{"id":93747,"date":"2020-06-10T11:01:37","date_gmt":"2020-06-10T15:01:37","guid":{"rendered":"https:\/\/www.cyberark.com\/pam-as-a-service\/"},"modified":"2023-12-07T05:03:38","modified_gmt":"2023-12-07T10:03:38","slug":"pam-as-a-service","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/pam-as-a-service\/","title":{"rendered":"PAM as a Service"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; css=&#8220;.vc_custom_1587676663033{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/04\/1920x630_hero.jpg?id=89703) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cyb-hero-pam cyb-desktop&#8220;][vc_column el_class=&#8220;cyb-center cyb-white cyb-pad-btm&#8220;][vc_column_text el_class=&#8220;cyb-white&#8220; css=&#8220;.vc_custom_1587677080176{margin-top: 5.3125rem !important;margin-bottom: 20px !important;}&#8220;]<\/p>\n<h1>EINFACHER. SICHERER.<\/h1>\n<h3>CYBERARK PRIVILEGED ACCESS MANAGEMENT AS A SERVICE<\/h3>\n<p>[\/vc_column_text][vc_btn title=&#8220;JETZT ANSEHEN&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;#ffffff&#8220; shape=&#8220;square&#8220; link=&#8220;url:%23demo|&#8220; el_class=&#8220;cyb-button event-click solid-blue cyb-center-btn mgn-bottom&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; css=&#8220;.vc_custom_1587758815335{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/04\/1920x630_hero.jpg?id=89703) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cyb-hero-pam cyb-mobile&#8220;][vc_column el_class=&#8220;cyb-center cyb-pad-btm&#8220;][vc_column_text el_class=&#8220;cyb-white&#8220; css=&#8220;.vc_custom_1587676944446{margin-bottom: 20px !important;padding-top: 20px !important;}&#8220;]<\/p>\n<h1>EINFACHER. SICHERER.<\/h1>\n<h3 class=\"regular\">CYBERARK PRIVILEGED ACCESS MANAGEMENT AS A SERVICE<\/h3>\n<p>[\/vc_column_text][vc_btn title=&#8220;JETZT ANSEHEN&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;#ffffff&#8220; shape=&#8220;square&#8220; link=&#8220;url:%23demo|&#8220; el_class=&#8220;cyb-button event-click solid-blue cyb-center-btn mgn-bottom&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cyb-center cyb-pad-top cyb-txt-orig&#8220;][vc_column][vc_column_text]<\/p>\n<h2>PAM AS A SERVICE VOM MARKTF\u00dcHRER<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; el_class=&#8220;cyb-card-hover-icon&#8220;][vc_column width=&#8220;1\/4&#8243; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fproduct-datasheets%2Fprivileged-access-security-data-sheet&#8220;][vc_column_text]<img decoding=\"async\" class=\"alignnone wp-image-81205 size-full\" style=\"height: 4.375rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/12\/icon-laptop-search-1.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>SICHERER SCHUTZ<br \/>\nVON PRIVILEGIEN<\/h4>\n<p>Sichern Sie privilegierte Anmeldeinformationen von menschlichen und nicht-menschlichen. Isolieren und \u00fcberwachen Sie Sitzungen automatisch und aktivieren Sie den nativen Zugriff f\u00fcr Endbenutzer.[\/vc_column_text][vc_column_text]WEITERE INFORMATIONEN &gt;[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fresources%2Fproduct-datasheets%2Fdatenblatt-endpoint-privilege-manager&#8220;][vc_column_text]<img decoding=\"async\" class=\"alignnone wp-image-81205 size-full\" style=\"height: 4.375rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/04\/Asset-5.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>LEAST-PRIVILEGE-PRINZIP<br \/>\nSCHNELL IMPLEMENTIEREN<\/h4>\n<p>Implementieren Sie das Least-Privilege-Prinzip und sch\u00fctzen Sie sich vor Malware, indem Sie nicht ben\u00f6tigten Zugriff auf Workstations und Server entfernen. Erkennen und unterbinden Sie mutma\u00dfliche Versuche, Anmeldeinformationen zu stehlen.[\/vc_column_text][vc_column_text]WEITERE INFORMATIONEN &gt;[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fsolution-briefs%2Fjump-start-solution-brief&#8220;][vc_column_text]<img decoding=\"async\" class=\"alignnone wp-image-81205 size-full\" style=\"height: 4.375rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/04\/Asset-6.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>MASSGESCHNEIDERTER<br \/>\nUND EINFACHER ANSATZ<\/h4>\n<p>Schnelle Bereitstellung mit praktischer Anleitung durch den PAM-Marktf\u00fchrer. Macht Hardware durch SaaS-Architektur \u00fcberfl\u00fcssig und automatisiert Back-End-Upgrades und Patches.[\/vc_column_text][vc_column_text]WEITERE INFORMATIONEN &gt;[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243; column_link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fproduct-datasheets%2Fcyberark-privilege-cloud-security-datasheet&#8220;][vc_column_text]<img decoding=\"async\" class=\"alignnone wp-image-81205 size-full\" style=\"height: 4.375rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/04\/Asset-7.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>ERSTKLASSIGE<br \/>\nSICHERHEIT<\/h4>\n<p>SOC 2 Type 2 entsprechende SaaS bieten Sicherheit f\u00fcr Unternehmen, l\u00e4sst sich in andere f\u00fchrende Sicherheitsl\u00f6sungen integrieren und sch\u00fctzt die Kronjuwelen Ihres Unternehmens.[\/vc_column_text][vc_column_text]WEITERE INFORMATIONEN &gt;[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cyb-center cyb-pad-top cyb-txt-orig&#8220; css=&#8220;.vc_custom_1587756427651{background-color: #f1f2f2 !important;}&#8220;][vc_column][vc_column_text]<\/p>\n<h2>W\u00c4HLEN SIE DIE PASSENDE SAAS-L\u00d6SUNG<\/h2>\n<p>Mit CyberArk SaaS-L\u00f6sungen f\u00fcr Privileged Access Management machen Sie keine Kompromisse bei Sicherheit oder Betrieb.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cyb-pad&#8220; css=&#8220;.vc_custom_1587691600960{background-color: #f1f2f2 !important;}&#8220;][vc_column width=&#8220;1\/2&#8243; css=&#8220;.vc_custom_1561480116987{padding-bottom: 1.375rem !important;}&#8220;][vc_column_text]    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_ghxjc3m9p3 videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        [\/vc_column_text][\/vc_column][vc_column width=&#8220;5\/12&#8243; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_column_text css=&#8220;.vc_custom_1587757101831{padding-bottom: 1.375rem !important;}&#8220;]<\/p>\n<h3>PAM AS A SERVICE EINFACH UND SKALIERBAR BEREITSTELLEN<\/h3>\n<p class=\"cyb-sub-head\"><strong>Sehen Sie sich dieses kurze Demo-Video an und erfahren Sie, wie Sie: <\/strong><\/p>\n<ul>\n<li>PAM as a Service einfach bereitstellen<\/li>\n<li>Schnell eine skalierbare Risikominderung f\u00fcr Ihr Unternehmen erreichen<\/li>\n<li>Eine benutzerfreundliche L\u00f6sung implemtentieren, mit der Anmeldeinformationen sicher gespeichert und rotiert werden<\/li>\n<li>Sessions isolieren und \u00fcberwachen<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_column_text]<strong><a href=\"#demo\">LIVE-DEMO ANFORDERN &gt;<\/a><\/strong>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cyb-reverse cyb-pad&#8220; css=&#8220;.vc_custom_1587691520907{background-color: #f1f2f2 !important;}&#8220;][vc_column width=&#8220;5\/12&#8243; css=&#8220;.vc_custom_1587691415103{padding-bottom: 1.375rem !important;}&#8220;][vc_column_text css=&#8220;.vc_custom_1587757111222{padding-bottom: 1.375rem !important;}&#8220;]<\/p>\n<h3>LEAST-PRIVILEGE-PRINZIP KOSTENLOS IMPLEMENTIEREN<\/h3>\n<p class=\"cyb-sub-head\"><strong>In den n\u00e4chsten 30 Tagen k\u00f6nnen Sie selbst erleben, wie einfach es ist:<\/strong><\/p>\n<ul>\n<li>Nicht ben\u00f6tigte lokale Administratorrechte entfernen<\/li>\n<li>Anwendungskontrolle st\u00e4rken<\/li>\n<li>Diebstahl von Anmeldeinformationen auf Windows und Mac Endger\u00e4ten verhindern<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_column_text]<strong><a href=\"https:\/\/www.cyberark.com\/de\/products\/privileged-account-security-solution\/endpoint-privilege-manager\/endpoint-privilege-manager-free-trial\/\">KOSTENLOSER 30-TAGE-TEST &gt;<\/a><\/strong>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; css=&#8220;.vc_custom_1562162033745{padding-bottom: 1.375rem !important;}&#8220; offset=&#8220;vc_col-sm-offset-1&#8243;][vc_column_text]    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_bhwe3t5ct0 videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        [\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row_content_no_spaces&#8220; equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220;][vc_column][vc_column_text][cyber_slick_carousel_vc arrows=&#8220;true&#8220; appenddots=&#8220;.cyb-dots&#8220; prevarrow=&#8220;.cyb-prev&#8220; nextarrow=&#8220;.cyb-next&#8220; dots=&#8220;true&#8220; dotsclass=&#8220;cyb-dots-inner&#8220; draggable=&#8220;true&#8220; infinite=&#8220;true&#8220; speed=&#8220;600&#8243;][vc_row_inner equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; css=&#8220;.vc_custom_1587763928566{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/04\/PH_1920x630.jpg?id=89712) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_column_inner width=&#8220;1\/2&#8243;][\/vc_column_inner][vc_column_inner el_class=&#8220;cyb-fxd-hgt-620 cyb-middle&#8220; width=&#8220;1\/2&#8243; css=&#8220;.vc_custom_1587763383713{padding-right: 10% !important;padding-left: 10% !important;background-color: #1d4b73 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_custom_heading text=&#8220;CyberArk PAM-as-a-Service bietet einen zentralisierten Ansatz f\u00fcr Unternehmen, der bei uns ausgezeichnet funktioniert. Und f\u00fcr unser kleines IT-Team ist es einfach, weil es eine hundertprozentig Cloud-basierte L\u00f6sung ist!&#8220; font_container=&#8220;tag:h2|font_size:2.125rem|text_align:left|color:%23ffffff|line_height:2.5625rem&#8220; use_theme_fonts=&#8220;yes&#8220; el_class=&#8220;cyb-ltr-spc-6 blockquote&#8220; css=&#8220;.vc_custom_1587763570603{padding-bottom: 0.9375rem !important;}&#8220;][vc_column_text el_class=&#8220;cyb-white&#8220; css=&#8220;.vc_custom_1587763656029{padding-bottom: 2.1875rem !important;}&#8220;]Bassam Alqassar, Vice President<br \/>\nPrincess House[\/vc_column_text][vc_btn title=&#8220;FALLSTUDIE LESEN&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;#ffffff&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fresource%2Fprincess-house-prioritizes-pam-as-a-service-to-reduce-risk%2F|&#8220; el_class=&#8220;cyb-button&#8220;][vc_row_inner equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; css=&#8220;.vc_custom_1587763538548{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/04\/Milliken_1920x630.jpg?id=89931) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_column_inner width=&#8220;1\/2&#8243;][\/vc_column_inner][vc_column_inner el_class=&#8220;cyb-fxd-hgt-620 cyb-middle&#8220; width=&#8220;1\/2&#8243; css=&#8220;.vc_custom_1587763391846{padding-right: 10% !important;padding-left: 10% !important;background-color: #1d4b73 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220;][vc_custom_heading text=&#8220;Erfahren Sie, wie Milliken &amp; Company das Least-Privilege-Prinzip und Anwendungskontrolle auf \u00fcber 5.000 Endger\u00e4ten effizient implementiert hat, ohne das Endbenutzererlebnis zu beeintr\u00e4chtigen.&#8220; font_container=&#8220;tag:h2|font_size:2.125rem|text_align:left|color:%23ffffff|line_height:2.5625rem&#8220; use_theme_fonts=&#8220;yes&#8220; el_class=&#8220;cyb-ltr-spc-6&#8243; css=&#8220;.vc_custom_1587776319677{padding-bottom: 0.9375rem !important;}&#8220;][vc_btn title=&#8220;FALLSTUDIE LESEN&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;#ffffff&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fresource%2Fmilliken-company-enhances-security-protocol-least-privilege-default-deny-application-control-protect-global-end-users%2F|&#8220; el_class=&#8220;cyb-button&#8220;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8220;cyb-slick-nav&#8220;][vc_column_inner][vc_raw_html]PHNwYW4gY2xhc3M9ImN5Yi1wcmV2IHNsaWNrLWFycm93IiBzdHlsZT0iZGlzcGxheTogaW5saW5lLWJsb2NrOyI+WnVyw7xjazwvc3Bhbj4NCjxzcGFuIGNsYXNzPSJjeWItZG90cyI+PC9zcGFuPg0KPHNwYW4gY2xhc3M9ImN5Yi1uZXh0IHNsaWNrLWFycm93IiBzdHlsZT0iZGlzcGxheTogaW5saW5lLWJsb2NrOyI+V2VpdGVyPC9zcGFuPg==[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; disable_element=&#8220;yes&#8220; css=&#8220;.vc_custom_1587763771428{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/04\/PH_1920x630.jpg?id=89712) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cyb-min-hgt-620&#8243;][vc_column width=&#8220;1\/2&#8243; css=&#8220;.vc_custom_1587689049116{padding-top: 2.5rem !important;padding-right: 10% !important;padding-bottom: 2.5rem !important;padding-left: 10% !important;background-color: #1d4c74 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; offset=&#8220;vc_col-sm-offset-6&#8243;][vc_column_text el_class=&#8220;cyb-white&#8220; css=&#8220;.vc_custom_1587757127165{padding-bottom: 2.1875rem !important;}&#8220;]<\/p>\n<h2 class=\"cyb-white blockquote\" style=\"font-size: 2.125rem;\">CyberArk PAM-as-a-Service bietet einen zentralisierten Ansatz f\u00fcr Unternehmen, der bei uns ausgezeichnet funktioniert. Und f\u00fcr unser kleines IT-Team ist es einfach, weil es eine hundertprozentig Cloud-basierte L\u00f6sung ist!<\/h2>\n<p>Bassam Alqassar, Vice President<br \/>\nPrincess House[\/vc_column_text][vc_btn title=&#8220;FALLSTUDIE LESEN&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;#ffffff&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fresource%2Fprincess-house-prioritizes-pam-as-a-service-to-reduce-risk%2F|&#8220; el_class=&#8220;cyb-button&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; css=&#8220;.vc_custom_1587691762693{padding-top: 2.5rem !important;background-color: #f1f2f2 !important;}&#8220;][vc_column css=&#8220;.vc_custom_1557496295891{padding-bottom: 1.4375rem !important;}&#8220; el_class=&#8220;cyb-center&#8220;][vc_column_text]<\/p>\n<h2>SAAS VOM PAM-PIONIER<\/h2>\n<p>Nutzen Sie die umfassende Erfahrung und die preisgekr\u00f6nten Innovationen von CyberArk in den Bereichen Privileged-Access-Sicherheit und SaaS, um Ihre sich st\u00e4ndig weiterentwickelnden Gesch\u00e4ftsanforderungen schnell zu sichern.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; content_placement=&#8220;bottom&#8220; css=&#8220;.vc_custom_1587691768125{padding-bottom: 1.5rem !important;background-color: #f1f2f2 !important;}&#8220; el_class=&#8220;cyb-center&#8220;][vc_column width=&#8220;1\/3&#8243; css=&#8220;.vc_custom_1588012406887{margin-top: 10px !important;margin-right: 10px !important;margin-bottom: 10px !important;margin-left: 10px !important;padding-top: 1.375rem !important;padding-bottom: 1.375rem !important;}&#8220;][vc_column_text css=&#8220;.vc_custom_1588012986893{padding-bottom: 10px !important;}&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-85470\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/04\/logo-soc-v3.png\" alt=\"\" width=\"129\" height=\"129\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h5>COMPLIANCE ZU SOC 2 TYP 2<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243; css=&#8220;.vc_custom_1588012432580{margin-top: 10px !important;margin-right: 10px !important;margin-bottom: 10px !important;margin-left: 10px !important;padding-top: 1.375rem !important;padding-bottom: 1.375rem !important;}&#8220; offset=&#8220;vc_col-sm-offset-0&#8243;][vc_column_text css=&#8220;.vc_custom_1587762036347{padding-bottom: 2.5rem !important;}&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-49828\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/04\/SCAWARDS2020_winner-300x86.png\" alt=\"\" width=\"224\" height=\"73\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h5>F\u00dcR DIE BESTE ENTERPRISE-SECURITY-L\u00d6SUNG<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243; css=&#8220;.vc_custom_1588012424925{margin-top: 10px !important;margin-right: 10px !important;margin-bottom: 10px !important;margin-left: 10px !important;padding-top: 1.375rem !important;padding-bottom: 1.375rem !important;}&#8220;][vc_column_text css=&#8220;.vc_custom_1588013013792{padding-bottom: 10px !important;}&#8220;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-49846\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/04\/award_04.png\" alt=\"\" width=\"159\" height=\"129\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h5>F\u00dcR PRIVILEGED-ACCOUNT-SICHERHEIT<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243; css=&#8220;.vc_custom_1587679281354{margin-top: 10px !important;margin-right: 10px !important;margin-bottom: 10px !important;margin-left: 10px !important;padding-top: 1.375rem !important;padding-bottom: 1.375rem !important;}&#8220; offset=&#8220;vc_col-sm-offset-2&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-68394\" style=\"width: 9.375rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/04\/award_02.png\" alt=\"\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/3&#8243; css=&#8220;.vc_custom_1587679303375{margin-top: 10px !important;margin-right: 10px !important;margin-bottom: 10px !important;margin-left: 10px !important;padding-top: 1.375rem !important;padding-bottom: 1.375rem !important;}&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"162\" height=\"225\" class=\"size-full wp-image-37853 aligncenter\" style=\"width: 6.875rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/03\/WINNER_gold_2019.png\" alt=\"\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/03\/WINNER_gold_2019.png 162w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/03\/WINNER_gold_2019-150x208.png 150w\" sizes=\"auto, (max-width: 162px) 100vw, 162px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; css=&#8220;.vc_custom_1587691669811{padding-top: 2rem !important;}&#8220;][vc_column css=&#8220;.vc_custom_1576678412349{padding-bottom: 1.25rem !important;}&#8220; el_class=&#8220;cyb-center&#8220;][vc_column_text]<\/p>\n<h2>RESSOURCEN<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220;][vc_column width=&#8220;1\/6&#8243; css=&#8220;.vc_custom_1576678832651{padding-bottom: 2.5rem !important;}&#8220; offset=&#8220;vc_col-sm-offset-2&#8243;][\/vc_column][vc_column width=&#8220;1\/6&#8243; css=&#8220;.vc_custom_1576678839828{padding-bottom: 2.5rem !important;}&#8220; offset=&#8220;vc_col-sm-offset-1&#8243;][\/vc_column][vc_column width=&#8220;1\/6&#8243; css=&#8220;.vc_custom_1576678848228{padding-bottom: 2.5rem !important;}&#8220; offset=&#8220;vc_col-sm-offset-1&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220;][vc_column width=&#8220;1\/6&#8243; css=&#8220;.vc_custom_1576678866480{padding-bottom: 2.5rem !important;}&#8220; el_class=&#8220;cyb-center&#8220; offset=&#8220;vc_col-sm-offset-2&#8243;][\/vc_column][vc_column width=&#8220;1\/6&#8243; css=&#8220;.vc_custom_1576678873613{padding-bottom: 2.5rem !important;}&#8220; offset=&#8220;vc_col-sm-offset-1&#8243;][\/vc_column][vc_column width=&#8220;1\/6&#8243; css=&#8220;.vc_custom_1576678880880{padding-bottom: 2.5rem !important;}&#8220; offset=&#8220;vc_col-sm-offset-1&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220;][vc_column css=&#8220;.vc_custom_1537546542206{padding-bottom: 3.125rem !important;}&#8220; el_class=&#8220;cyb-center&#8220;][vc_btn title=&#8220;WEITERE RESSOURCEN&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;#414042&#8243; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fresources%2F|&#8220; el_class=&#8220;cyb-button&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; css=&#8220;.vc_custom_1587691902725{padding-top: 2rem !important;background-color: #f1f2f2 !important;}&#8220; el_class=&#8220;cyb-center&#8220;][vc_column width=&#8220;2\/3&#8243; css=&#8220;.vc_custom_1576678580195{padding-bottom: 1.25rem !important;}&#8220; offset=&#8220;vc_col-sm-offset-2&#8243;][vc_raw_html]PGEgY2xhc3M9ImFuY2hvciIgbmFtZT0iZGVtbyI+PC9hPg==[\/vc_raw_html][vc_column_text]<\/p>\n<h2>LIVE-DEMO ODER ANGEBOT ANFORDERN<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; css=&#8220;.vc_custom_1587691910631{padding-bottom: 2.5rem !important;background-color: #f1f2f2 !important;}&#8220;][vc_column width=&#8220;2\/3&#8243; offset=&#8220;vc_col-sm-offset-2&#8243;][vc_raw_html]W21hcmtldG9fZm9ybSBpZD0iNDUzMyIgYXNzZXRfdHlwZT0icGFtLWFzLWEtc2VydmljZSIgdHlfbWVzc2FnZT0iPHA+PHN0cm9uZz5UaGFuayB5b3U8L3N0cm9uZz4gZm9yIHlvdXIgaW50ZXJlc3QuIDxiciAvPjxiciAvPldlJ2xsIGJlIGluIHRvdWNoIHdpdGggeW91IHNob3J0bHkuPC9wPiJd[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; css=&#8220;.vc_custom_1587676663033{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/04\/1920x630_hero.jpg?id=89703) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cyb-hero-pam cyb-desktop&#8220;][vc_column el_class=&#8220;cyb-center cyb-white cyb-pad-btm&#8220;][vc_column_text el_class=&#8220;cyb-white&#8220; css=&#8220;.vc_custom_1587677080176{margin-top: 5.3125rem !important;margin-bottom: 20px !important;}&#8220;] EINFACHER. SICHERER. CYBERARK PRIVILEGED ACCESS MANAGEMENT AS A SERVICE [\/vc_column_text][vc_btn title=&#8220;JETZT ANSEHEN&#8220;&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-93747","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>PAM as a Service | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/de\/pam-as-a-service\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PAM as a Service\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; css=&#8220;.vc_custom_1587676663033{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/04\/1920x630_hero.jpg?id=89703) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cyb-hero-pam cyb-desktop&#8220;][vc_column el_class=&#8220;cyb-center cyb-white cyb-pad-btm&#8220;][vc_column_text el_class=&#8220;cyb-white&#8220; css=&#8220;.vc_custom_1587677080176{margin-top: 5.3125rem !important;margin-bottom: 20px !important;}&#8220;] EINFACHER. SICHERER. CYBERARK PRIVILEGED ACCESS MANAGEMENT AS A SERVICE [\/vc_column_text][vc_btn title=&#8220;JETZT ANSEHEN&#8220;...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/de\/pam-as-a-service\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-07T10:03:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/12\/icon-laptop-search-1.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/de\/pam-as-a-service\/\",\"url\":\"https:\/\/www.cyberark.com\/de\/pam-as-a-service\/\",\"name\":\"PAM as a Service | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/pam-as-a-service\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/pam-as-a-service\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/12\/icon-laptop-search-1.svg\",\"datePublished\":\"2020-06-10T15:01:37+00:00\",\"dateModified\":\"2023-12-07T10:03:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/pam-as-a-service\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/de\/pam-as-a-service\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/de\/pam-as-a-service\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/12\/icon-laptop-search-1.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/12\/icon-laptop-search-1.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/de\/pam-as-a-service\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PAM as a Service\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"PAM as a Service | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/de\/pam-as-a-service\/","og_locale":"de_DE","og_type":"article","og_title":"PAM as a Service","og_description":"[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; css=&#8220;.vc_custom_1587676663033{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2020\/04\/1920x630_hero.jpg?id=89703) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cyb-hero-pam cyb-desktop&#8220;][vc_column el_class=&#8220;cyb-center cyb-white cyb-pad-btm&#8220;][vc_column_text el_class=&#8220;cyb-white&#8220; css=&#8220;.vc_custom_1587677080176{margin-top: 5.3125rem !important;margin-bottom: 20px !important;}&#8220;] EINFACHER. SICHERER. CYBERARK PRIVILEGED ACCESS MANAGEMENT AS A SERVICE [\/vc_column_text][vc_btn title=&#8220;JETZT ANSEHEN&#8220;...","og_url":"https:\/\/www.cyberark.com\/de\/pam-as-a-service\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2023-12-07T10:03:38+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/12\/icon-laptop-search-1.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"6 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/de\/pam-as-a-service\/","url":"https:\/\/www.cyberark.com\/de\/pam-as-a-service\/","name":"PAM as a Service | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/de\/pam-as-a-service\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/de\/pam-as-a-service\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/12\/icon-laptop-search-1.svg","datePublished":"2020-06-10T15:01:37+00:00","dateModified":"2023-12-07T10:03:38+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/de\/pam-as-a-service\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/de\/pam-as-a-service\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/de\/pam-as-a-service\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/12\/icon-laptop-search-1.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2019\/12\/icon-laptop-search-1.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/de\/pam-as-a-service\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"PAM as a Service"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/93747","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=93747"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/93747\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=93747"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=93747"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}