{"id":18318,"date":"2021-06-01T16:52:57","date_gmt":"2021-06-01T15:52:57","guid":{"rendered":"https:\/\/www.wallix.com\/infographic-ensuring-nis-directive-security-compliance-with-wallix\/"},"modified":"2025-11-17T16:30:47","modified_gmt":"2025-11-17T15:30:47","slug":"sicherstellung-nis-richtlinie-security-mit-wallix","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/de\/blogpost\/sicherstellung-nis-richtlinie-security-mit-wallix\/","title":{"rendered":"Infografik: Einhaltung der NIS-Richtlinie mit WALLIX"},"content":{"rendered":"<div id='full_slider_1'  class='avia-fullwidth-slider main_color avia-shadow   avia-builder-el-0  el_before_av_two_third  avia-builder-el-first   container_wrap fullsize'  ><div  class='avia-slideshow av-lsabrcpk-c31238c0df3b5db3e324cea661941c54 avia-slideshow-entry_without_sidebar av_slideshow_full avia-slide-slider av-slideshow-ui av-control-default av-slideshow-manual av-loop-once av-loop-manual-endless av-default-height-applied   avia-slideshow-1' data-slideshow-options=\"{&quot;animation&quot;:&quot;slide&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;bg_slider&quot;:false,&quot;keep_padding&quot;:false,&quot;hoverpause&quot;:false,&quot;show_slide_delay&quot;:0}\"  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><ul class='avia-slideshow-inner ' style='padding-bottom: 34.95867768595%;'><li  class='avia-slideshow-slide av-lsabrcpk-c31238c0df3b5db3e324cea661941c54__0  av-single-slide slide-1 slide-odd'><div data-rel='slideshow-1' class='avia-slide-wrap '   ><img decoding=\"async\" fetchpriority=\"high\" class=\"wp-image-58916 avia-img-lazy-loading-not-58916\"  src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2021\/06\/AdobeStock_92093794-1210x423.jpeg\" width=\"1210\" height=\"423\" title='NIS2' alt='NIS2'  itemprop=\"thumbnailUrl\"   \/><\/div><\/li><\/ul><\/div><\/div><div id='after_full_slider_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-18318'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1 sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1\">\n#top .flex_column_table.av-equal-height-column-flextable.av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1{\nmargin-top:-600px;\nmargin-bottom:0;\n}\n.flex_column.av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1 av_two_third  avia-builder-el-1  el_after_av_slideshow_full  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lsabriqq-74018f4921fb18c6437d97925a38597d\">\n#top .av-special-heading.av-lsabriqq-74018f4921fb18c6437d97925a38597d{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lsabriqq-74018f4921fb18c6437d97925a38597d .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lsabriqq-74018f4921fb18c6437d97925a38597d .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lsabriqq-74018f4921fb18c6437d97925a38597d av-special-heading-h1 blockquote modern-quote  avia-builder-el-2  el_before_av_post_metadata  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Infografik: Einhaltung der NIS-Richtlinie mit WALLIX<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<div  class='av-post-metadata-container av-av_post_metadata-36bcf33e90f22125c019c70beb35c7b9 av-metadata-container-align-left  avia-builder-el-3  el_after_av_heading  el_before_av_hr  av-metadata-container-1'><div class='av-post-metadata-container-inner'><span class=\"av-post-metadata-content av-post-metadata-meta-content\"><span class=\"av-post-metadata-content av-post-metadata-author\"  itemprop=\"author\" ><span class=\"av-metadata-before av-metadata-before-author\">by<\/span><span class=\"av-post-metadata-author-link\" ><a href=\"https:\/\/www.wallix.com\/de\/author\/alex\/\"  rel=\"author\">WALLIX<\/a><\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-modified\"><span class=\"av-post-metadata-modified-date\" >17. November 2025<\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-category\"><span class=\"av-metadata-before av-metadata-before-categories\">in<\/span><span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/de\/category\/blogpost\/blog-audit-compliance-de\/\" >AUDIT &amp; COMPLIANCE<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/de\/category\/blogpost\/\" >BLOGPOST<\/a><\/span><\/span><\/span><\/div><\/div><br \/>\n<div  class='hr av-av_hr-bca31578670ae9d408d6d6d291fc57a6 hr-default  avia-builder-el-4  el_after_av_post_metadata  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-lsabryb2-5091e15bb62c54c7fab289c105a25fe7 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Mit dem Aufkommen des Internets der industriellen Dinge (Internet of Industrial Things, IIoT) schafft die digitale Transformation neue Chancen und damit auch neue Risiken f\u00fcr Akteure der Industrie 4.0.<\/p>\n<p>Ob es sich nun um <strong>Betreiber wesentlicher Dienste (sog. Operators of Essential Services, kurz: OES)<\/strong> oder um <strong>Betreiber von lebenswichtiger Bedeutung (sog. Operators of Vital Importance, kurz: OVI)<\/strong> handelt: Diese Akteure im Energie-, Transport-, Gesundheits-, Verteilungs- und Wasseraufbereitungssektor verwalten Sachanlagen, die direkte Auswirkungen auf das Leben der Menschen und die Umwelt haben k\u00f6nnen. Diese Betreiber werden als Erbringer einer wesentlichen Dienstleistung definiert, deren Unterbrechung erhebliche Auswirkungen auf das Funktionieren der Wirtschaft oder der Gesellschaft haben w\u00fcrde.<\/p>\n<p>In Industrieunternehmen wie OES gab es traditionell eine strikte Trennung zwischen IT und OT. Mit der IT\/OT-Konvergenz haben jedoch die einst isolierten OT-Systeme mit ihren spezifischen Kommunikationsprotokollen \u2013 die ber\u00fchmten Befehls- und Kontrollsysteme, die viele Jahre lang verwendet wurden \u2013 im Industriesektor nun digitale Technologien \u00fcbernommen und sind zunehmend mit dem Rest der Welt verbunden. Infolgedessen sind sie auch zunehmend Cyber-Bedrohungen ausgesetzt. Dar\u00fcber hinaus bleibt der Industriesektor einer der am st\u00e4rksten angegriffenen Sektoren.<\/p>\n<p>Eine robuste Cybersicherheit ist daher eine absolute Notwendigkeit, um den Zugang zu den Daten, Systemen und Industrieanlagen zu sch\u00fctzen, die diese wichtigen Infrastrukturen steuern. Es gilt, die die Folgen eines potenziell katastrophalen Cyberangriffs zu vermeiden.<\/p>\n<p>Die zunehmende Zahl von Angriffen und Bedrohungen auf die Informationssysteme dieser Organisationen hat die Europ\u00e4ische Union dazu veranlasst, im Rahmen der NIS-Richtlinie Empfehlungen f\u00fcr Sicherheitsstandards f\u00fcr private Unternehmen und \u00f6ffentliche Organisationen, die als OES definiert sind, bekanntzugeben.<\/p>\n<p>Entdecken Sie, wie die Sicherheitsl\u00f6sungen von WALLIX diese Empfehlungen erf\u00fcllen und wie WALLIX dazu beitragen kann, die Einhaltung der NIS-Richtlinie zu gew\u00e4hrleisten:<\/p>\n<p><a href=\"https:\/\/www.wallix.com\/blog\/ensuring-nis-directive-security-compliance-with-wallix\/nis_directive_ose_compliance_infographic_en\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-15477 size-large\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2021\/06\/NIS_Directive_OSE_Compliance_Infographic_EN-350x1024.jpg\" alt=\"WALLIX helps Operators of Essential Services achieve compliance with NIS Directive security recommendations\" width=\"350\" height=\"1024\" \/><\/a><\/p>\n<p>Die Kontrolle von Administratorkonten, die Authentifizierung oder die Verwaltung von Zugriffsrechten sind allesamt Schutzma\u00dfnahmen, die von den NIS-Empfehlungen vorgeschrieben werden. WALLIX sichert nicht nur die IT-Identit\u00e4t und den Zugriff, sondern auch die Architektur von industriellen Automatisierungs- und Steuerungssystemen (IACS), indem es interne und externe Verbindungen zentralisiert und ein f\u00fchrendes R\u00fcckverfolgbarkeits- und Auditing-Tool f\u00fcr Wartungs- und Verwaltungst\u00e4tigkeiten bietet. WALLIX-L\u00f6sungen erm\u00f6glichen es kritischen OESs, konform und cyber-gesch\u00fctzt zu sein.<\/p>\n<p>\u00dcberzeugen Sie sich selbst, wie WALLIX Ihre kritische Infrastruktur sichern kann. Fordern Sie noch heute eine kostenlose Testversion an!<\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36\">\n#top .flex_column_table.av-equal-height-column-flextable.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\nmargin-top:-600px;\nmargin-bottom:0;\n}\n.flex_column.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36 av_one_third  avia-builder-el-6  el_after_av_two_third  avia-builder-el-last  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-av_social_share-5673408492043cfc0448520a00f34cb4 av-social-sharing-box-default  avia-builder-el-7  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Diesen Artikel teilen<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Teilen auf X\" href='https:\/\/twitter.com\/share?text=Infografik%3A%20Einhaltung%20der%20NIS-Richtlinie%20mit%20WALLIX&#038;url=https:\/\/www.wallix.com\/de\/?p=18318' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Teilen auf X'><span class='avia_hidden_link_text'>Teilen auf X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Teilen auf LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Infografik%3A%20Einhaltung%20der%20NIS-Richtlinie%20mit%20WALLIX&#038;url=https:\/\/www.wallix.com\/de\/blogpost\/sicherstellung-nis-richtlinie-security-mit-wallix\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Teilen auf LinkedIn'><span class='avia_hidden_link_text'>Teilen auf LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Per E-Mail teilen\" href='mailto:?subject=Infografik%3A%20Einhaltung%20der%20NIS-Richtlinie%20mit%20WALLIX&#038;body=https:\/\/www.wallix.com\/de\/blogpost\/sicherstellung-nis-richtlinie-security-mit-wallix\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Per E-Mail teilen'><span class='avia_hidden_link_text'>Per E-Mail teilen<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-8  el_after_av_social_share  el_before_av_heading '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-19d5f8f5267b794b148a7e582db0308a\">\n#top .av-special-heading.av-av_heading-19d5f8f5267b794b148a7e582db0308a{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-av_heading-19d5f8f5267b794b148a7e582db0308a .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-19d5f8f5267b794b148a7e582db0308a .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-19d5f8f5267b794b148a7e582db0308a av-special-heading-h3 blockquote modern-quote  avia-builder-el-9  el_after_av_hr  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >verwandter Inhalt<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-10  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-1\"  class='av-magazine av-lsabsc15-074ea2325391f6c12fc768920f882108  avia-builder-el-11  el_after_av_hr  el_before_av_heading   avia-builder-el-11  el_after_av_hr  el_before_av_heading ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-68335 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Wie PAM die Umsetzung von IEC 62443 unterst\u00fctzt\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-12T15:27:57+01:00\" >12. Februar 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/wie-pam-die-implementierung-von-iec-62443-ermoeglicht\/' title='Link zu: Wie PAM die Umsetzung von IEC 62443 unterst\u00fctzt'>Wie PAM die Umsetzung von IEC 62443 unterst\u00fctzt<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-68309 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Die Bedeutung der IEC-62443-Standards f\u00fcr den Schutz industrieller Cyber-\u00d6kosysteme\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-12T13:45:11+01:00\" >12. Februar 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/das-entscheidende-bindeglied-iec-62443-standards-zum-schutz-industrieller-cyber-oekosysteme\/' title='Link zu: Die Bedeutung der IEC-62443-Standards f\u00fcr den Schutz industrieller Cyber-\u00d6kosysteme'>Die Bedeutung der IEC-62443-Standards f\u00fcr den Schutz industrieller Cyber-\u00d6kosysteme<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-64219 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Gew\u00e4hrleistung von Compliance und Sicherheit f\u00fcr MSPs und ihre Kunden\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-10-09T16:03:49+01:00\" >9. Oktober 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/gewaehrleistung-von-compliance-und-sicherheit-fuer-msps-und-ihre-kunden\/' title='Link zu: Gew\u00e4hrleistung von Compliance und Sicherheit f\u00fcr MSPs und ihre Kunden'>Gew\u00e4hrleistung von Compliance und Sicherheit f\u00fcr MSPs und ihre Kunden<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-64524 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Ist Ihre Sicherheit bereit f\u00fcr die KI-Revolution?\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-09-17T10:36:41+01:00\" >17. September 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/secure-ai-driven-application-for-msp\/' title='Link zu: Ist Ihre Sicherheit bereit f\u00fcr die KI-Revolution?'>Ist Ihre Sicherheit bereit f\u00fcr die KI-Revolution?<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-63585 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Erweitern Sie Ihre Sicherheitsstrategie: Die Leistungsf\u00e4higkeit von PAM und IAG f\u00fcr Managed Service Provider\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-09-17T09:51:23+01:00\" >17. September 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/elevate-security-strategy-pam-iag-managed-service-provider\/' title='Link zu: Erweitern Sie Ihre Sicherheitsstrategie: Die Leistungsf\u00e4higkeit von PAM und IAG f\u00fcr Managed Service Provider'>Erweitern Sie Ihre Sicherheitsstrategie: Die Leistungsf\u00e4higkeit von PAM und IAG f\u00fcr Managed Service Provider<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-3db0c3e04c6cf8b16efbe7a55fb61973\">\n#top .av-special-heading.av-av_heading-3db0c3e04c6cf8b16efbe7a55fb61973{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-av_heading-3db0c3e04c6cf8b16efbe7a55fb61973 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-3db0c3e04c6cf8b16efbe7a55fb61973 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-3db0c3e04c6cf8b16efbe7a55fb61973 av-special-heading-h3 blockquote modern-quote  avia-builder-el-12  el_after_av_magazine  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Verwandte Ressourcen<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-13  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-2\"  class='av-magazine av-lsabs8r4-1f8a5a46cfc38f8e59ea33042ccb15da  avia-builder-el-14  el_after_av_hr  avia-builder-el-last   avia-builder-el-14  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-75011 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Grundlagen der Zugriffssicherheit: Ein Leitfaden f\u00fcr Einsteiger\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-07-17T13:52:22+01:00\" >17. Juli 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/grundlagen-der-zugriffssicherheit-ein-leitfaden-fuer-einsteiger\/' title='Link zu: Grundlagen der Zugriffssicherheit: Ein Leitfaden f\u00fcr Einsteiger'>Grundlagen der Zugriffssicherheit: Ein Leitfaden f\u00fcr Einsteiger<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-74085 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Compliance und Risikomanagement: Cybersicherheit vereinfachen \u2013 Potenziale entfalten\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-04-30T16:08:32+01:00\" >30. April 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/compliance-und-risikomanagement-cybersicherheit-vereinfachen-potenziale-entfalten\/' title='Link zu: Compliance und Risikomanagement: Cybersicherheit vereinfachen \u2013 Potenziale entfalten'>Compliance und Risikomanagement: Cybersicherheit vereinfachen \u2013 Potenziale entfalten<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-66367 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Leitfaden f\u00fcr CISOs zur Einhaltung gesetzlicher Vorschriften\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-12-02T15:22:39+01:00\" >2. Dezember 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/leitfaden-fuer-cisos-zur-einhaltung-gesetzlicher-vorschriften\/' title='Link zu: Leitfaden f\u00fcr CISOs zur Einhaltung gesetzlicher Vorschriften'>Leitfaden f\u00fcr CISOs zur Einhaltung gesetzlicher Vorschriften<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-65550 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: 10 zentrale Strategien f\u00fcr MSPs\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-11-13T16:23:28+01:00\" >13. November 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/10-zentrale-strategien-fuer-msps\/' title='Link zu: 10 zentrale Strategien f\u00fcr MSPs'>10 zentrale Strategien f\u00fcr MSPs<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-66002 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: DORA LEICHT GEMACHT INTERAKTIVE MATRIX\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-10-23T15:03:43+01:00\" >23. Oktober 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/dora-leicht-gemacht-interaktive-matrix\/' title='Link zu: DORA LEICHT GEMACHT INTERAKTIVE MATRIX'>DORA LEICHT GEMACHT INTERAKTIVE MATRIX<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":58916,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1644,1641],"tags":[],"class_list":["post-18318","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-audit-compliance-de","category-blogpost"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Infografik: Sicherstellung der Einhaltung der NIS-Richtlinie mit WALLIX<\/title>\n<meta name=\"description\" content=\"Erfahren Sie, wie WALLIX Betreibern von wesentlichen Diensten (OSE) hilft, die Sicherheitsempfehlungen der NIS-Richtlinie einzuhalten.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/de\/blogpost\/sicherstellung-nis-richtlinie-security-mit-wallix\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infografik: Sicherstellung der Einhaltung der NIS-Richtlinie mit WALLIX\" \/>\n<meta property=\"og:description\" content=\"Erfahren Sie, wie WALLIX Betreibern von wesentlichen Diensten (OSE) hilft, die Sicherheitsempfehlungen der NIS-Richtlinie einzuhalten.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/de\/blogpost\/sicherstellung-nis-richtlinie-security-mit-wallix\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-01T15:52:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-17T15:30:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2021\/06\/AdobeStock_92093794-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"WALLIX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"WALLIX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/sicherstellung-nis-richtlinie-security-mit-wallix\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/sicherstellung-nis-richtlinie-security-mit-wallix\\\/\"},\"author\":{\"name\":\"WALLIX\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\"},\"headline\":\"Infografik: Einhaltung der NIS-Richtlinie mit WALLIX\",\"datePublished\":\"2021-06-01T15:52:57+00:00\",\"dateModified\":\"2025-11-17T15:30:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/sicherstellung-nis-richtlinie-security-mit-wallix\\\/\"},\"wordCount\":2121,\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/sicherstellung-nis-richtlinie-security-mit-wallix\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/AdobeStock_92093794-scaled.jpeg\",\"articleSection\":[\"AUDIT &amp; COMPLIANCE\",\"BLOGPOST\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/sicherstellung-nis-richtlinie-security-mit-wallix\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/sicherstellung-nis-richtlinie-security-mit-wallix\\\/\",\"name\":\"Infografik: Sicherstellung der Einhaltung der NIS-Richtlinie mit WALLIX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/sicherstellung-nis-richtlinie-security-mit-wallix\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/sicherstellung-nis-richtlinie-security-mit-wallix\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/AdobeStock_92093794-scaled.jpeg\",\"datePublished\":\"2021-06-01T15:52:57+00:00\",\"dateModified\":\"2025-11-17T15:30:47+00:00\",\"description\":\"Erfahren Sie, wie WALLIX Betreibern von wesentlichen Diensten (OSE) hilft, die Sicherheitsempfehlungen der NIS-Richtlinie einzuhalten.\",\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/sicherstellung-nis-richtlinie-security-mit-wallix\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/sicherstellung-nis-richtlinie-security-mit-wallix\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/AdobeStock_92093794-scaled.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/AdobeStock_92093794-scaled.jpeg\",\"width\":2560,\"height\":1628,\"caption\":\"NIS2\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/wallixcom\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wallix\\\/\",\"https:\\\/\\\/www.youtube.com\\\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\",\"name\":\"WALLIX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"caption\":\"WALLIX\"},\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/author\\\/alex\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Infografik: Sicherstellung der Einhaltung der NIS-Richtlinie mit WALLIX","description":"Erfahren Sie, wie WALLIX Betreibern von wesentlichen Diensten (OSE) hilft, die Sicherheitsempfehlungen der NIS-Richtlinie einzuhalten.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/de\/blogpost\/sicherstellung-nis-richtlinie-security-mit-wallix\/","og_locale":"de_DE","og_type":"article","og_title":"Infografik: Sicherstellung der Einhaltung der NIS-Richtlinie mit WALLIX","og_description":"Erfahren Sie, wie WALLIX Betreibern von wesentlichen Diensten (OSE) hilft, die Sicherheitsempfehlungen der NIS-Richtlinie einzuhalten.","og_url":"https:\/\/www.wallix.com\/de\/blogpost\/sicherstellung-nis-richtlinie-security-mit-wallix\/","og_site_name":"WALLIX","article_published_time":"2021-06-01T15:52:57+00:00","article_modified_time":"2025-11-17T15:30:47+00:00","og_image":[{"width":2560,"height":1628,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2021\/06\/AdobeStock_92093794-scaled.jpeg","type":"image\/jpeg"}],"author":"WALLIX","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"Verfasst von":"WALLIX","Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/de\/blogpost\/sicherstellung-nis-richtlinie-security-mit-wallix\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/sicherstellung-nis-richtlinie-security-mit-wallix\/"},"author":{"name":"WALLIX","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd"},"headline":"Infografik: Einhaltung der NIS-Richtlinie mit WALLIX","datePublished":"2021-06-01T15:52:57+00:00","dateModified":"2025-11-17T15:30:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/sicherstellung-nis-richtlinie-security-mit-wallix\/"},"wordCount":2121,"publisher":{"@id":"https:\/\/www.wallix.com\/de\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/sicherstellung-nis-richtlinie-security-mit-wallix\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2021\/06\/AdobeStock_92093794-scaled.jpeg","articleSection":["AUDIT &amp; COMPLIANCE","BLOGPOST"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/de\/blogpost\/sicherstellung-nis-richtlinie-security-mit-wallix\/","url":"https:\/\/www.wallix.com\/de\/blogpost\/sicherstellung-nis-richtlinie-security-mit-wallix\/","name":"Infografik: Sicherstellung der Einhaltung der NIS-Richtlinie mit WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/sicherstellung-nis-richtlinie-security-mit-wallix\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/sicherstellung-nis-richtlinie-security-mit-wallix\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2021\/06\/AdobeStock_92093794-scaled.jpeg","datePublished":"2021-06-01T15:52:57+00:00","dateModified":"2025-11-17T15:30:47+00:00","description":"Erfahren Sie, wie WALLIX Betreibern von wesentlichen Diensten (OSE) hilft, die Sicherheitsempfehlungen der NIS-Richtlinie einzuhalten.","inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/de\/blogpost\/sicherstellung-nis-richtlinie-security-mit-wallix\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/blogpost\/sicherstellung-nis-richtlinie-security-mit-wallix\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2021\/06\/AdobeStock_92093794-scaled.jpeg","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2021\/06\/AdobeStock_92093794-scaled.jpeg","width":2560,"height":1628,"caption":"NIS2"},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/de\/#website","url":"https:\/\/www.wallix.com\/de\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/de\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd","name":"WALLIX","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","caption":"WALLIX"},"url":"https:\/\/www.wallix.com\/de\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/18318","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/comments?post=18318"}],"version-history":[{"count":11,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/18318\/revisions"}],"predecessor-version":[{"id":80375,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/18318\/revisions\/80375"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/media\/58916"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/media?parent=18318"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/categories?post=18318"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/tags?post=18318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}