{"id":32241,"date":"2017-06-22T07:53:48","date_gmt":"2017-06-22T11:53:48","guid":{"rendered":"https:\/\/www.cyberark.com\/enisa\/"},"modified":"2020-07-16T21:01:37","modified_gmt":"2020-07-17T01:01:37","slug":"enisa","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/solutions\/audit-compliance\/enisa\/","title":{"rendered":"ENISA"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;top&#8220; css=&#8220;.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/aud-comp-hero.jpg?id=26743) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cyb-hero-section&#8220;][vc_column][vc_row_inner content_placement=&#8220;middle&#8220; el_class=&#8220;cyb-hero-header&#8220;][vc_column_inner el_class=&#8220;cyb-hero-header-text&#8220;][vc_custom_heading text=&#8220;ENISA&#8220; font_container=&#8220;tag:h1|text_align:left&#8220; use_theme_fonts=&#8220;yes&#8220;][vc_btn title=&#8220;WHITEPAPER HERUNTERLADEN&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;#ffffff&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fresource%2Fisolation-control-monitoring-next-generation-jump-servers%2F|&#8220; el_class=&#8220;cyb-button xlarge event-click&#8220; el_id=&#8220;ENISA Page: Download Whitepaper&#8220;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column css=&#8220;.vc_custom_1538257616782{padding-top: 2rem !important;padding-bottom: 2rem !important;}&#8220;][vc_column_text]<\/p>\n<h4>Privilegierte Accounts und ihre Nutzung in der Smart-Grid-Infrastruktur sichern, verwalten und \u00fcberwachen<\/h4>\n<p>Effiziente, nachhaltige und zuverl\u00e4ssige Methoden zur Energiegewinnung und -verteilung sorgen f\u00fcr eine zunehmende Verbreitung intelligenter Stromnetze. Die Kehrseite der Medaille sind immer h\u00e4ufigere und komplexere Cyberangriffe auf Energieversorger. Um auch k\u00fcnftig eine zuverl\u00e4ssige Energieversorgung gew\u00e4hrleisten zu k\u00f6nnen, m\u00fcssen Smart-Grid-Infrastrukturen daher umfassend gesch\u00fctzt werden.<\/p>\n<p>Der Bericht \u00fcber Internet-Sicherheitsma\u00dfnahmen f\u00fcr Smart Grids der Europ\u00e4ischen Agentur f\u00fcr Netz- und Informationssicherheit (ENISA) hilft Anbietern von Smart Grids in Europa dabei, Sicherheit und Stabilit\u00e4t ihrer Infrastrukturen mit einer Reihe von minimalen Sicherheitsma\u00dfnahmen zu verbessern.<\/p>\n<p>Mit der <a href=\"https:\/\/www.cyberark.com\/de\/products\/privileged-account-security-solution\/\">Privileged Access Security L\u00f6sung von CyberArk<\/a> lassen sich zahlreiche Aspekte der ENISA-Empfehlungen umsetzen, darunter:<\/p>\n<ul>\n<li>Management dritter Parteien<\/li>\n<li>Pr\u00fcfung und Haftbarkeit<\/li>\n<li>Sicherheit von Informationssystemen<\/li>\n<li>Netzwerksicherheit<\/li>\n<\/ul>\n<p>L\u00f6sungen von CyberArk bieten Kontrollmechanismen zur zentralen Sicherung, Verwaltung und \u00dcberwachung privilegierter Konten und ihrer Nutzung in Smart-Grid-Infrastrukturen. Dies beinhaltet auch eine umfassende <a href=\"https:\/\/www.cyberark.com\/de\/products\/privileged-account-security-solution\/privileged-session-manager\/\"> \u00dcberwachung von Aktivit\u00e4ten<\/a> privilegierter Benutzer.<\/p>\n<p><strong>Vorteile<\/strong>:<\/p>\n<ul>\n<li>Sicherstellung pers\u00f6nlicher Verantwortlichkeit bei der Nutzung privilegierter oder gemeinsamer Konten<\/li>\n<li>sicherer Remote-Zugriff f\u00fcr externe Drittanbieter oder Dienstleister mit Echtzeit-\u00dcberwachung<\/li>\n<li>sichere Speicherung von privilegierten Anmeldedaten und Session-Aufzeichnungen im zugriffssicheren, patentierten Digital Vault von CyberArk<\/li>\n<li>zentrale Durchsetzung unternehmensweiter Richtlinien und Workflows f\u00fcr Zugriffe mit flexibler Unterst\u00fctzung unterschiedlichster Gesch\u00e4ftsprozesse<\/li>\n<li>Pr\u00fcfung und \u00dcberwachung privilegierter Accounts und Aktivit\u00e4ten mit integrierten oder benutzerdefinierten Berichten<\/li>\n<li>Einrichtung privilegierter Sessions ohne Preisgabe sensibler Anmeldedaten<\/li>\n<li>Aufzeichnung privilegierter Sessions f\u00fcr kontextbasierte Wiedergabe<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;top&#8220; css=&#8220;.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/aud-comp-hero.jpg?id=26743) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cyb-hero-section&#8220;][vc_column][vc_row_inner content_placement=&#8220;middle&#8220; el_class=&#8220;cyb-hero-header&#8220;][vc_column_inner el_class=&#8220;cyb-hero-header-text&#8220;][vc_custom_heading text=&#8220;ENISA&#8220; font_container=&#8220;tag:h1|text_align:left&#8220; use_theme_fonts=&#8220;yes&#8220;][vc_btn title=&#8220;WHITEPAPER HERUNTERLADEN&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;#ffffff&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fresource%2Fisolation-control-monitoring-next-generation-jump-servers%2F|&#8220; el_class=&#8220;cyb-button xlarge event-click&#8220; el_id=&#8220;ENISA Page: Download Whitepaper&#8220;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column css=&#8220;.vc_custom_1538257616782{padding-top: 2rem&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":32278,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-32241","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>ENISA Smart Grid-Infrastruktur: CyberArk L\u00f6sungen<\/title>\n<meta name=\"description\" content=\"ENISA-Compliance-L\u00f6sungen von CyberArk erm\u00f6glichen die Sicherung, Verwaltung und \u00dcberwachung privilegierter Accounts und ihrer Nutzung in Smart-Grid-Infrastrukturen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/enisa\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ENISA\" \/>\n<meta property=\"og:description\" content=\"ENISA-Compliance-L\u00f6sungen von CyberArk erm\u00f6glichen die Sicherung, Verwaltung und \u00dcberwachung privilegierter Accounts und ihrer Nutzung in Smart-Grid-Infrastrukturen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/enisa\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-17T01:01:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/enisa\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/enisa\/\",\"name\":\"ENISA Smart Grid-Infrastruktur: CyberArk L\u00f6sungen\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"datePublished\":\"2017-06-22T11:53:48+00:00\",\"dateModified\":\"2020-07-17T01:01:37+00:00\",\"description\":\"ENISA-Compliance-L\u00f6sungen von CyberArk erm\u00f6glichen die Sicherung, Verwaltung und \u00dcberwachung privilegierter Accounts und ihrer Nutzung in Smart-Grid-Infrastrukturen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/enisa\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/enisa\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/enisa\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L\u00f6sungen f\u00fcr Identity Security\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Audit und Compliance\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"ENISA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"ENISA Smart Grid-Infrastruktur: CyberArk L\u00f6sungen","description":"ENISA-Compliance-L\u00f6sungen von CyberArk erm\u00f6glichen die Sicherung, Verwaltung und \u00dcberwachung privilegierter Accounts und ihrer Nutzung in Smart-Grid-Infrastrukturen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/enisa\/","og_locale":"de_DE","og_type":"article","og_title":"ENISA","og_description":"ENISA-Compliance-L\u00f6sungen von CyberArk erm\u00f6glichen die Sicherung, Verwaltung und \u00dcberwachung privilegierter Accounts und ihrer Nutzung in Smart-Grid-Infrastrukturen.","og_url":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/enisa\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2020-07-17T01:01:37+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"2 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/enisa\/","url":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/enisa\/","name":"ENISA Smart Grid-Infrastruktur: CyberArk L\u00f6sungen","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"datePublished":"2017-06-22T11:53:48+00:00","dateModified":"2020-07-17T01:01:37+00:00","description":"ENISA-Compliance-L\u00f6sungen von CyberArk erm\u00f6glichen die Sicherung, Verwaltung und \u00dcberwachung privilegierter Accounts und ihrer Nutzung in Smart-Grid-Infrastrukturen.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/enisa\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/audit-compliance\/enisa\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/enisa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"L\u00f6sungen f\u00fcr Identity Security","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Audit und Compliance","item":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/"},{"@type":"ListItem","position":4,"name":"ENISA"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32241","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=32241"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32241\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32278"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=32241"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=32241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}