{"id":46183,"date":"2024-02-06T14:24:06","date_gmt":"2024-02-06T13:24:06","guid":{"rendered":"https:\/\/www.wallix.com\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\/"},"modified":"2024-02-07T14:35:31","modified_gmt":"2024-02-07T13:35:31","slug":"verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/whitepaper-audit-compliance-de\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\/","title":{"rendered":"Verwaltung des privilegierten Zugangs: Der Schl\u00fcssel zur Einhaltung der NIS\/NIS2-Richtlinien"},"content":{"rendered":"<div id='av_section_1'  class='avia-section av-ll6leyc9-81122575121ee03b2d46f9a595834706 main_color avia-section-default avia-no-border-styling  avia-builder-el-0  el_before_av_one_half  avia-builder-el-first  avia-bg-style-fixed av-minimum-height av-minimum-height-25 av-height-25  container_wrap fullsize'   data-av_minimum_height_pc='25' data-av_min_height_opt='25'><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-46183'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ll6lixzu-50dd6aabb78e4d9066bc7977bbb26d0a\">\n#top .av-special-heading.av-ll6lixzu-50dd6aabb78e4d9066bc7977bbb26d0a{\npadding-bottom:10px;\ncolor:#ffffff;\n}\nbody .av-special-heading.av-ll6lixzu-50dd6aabb78e4d9066bc7977bbb26d0a .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-ll6lixzu-50dd6aabb78e4d9066bc7977bbb26d0a .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-ll6lixzu-50dd6aabb78e4d9066bc7977bbb26d0a .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-ll6lixzu-50dd6aabb78e4d9066bc7977bbb26d0a av-special-heading-h2 custom-color-heading blockquote modern-quote  avia-builder-el-1  avia-builder-el-no-sibling '><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Verwaltung des privilegierten Zugangs:<br \/>\nSchl\u00fcssel zur Einhaltung der NIS\/NIS2-Richtlinien<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><div id='after_section_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-46183'><div class='entry-content-wrapper clearfix'>\n<div  class='flex_column av-5b0es8w-29b68930f2123f02df19635b61172dea av_one_half  avia-builder-el-2  el_after_av_section  el_before_av_one_half  avia-builder-el-first  first flex_column_div  '     ><section  class='av_textblock_section av-4v28cg0-027905e13a306ef76b60c3efb8c24a58 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h2><span style=\"color: #000000;\"><strong>Privileged Access Management ist der Schl\u00fcssel zur Einhaltung der NIS\/NIS2-Richtlinien<\/strong><\/span><\/h2>\n<p><span style=\"color: #000000;\">Die am 6. Juli 2016 verabschiedete NIS-Richtlinie (Network Infrastructure Security) wurde von den Mitgliedstaaten der Europ\u00e4ischen Union am 9. Mai 2018 umgesetzt. Dieser Leitfaden hat dazu beigetragen, die langj\u00e4hrigen nationalen Sicherheitspraktiken der Mitgliedstaaten zu vereinheitlichen und den Schutz von Betreibern wesentlicher Dienste (OES) und Anbietern digitaler Dienste (DSP) vor Cyber-Bedrohungen zu st\u00e4rken.<\/span><\/p>\n<p><span style=\"color: #000000;\">Angesichts der technologischen Entwicklungen und der Folgen der Gesundheitskrise beschloss die Europ\u00e4ische Kommission, diese NIS-Richtlinie zu aktualisieren, indem sie am 16. Dezember 2020 einen neuen Vorschlag vorlegte, die &#8222;NIS2-Richtlinie&#8220;.<\/span><\/p>\n<p><span style=\"color: #000000;\"><em>Dieses Whitepaper erl\u00e4utert die Auswirkungen der \u00fcberarbeiteten NIS-Richtlinie &#8211; auch bekannt als NIS2-Richtlinie &#8211; auf die Cybersicherheitspraktiken kritischer oder wichtiger europ\u00e4ischer Einrichtungen und zeigt auf, wie L\u00f6sungen f\u00fcr privilegierten Zugang, Endpunkte und Identit\u00e4tsmanagement ihnen bereits bei der Einhaltung der Vorschriften helfen k\u00f6nnen.<\/em><\/span><\/p>\n<p><strong>Finden Sie heraus, wie Sie Ihre Compliance-Anforderungen mit diesem Mapping optimieren k\u00f6nnen!<\/strong><\/p>\n<\/div><\/section><br \/>\n<div  class='av-social-sharing-box av-edzqzk-0f733b329f18c0f6b034dbb1fa4142ac av-social-sharing-box-default  avia-builder-el-4  el_after_av_textblock  avia-builder-el-last  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Dieses Whitepaper weitergeben<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Teilen auf X\" href='https:\/\/twitter.com\/share?text=Verwaltung%20des%20privilegierten%20Zugangs%3A%20Der%20Schl%C3%BCssel%20zur%20Einhaltung%20der%20NIS%2FNIS2-Richtlinien&#038;url=https:\/\/www.wallix.com\/de\/?p=46183' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Teilen auf X'><span class='avia_hidden_link_text'>Teilen auf X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Teilen auf LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Verwaltung%20des%20privilegierten%20Zugangs%3A%20Der%20Schl%C3%BCssel%20zur%20Einhaltung%20der%20NIS%2FNIS2-Richtlinien&#038;url=https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/whitepaper-audit-compliance-de\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Teilen auf LinkedIn'><span class='avia_hidden_link_text'>Teilen auf LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Per E-Mail teilen\" href='mailto:?subject=Verwaltung%20des%20privilegierten%20Zugangs%3A%20Der%20Schl%C3%BCssel%20zur%20Einhaltung%20der%20NIS%2FNIS2-Richtlinien&#038;body=https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/whitepaper-audit-compliance-de\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Per E-Mail teilen'><span class='avia_hidden_link_text'>Per E-Mail teilen<\/span><\/a><\/li><\/ul><\/div><\/div><\/p><\/div>\n<div  class='flex_column av-4kz42lc-473eb64609d672d6f92bf29237ca7abe av_one_half  avia-builder-el-5  el_after_av_one_half  el_before_av_one_half  flex_column_div  '     ><section  class='av_textblock_section av-ll6lu9eg-157dbfc6d3b223bc4bef5583dc7f6d2a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3><strong>Dieses Whitepaper herunterladen<br \/>\n<\/strong><\/h3>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lzzfkw-7aa022a561a400efd8108dcca310e938\">\n#top .hr.hr-invisible.av-lzzfkw-7aa022a561a400efd8108dcca310e938{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-lzzfkw-7aa022a561a400efd8108dcca310e938 hr-invisible  avia-builder-el-7  el_after_av_textblock  el_before_av_codeblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3e7ru0w-d7bfb6655c8a0554077bc2fec679ea73\">\n#top .hr.hr-invisible.av-3e7ru0w-d7bfb6655c8a0554077bc2fec679ea73{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-3e7ru0w-d7bfb6655c8a0554077bc2fec679ea73 hr-invisible  avia-builder-el-9  el_after_av_codeblock  avia-builder-el-last '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p><\/div><div  class='flex_column av-15zjxb4-3483d93466a9169fd67958a3a193e44c av_one_half  avia-builder-el-10  el_after_av_one_half  el_before_av_one_half  first flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-34uhrts-ac4c2f61e247892b9986c98cd783afdb\">\n#top .av-special-heading.av-34uhrts-ac4c2f61e247892b9986c98cd783afdb{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-34uhrts-ac4c2f61e247892b9986c98cd783afdb .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-34uhrts-ac4c2f61e247892b9986c98cd783afdb .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-34uhrts-ac4c2f61e247892b9986c98cd783afdb av-special-heading-h2 blockquote modern-quote  avia-builder-el-11  el_before_av_hr  avia-builder-el-first '><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Verwandte Inhalte<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2d7x5s0-44575d6a59874b4a9674e8411ba03faf\">\n#top .hr.hr-invisible.av-2d7x5s0-44575d6a59874b4a9674e8411ba03faf{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-2d7x5s0-44575d6a59874b4a9674e8411ba03faf hr-invisible  avia-builder-el-12  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-1\"  class='av-magazine av-ll6m5bbn-e538fcb693cd1f66a8ec17e8ad37b411  avia-builder-el-13  el_after_av_hr  avia-builder-el-last   avia-builder-el-13  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-68335 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/de\/blogpost\/wie-pam-die-implementierung-von-iec-62443-ermoeglicht\/' title='Link zu: Wie PAM die Umsetzung von IEC 62443 unterst\u00fctzt' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/07\/WOP_Core-80x80.jpeg\" class=\"wp-image-74768 avia-img-lazy-loading-not-74768 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"Image of a neon blue cloud created from digital data in a secure environment\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/07\/WOP_Core-80x80.jpeg 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/07\/WOP_Core-36x36.jpeg 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/07\/WOP_Core-180x180.jpeg 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Wie PAM die Umsetzung von IEC 62443 unterst\u00fctzt\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-12T15:27:57+01:00\" >12. Februar 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/wie-pam-die-implementierung-von-iec-62443-ermoeglicht\/' title='Link zu: Wie PAM die Umsetzung von IEC 62443 unterst\u00fctzt'>Wie PAM die Umsetzung von IEC 62443 unterst\u00fctzt<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-68309 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/de\/blogpost\/das-entscheidende-bindeglied-iec-62443-standards-zum-schutz-industrieller-cyber-oekosysteme\/' title='Link zu: Die Bedeutung der IEC-62443-Standards f\u00fcr den Schutz industrieller Cyber-\u00d6kosysteme' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-24-112357-80x80.png\" class=\"wp-image-70048 avia-img-lazy-loading-not-70048 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"Maintenance staff repair a critical piece of equipment, minimizing downtime on the production floor\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-24-112357-80x80.png 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-24-112357-36x36.png 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-24-112357-180x180.png 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Die Bedeutung der IEC-62443-Standards f\u00fcr den Schutz industrieller Cyber-\u00d6kosysteme\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-12T13:45:11+01:00\" >12. Februar 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/das-entscheidende-bindeglied-iec-62443-standards-zum-schutz-industrieller-cyber-oekosysteme\/' title='Link zu: Die Bedeutung der IEC-62443-Standards f\u00fcr den Schutz industrieller Cyber-\u00d6kosysteme'>Die Bedeutung der IEC-62443-Standards f\u00fcr den Schutz industrieller Cyber-\u00d6kosysteme<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-64219 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/de\/blogpost\/gewaehrleistung-von-compliance-und-sicherheit-fuer-msps-und-ihre-kunden\/' title='Link zu: Gew\u00e4hrleistung von Compliance und Sicherheit f\u00fcr MSPs und ihre Kunden' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/article-2-80x80.jpeg\" class=\"wp-image-62777 avia-img-lazy-loading-not-62777 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"Explore Wallix insights on cybersecurity and identity access management. This visual illustrates key concepts and strategies to secure your organization\u2019s digital infrastructure.\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/article-2-80x80.jpeg 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/article-2-36x36.jpeg 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/article-2-180x180.jpeg 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Gew\u00e4hrleistung von Compliance und Sicherheit f\u00fcr MSPs und ihre Kunden\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-10-09T16:03:49+01:00\" >9. Oktober 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/gewaehrleistung-von-compliance-und-sicherheit-fuer-msps-und-ihre-kunden\/' title='Link zu: Gew\u00e4hrleistung von Compliance und Sicherheit f\u00fcr MSPs und ihre Kunden'>Gew\u00e4hrleistung von Compliance und Sicherheit f\u00fcr MSPs und ihre Kunden<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-64524 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/de\/blogpost\/secure-ai-driven-application-for-msp\/' title='Link zu: Ist Ihre Sicherheit bereit f\u00fcr die KI-Revolution?' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/article-6-80x80.jpeg\" class=\"wp-image-62809 avia-img-lazy-loading-not-62809 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"Discover insights from Wallix on cybersecurity and access management. This visual highlights key points and strategies for protecting your organization\u2019s digital assets.\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/article-6-80x80.jpeg 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/article-6-36x36.jpeg 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/article-6-180x180.jpeg 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Ist Ihre Sicherheit bereit f\u00fcr die KI-Revolution?\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-09-17T10:36:41+01:00\" >17. September 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/secure-ai-driven-application-for-msp\/' title='Link zu: Ist Ihre Sicherheit bereit f\u00fcr die KI-Revolution?'>Ist Ihre Sicherheit bereit f\u00fcr die KI-Revolution?<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-63585 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/de\/blogpost\/elevate-security-strategy-pam-iag-managed-service-provider\/' title='Link zu: Erweitern Sie Ihre Sicherheitsstrategie: Die Leistungsf\u00e4higkeit von PAM und IAG f\u00fcr Managed Service Provider' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/article-5-80x80.jpeg\" class=\"wp-image-62800 avia-img-lazy-loading-not-62800 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"Business performance monitoring concept, businessman using computer laptop Online survey filling out, digital form checklist, Quality control and accuracy Check, Assessment form, questionnaire.\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/article-5-80x80.jpeg 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/article-5-36x36.jpeg 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/article-5-180x180.jpeg 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Erweitern Sie Ihre Sicherheitsstrategie: Die Leistungsf\u00e4higkeit von PAM und IAG f\u00fcr Managed Service Provider\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-09-17T09:51:23+01:00\" >17. September 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/elevate-security-strategy-pam-iag-managed-service-provider\/' title='Link zu: Erweitern Sie Ihre Sicherheitsstrategie: Die Leistungsf\u00e4higkeit von PAM und IAG f\u00fcr Managed Service Provider'>Erweitern Sie Ihre Sicherheitsstrategie: Die Leistungsf\u00e4higkeit von PAM und IAG f\u00fcr Managed Service Provider<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div><\/p>\n<div  class='flex_column av-nh15kw-8ebda5a28a70ad5c464ce817b6d18ccb av_one_half  avia-builder-el-14  el_after_av_one_half  avia-builder-el-last  flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1k1oio0-2e51b019faefb8c2e3812687e45f29b0\">\n#top .av-special-heading.av-1k1oio0-2e51b019faefb8c2e3812687e45f29b0{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-1k1oio0-2e51b019faefb8c2e3812687e45f29b0 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-1k1oio0-2e51b019faefb8c2e3812687e45f29b0 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-1k1oio0-2e51b019faefb8c2e3812687e45f29b0 av-special-heading-h2 blockquote modern-quote  avia-builder-el-15  el_before_av_hr  avia-builder-el-first '><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Verwandte Ressource<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-13ax9ts-551a8a156a8b3f6cd4f0feb5196ea674\">\n#top .hr.hr-invisible.av-13ax9ts-551a8a156a8b3f6cd4f0feb5196ea674{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-13ax9ts-551a8a156a8b3f6cd4f0feb5196ea674 hr-invisible  avia-builder-el-16  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-2\"  class='av-magazine av-o2tmbk-ce302b04d029625c0ba719d145a300a9  avia-builder-el-17  el_after_av_hr  avia-builder-el-last   avia-builder-el-17  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-75011 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/grundlagen-der-zugriffssicherheit-ein-leitfaden-fuer-einsteiger\/' title='Link zu: Grundlagen der Zugriffssicherheit: Ein Leitfaden f\u00fcr Einsteiger' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/09\/BEGINNERS-GUIDE-COUV-80x80.png\" class=\"wp-image-34045 avia-img-lazy-loading-not-34045 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"Image de couverture Beginners guide\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/09\/BEGINNERS-GUIDE-COUV-80x80.png 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/09\/BEGINNERS-GUIDE-COUV-36x36.png 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/09\/BEGINNERS-GUIDE-COUV-180x180.png 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Grundlagen der Zugriffssicherheit: Ein Leitfaden f\u00fcr Einsteiger\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-07-17T13:52:22+01:00\" >17. Juli 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/grundlagen-der-zugriffssicherheit-ein-leitfaden-fuer-einsteiger\/' title='Link zu: Grundlagen der Zugriffssicherheit: Ein Leitfaden f\u00fcr Einsteiger'>Grundlagen der Zugriffssicherheit: Ein Leitfaden f\u00fcr Einsteiger<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-74085 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/compliance-und-risikomanagement-cybersicherheit-vereinfachen-potenziale-entfalten\/' title='Link zu: Compliance und Risikomanagement: Cybersicherheit vereinfachen \u2013 Potenziale entfalten' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/04\/visuel_CV_WP-80x80.jpg\" class=\"wp-image-72148 avia-img-lazy-loading-not-72148 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"Digital technology, internet network connection, big data, digital marketing IOT internet of things concept. Man using modern computer surfing internet futuristic metaverse NFT, innovative technology background\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/04\/visuel_CV_WP-80x80.jpg 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/04\/visuel_CV_WP-36x36.jpg 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/04\/visuel_CV_WP-180x180.jpg 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Compliance und Risikomanagement: Cybersicherheit vereinfachen \u2013 Potenziale entfalten\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-04-30T16:08:32+01:00\" >30. April 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/compliance-und-risikomanagement-cybersicherheit-vereinfachen-potenziale-entfalten\/' title='Link zu: Compliance und Risikomanagement: Cybersicherheit vereinfachen \u2013 Potenziale entfalten'>Compliance und Risikomanagement: Cybersicherheit vereinfachen \u2013 Potenziale entfalten<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-66367 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/leitfaden-fuer-cisos-zur-einhaltung-gesetzlicher-vorschriften\/' title='Link zu: Leitfaden f\u00fcr CISOs zur Einhaltung gesetzlicher Vorschriften' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/09\/CISO-COUV-80x80.png\" class=\"wp-image-34033 avia-img-lazy-loading-not-34033 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"Image de couverture CISO\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/09\/CISO-COUV-80x80.png 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/09\/CISO-COUV-36x36.png 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/09\/CISO-COUV-180x180.png 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Leitfaden f\u00fcr CISOs zur Einhaltung gesetzlicher Vorschriften\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-12-02T15:22:39+01:00\" >2. Dezember 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/leitfaden-fuer-cisos-zur-einhaltung-gesetzlicher-vorschriften\/' title='Link zu: Leitfaden f\u00fcr CISOs zur Einhaltung gesetzlicher Vorschriften'>Leitfaden f\u00fcr CISOs zur Einhaltung gesetzlicher Vorschriften<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-65550 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/10-zentrale-strategien-fuer-msps\/' title='Link zu: 10 zentrale Strategien f\u00fcr MSPs' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/AdobeStock_740825139-80x80.jpeg\" class=\"wp-image-63215 avia-img-lazy-loading-not-63215 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"Conceptual cybersecurity illustration \u2014 visual depiction of data protection, network security and secure IT infrastructure for modern enterprise environments.\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/AdobeStock_740825139-80x80.jpeg 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/AdobeStock_740825139-36x36.jpeg 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/AdobeStock_740825139-180x180.jpeg 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: 10 zentrale Strategien f\u00fcr MSPs\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-11-13T16:23:28+01:00\" >13. November 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/10-zentrale-strategien-fuer-msps\/' title='Link zu: 10 zentrale Strategien f\u00fcr MSPs'>10 zentrale Strategien f\u00fcr MSPs<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-66002 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/dora-leicht-gemacht-interaktive-matrix\/' title='Link zu: DORA LEICHT GEMACHT INTERAKTIVE MATRIX' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2021\/06\/RGPD-reglement-general-europeen-protection-des-donnees-150x150.jpg\" class=\"wp-image-15905 avia-img-lazy-loading-not-15905 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"DORA\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: DORA LEICHT GEMACHT INTERAKTIVE MATRIX\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-10-23T15:03:43+01:00\" >23. Oktober 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/dora-leicht-gemacht-interaktive-matrix\/' title='Link zu: DORA LEICHT GEMACHT INTERAKTIVE MATRIX'>DORA LEICHT GEMACHT INTERAKTIVE MATRIX<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":34063,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1659,1653],"tags":[],"class_list":["post-46183","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-whitepaper-audit-compliance-de","category-whitepaper-de"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Verwaltung des privilegierten Zugangs: Der Schl\u00fcssel zur Einhaltung der NIS\/NIS2-Richtlinien - WALLIX<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/whitepaper-audit-compliance-de\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Verwaltung des privilegierten Zugangs: Der Schl\u00fcssel zur Einhaltung der NIS\/NIS2-Richtlinien - WALLIX\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/whitepaper-audit-compliance-de\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-06T13:24:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-07T13:35:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/08\/NIS2-COUV.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"WALLIX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"WALLIX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/ressourcen\\\/whitepaper-de\\\/whitepaper-audit-compliance-de\\\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/ressourcen\\\/whitepaper-de\\\/whitepaper-audit-compliance-de\\\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\\\/\"},\"author\":{\"name\":\"WALLIX\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\"},\"headline\":\"Verwaltung des privilegierten Zugangs: Der Schl\u00fcssel zur Einhaltung der NIS\\\/NIS2-Richtlinien\",\"datePublished\":\"2024-02-06T13:24:06+00:00\",\"dateModified\":\"2024-02-07T13:35:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/ressourcen\\\/whitepaper-de\\\/whitepaper-audit-compliance-de\\\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\\\/\"},\"wordCount\":2430,\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/ressourcen\\\/whitepaper-de\\\/whitepaper-audit-compliance-de\\\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/NIS2-COUV.png\",\"articleSection\":[\"AUDIT &amp; COMPLIANCE\",\"WHITEPAPER\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/ressourcen\\\/whitepaper-de\\\/whitepaper-audit-compliance-de\\\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/ressourcen\\\/whitepaper-de\\\/whitepaper-audit-compliance-de\\\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\\\/\",\"name\":\"Verwaltung des privilegierten Zugangs: Der Schl\u00fcssel zur Einhaltung der NIS\\\/NIS2-Richtlinien - WALLIX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/ressourcen\\\/whitepaper-de\\\/whitepaper-audit-compliance-de\\\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/ressourcen\\\/whitepaper-de\\\/whitepaper-audit-compliance-de\\\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/NIS2-COUV.png\",\"datePublished\":\"2024-02-06T13:24:06+00:00\",\"dateModified\":\"2024-02-07T13:35:31+00:00\",\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wallix.com\\\/de\\\/ressourcen\\\/whitepaper-de\\\/whitepaper-audit-compliance-de\\\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/ressourcen\\\/whitepaper-de\\\/whitepaper-audit-compliance-de\\\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/NIS2-COUV.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/NIS2-COUV.png\",\"width\":1200,\"height\":627,\"caption\":\"Cover image illustrating the NIS2 cybersecurity directive on a WALLIX page, highlighting strengthened EU digital security requirements and WALLIX\u2019s guidance on achieving compliance through robust identity and access management solutions.\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/wallixcom\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wallix\\\/\",\"https:\\\/\\\/www.youtube.com\\\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\",\"name\":\"WALLIX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"caption\":\"WALLIX\"},\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/author\\\/alex\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Verwaltung des privilegierten Zugangs: Der Schl\u00fcssel zur Einhaltung der NIS\/NIS2-Richtlinien - WALLIX","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/whitepaper-audit-compliance-de\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\/","og_locale":"de_DE","og_type":"article","og_title":"Verwaltung des privilegierten Zugangs: Der Schl\u00fcssel zur Einhaltung der NIS\/NIS2-Richtlinien - WALLIX","og_url":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/whitepaper-audit-compliance-de\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\/","og_site_name":"WALLIX","article_published_time":"2024-02-06T13:24:06+00:00","article_modified_time":"2024-02-07T13:35:31+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/08\/NIS2-COUV.png","type":"image\/png"}],"author":"WALLIX","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"Verfasst von":"WALLIX","Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/whitepaper-audit-compliance-de\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/whitepaper-audit-compliance-de\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\/"},"author":{"name":"WALLIX","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd"},"headline":"Verwaltung des privilegierten Zugangs: Der Schl\u00fcssel zur Einhaltung der NIS\/NIS2-Richtlinien","datePublished":"2024-02-06T13:24:06+00:00","dateModified":"2024-02-07T13:35:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/whitepaper-audit-compliance-de\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\/"},"wordCount":2430,"publisher":{"@id":"https:\/\/www.wallix.com\/de\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/whitepaper-audit-compliance-de\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/08\/NIS2-COUV.png","articleSection":["AUDIT &amp; COMPLIANCE","WHITEPAPER"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/whitepaper-audit-compliance-de\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\/","url":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/whitepaper-audit-compliance-de\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\/","name":"Verwaltung des privilegierten Zugangs: Der Schl\u00fcssel zur Einhaltung der NIS\/NIS2-Richtlinien - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/whitepaper-audit-compliance-de\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/whitepaper-audit-compliance-de\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/08\/NIS2-COUV.png","datePublished":"2024-02-06T13:24:06+00:00","dateModified":"2024-02-07T13:35:31+00:00","inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/whitepaper-audit-compliance-de\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/whitepaper-audit-compliance-de\/verwaltung-des-privilegierten-zugangs-der-schluessel-zur-einhaltung-der-nis-nis2-richtlinien\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/08\/NIS2-COUV.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/08\/NIS2-COUV.png","width":1200,"height":627,"caption":"Cover image illustrating the NIS2 cybersecurity directive on a WALLIX page, highlighting strengthened EU digital security requirements and WALLIX\u2019s guidance on achieving compliance through robust identity and access management solutions."},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/de\/#website","url":"https:\/\/www.wallix.com\/de\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/de\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd","name":"WALLIX","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","caption":"WALLIX"},"url":"https:\/\/www.wallix.com\/de\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/46183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/comments?post=46183"}],"version-history":[{"count":11,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/46183\/revisions"}],"predecessor-version":[{"id":58737,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/46183\/revisions\/58737"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/media\/34063"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/media?parent=46183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/categories?post=46183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/tags?post=46183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}