{"id":32304,"date":"2017-06-13T15:11:57","date_gmt":"2017-06-13T19:11:57","guid":{"rendered":"https:\/\/www.cyberark.com\/products\/"},"modified":"2026-02-16T06:36:57","modified_gmt":"2026-02-16T11:36:57","slug":"products","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/products\/","title":{"rendered":"Produkte"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cybv2 int-hero-full impact-hero dark&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243; css=&#8220;.vc_custom_1623332891297{margin-bottom: 50px !important;}&#8220;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h2>Sichern Sie jede Identit\u00e4t, \u00fcberall.<\/h2>\n<p><\/p>\n<h3>Jede Identit\u00e4t kann zu einer privilegierten Identit\u00e4t werden. Das bedeutet, dass jede menschliche, maschinelle und KI-Identit\u00e4t einen potenziellen Angriffspfad darstellt. In einer Welt, in der Ihre digitalen Mitarbeiter \u00fcber Administratorrechte verf\u00fcgen und keine R\u00fccksicht nehmen, ben\u00f6tigen Sie eine Sicherheitsplattform, die alles sieht und alles sch\u00fctzt.\u200b<\/h3>\n<p>\n[\/vc_column_text][vc_btn title=&#8220;Lieferantenbewertung erhalten&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; css=&#8220;&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fanalyst-reports%2Fidc-marketscape-worldwide-integrated-solutions|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/resources\/ebooks\/worauf-sie-bei-einer-identity-security-plattform-achten-sollten\">Lesen Sie den Buyer\u2019s Guide<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 cybv2-pad-top text-md-center&#8220;][vc_column][vc_column_text css=&#8220;&#8220;]<\/p>\n<h2>CyberArk Identity Security Plattform<\/h2>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 cybv2-pad-btm text-md-center&#8220;][vc_column width=&#8220;2\/3&#8243; offset=&#8220;vc_col-sm-offset-2&#8243;][vc_column_text css=&#8220;&#8220;]<\/p>\n<h5>Einheitliche L\u00f6sung zum Schutz all Ihrer Identit\u00e4ten. Wir helfen Ihnen, schneller zu agieren, Risiken zu reduzieren und Ihren Sicherheitsstack zu vereinfachen\u00a0\u2013 alles auf einer einzigen, intuitiven Plattform.<\/h5>\n<p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;seesaw-v2 cybv2 seesaw-v2 cybv2-pad-btm cyb-reverse cybv2&#8243;][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;column&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;dark pb-4&#8243;]<\/p>\n<h4>Alles im Blick mit kontinuierlicher Erkennung und Kontextbez\u00fcgen.<\/h4>\n<p>Sie k\u00f6nnen nicht sch\u00fctzen, was Sie nicht sehen k\u00f6nnen. Das Problem ist, dass neue Identit\u00e4ten \u2013 von Menschen, Maschinen, Secrets, Zertifikaten \u2013 schneller auftauchen, als Sie sie verfolgen k\u00f6nnen. Es ist, als w\u00fcrde man versuchen, die Autos auf einer zehnspurigen Autobahn w\u00e4hrend der Hauptverkehrszeit zu z\u00e4hlen.<\/p>\n<p>Unsere Plattform bietet Ihnen die Transparenz, die Sie ben\u00f6tigen. Wir erkennen kontinuierlich jede Identit\u00e4t in Ihrer Umgebung, von der Cloud bis zum On-Premise. Wir f\u00fcgen dann einen risikobasierten Kontext hinzu, der Ihnen hilft, Priorit\u00e4ten zu setzen und das Onboarding zu automatisieren, damit nichts durch das Raster f\u00e4llt.[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-offset-1&#8243;][vc_single_image image=&#8220;111962&#8243; img_size=&#8220;full&#8220; css=&#8220;&#8220; el_class=&#8220;border-radius&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;seesaw-v2 cybv2&#8243;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;d-flex align-items-start&#8220;][vc_single_image image=&#8220;114247&#8243; img_size=&#8220;full&#8220; css=&#8220;&#8220;][\/vc_column][vc_column width=&#8220;5\/12&#8243; offset=&#8220;vc_col-lg-offset-1&#8243; el_class=&#8220;column&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;dark pb-4&#8243;]<\/p>\n<h4>Zugriff kontrollieren mit modernen Privilegienverwaltungen<\/h4>\n<p>Jedem die Schl\u00fcssel zur Schatzkammer zu geben, ist das Rezept f\u00fcr eine Katastrophe. Aber auch die Verwaltung von Anmeldedaten, Authentifizierung, Sessions und Berechtigungen f\u00fcr Tausende von Identit\u00e4ten kann sich chaotisch anf\u00fchlen.<\/p>\n<p>Wir bringen Ordnung in dieses Chaos. Unsere Plattform erzwingt Least Privilege mit modernen Kontrollen, die f\u00fcr die heutigen Bedrohungen entwickelt wurden.<\/p>\n<p><strong>Alle Anmeldedaten sichern:<\/strong> Verwalten Sie Passw\u00f6rter, Secrets und Schl\u00fcssel mit postquantumf\u00e4higer Bereitschaft.<\/p>\n<p><strong>Gew\u00e4hren Sie Zugang zu  Ihren Bedingungen:<\/strong> Verwenden Sie Just-In-Time und Zero Standing Privilege, um sicherzustellen, dass der Zugriff nur bei Bedarf gew\u00e4hrt und danach automatisch entfernt wird.<\/p>\n<p><strong>Jede Session \u00fcberwachen:<\/strong> Behalten Sie privilegierte Aktivit\u00e4ten mit modernem Session-Management im Blick, das klare, umsetzbare Erkenntnisse liefert.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;seesaw-v2 cybv2-pad-120 cyb-reverse cybv2&#8243;][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;column&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;dark pb-4&#8243;]<\/p>\n<h4>Richtlinien intelligent automatisieren<\/h4>\n<p>Das manuelle Erstellen und Aktualisieren von Sicherheitsrichtlinien f\u00fcr jede Identit\u00e4t ist nicht nachhaltig. Es ist auch anf\u00e4llig f\u00fcr menschliche Fehler. Unsere Plattform automatisiert die Richtliniendurchsetzung basierend auf Risiko, Kontext und Informationen von CORA AI. Von der nahtlosen, KI-gest\u00fctzten Credential-Rotation bis hin zum intelligenten Berechtigungsmanagement unterst\u00fctzen wir Sie dabei, die richtigen Richtlinien konsistent und in gro\u00dfem Ma\u00dfstab durchzusetzen.[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-offset-1&#8243;][vc_single_image image=&#8220;114256&#8243; img_size=&#8220;full&#8220; css=&#8220;.vc_custom_1753989262655{border-radius: 5px !important;}&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;seesaw-v2 cybv2&#8243;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;d-flex align-items-start&#8220;][vc_single_image image=&#8220;110400&#8243; img_size=&#8220;full&#8220; css=&#8220;&#8220;][\/vc_column][vc_column width=&#8220;5\/12&#8243; offset=&#8220;vc_col-lg-offset-1&#8243; el_class=&#8220;column&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;dark pb-4&#8243;]<\/p>\n<h4>Verwalten Sie den gesamten Identity Lifecycle<\/h4>\n<p>Identit\u00e4ten sind nicht statisch. Menschen kommen, wechseln Rollen und gehen. Maschinen werden hochgefahren und auch wieder stillgelegt. Unsere Plattform, die durch die Zilla Security-Integration optimiert wurde, bietet ein umfassendes Lifecycle-Management sowie Identity Governance and Administration (IGA). Wir verwenden KI-gest\u00fctzte Empfehlungen, um die Bereitstellung zu beschleunigen, Zugriffspr\u00fcfungen zu optimieren und Berechtigungen zu verwalten, sodass Identit\u00e4ten in jeder Phase den richtigen Zugriff haben.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;seesaw-v2 cybv2-pad-120 cyb-reverse cybv2&#8243;][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;column&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;dark pb-4&#8243;]<\/p>\n<h4>Verbessern Sie Ihre Audits mit einheitlicher Governance und Compliance<\/h4>\n<p>Wenn die Auditsaison l\u00e4uft, ist das Letzte, was Sie sich w\u00fcnschen, ein hektisches Herumsuchen nach Nachweisen. Wir machen Governance und Compliance einfach. Die Plattform vereinfacht den Zugriff, zentralisiert Audits und macht das Sammeln von Nachweisen zum Kinderspiel. Mit Integrationen f\u00fcr alle Ihre Apps \u2013 Cloud, Eigenentwicklungen und On-Premise \u2013 erhalten Sie eine umfassende, automatisierte \u00dcbersicht \u00fcber den Zugriff, was es einfacher macht, die Compliance nachzuweisen und die Stakeholder zufriedenzustellen.[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-offset-1&#8243;][vc_single_image image=&#8220;212844&#8243; img_size=&#8220;full&#8220; css=&#8220;.vc_custom_1753989389883{border-radius: 5px !important;}&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;seesaw-v2 cybv2&#8243;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;d-flex align-items-start&#8220;][vc_single_image image=&#8220;213226&#8243; img_size=&#8220;full&#8220; css=&#8220;&#8220;][\/vc_column][vc_column width=&#8220;5\/12&#8243; offset=&#8220;vc_col-lg-offset-1&#8243; el_class=&#8220;column&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;dark pb-4&#8243;]<\/p>\n<h4>Vereinfachen Sie alles mit dem Control Center<\/h4>\n<p>Sicherheitstools sollten keinen Doktorgrad erfordern, um zu funktionieren. Unser einheitliches Control Center ist der zentrale Anlaufpunkt f\u00fcr Administratoren und Endbenutzer. Es rationalisiert administrative Aufgaben und bietet Usern einen sicheren, intuitiven Zugriff auf die Ressourcen, die sie f\u00fcr ihre Arbeit ben\u00f6tigen\u00a0\u2013 ohne ein Dutzend verschiedener Logins oder umst\u00e4ndlicher Schnittstellen. An einem Ort k\u00f6nnen Sie alles sicher verwalten und darauf zugreifen.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;seesaw-v2 cybv2-pad-120 cyb-reverse cybv2&#8243;][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;column&#8220;][vc_column_text css=&#8220;&#8220; el_class=&#8220;dark pb-4&#8243;]<\/p>\n<h4>Intelligenter arbeiten mit CORA AI<\/h4>\n<p>Lernen Sie CORA kennen, die in unsere Plattform eingebettete KI-Engine. Betrachten Sie ihn als den sch\u00e4rfsten Analysten in Ihrem Team, der 24\/7 arbeitet, um Probleme zu erkennen, bevor sie beginnen. CORA ist nicht nur eine weitere Zusatzfunktion; Es ist die Intelligenz, die die gesamte Plattform effektiver macht.<\/p>\n<p>CORA AI hilft Ihnen:<\/p>\n<p><strong>Auff\u00e4lligkeiten erkennen:<\/strong> Es erkennt risikoreiches Verhalten, das Menschen \u00fcbersehen k\u00f6nnten.<\/p>\n<p><strong>Schnellere Auditsitzungen:<\/strong> Erhalten Sie KI-gesteuerte Zusammenfassungen privilegierter Sessions und verwandeln Sie Stunden der \u00dcberpr\u00fcfung in Minuten.<\/p>\n<p><strong>Zuverl\u00e4ssige Compliance<\/strong> Erhalten Sie intelligente Richtlinienempfehlungen und Hilfe bei der Fehlerbehebung und dem Onboarding.[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; offset=&#8220;vc_col-lg-offset-1&#8243;][vc_single_image image=&#8220;208500&#8243; img_size=&#8220;full&#8220; css=&#8220;.vc_custom_1753989502815{border-radius: 5px !important;}&#8220;][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2-pad cyan-gradient font-white cyb-br cybv2 info-graphic sub2 cybv2-margin-btm-120&#8243; css=&#8220;.vc_custom_1755617201729{margin-bottom: 50px !important;}&#8220;][vc_column width=&#8220;2\/3&#8243; offset=&#8220;vc_col-sm-offset-2&#8243; el_class=&#8220;text-center&#8220;][vc_column_text css=&#8220;.vc_custom_1753987263378{margin-bottom: 80px !important;}&#8220; el_class=&#8220;text-md-center head-box&#8220;]<\/p>\n<h3>Identity Security definiert<\/h3>\n<p>Identity Security basiert auf intelligenten Berechtigungskontrollen, sichert nahtlos den Zugang f\u00fcr alle Identit\u00e4ten und automatisiert flexibel den Lebenszyklus der Identit\u00e4ten mit kontinuierlicher Bedrohungserkennung und -abwehr \u2013 alles mit einem einheitlichen Ansatz.[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1755616734689{border-bottom-width: 50px !important;}&#8220; el_class=&#8220;text-center&#8220;]<img decoding=\"async\" class=\"alignnone size-full wp-image-188738\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/PG-final-2025.svg\" alt=\"CSB Grafik\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; css=&#8220;.vc_custom_1611959082037{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cyber-security-section5-bckgrd.jpg?id=105424) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cybv2 cybv2_full_width_resource&#8220;][vc_column][vc_column_text el_class=&#8220;new_hpstyle_section5_title&#8220;]<\/p>\n<h5 style=\"text-align: center;\">CyberArk Blueprint<\/h5>\n<p>\n[\/vc_column_text][vc_row_inner el_class=&#8220;new_hpstyle_section5_container&#8220;][vc_column_inner][vc_single_image image=&#8220;113625&#8243; img_size=&#8220;full&#8220; alignment=&#8220;center&#8220; el_class=&#8220;new_hpstyle_section5_gart_img&#8220;][vc_column_text el_class=&#8220;new_hpstyle_section5_text1&#8243;]<\/p>\n<h4>Ein Leitfaden zur Identit\u00e4tssicherheit<\/h4>\n<p>\n[\/vc_column_text][vc_column_text el_class=&#8220;new_hpstyle_section5_text2&#8243;]<\/p>\n<p style=\"text-align: left;\">CyberArk Blueprint ist ein innovatives Tool f\u00fcr die Erstellung von hochgradig kundenspezifischen Sicherheits-Roadmaps. Benutzerfreundlich und einfach zu implementieren, k\u00f6nnen Sie Ihren n\u00e4chsten Schritt f\u00fcr die kommenden Jahre bestimmen.<\/p>\n<p>\n[\/vc_column_text][vc_btn title=&#8220;Mehr erfahren&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fblueprint%2F|&#8220; el_class=&#8220;cybv2-button-solid cyb-button-hpstyle_section5&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_resources&#8220; css=&#8220;.vc_custom_1608676992400{background-color: rgba(255,255,255,0.01) !important;*background-color: rgb(255,255,255) !important;}&#8220;][vc_column width=&#8220;1\/3&#8243;][vc_column_text]<\/p>\n<h3>Verwandte<br \/>\nRessourcen<br \/>\nerkunden<\/h3>\n<p>\n[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"https:\/\/www.cyberark.com\/de\/resources\/\">Alle Ressourcen anzeigen<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243;][\/vc_column][vc_column width=&#8220;1\/3&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_resources_uberflip cybv2_resources_uberflip_4_column&#8220;][vc_column el_class=&#8220;new_hpstyle_section8_col1&#8243;]<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div>[vc_raw_html css=&#8220;.vc_custom_1754984805959{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;new_hpstyle_section8_uberflip&#8220;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%09jQuery%28%27.cybv2_resources_uberflip%27%29.on%28%27DOMSubtreeModified%27%2C%20function%28%29%7B%0A%09%09%2F%2FGet%20tiles%0A%09%09%24tiles%20%3D%20jQuery%28%27.cybv2_resources_uberflip%20.tile.single%27%29%3B%0A%09%09var%20updated%20%3D%20false%3B%0A%09%09%2F%2FMake%20sure%20tiles%20exist%0A%09%09if%28%24tiles.length%20%3E%200%29%7B%0A%09%09%09var%20allAvailable%20%3D%20true%3B%0A%09%09%09%2F%2FCheck%20if%20all%20tiles%20loaded%20in%0A%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%3D%3D%20undefined%20%26%26%20%24tile.attr%28%27id%27%29%20%21%3D%20%27loading-notifier%27%29%7B%0A%09%09%09%09%09allAvailable%20%3D%20false%3B%0A%09%09%09%09%7D%0A%09%09%09%7D%29%3B%0A%09%09%09%2F%2FCheck%20if%20loaded%20in%0A%09%09%09if%28allAvailable%29%7B%0A%09%09%09%09jQuery.each%28%24tiles%2C%20function%28%20index%2C%20elem%20%29%20%7B%0A%09%09%09%09%09%24tile%20%3D%20jQuery%28elem%29%3B%0A%09%09%09%09%09var%20updated%20%3D%20false%3B%0A%09%09%09%09%09%2F%2FCheck%20if%20tile%20to%20update%0A%09%09%09%09%09if%28%24tile.find%28%27.ob-custom-label%27%29.html%28%29%20%21%3D%20undefined%20%26%26%20%24tile.data%28%27updated%27%29%20%3D%3D%20undefined%29%7B%0A%09%09%09%09%09%09jQuery%28%27.cybv2_resources_uberflip%27%29.off%28%27DOMSubtreeModified%27%29%3B%0A%09%09%09%09%09%09%24tags%20%3D%20%24tile.data%28%27tags%27%29.split%28%27%2C%27%29%3B%0A%0A%09%09%09%09%09%09%2F%2FGrab%20tag%0A%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%29%3B%0A%0A%09%09%09%09%09%09%2F%2FCheck%20tags%20and%20change%20link%20accordingly%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27analyst-report%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Analyst%20Report%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27blog%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27case-study%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Case%20Study%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27ebook%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.ob-custom-label%27%29.css%28%27text-transform%27%2C%20%27none%27%29%3B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20eBook%27%29%3B%0A%09%09%09%09%09%09%09%24tag%20%3D%20%24tile.find%28%27.ob-custom-label%27%29.html%28%27eBook%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27infographic%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Infographic%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27webinar%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Webinar%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27product-datasheet%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Product%20Datasheet%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27solution-brief%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Solution%20Brief%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27video%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Watch%20Video%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28string_to_slug%28%24tag%29%20%3D%3D%20%27whitepaper%27%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Download%20Whitepaper%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28%24tile.hasClass%28%27blogpost%27%29%29%7B%0A%09%09%09%09%09%09%09%24tile.find%28%27.item-link.view%27%29.html%28%27Read%20Blog%27%29%3B%0A%09%09%09%09%09%09%7D%0A%0A%09%09%09%09%09%09if%28updated%20%3D%3D%20false%29%7B%0A%09%09%09%09%09%09%09updated%20%3D%20true%3B%0A%09%09%09%09%09%09%09%24tile.data%28%27updated%27%2C%20true%29%3B%0A%09%09%09%09%09%09%7D%0A%09%09%09%09%09%7D%0A%09%09%09%09%7D%29%3B%0A%09%09%09%7D%0A%09%09%7D%0A%09%7D%29%3B%0A%0A%09function%20string_to_slug%20%28str%29%20%7B%0A%09%09if%20%28typeof%20str%20%3D%3D%3D%20%27string%27%20%7C%7C%20str%20instanceof%20String%29%7B%0A%09%09%09str%20%3D%20str.replace%28%2F%5E%5Cs%2B%7C%5Cs%2B%24%2Fg%2C%20%27%27%29%3B%20%2F%2F%20trim%0A%09%09%20%20%20%20str%20%3D%20str.toLowerCase%28%29%3B%0A%09%09%20%20%0A%09%09%20%20%20%20%2F%2F%20remove%20accents%2C%20swap%20%C3%B1%20for%20n%2C%20etc%0A%09%09%20%20%20%20var%20from%20%3D%20%22%C3%A0%C3%A1%C3%A4%C3%A2%C3%A8%C3%A9%C3%AB%C3%AA%C3%AC%C3%AD%C3%AF%C3%AE%C3%B2%C3%B3%C3%B6%C3%B4%C3%B9%C3%BA%C3%BC%C3%BB%C3%B1%C3%A7%C2%B7%2F_%2C%3A%3B%22%3B%0A%09%09%20%20%20%20var%20to%20%20%20%3D%20%22aaaaeeeeiiiioooouuuunc------%22%3B%0A%09%09%20%20%20%20for%20%28var%20i%3D0%2C%20l%3Dfrom.length%20%3B%20i%3Cl%20%3B%20i%2B%2B%29%20%7B%0A%09%09%20%20%20%20%20%20%20%20str%20%3D%20str.replace%28new%20RegExp%28from.charAt%28i%29%2C%20%27g%27%29%2C%20to.charAt%28i%29%29%3B%0A%09%09%20%20%20%20%7D%0A%0A%09%09%20%20%20%20str%20%3D%20str.replace%28%2F%5B%5Ea-z0-9%20-%5D%2Fg%2C%20%27%27%29%20%2F%2F%20remove%20invalid%20chars%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F%5Cs%2B%2Fg%2C%20%27-%27%29%20%2F%2F%20collapse%20whitespace%20and%20replace%20by%20-%0A%09%09%20%20%20%20%20%20%20%20.replace%28%2F-%2B%2Fg%2C%20%27-%27%29%3B%20%2F%2F%20collapse%20dashes%0A%09%09%7D%0A%0A%09%20%20%20%20return%20str%3B%0A%09%7D%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"templatera_shortcode\"><div data-vc-full-width=\"true\" data-vc-full-width-temp=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid cybv2 cybv2_logos vc_custom_1705518984428 vc_row-has-fill\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_text_column wpb_content_element  new_hpstyle_section7_carou_text extra-space link-arrow-right\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4 style=\"text-align: center;\">CyberArk Marketplace<\/h4>\n<p style=\"text-align: center; font-weight: 300; padding-bottom: 0px;\">Durchsuchen Sie unseren Online-Marketplace, um Integrationen zu finden.<br \/>\n<a style=\"display: inline-block; margin-top: 15px;\" href=\"https:\/\/cyberark-customers.force.com\/mplace\/s\/\" target=\"_blank\" rel=\"noopener noreferrer\">Marketplace besuchen<i class=\"fas fa-external-link-alt\"><\/i><\/a><\/p>\n<p><style>\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d008126ab78 .sp-lcp-item img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d008126ab78 .sp-lcp-item:hover img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv#sp-logo-carousel-pro69d008126ab78.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69d008126ab78.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\tpadding: 0px;\n\t\t\t\tbackground: rgba(10,10,10,0.01);\n\t\t\t}\n\t\t\tdiv#sp-logo-carousel-pro69d008126ab78.sp-logo-carousel-pro-area .sp-lcp-item:hover .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69d008126ab78.sp-logo-carousel-pro-area .sp-lcp-item:hover.sp-lcp-item-border{\n\t\t\t\tbackground: rgba(0,0,0,0.01);\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section.layout-carousel div#sp-logo-carousel-pro69d008126ab78 .slick-slide {\n\t\t\t\tfloat: none !important;\n\t\t\t\tdisplay: inline-block;\n\t\t\t\tvertical-align: middle;\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d008126ab78 [class*=\"lcp-col\"]{\n\t\t\t\tvertical-align: middle;\n\t\t\t\tmargin: 0;\n\t\t\t\tbox-shadow: none;\n\t\t\t}.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d008126ab78 .sp-lcpro-readmore-area{\n\t\t\t\t\ttext-align: center;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d008126ab78 .sp-lcpro-readmore-area .sp-lcpro-readmore{\n\t\t\t\t\tbackground: transparent;\n\t\t\t\t\tcolor: #05b3c6;\n\t\t\t\t\tpadding: 5px 13px;\n\t\t\t\t\tmargin-bottom: 18px;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tborder-radius: 2px;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t\tfont-size: 14px;font-family: Ubuntu;\n\t\t\t\t\t\tfont-style: normal; font-weight: 400;line-height:20px;\n\t\t\t\t\tletter-spacing: normal;\n\t\t\t\t\ttext-transform: none;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d008126ab78 .sp-lcpro-readmore-area .sp-lcpro-readmore:hover{\n\t\t\t\t\tbackground: #05b3c6;\n\t\t\t\t\tcolor: #ffffff;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t}div.sp-logo-section-id-69d008126ab78 .bx-viewport.bx-viewport { height: auto !important; }\n\t\t\t\tdiv#sp-logo-carousel-pro69d008126ab78.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69d008126ab78.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\t\tborder-radius: 100%;\n\t\t\t\t\tz-index: 1;\n\t\t\t\t\toverflow: hidden;\n\t\t\t\t}\n\t\t\t\t\tdiv#sp-logo-carousel-pro69d008126ab78.sp-logo-carousel-pro-area .sp-lcp-item{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tfloat: none !important;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tvertical-align: middle;}\n\t\t\t\tdiv#sp-logo-carousel-pro69d008126ab78.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69d008126ab78.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\t\t-webkit-box-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\t-moz-box-shadow:: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tbox-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tmargin-top: 6px;\n\t\t\t\t\tmargin-bottom:6px;\n\t\t\t\t}\n\t\t\t\tdiv#sp-logo-carousel-pro69d008126ab78.sp-logo-carousel-pro-area .sp-lcp-item:hover .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69d008126ab78.sp-logo-carousel-pro-area .sp-lcp-item:hover.sp-lcp-item-border{\n\t\t\t\t\t-webkit-box-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\t-moz-box-shadow:: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tbox-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-carousel.lcp_horizontal div#sp-logo-carousel-pro69d008126ab78.sp-logo-carousel-pro-area .slick-list{\n\t\t\t\t\tmargin-left: 0;\n\t\t\t\t\tmargin-right: 0;\n\t\t\t\t}\n\t\t\t\tdiv#sp-logo-carousel-pro69d008126ab78.sp-logo-carousel-pro-area [class*=\"lcp-col-\"]{\n\t\t\t\t\tmargin-bottom: 6px;\n\t\t\t\t}div.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d008126ab78 [class*=\"lcp-col\"]{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tbox-shadow: none;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69d008126ab78.sp-logo-carousel-pro-area [class*=\"lcp-col\"],\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69d008126ab78.sp-logo-carousel-pro-area [class*=\"lcp-col\"]{\n\t\t\t\t\tpadding-left: 10px;\n\t\t\t\t\tpadding-right: 10px;\n\t\t\t\t\tpadding-bottom: 20px;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69d008126ab78.sp-logo-carousel-pro-area.lcp-container,\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69d008126ab78.sp-logo-carousel-pro-area.lcp-container{\n\t\t\t\t\tmargin-left: -10px;\n\t\t\t\t\tmargin-right: -10px;\n\t\t\t\t\tmargin-bottom: -20px;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\t.sp-logo-carousel-pro-section.sp-lcpro-id-105685{\n\t\t\t\t\tposition: relative;\n\t\t\t\t}\n\t\t\t\t#lcp-preloader-105685{\n\t\t\t\t\tposition: absolute;\n\t\t\t\t\tleft: 0;\n\t\t\t\t\ttop: 0;\n\t\t\t\t\theight: 100%;\n\t\t\t\t\twidth: 100%;\n\t\t\t\t\ttext-align: center;\n\t\t\t\t\tdisplay: flex;\n\t\t\t\t\talign-items: center;\n\t\t\t\t\tjustify-content: center;\n\t\t\t\t\tbackground: #fff;\n\t\t\t\t\tz-index: 9999;\n\t\t\t\t}\n\t\t\t\t<\/style><div class=\"sp-logo-carousel-pro-section layout-carousel sp-lcpro-id-105685 sp-logo-section-id-69d008126ab78 nav_position_top_right title_position_bottom sp-lcpro-clear lcp_horizontal\"><div id=\"lcp-preloader-105685\" class=\"sp-logo-carousel-pro-preloader\"><img decoding=\"async\" src=\" https:\/\/www.cyberark.com\/wp-content\/plugins\/logo-carousel-pro\/public\/assets\/css\/images\/bx_loader.gif \"\/><\/div><div id=\"sp-logo-carousel-pro69d008126ab78\" class=\"sp-logo-carousel-pro-area lcp-preloader mode_ticker \" data-minslide=\"1\" data-maxslide=\"1\" data-slidewidth=\"\" data-slidemargin=\"20\" data-speed=\"30000\" data-mode=\"horizontal\" data-direction=\"next\" data-tickerhover=\"false\"><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/aws.png\" alt=\"aws logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/crowdstrike.png\" alt=\"crowdstrike logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Google.png\" alt=\"Google logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/microsoft-logo.png\" alt=\"Microsoft logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/paloalto.png\" alt=\"paloalto logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Proofpoint.png\" alt=\"Proofpoint logo\" ><\/div><\/div><\/div><\/div><\/div><br \/>\n<style>\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d0081271626 .sp-lcp-item img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d0081271626 .sp-lcp-item:hover img{\n\t\t\t\topacity: 1 !important;\n\t\t\t}\t\n\t\t\tdiv#sp-logo-carousel-pro69d0081271626.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69d0081271626.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\tpadding: 0px;\n\t\t\t\tbackground: rgba(10,10,10,0.01);\n\t\t\t}\n\t\t\tdiv#sp-logo-carousel-pro69d0081271626.sp-logo-carousel-pro-area .sp-lcp-item:hover .sp-lcp-item-border,\n\t\t\tdiv#sp-logo-carousel-pro69d0081271626.sp-logo-carousel-pro-area .sp-lcp-item:hover.sp-lcp-item-border{\n\t\t\t\tbackground: rgba(0,0,0,0.01);\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section.layout-carousel div#sp-logo-carousel-pro69d0081271626 .slick-slide {\n\t\t\t\tfloat: none !important;\n\t\t\t\tdisplay: inline-block;\n\t\t\t\tvertical-align: middle;\n\t\t\t}\n\t\t\tdiv.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d0081271626 [class*=\"lcp-col\"]{\n\t\t\t\tvertical-align: middle;\n\t\t\t\tmargin: 0;\n\t\t\t\tbox-shadow: none;\n\t\t\t}\n\t\t\t\tdiv.sp-logo-section-id-69d0081271626 .bx-viewport{\n\t\t\t\tdirection: ltr;\n\t\t\t\t}.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d0081271626 .sp-lcpro-readmore-area{\n\t\t\t\t\ttext-align: center;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d0081271626 .sp-lcpro-readmore-area .sp-lcpro-readmore{\n\t\t\t\t\tbackground: transparent;\n\t\t\t\t\tcolor: #05b3c6;\n\t\t\t\t\tpadding: 5px 13px;\n\t\t\t\t\tmargin-bottom: 18px;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tborder-radius: 2px;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t\tfont-size: 14px;font-family: Ubuntu;\n\t\t\t\t\t\tfont-style: normal; font-weight: 400;line-height:20px;\n\t\t\t\t\tletter-spacing: normal;\n\t\t\t\t\ttext-transform: none;\n\t\t\t\t}\n\t\t\t\t.sp-logo-carousel-pro-section #sp-logo-carousel-pro69d0081271626 .sp-lcpro-readmore-area .sp-lcpro-readmore:hover{\n\t\t\t\t\tbackground: #05b3c6;\n\t\t\t\t\tcolor: #ffffff;\n\t\t\t\t\tborder: 2px solid #05b3c6 !important;\n\t\t\t\t}div.sp-logo-section-id-69d0081271626 .bx-viewport.bx-viewport { height: auto !important; }\n\t\t\t\tdiv#sp-logo-carousel-pro69d0081271626.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69d0081271626.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\t\tborder-radius: 100%;\n\t\t\t\t\tz-index: 1;\n\t\t\t\t\toverflow: hidden;\n\t\t\t\t}\n\t\t\t\t\tdiv#sp-logo-carousel-pro69d0081271626.sp-logo-carousel-pro-area .sp-lcp-item{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tfloat: none !important;\n\t\t\t\t\tdisplay: inline-block;\n\t\t\t\t\tvertical-align: middle;}\n\t\t\t\tdiv#sp-logo-carousel-pro69d0081271626.sp-logo-carousel-pro-area .sp-lcp-item .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69d0081271626.sp-logo-carousel-pro-area .sp-lcp-item.sp-lcp-item-border{\n\t\t\t\t\t-webkit-box-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\t-moz-box-shadow:: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tbox-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tmargin-top: 6px;\n\t\t\t\t\tmargin-bottom:6px;\n\t\t\t\t}\n\t\t\t\tdiv#sp-logo-carousel-pro69d0081271626.sp-logo-carousel-pro-area .sp-lcp-item:hover .sp-lcp-item-border,\n\t\t\t\tdiv#sp-logo-carousel-pro69d0081271626.sp-logo-carousel-pro-area .sp-lcp-item:hover.sp-lcp-item-border{\n\t\t\t\t\t-webkit-box-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\t-moz-box-shadow:: 0 0 10px 0 #0a0a0a;\n\t\t\t\t\tbox-shadow: 0 0 10px 0 #0a0a0a;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-carousel.lcp_horizontal div#sp-logo-carousel-pro69d0081271626.sp-logo-carousel-pro-area .slick-list{\n\t\t\t\t\tmargin-left: 0;\n\t\t\t\t\tmargin-right: 0;\n\t\t\t\t}\n\t\t\t\tdiv#sp-logo-carousel-pro69d0081271626.sp-logo-carousel-pro-area [class*=\"lcp-col-\"]{\n\t\t\t\t\tmargin-bottom: 6px;\n\t\t\t\t}div.sp-logo-carousel-pro-section div#sp-logo-carousel-pro69d0081271626 [class*=\"lcp-col\"]{\n\t\t\t\t\tmargin: 0;\n\t\t\t\t\tbox-shadow: none;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69d0081271626.sp-logo-carousel-pro-area [class*=\"lcp-col\"],\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69d0081271626.sp-logo-carousel-pro-area [class*=\"lcp-col\"]{\n\t\t\t\t\tpadding-left: 10px;\n\t\t\t\t\tpadding-right: 10px;\n\t\t\t\t\tpadding-bottom: 20px;\n\t\t\t\t}\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-grid div#sp-logo-carousel-pro69d0081271626.sp-logo-carousel-pro-area.lcp-container,\n\t\t\t\tdiv.sp-logo-carousel-pro-section.layout-filter div#sp-logo-carousel-pro69d0081271626.sp-logo-carousel-pro-area.lcp-container{\n\t\t\t\t\tmargin-left: -10px;\n\t\t\t\t\tmargin-right: -10px;\n\t\t\t\t\tmargin-bottom: -20px;\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\t.sp-logo-carousel-pro-section.sp-lcpro-id-105741{\n\t\t\t\t\tposition: relative;\n\t\t\t\t}\n\t\t\t\t#lcp-preloader-105741{\n\t\t\t\t\tposition: absolute;\n\t\t\t\t\tleft: 0;\n\t\t\t\t\ttop: 0;\n\t\t\t\t\theight: 100%;\n\t\t\t\t\twidth: 100%;\n\t\t\t\t\ttext-align: center;\n\t\t\t\t\tdisplay: flex;\n\t\t\t\t\talign-items: center;\n\t\t\t\t\tjustify-content: center;\n\t\t\t\t\tbackground: #fff;\n\t\t\t\t\tz-index: 9999;\n\t\t\t\t}\n\t\t\t\t<\/style><div class=\"sp-logo-carousel-pro-section layout-carousel sp-lcpro-id-105741 sp-logo-section-id-69d0081271626 nav_position_top_right title_position_bottom sp-lcpro-clear lcp_horizontal\"><div id=\"sp-logo-carousel-pro69d0081271626\" class=\"sp-logo-carousel-pro-area lcp-preloader mode_ticker \" data-minslide=\"1\" data-maxslide=\"1\" data-slidewidth=\"\" data-slidemargin=\"20\" data-speed=\"30000\" data-mode=\"horizontal\" data-direction=\"prev\" data-tickerhover=\"false\"><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/RedHat.png\" alt=\"RedHat Logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Sailpoint.png\" alt=\"Sailpoint logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/sap.png\" alt=\"sap logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/Servicenow.png\" alt=\"Servicenow logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Tenable.png\" alt=\"Tenable\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/UIPath.png\" alt=\"UiPath\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/vmware-1.png\" alt=\"vmware logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/vmware-tanzu.png\" alt=\"vmware-tanzu logo\" ><\/div><\/div><\/div><div class=\"sp-lcp-item text-center\"><div class=\"sp-lcp-item-border\"><div class=\"sp-lcp-logo-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Workday.png\" alt=\"Workday logo\" ><\/div><\/div><\/div><\/div><\/div>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"gambit_fullwidth_row\" data-content-width=\"110%\" style=\"display: none\"><\/div><\/div><\/a><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><div data-vc-full-width=\"true\" data-vc-full-width-temp=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid vc_custom_1611095281474 vc_row-has-fill\"><div  class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<style>\r\n.page-id-105338 #hero-logo-container{\r\n    display: none;\r\n}\r\n\/* General *\/\r\n.cybv2 .link-arrow-right a {\r\n\tmargin-right: 6px;\r\n}\r\n.cybv2 h4 {\r\n\tline-height: 1.3em;\r\n}\r\n.cybv2 a.big_link {\r\n\tmargin: 0;\r\n}\r\n@media only screen and (max-device-width: 767px) {\r\n.cybv2 h2 {\r\n\tfont-size: 40px;\r\n}\r\n}\r\n.page-id-105338 .vc_btn3-color-grey{\r\n    font-weight: 600 !important;\r\n}\r\n\/* End General *\/\r\n\r\n\/* Section 7 *\/\r\n.cybv2.cybv2_logos h4 {\r\n\tcolor: #ffffff !important;\r\n}\r\n.cybv2.cybv2_logos .extra-space {\r\n\tmargin-bottom: 50px;\r\n}\r\n.cybv2_logos {\r\n    padding: 75px 100px 90px 100px;\r\n}\r\n.new_hpstyle_section7_carou_text p {\r\n    font-size: 20px;\r\n    color: #fff;\r\n    padding-bottom: 60px;\r\n}\r\n.new_hpstyle_section7_carousel1 {\r\n    padding: 50px 0 30px 500px;\r\n}\r\n.new_hpstyle_section7_carousel2 {\r\n    padding: 20px 500px 30px 0;\r\n}\r\n.cybv2_logos .sp-logo-carousel-pro-section.sp-lcpro-id-105685{\r\n    margin-bottom: 20px;\r\n}\r\n.cybv2_logos .link-arrow-right p a,\r\n.cybv2_logos .link-arrow-right p i{\r\n    color: #D4EB33 !important;\r\n}\r\n\r\n.cybv2_logos .link-arrow-right .wpb_wrapper p a:hover,\r\n.cybv2_logos .link-arrow-right .wpb_wrapper p a:hover i{\r\n    color: #F3FFA0 !important;\r\n}\r\n@media only screen and (max-width: 1024px) {\r\n.new_hpstyle_section7_carousel1 {\r\n    padding: 50px 0 30px 300px;\r\n}\r\n.new_hpstyle_section7_carousel2 {\r\n    padding: 20px 300px 30px 0;\r\n}\r\n}\r\n@media only screen and (max-width: 767px) {\r\n.cybv2.cybv2_logos .extra-space {\r\n\tmargin-bottom: 30px;\r\n}\r\n.cybv2_logos .sp-logo-carousel-pro-area .sp-lcp-item {\r\n\tmax-width: 82px;\r\n\tmargin-right: 10px !important;\r\n}\r\n.cybv2_logos {\r\n\tpadding: 40px 100px 50px 100px;\r\n}\r\n}\r\n\/* End section 7 *\/\r\n\r\n<\/style>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/a><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 cybv2-pad cybv2-oval-left-background hv-cta-list&#8220; css=&#8220;.vc_custom_1611885567532{background-color: #ff7600 !important;}&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;img-box cyb-clm-background-rc&#8220; css=&#8220;.vc_custom_1612492474039{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/IdentitySolutionsPlatform-HighValue-CTA.jpg?id=108944) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;stat-column&#8220;][vc_row_inner][vc_column_inner el_class=&#8220;head-box&#8220; width=&#8220;3\/4&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text]<\/p>\n<h2>Mit einem Experten sprechen<\/h2>\n<p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; width=&#8220;11\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]Privilegierte Konten und Anmeldedaten verwalten[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; width=&#8220;11\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]Sichere Mitarbeiter- und Kundenidentit\u00e4ten[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; width=&#8220;11\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_column_text el_class=&#8220;benefits-content-icon&#8220;]<img loading=\"lazy\" decoding=\"async\" width=\"48\" height=\"48\" class=\"alignnone wp-image-106504 size-medium\" style=\"width: 48px;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/cybv2-checkmark-orange.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;list-text&#8220;]Sicherer und verwalteter Zugriff f\u00fcr Anwendungen und andere nicht-menschliche Identit\u00e4ten[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8220;list-box&#8220; width=&#8220;11\/12&#8243; offset=&#8220;vc_col-sm-offset-1 vc_col-xs-offset-1 vc_col-xs-11&#8243;][vc_btn title=&#8220;Vertrieb kontaktieren&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fcontact%2F|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row disable_element=&#8220;yes&#8220; el_class=&#8220;cybv2 int-hero&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243;][vc_column_text el_class=&#8220;cyb-breadcrumb&#8220;]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"#\">Zur\u00fcck zu<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>PRODUCT CATEGORY<\/h1>\n<p><\/p>\n<h2>Lorem dolor sit amet consectetur libero tempore sol magni dolores ipsam quia sit.<\/h2>\n<p>\n[\/vc_column_text][vc_btn title=&#8220;CTA&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:%23|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<a href=\"#\">Wertvolle kostenlose Ressource<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-2&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-106192\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/int-hero-placeholder-1.jpg\" alt=\"\" width=\"640\" height=\"440\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/int-hero-placeholder-1.jpg 640w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/int-hero-placeholder-1-300x206.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/12\/int-hero-placeholder-1-150x103.jpg 150w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; disable_element=&#8220;yes&#8220; el_class=&#8220;cybv2 int-hero&#8220;][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-1&#8243;][vc_column_text el_class=&#8220;cyb-breadcrumb&#8220;]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"#\">Zur\u00fcck zu<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>PRODUCT CATEGORY<\/h1>\n<p><\/p>\n<h2>Lorem dolor sit amet consectetur libero tempore sol magni dolores ipsam quia sit.<\/h2>\n<p>\n[\/vc_column_text][vc_btn title=&#8220;CTA&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:%23|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][vc_column width=&#8220;1\/2&#8243; el_class=&#8220;column-2&#8243;][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_0urpxbo8xu videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<p>&nbsp;<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&nbsp;&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[27776],"class_list":["post-32304","page","type-page","status-publish","hentry","product_category-identity-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Identity Security Plattforml\u00f6sungen | CyberArk<\/title>\n<meta name=\"description\" content=\"Die CyberArk Identity Security Plattform ist eine End-to-End-L\u00f6sung f\u00fcr Identit\u00e4tszugriffsmanagement, die Privilegien durchsetzt, Zugriff erm\u00f6glicht und DevOps sichert.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/products\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Produkte\" \/>\n<meta property=\"og:description\" content=\"Die CyberArk Identity Security Plattform ist eine End-to-End-L\u00f6sung f\u00fcr Identit\u00e4tszugriffsmanagement, die Privilegien durchsetzt, Zugriff erm\u00f6glicht und DevOps sichert.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/products\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-16T11:36:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/PG-final-2025.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"15 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/products\/\",\"url\":\"https:\/\/www.cyberark.com\/products\/\",\"name\":\"Identity Security Plattforml\u00f6sungen | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/PG-final-2025.svg\",\"datePublished\":\"2017-06-13T19:11:57+00:00\",\"dateModified\":\"2026-02-16T11:36:57+00:00\",\"description\":\"Die CyberArk Identity Security Plattform ist eine End-to-End-L\u00f6sung f\u00fcr Identit\u00e4tszugriffsmanagement, die Privilegien durchsetzt, Zugriff erm\u00f6glicht und DevOps sichert.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/products\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/products\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/products\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/PG-final-2025.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/PG-final-2025.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/products\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Produkte\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Identity Security Plattforml\u00f6sungen | CyberArk","description":"Die CyberArk Identity Security Plattform ist eine End-to-End-L\u00f6sung f\u00fcr Identit\u00e4tszugriffsmanagement, die Privilegien durchsetzt, Zugriff erm\u00f6glicht und DevOps sichert.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/products\/","og_locale":"de_DE","og_type":"article","og_title":"Produkte","og_description":"Die CyberArk Identity Security Plattform ist eine End-to-End-L\u00f6sung f\u00fcr Identit\u00e4tszugriffsmanagement, die Privilegien durchsetzt, Zugriff erm\u00f6glicht und DevOps sichert.","og_url":"https:\/\/www.cyberark.com\/products\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-02-16T11:36:57+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/PG-final-2025.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"15 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/products\/","url":"https:\/\/www.cyberark.com\/products\/","name":"Identity Security Plattforml\u00f6sungen | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/products\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/products\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/PG-final-2025.svg","datePublished":"2017-06-13T19:11:57+00:00","dateModified":"2026-02-16T11:36:57+00:00","description":"Die CyberArk Identity Security Plattform ist eine End-to-End-L\u00f6sung f\u00fcr Identit\u00e4tszugriffsmanagement, die Privilegien durchsetzt, Zugriff erm\u00f6glicht und DevOps sichert.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/products\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/products\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/products\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/PG-final-2025.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/PG-final-2025.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/products\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Produkte"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32304","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=32304"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32304\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=32304"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=32304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}