wird auch deren Governance immer komplexer. <\/h2>\n<p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8220;yes&#8220;][vc_column_inner el_class=&#8220;icon-box mb-6&#8243; width=&#8220;1\/3&#8243; column_link=&#8220;title:Mehr%20erfahren|&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;pb-6&#8243;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-193304\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Warning-Icon.svg\" alt=\"Warning icon\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4>Manuelle Prozesse erh\u00f6hen das Risiko.<\/h4>\n<p>Bei den 87% der Unternehmen, die noch auf manuelle IGA\u2011Prozesse setzen, bleiben Access Sprawl und Privilege Drift weiterhin best\u00e4ndige Risikofaktoren.[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;chartreuse link-arrow-right pt-5&#8243;]<a href=\"https:\/\/www.cyberark.com\/resources\/modern-iga\/state-of-iga-the-manual-reality-checkpoint\">Mehr erfahren<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;icon-box mb-6&#8243; width=&#8220;1\/3&#8243; column_link=&#8220;title:Mehr%20erfahren|&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;pb-6&#8243;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-193521\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/09\/pay-icon.svg\" alt=\"Pay icon\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4>\u00c4nderungen im Identity Lifecycle sind schwer zu verwalten.<\/h4>\n<p>H\u00e4ufige Joiner\u2011, Mover\u2011 und Leaver\u2011Vorg\u00e4nge mit differenzierten Zugriffsanforderungen f\u00fchren zu \u00dcberprivilegierung und einer \u00dcberlastung des Ticket\u2011Systems. <br \/>Jetzt herunterladen<br \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;chartreuse link-arrow-right pt-5&#8243;]<a href=\"https:\/\/www.cyberark.com\/resources\/solution-briefs\/cyberark-provisioning\">Download Now<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;icon-box mb-6&#8243; width=&#8220;1\/3&#8243; column_link=&#8220;title:Mehr%20erfahren|&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;pb-6&#8243;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-193313\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Seamless-Overview-Vertical-Developer-Tools.svg\" alt=\"Seamless Overview Vertical Developer Tools Icons\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4>Begrenzte Identity\u2011Transparenz erh\u00f6ht die Angriffsfl\u00e4che.<\/h4>\n<p>Was Sie nicht sehen k\u00f6nnen, k\u00f6nnen Sie auch nicht kontrollieren.[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;chartreuse link-arrow-right pt-5&#8243;]<a href=\"https:\/\/www.cyberark.com\/de\/products\/modern-iga\/\">Weiterlesen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 cybv2-pad-btm&#8220;][vc_column offset=&#8220;vc_col-lg-10&#8243; el_class=&#8220;mb-4&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<p class=\"head-content\">L\u00d6SUNGEN<\/p>\n<h2 class=\"h3\">Identity Governance \u2013 einfach und sicher<\/h2>\n<p>\n[\/vc_column_text][\/vc_column][vc_column offset=&#8220;vc_col-lg-8&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<p class=\"lead\">Vereinheitlichen Sie die Transparenz, automatisieren Sie Zugriffsentscheidungen und reduzieren Sie Identit\u00e4tsrisiken f\u00fcr jede menschliche und maschinelle Identit\u00e4t. <\/p>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;seesaw-v2 cybv2-pad-btm-120 cyb-reverse v3&#8243;][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;column&#8220;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h3>Alle Identit\u00e4ten verwalten.<\/h3>\n<p>CyberArk stellt ein zentrales \u201eSystem of Record\u201c f\u00fcr alle Berechtigungen bereit \u2013 inklusive vollst\u00e4ndiger \u00c4nderungshistorie \u2013, sodass Teams jederzeit wissen, wer worauf Zugriff hat und warum. Zugriffs\u00fcberpr\u00fcfungen werden automatisiert und mit auditf\u00e4higen Evidence\u2011Paketen unterst\u00fctzt.[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-offset-1&#8243;][vc_single_image image=&#8220;221980&#8243; img_size=&#8220;full&#8220; css=&#8220;&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;seesaw-v2 cybv2-pad-btm-120&#8243;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;d-flex align-items-start&#8220;][vc_single_image image=&#8220;221989&#8243; img_size=&#8220;full&#8220; css=&#8220;&#8220;][\/vc_column][vc_column width=&#8220;5\/12&#8243; offset=&#8220;vc_col-lg-offset-1&#8243; el_class=&#8220;column&#8220;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h3>Mit KI den richtigen Zugriff definieren.<\/h3>\n<p>KI-Profile identifizieren Least\u2011Privilege\u2011Zugriffe, indem sie reale Berechtigungen in der gesamten Umgebung analysieren. So entfallen manuelle Role\u2011Mining\u2011Aufw\u00e4nde, und der Umfang der zu \u00fcberpr\u00fcfenden Zugriffe wird deutlich reduziert.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;seesaw-v2 cybv2-pad-btm-120 cyb-reverse v3&#8243;][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;column&#8220;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h3>Identit\u00e4tsrisiken proaktiv erkennen.<\/h3>\n<p>Decken Sie kontinuierlich Identit\u00e4tsrisiken auf, indem Sie Berechtigungen in allen Anwendungen \u00fcberwachen. Erhalten Sie Echtzeit-Warnmeldungen zu risikoreichen Zugriffen und fehlerhaften Berechtigungen, um Verst\u00f6\u00dfe gegen die Funktionstrennung (Segregation of Duties, SoD) und verwaiste Konten, die oft unbemerkt bleiben, schnell zu erkennen.[\/vc_column_text][vc_row_inner disable_element=&#8220;yes&#8220; el_class=&#8220;pt-4&#8243;][vc_column_inner][vc_btn title=&#8220;Demo anfordern&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;&#8220; link=&#8220;url:%23|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right pt-2 pl-3&#8243;]<a href=\"https:\/\/www.cyberark.com\/de\/solutions\/defend-against-attacks\/\">Entdecken Sie, wie<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-offset-1&#8243;][vc_single_image image=&#8220;221998&#8243; img_size=&#8220;full&#8220; css=&#8220;&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 cybv2-pad-top pb-10&#8243; css=&#8220;.vc_custom_1768582353560{background-color: #E8E8E3 !important;}&#8220;][vc_column][vc_row_inner][vc_column_inner el_class=&#8220;mb-4&#8243; offset=&#8220;vc_col-lg-10&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<p class=\"head-content\">ZENTRALE FUNKTIONEN &#038; FEATURES<\/p>\n<h2 class=\"h3\">Governance vereinheitlichen.<\/h2>\n<p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;mb-8&#8243; offset=&#8220;vc_col-lg-8&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<p class=\"lead\">Erweitern Sie Identity Governance \u00fcber die gesamte CyberArk Identity Security Platform hinweg und bringen Sie Zugriffs\u00fcberpr\u00fcfungen sowie Lifecycle\u2011Automatisierung in Einklang mit Privilegienkontrollen f\u00fcr menschliche und maschinelle Identit\u00e4ten.<\/p>\n<p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;cta-box mb-6&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;mb-6&#8243;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-112985\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/increased-automation.svg\" alt=\"Increased automation icon\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4>Zugriffs\u00fcberpr\u00fcfungen f\u00fcr Nutzer automatisieren.<\/h4>\n<p>Eliminieren Sie manuelle Tabellenkalkulationen durch automatisierte, KI-gest\u00fctzte Zugriffs\u00fcberpr\u00fcfungen und ein umfassendes, auditbereites Evidence\u2011Paket. [\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;cta-box mb-6&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;mb-6&#8243;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-121001\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/06\/Vendors-consolodated.svg\" alt=\"Vendors consolodated\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4>Lifecycle Management optimieren.<\/h4>\n<p>Automatisieren Sie Joiner-, Mover- und Leaver-Prozesse durch KI-gest\u00fctzte Zugriffsempfehlungen und effiziente Provisioning-Workflows. So reduzieren Sie die Ticket-Last, verhindern Access Drift und steigern die Produktivit\u00e4t.[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;cta-box mb-6&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;mb-6&#8243;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-129929\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/02\/oversight-icon.svg\" alt=\"Oversight icon\" width=\"39\" height=\"45\" \/>[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4>Kontinuierliche Identity\u2011Transparenz gewinnen.<\/h4>\n<p>Erhalten Sie eine einheitliche Sicht auf menschliche und maschinelle Identit\u00e4ten, erkennen Sie SoD\u2011Konflikte und verwaiste Konten und \u00fcberwachen Sie Berechtigungen in Echtzeit, um Risiken zu reduzieren und Ihre Sicherheitslage zu st\u00e4rken.[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 dark stat-component&#8220;][vc_column][vc_row_inner el_class=&#8220;heading&#8220;][vc_column_inner offset=&#8220;vc_col-lg-8&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<p class=\"head-content\">VORTEILE UND MEHRWERT<\/p>\n<h2 class=\"h3\">Die Governance-L\u00fccke schlie\u00dfen.<\/h2>\n<p>Integrationsherausforderungen bei Anwendungen halten Teams in manuellen Reviews und ticketbasierten Provisioning\u2011Prozessen fest \u2013 und erzeugen Blind Spots, \u00fcberm\u00e4\u00dfige Berechtigungen und ein wachsendes Identit\u00e4tsrisiko.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8220;yes&#8220; el_class=&#8220;progress-component&#8220;][vc_column_inner width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-3&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;text-lg&#8220;]<\/p>\n<div class=\"h2\">84%<\/div>\n<p>f\u00fchren IGA manuell durch, weil sich Anwendungen nur schwer integrieren lassen.[\/vc_column_text][vc_raw_html css=&#8220;&#8220;]PGRpdiBjbGFzcz0icHJvZ3Jlc3MtYmFyLWNvbnRhaW5lciI+DQogIDxkaXYgY2xhc3M9InByb2dyZXNzLWJhciBwcm9ncmVzcy1iYXItcHVycGxlIiBkYXRhLXBlcmNlbnRhZ2U9Ijg0Ij48L2Rpdj48YnI+PC9kaXY+[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-3&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;text-lg&#8220;]<\/p>\n<div class=\"h2\">73%<\/div>\n<p>geben an, dass \u00fcberm\u00e4\u00dfige Privilegien ein gro\u00dfes Risiko darstellen.[\/vc_column_text][vc_raw_html css=&#8220;&#8220;]PGRpdiBjbGFzcz0icHJvZ3Jlc3MtYmFyLWNvbnRhaW5lciI+DQogIDxkaXYgY2xhc3M9InByb2dyZXNzLWJhciBwcm9ncmVzcy1iYXItZ3JlZW4iIGRhdGEtcGVyY2VudGFnZT0iNzMiPjwvZGl2Pjxicj48L2Rpdj4=[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-3&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;text-lg&#8220;]<\/p>\n<div class=\"h2\">55%<\/div>\n<p>ben\u00f6tigen mehr als 7 Tage f\u00fcr das Provisioning \u2013 und 90% haben Schwierigkeiten mit der Rollenverwaltung.[\/vc_column_text][vc_raw_html css=&#8220;&#8220;]PGRpdiBjbGFzcz0icHJvZ3Jlc3MtYmFyLWNvbnRhaW5lciI+DQo8ZGl2IGNsYXNzPSJwcm9ncmVzcy1iYXIgcHJvZ3Jlc3MtYmFyLWJsdWUiIGRhdGEtcGVyY2VudGFnZT0iNTUiPjwvZGl2Pjxicj48L2Rpdj48YnI+[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-3&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;text-lg&#8220;]<\/p>\n<div class=\"h2\">63%<\/div>\n<p>umgehen Zugriffsregeln aufgrund langsamer Governance.[\/vc_column_text][vc_raw_html css=&#8220;&#8220;]PGRpdiBjbGFzcz0icHJvZ3Jlc3MtYmFyLWNvbnRhaW5lciI+DQogIDxkaXYgY2xhc3M9InByb2dyZXNzLWJhciBwcm9ncmVzcy1iYXItcHVycGxlIiBkYXRhLXBlcmNlbnRhZ2U9IjYzIj48L2Rpdj48YnI+PC9kaXY+[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2&#8243;][vc_column el_class=&#8220;mb-8&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<p class=\"head-content\">RESSOURCEN<\/p>\n<h3>Beenden Sie das Planen (oder Aufschieben) Ihres IGA\u2011Projekts. Lesen Sie zuerst diese Informationen. <\/h3>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column&#8220;][vc_column el_class=&#8220;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8220;.vc_custom_1768285275627{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;new_hpstyle_section8_uberflip&#8220;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 partners cybv2-pad box-row cyb-background-lt bgimg-hide-mobile&#8220; css=&#8220;.vc_custom_1768583239473{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_column][vc_row_inner][vc_column_inner offset=&#8220;vc_col-lg-10&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<p class=\"head-content\">VERTRAUENSMERKMALE<\/p>\n<h2 class=\"h3\">Integrationen<\/h2>\n<p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8220;mb-8&#8243; offset=&#8220;vc_col-lg-8&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;mb-4&#8243;]<\/p>\n<p class=\"lead\">Durchsuchen Sie unseren Online-Marktplatz nach IGA-Integrationen<\/p>\n<p>\n[\/vc_column_text][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/modern-iga-integrations\/\">Weitere Integrationen anzeigen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2&#8243;][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;222016&#8243; img_size=&#8220;full&#8220; alignment=&#8220;center&#8220; css=&#8220;&#8220; el_class=&#8220;partner-logo&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;222007&#8243; img_size=&#8220;full&#8220; alignment=&#8220;center&#8220; css=&#8220;&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;222025&#8243; img_size=&#8220;full&#8220; alignment=&#8220;center&#8220; css=&#8220;&#8220; el_class=&#8220;partner-logo&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;222034&#8243; img_size=&#8220;full&#8220; alignment=&#8220;center&#8220; css=&#8220;&#8220; el_class=&#8220;partner-logo&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;222043&#8243; img_size=&#8220;full&#8220; alignment=&#8220;center&#8220; css=&#8220;&#8220; el_class=&#8220;partner-logo&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;222052&#8243; img_size=&#8220;full&#8220; alignment=&#8220;center&#8220; css=&#8220;&#8220; el_class=&#8220;partner-logo&#8220;][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 mt-4&#8243;][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;222061&#8243; img_size=&#8220;full&#8220; alignment=&#8220;center&#8220; css=&#8220;&#8220; el_class=&#8220;partner-logo&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;222070&#8243; img_size=&#8220;full&#8220; alignment=&#8220;center&#8220; css=&#8220;&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;222079&#8243; img_size=&#8220;full&#8220; alignment=&#8220;center&#8220; css=&#8220;&#8220; el_class=&#8220;partner-logo&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;222088&#8243; img_size=&#8220;full&#8220; alignment=&#8220;center&#8220; css=&#8220;&#8220; el_class=&#8220;partner-logo&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;222097&#8243; img_size=&#8220;full&#8220; alignment=&#8220;center&#8220; css=&#8220;&#8220; el_class=&#8220;partner-logo&#8220;][\/vc_column_inner][vc_column_inner el_class=&#8220;partner-box&#8220; width=&#8220;1\/6&#8243; offset=&#8220;vc_col-lg-2 vc_col-md-2 vc_col-xs-6&#8243;][vc_single_image image=&#8220;222106&#8243; img_size=&#8220;full&#8220; alignment=&#8220;center&#8220; css=&#8220;&#8220; el_class=&#8220;partner-logo&#8220;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 fullaccordion2 cybv2-pad acc1&#8243;][vc_column][vc_column_text css=&#8220;&#8220; el_class=&#8220;heading&#8220;]<\/p>\n<p class=\"head-content\">FAQ<\/p>\n<h3>H\u00e4ufig gestellte Fragen<\/h3>\n<p>\n[\/vc_column_text][vc_tta_accordion shape=&#8220;square&#8220; color=&#8220;white&#8220; c_icon=&#8220;&#8220; active_section=&#8220;1&#8243; css_animation=&#8220;none&#8220; collapsible_all=&#8220;true&#8220;][vc_tta_section title=&#8220;Wodurch unterscheidet sich CyberArk IGA von Legacy\u2011IGA\u2011L\u00f6sungen? &#8220; tab_id=&#8220;general-1&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;padding-content-img&#8220;]Traditionelle IGA\u2011Tools wurden f\u00fcr statische On\u2011Prem\u2011Umgebungen entwickelt und st\u00fctzen sich stark auf individuelle Professional\u2011Services\u2011Projekte sowie manuelle Prozesse, um Funktionsl\u00fccken zu schlie\u00dfen. CyberArk IGA ist dagegen speziell f\u00fcr moderne, hybride Unternehmen konzipiert: mit Automatisierung, KI\u2011gest\u00fctzter Intelligenz und kontinuierlichen Kontrollen, die Identity Governance zug\u00e4nglicher, handlungsorientierter und sicherheitsfokussierter machen.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8220;Ist CyberArk IGA nur f\u00fcr gro\u00dfe Unternehmen mit ausgereiften IAM-Programmen geeignet?&#8220; tab_id=&#8220;general-2&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;padding-content-img&#8220;]Nein. CyberArk IGA ist so konzipiert, dass Unternehmen auf jeder Stufe ihrer Identity-Governance-Entwicklung unterst\u00fctzt werden. Teams k\u00f6nnen mit grundlegender Transparenz oder automatisierten Zugriffs\u00fcberpr\u00fcfungen beginnen, um sofortigen Mehrwert zu generieren, und den Umfang mit der Zeit erweitern. Dieser Ansatz erm\u00f6glicht schnelle Erfolge und bildet gleichzeitig das Fundament f\u00fcr eine umfassende Identity-Security-Strategie.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8220;Ben\u00f6tige ich individuelle Professional Services, um Anwendungen in CyberArk IGA zu integrieren?&#8220; tab_id=&#8220;general-3&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;padding-content-img&#8220;]Nein. CyberArk IGA ist darauf ausgelegt, Anwendungen ohne umfangreiche oder individuelle Professional Services anzubinden. Neben Out-of-the-box-Integrationen und flexiblen Konnektoren nutzt CyberArk Robotic Process Automation (RPA), um die Anbindung von Anwendungen ohne eigene APIs zu automatisieren. Dies erm\u00f6glicht es Unternehmen, deutlich schneller mehr Apps unter eine zentrale Governance zu bringen.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8220;Integriert sich CyberArk IGA mit CyberArk PAM?&#8220; tab_id=&#8220;general-4&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;padding-content-img&#8220;]Ja. CyberArk IGA integriert sich nahtlos mit CyberArk PAM und bietet umfassende Transparenz sowie Governance \u00fcber Safes, Gruppen und Nutzer. Privileged\u2011Access\u2011Reviews werden zudem deutlich einfacher \u2013 dank intuitiver User\u2011Access\u2011Review\u2011Workflows, einer \u00fcbersichtlichen Oberfl\u00e4che und einem auditf\u00e4higen Evidence\u2011Paket. [\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8220;Wie unterst\u00fctzt CyberArk IGA die Einhaltung von Compliance-Anforderungen?&#8220; tab_id=&#8220;features-and-capabilities-1&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;padding-content-img&#8220;]CyberArk hilft Unternehmen dabei, regulatorische und Audit\u2011Vorgaben \u2013 darunter Frameworks wie SOX, HIPAA, PCI DSS, ISO\u202f27001, DORA, NIST, GDPR, NYDFS, NYDOH und weitere globale Standards \u2013 zu erf\u00fcllen. Dies gelingt durch die Automatisierung periodischer User\u2011Access\u2011Reviews, die Durchsetzung von Segregation\u2011of\u2011Duties (SoD)-Richtlinien sowie vollst\u00e4ndig auditierbare Entscheidungswege und ein robustes Evidence\u2011Paket.[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 get-started cybv2-pad&#8220; css=&#8220;.vc_custom_1768286013903{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2026\/01\/CTA-image_1300x392.jpg?id=222111) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_column width=&#8220;2\/3&#8243; el_class=&#8220;stat-column text-center&#8220; offset=&#8220;vc_col-md-offset-2&#8243;][vc_column_text css=&#8220;&#8220; el_class=&#8220;extra-space chartreuse&#8220;]<\/p>\n<h3 style=\"color: white;\">Bereit, Ihre Governance\u2011Strategie neu auszurichten?<\/h3>\n<p>\n[\/vc_column_text][vc_btn title=&#8220;Eine Demo vereinbaren&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Frequest-demo%2F|title:Kontakt|&#8220; el_class=&#8220;cybv2-button-solid-chartreuse mt-8&#8243;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 hero dark&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243;][vc_column_text css=&#8220;&#8220;] Identity Governance Automatisieren Sie Least\u2011Privilege\u2011Zugriffe, erhalten Sie durchg\u00e4ngige Transparenz \u00fcber menschliche und maschinelle Identit\u00e4ten und eliminieren Sie manuellen Governance\u2011Aufwand. [\/vc_column_text][vc_btn title=&#8220;Demo anfordern&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220;&#8230;<\/p>\n","protected":false},"author":259,"featured_media":0,"parent":32302,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-223152","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CyberArk IGA: Automatisierung von Zugriffs\u00fcberpr\u00fcfungen und Lifecycle Management | CyberArk<\/title>\n<meta name=\"description\" content=\"Modernisieren Sie die Identity Governance mit automatisierten Zugriffs\u00fcberpr\u00fcfungen, Lifecycle Management und kontinuierlicher Transparenz \u00fcber alle Identit\u00e4ten hinweg \u2013 mit CyberArk Modern IGA.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/identity-governance\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity Governance\" \/>\n<meta property=\"og:description\" content=\"Modernisieren Sie die Identity Governance mit automatisierten Zugriffs\u00fcberpr\u00fcfungen, Lifecycle Management und kontinuierlicher Transparenz \u00fcber alle Identit\u00e4ten hinweg \u2013 mit CyberArk Modern IGA.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/identity-governance\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-19T14:53:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2026\/01\/govern-indentities-OG-img-1200x630-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/identity-governance\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/identity-governance\/\",\"name\":\"CyberArk IGA: Automatisierung von Zugriffs\u00fcberpr\u00fcfungen und Lifecycle Management | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/identity-governance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/identity-governance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/man-looking-at-data-on-laptop-optimized.jpg\",\"datePublished\":\"2026-01-22T19:23:54+00:00\",\"dateModified\":\"2026-02-19T14:53:11+00:00\",\"description\":\"Modernisieren Sie die Identity Governance mit automatisierten Zugriffs\u00fcberpr\u00fcfungen, Lifecycle Management und kontinuierlicher Transparenz \u00fcber alle Identit\u00e4ten hinweg \u2013 mit CyberArk Modern IGA.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/identity-governance\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/identity-governance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/identity-governance\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/man-looking-at-data-on-laptop-optimized.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/man-looking-at-data-on-laptop-optimized.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/identity-governance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L\u00f6sungen f\u00fcr Identity Security\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Identity Governance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CyberArk IGA: Automatisierung von Zugriffs\u00fcberpr\u00fcfungen und Lifecycle Management | CyberArk","description":"Modernisieren Sie die Identity Governance mit automatisierten Zugriffs\u00fcberpr\u00fcfungen, Lifecycle Management und kontinuierlicher Transparenz \u00fcber alle Identit\u00e4ten hinweg \u2013 mit CyberArk Modern IGA.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/identity-governance\/","og_locale":"de_DE","og_type":"article","og_title":"Identity Governance","og_description":"Modernisieren Sie die Identity Governance mit automatisierten Zugriffs\u00fcberpr\u00fcfungen, Lifecycle Management und kontinuierlicher Transparenz \u00fcber alle Identit\u00e4ten hinweg \u2013 mit CyberArk Modern IGA.","og_url":"https:\/\/www.cyberark.com\/solutions\/identity-governance\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-02-19T14:53:11+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2026\/01\/govern-indentities-OG-img-1200x630-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"7 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/identity-governance\/","url":"https:\/\/www.cyberark.com\/solutions\/identity-governance\/","name":"CyberArk IGA: Automatisierung von Zugriffs\u00fcberpr\u00fcfungen und Lifecycle Management | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/solutions\/identity-governance\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/solutions\/identity-governance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/man-looking-at-data-on-laptop-optimized.jpg","datePublished":"2026-01-22T19:23:54+00:00","dateModified":"2026-02-19T14:53:11+00:00","description":"Modernisieren Sie die Identity Governance mit automatisierten Zugriffs\u00fcberpr\u00fcfungen, Lifecycle Management und kontinuierlicher Transparenz \u00fcber alle Identit\u00e4ten hinweg \u2013 mit CyberArk Modern IGA.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/identity-governance\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/identity-governance\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/solutions\/identity-governance\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/man-looking-at-data-on-laptop-optimized.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/man-looking-at-data-on-laptop-optimized.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/identity-governance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"L\u00f6sungen f\u00fcr Identity Security","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Identity Governance"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/223152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=223152"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/223152\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32302"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=223152"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=223152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}