{"id":46213,"date":"2024-02-06T14:45:36","date_gmt":"2024-02-06T13:45:36","guid":{"rendered":"https:\/\/www.wallix.com\/?p=46213"},"modified":"2024-02-07T17:27:14","modified_gmt":"2024-02-07T16:27:14","slug":"digital-trust-und-die-rolle-von-privileged-access-management-wp","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/","title":{"rendered":"Digital Trust und die Rolle von Privileged Access Management"},"content":{"rendered":"<div id='av_section_1'  class='avia-section av-ll6leyc9-81122575121ee03b2d46f9a595834706 main_color avia-section-default avia-no-border-styling  avia-builder-el-0  el_before_av_one_half  avia-builder-el-first  avia-bg-style-fixed av-minimum-height av-minimum-height-25 av-height-25  container_wrap fullsize'   data-av_minimum_height_pc='25' data-av_min_height_opt='25'><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-46213'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ll6lixzu-d4e3ae0612b94d1b3d0ec162742015f3\">\n#top .av-special-heading.av-ll6lixzu-d4e3ae0612b94d1b3d0ec162742015f3{\npadding-bottom:10px;\ncolor:#ffffff;\n}\nbody .av-special-heading.av-ll6lixzu-d4e3ae0612b94d1b3d0ec162742015f3 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-ll6lixzu-d4e3ae0612b94d1b3d0ec162742015f3 .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-ll6lixzu-d4e3ae0612b94d1b3d0ec162742015f3 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-ll6lixzu-d4e3ae0612b94d1b3d0ec162742015f3 av-special-heading-h2 custom-color-heading blockquote modern-quote  avia-builder-el-1  avia-builder-el-no-sibling '><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Digital Trust und die Rolle von Privileged Access Management<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><div id='after_section_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-46213'><div class='entry-content-wrapper clearfix'>\n<div  class='flex_column av-5b0es8w-29b68930f2123f02df19635b61172dea av_one_half  avia-builder-el-2  el_after_av_section  el_before_av_one_half  avia-builder-el-first  first flex_column_div  '     ><p><section  class='av_textblock_section av-4v28cg0-a1edfedf329af90fddb9044d5f42d13c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>In einer zunehmend digitalisierten Welt, in der Daten die Grundlage f\u00fcr Innovationen und Gesch\u00e4ftserfolg bilden, steht ein unverzichtbares Konzept im Zentrum: Vertrauen. Die F\u00e4higkeit, Vertrauen in digitale Prozesse, Systeme und Interaktionen zu schaffen und aufrechtzuerhalten, wird zum entscheidenden Dreh- und Angelpunkt f\u00fcr Organisationen jeder Gr\u00f6\u00dfe und Branche.<\/p>\n<p>In einer Zeit, in der jeder Klick, jeder Datenpunkt und jede Transaktion eine digitale Spur hinterl\u00e4sst, erhebt sich das Konzept des \u201eDigital Trust\u201c als ein wertvolles Gut. Doch wie entsteht dieses Vertrauen in einer Welt, die von Datenstr\u00f6men und Technologien durchzogen ist? Die Antwort liegt in der F\u00e4higkeit, den Zugriff auf sensible digitale Ressourcen zu verwalten und zu sch\u00fctzen. Hier kommt das Privileged Access Management (PAM) ins Spiel.<\/p>\n<p>Das Privileged Access Management ist weit mehr als nur eine Technologie. Es ist der Eckpfeiler f\u00fcr den Schutz kritischer Daten, Systeme und Infrastrukturen vor unbefugtem Zugriff. PAM erlaubt es Organisationen, den Zugang zu privilegierten Accounts und Informationen zu kontrollieren, zu \u00fcberwachen und zu verwalten. Dadurch wird nicht nur die Sicherheit erh\u00f6ht, sondern auch die Integrit\u00e4t und Vertraulichkeit sensibler Daten gew\u00e4hrleistet.<\/p>\n<p>Das Whitepaper \u201e<strong>Digital Trust und die Rolle des Privileged Access Managements<\/strong>\u201c taucht tief in die Welt des Digital Trust und des Privileged Access Managements ein. Es beleuchtet die Herausforderungen und Chancen, die mit der Schaffung einer vertrauensw\u00fcrdigen digitalen Umgebung einhergehen, und zeigt auf, wie PAM dabei eine entscheidende Rolle spielt. Unsere Experten haben gemeinsam mit Prof. Dr. Dennis-Kenji Kipker, aktuell sicherlich einem der f\u00fchrenden K\u00f6pfe der Cybersecurity in Deutschland, ihre Erkenntnisse und ihr Fachwissen in diese Seiten eingebracht, um Ihnen eine umfassende Perspektive auf dieses essenzielle Thema zu bieten.<\/p>\n<p><strong>Erfahren Sie mehr und laden Sie jetzt Ihr kostenloses Leseexemplar herunter.<\/strong><\/p>\n<\/div><\/section><br \/>\n<div  class='av-social-sharing-box av-edzqzk-90b80617f37b22c90883c7e13553fe35 av-social-sharing-box-default  avia-builder-el-4  el_after_av_textblock  avia-builder-el-last  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Dieses Whitepaper teilen<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Teilen auf X\" href='https:\/\/twitter.com\/share?text=Digital%20Trust%20und%20die%20Rolle%20von%20Privileged%20Access%20Management&#038;url=https:\/\/www.wallix.com\/de\/?p=46213' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Teilen auf X'><span class='avia_hidden_link_text'>Teilen auf X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Teilen auf LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Digital%20Trust%20und%20die%20Rolle%20von%20Privileged%20Access%20Management&#038;url=https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Teilen auf LinkedIn'><span class='avia_hidden_link_text'>Teilen auf LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Per E-Mail teilen\" href='mailto:?subject=Digital%20Trust%20und%20die%20Rolle%20von%20Privileged%20Access%20Management&#038;body=https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Per E-Mail teilen'><span class='avia_hidden_link_text'>Per E-Mail teilen<\/span><\/a><\/li><\/ul><\/div><\/div><\/p><\/div><div  class='flex_column av-4kz42lc-473eb64609d672d6f92bf29237ca7abe av_one_half  avia-builder-el-5  el_after_av_one_half  el_before_av_one_half  flex_column_div  '     ><section  class='av_textblock_section av-ll6lu9eg-157dbfc6d3b223bc4bef5583dc7f6d2a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3><strong>Dieses Whitepaper herunterladen<br \/>\n<\/strong><\/h3>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lzzfkw-7aa022a561a400efd8108dcca310e938\">\n#top .hr.hr-invisible.av-lzzfkw-7aa022a561a400efd8108dcca310e938{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-lzzfkw-7aa022a561a400efd8108dcca310e938 hr-invisible  avia-builder-el-7  el_after_av_textblock  el_before_av_codeblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3e7ru0w-d7bfb6655c8a0554077bc2fec679ea73\">\n#top .hr.hr-invisible.av-3e7ru0w-d7bfb6655c8a0554077bc2fec679ea73{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-3e7ru0w-d7bfb6655c8a0554077bc2fec679ea73 hr-invisible  avia-builder-el-9  el_after_av_codeblock  avia-builder-el-last '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p><\/div><\/p>\n<div  class='flex_column av-15zjxb4-3483d93466a9169fd67958a3a193e44c av_one_half  avia-builder-el-10  el_after_av_one_half  el_before_av_one_half  first flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-34uhrts-ac4c2f61e247892b9986c98cd783afdb\">\n#top .av-special-heading.av-34uhrts-ac4c2f61e247892b9986c98cd783afdb{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-34uhrts-ac4c2f61e247892b9986c98cd783afdb .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-34uhrts-ac4c2f61e247892b9986c98cd783afdb .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-34uhrts-ac4c2f61e247892b9986c98cd783afdb av-special-heading-h2 blockquote modern-quote  avia-builder-el-11  el_before_av_hr  avia-builder-el-first '><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Verwandte Inhalte<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2d7x5s0-44575d6a59874b4a9674e8411ba03faf\">\n#top .hr.hr-invisible.av-2d7x5s0-44575d6a59874b4a9674e8411ba03faf{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-2d7x5s0-44575d6a59874b4a9674e8411ba03faf hr-invisible  avia-builder-el-12  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-1\"  class='av-magazine av-ll6m5bbn-cac8a819e262deee888a5fd7e01362fb  avia-builder-el-13  el_after_av_hr  avia-builder-el-last   avia-builder-el-13  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-78707 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/de\/blogpost\/identity-and-access-management-ein-umfassender-leitfaden\/' title='Link zu: Identity and Access Management: Ein umfassender Leitfaden' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/02\/blog_what-is-cybersecurity-framework_featured-img_730x270-80x80.jpg\" class=\"wp-image-46930 avia-img-lazy-loading-not-46930 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"Image illustrating the concept of a cybersecurity framework, with interconnected elements representing various security measures. The visual emphasizes the structured approach to protecting digital assets and ensuring compliance in an organization\u2019s cybersecurity strategy.\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/02\/blog_what-is-cybersecurity-framework_featured-img_730x270-80x80.jpg 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/02\/blog_what-is-cybersecurity-framework_featured-img_730x270-36x36.jpg 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/02\/blog_what-is-cybersecurity-framework_featured-img_730x270-180x180.jpg 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Identity and Access Management: Ein umfassender Leitfaden\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-10-01T13:24:15+01:00\" >Oktober 1, 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/identity-and-access-management-ein-umfassender-leitfaden\/' title='Link zu: Identity and Access Management: Ein umfassender Leitfaden'>Identity and Access Management: Ein umfassender Leitfaden<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-68277 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/de\/blogpost\/iga-und-pam-wie-die-identity-governance-administration-mit-pam-verbunden-ist\/' title='Link zu: IGA und PAM: Wie die Identity Governance Administration mit PAM verbunden ist' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/IAG-80x80.jpeg\" class=\"wp-image-63071 avia-img-lazy-loading-not-63071 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"WALLIX IAG \u2014 visual representation of Identity &amp; Access Governance solution, highlighting secure access governance, compliance and permission management for enterprise IT environments.\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/IAG-80x80.jpeg 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/IAG-36x36.jpeg 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/IAG-180x180.jpeg 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: IGA und PAM: Wie die Identity Governance Administration mit PAM verbunden ist\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-12T13:32:12+01:00\" >Februar 12, 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/iga-und-pam-wie-die-identity-governance-administration-mit-pam-verbunden-ist\/' title='Link zu: IGA und PAM: Wie die Identity Governance Administration mit PAM verbunden ist'>IGA und PAM: Wie die Identity Governance Administration mit PAM verbunden ist<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-63585 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/de\/blogpost\/elevate-security-strategy-pam-iag-managed-service-provider\/' title='Link zu: Erweitern Sie Ihre Sicherheitsstrategie: Die Leistungsf\u00e4higkeit von PAM und IAG f\u00fcr Managed Service Provider' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/article-5-80x80.jpeg\" class=\"wp-image-62800 avia-img-lazy-loading-not-62800 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"Business performance monitoring concept, businessman using computer laptop Online survey filling out, digital form checklist, Quality control and accuracy Check, Assessment form, questionnaire.\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/article-5-80x80.jpeg 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/article-5-36x36.jpeg 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/article-5-180x180.jpeg 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Erweitern Sie Ihre Sicherheitsstrategie: Die Leistungsf\u00e4higkeit von PAM und IAG f\u00fcr Managed Service Provider\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-09-17T09:51:23+01:00\" >September 17, 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/elevate-security-strategy-pam-iag-managed-service-provider\/' title='Link zu: Erweitern Sie Ihre Sicherheitsstrategie: Die Leistungsf\u00e4higkeit von PAM und IAG f\u00fcr Managed Service Provider'>Erweitern Sie Ihre Sicherheitsstrategie: Die Leistungsf\u00e4higkeit von PAM und IAG f\u00fcr Managed Service Provider<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-64394 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/de\/blogpost\/transforming-cybersecurity-from-cost-center-to-profit-generator-msp\/' title='Link zu: Cybersecurity: Von einer Kostenstelle zu einem Gewinnbringer f\u00fcr MSPs' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/article-3-80x80.jpeg\" class=\"wp-image-62771 avia-img-lazy-loading-not-62771 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"Gain insights from Wallix on strengthening cybersecurity and managing privileged access. This image highlights key practices and strategies for securing organizational IT assets.\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/article-3-80x80.jpeg 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/article-3-36x36.jpeg 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/article-3-180x180.jpeg 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Cybersecurity: Von einer Kostenstelle zu einem Gewinnbringer f\u00fcr MSPs\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-09-16T15:49:56+01:00\" >September 16, 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/transforming-cybersecurity-from-cost-center-to-profit-generator-msp\/' title='Link zu: Cybersecurity: Von einer Kostenstelle zu einem Gewinnbringer f\u00fcr MSPs'>Cybersecurity: Von einer Kostenstelle zu einem Gewinnbringer f\u00fcr MSPs<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-60910 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/de\/blogpost\/fokus-ot-sicherheit-strategien-trends-und-herausforderungen-im-kampf-gegen-it-bedrohungen\/' title='Link zu: Fokus: OT-Sicherheit &#8211; Strategien, Trends und Herausforderungen im Kampf gegen IT-Bedrohungen' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/07\/AdobeStock_178187166-80x80.jpeg\" class=\"wp-image-60900 avia-img-lazy-loading-not-60900 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/07\/AdobeStock_178187166-80x80.jpeg 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/07\/AdobeStock_178187166-36x36.jpeg 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/07\/AdobeStock_178187166-180x180.jpeg 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Fokus: OT-Sicherheit - Strategien, Trends und Herausforderungen im Kampf gegen IT-Bedrohungen\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-07-25T11:18:08+01:00\" >Juli 25, 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/fokus-ot-sicherheit-strategien-trends-und-herausforderungen-im-kampf-gegen-it-bedrohungen\/' title='Link zu: Fokus: OT-Sicherheit &#8211; Strategien, Trends und Herausforderungen im Kampf gegen IT-Bedrohungen'>Fokus: OT-Sicherheit &#8211; Strategien, Trends und Herausforderungen im Kampf gegen IT-Bedrohungen<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div>\n<div  class='flex_column av-nh15kw-8ebda5a28a70ad5c464ce817b6d18ccb av_one_half  avia-builder-el-14  el_after_av_one_half  avia-builder-el-last  flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1k1oio0-2e51b019faefb8c2e3812687e45f29b0\">\n#top .av-special-heading.av-1k1oio0-2e51b019faefb8c2e3812687e45f29b0{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-1k1oio0-2e51b019faefb8c2e3812687e45f29b0 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-1k1oio0-2e51b019faefb8c2e3812687e45f29b0 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-1k1oio0-2e51b019faefb8c2e3812687e45f29b0 av-special-heading-h2 blockquote modern-quote  avia-builder-el-15  el_before_av_hr  avia-builder-el-first '><h2 class='av-special-heading-tag '  itemprop=\"headline\"  >Verwandte Ressource<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-13ax9ts-551a8a156a8b3f6cd4f0feb5196ea674\">\n#top .hr.hr-invisible.av-13ax9ts-551a8a156a8b3f6cd4f0feb5196ea674{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-13ax9ts-551a8a156a8b3f6cd4f0feb5196ea674 hr-invisible  avia-builder-el-16  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-2\"  class='av-magazine av-o2tmbk-e0f5de9242031244a22b7b4c4d625da7  avia-builder-el-17  el_after_av_hr  avia-builder-el-last   avia-builder-el-17  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-67431 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/3-strategien-fuer-den-sicheren-fernzugriff\/' title='Link zu: Fertigungsindustrie | 3 Strategien f\u00fcr den sicheren Fernzugriff' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/04\/WALLIX-INSIDE-BACKGROUND-80x80.jpeg\" class=\"wp-image-54110 avia-img-lazy-loading-not-54110 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"Gas storage sphere tanks in petrochemical industry or oil and gas refinery plant at evening, Manufacturing of petroleum industrial plant with gas column and smoke stacks on sunset sky background\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/04\/WALLIX-INSIDE-BACKGROUND-80x80.jpeg 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/04\/WALLIX-INSIDE-BACKGROUND-36x36.jpeg 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/04\/WALLIX-INSIDE-BACKGROUND-180x180.jpeg 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Fertigungsindustrie | 3 Strategien f\u00fcr den sicheren Fernzugriff\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-12-30T11:55:34+01:00\" >Dezember 30, 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/3-strategien-fuer-den-sicheren-fernzugriff\/' title='Link zu: Fertigungsindustrie | 3 Strategien f\u00fcr den sicheren Fernzugriff'>Fertigungsindustrie | 3 Strategien f\u00fcr den sicheren Fernzugriff<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-66367 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/leitfaden-fuer-cisos-zur-einhaltung-gesetzlicher-vorschriften\/' title='Link zu: Leitfaden f\u00fcr CISOs zur Einhaltung gesetzlicher Vorschriften' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/09\/CISO-COUV-80x80.png\" class=\"wp-image-34033 avia-img-lazy-loading-not-34033 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"Image de couverture CISO\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/09\/CISO-COUV-80x80.png 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/09\/CISO-COUV-36x36.png 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/09\/CISO-COUV-180x180.png 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Leitfaden f\u00fcr CISOs zur Einhaltung gesetzlicher Vorschriften\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-12-02T15:22:39+01:00\" >Dezember 2, 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/leitfaden-fuer-cisos-zur-einhaltung-gesetzlicher-vorschriften\/' title='Link zu: Leitfaden f\u00fcr CISOs zur Einhaltung gesetzlicher Vorschriften'>Leitfaden f\u00fcr CISOs zur Einhaltung gesetzlicher Vorschriften<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-65550 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/10-zentrale-strategien-fuer-msps\/' title='Link zu: 10 zentrale Strategien f\u00fcr MSPs' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/AdobeStock_740825139-80x80.jpeg\" class=\"wp-image-63215 avia-img-lazy-loading-not-63215 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"Conceptual cybersecurity illustration \u2014 visual depiction of data protection, network security and secure IT infrastructure for modern enterprise environments.\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/AdobeStock_740825139-80x80.jpeg 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/AdobeStock_740825139-36x36.jpeg 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/09\/AdobeStock_740825139-180x180.jpeg 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: 10 zentrale Strategien f\u00fcr MSPs\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-11-13T16:23:28+01:00\" >November 13, 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/10-zentrale-strategien-fuer-msps\/' title='Link zu: 10 zentrale Strategien f\u00fcr MSPs'>10 zentrale Strategien f\u00fcr MSPs<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-65525 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/praktischer-leitfaden-zur-passwortsicherheit-mit-wallix-one-enterprise-vault\/' title='Link zu: Praktischer Leitfaden zur Passwortsicherheit mit WALLIX One Enterprise Vault' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/05\/KSAs_NCA_ECC-80x80.jpeg\" class=\"wp-image-58141 avia-img-lazy-loading-not-58141 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"Confident Male Data Scientist Works on Personal Computer in Big Infrastructure Control and Monitoring Room with Neural Network. Young Engineer in an Office Room with Colleagues.\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/05\/KSAs_NCA_ECC-80x80.jpeg 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/05\/KSAs_NCA_ECC-36x36.jpeg 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/05\/KSAs_NCA_ECC-180x180.jpeg 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Praktischer Leitfaden zur Passwortsicherheit mit WALLIX One Enterprise Vault\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-11-13T13:55:01+01:00\" >November 13, 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/praktischer-leitfaden-zur-passwortsicherheit-mit-wallix-one-enterprise-vault\/' title='Link zu: Praktischer Leitfaden zur Passwortsicherheit mit WALLIX One Enterprise Vault'>Praktischer Leitfaden zur Passwortsicherheit mit WALLIX One Enterprise Vault<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-46234 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-thumbnail\"><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/9-gute-gruende-fuer-pam-as-a-service\/' title='Link zu: 9 gute Gr\u00fcnde f\u00fcr PAM as a Service' class='av-magazine-thumbnail-link'><img decoding=\"async\" fetchpriority=\"high\" width=\"80\" height=\"80\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/12\/third_party_access-80x80.jpeg\" class=\"wp-image-38192 avia-img-lazy-loading-not-38192 attachment-thumbnail size-thumbnail wp-post-image\" alt=\"Photograph or graphic showing secure remote access interactions.\nUsed to visually represent WALLIX\u2019s technology for securing and controlling remote access by external vendors, partners, and contractors to corporate IT and infrastructure.\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/12\/third_party_access-80x80.jpeg 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/12\/third_party_access-36x36.jpeg 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/12\/third_party_access-180x180.jpeg 180w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/a><\/div><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: 9 gute Gr\u00fcnde f\u00fcr PAM as a Service\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-02-06T14:54:36+01:00\" >Februar 6, 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/9-gute-gruende-fuer-pam-as-a-service\/' title='Link zu: 9 gute Gr\u00fcnde f\u00fcr PAM as a Service'>9 gute Gr\u00fcnde f\u00fcr PAM as a Service<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":34063,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1736,1794,1653],"tags":[],"class_list":["post-46213","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-whitepaper-iag-de","category-whitepaper-privilege-access-management-de","category-whitepaper-de"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digital Trust und die Rolle von Privileged Access Management - WALLIX<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Trust und die Rolle von Privileged Access Management - WALLIX\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-06T13:45:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-07T16:27:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/08\/NIS2-COUV.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"WALLIX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"WALLIX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/\"},\"author\":{\"name\":\"WALLIX\",\"@id\":\"https:\/\/www.wallix.com\/de\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd\"},\"headline\":\"Digital Trust und die Rolle von Privileged Access Management\",\"datePublished\":\"2024-02-06T13:45:36+00:00\",\"dateModified\":\"2024-02-07T16:27:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/\"},\"wordCount\":2611,\"publisher\":{\"@id\":\"https:\/\/www.wallix.com\/de\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/08\/NIS2-COUV.png\",\"articleSection\":[\"IDENTITY AND ACCESS GOVERNANCE\",\"PRIVILEGE ACCESS MANAGEMENT\",\"WHITEPAPER\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/\",\"url\":\"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/\",\"name\":\"Digital Trust und die Rolle von Privileged Access Management - WALLIX\",\"isPartOf\":{\"@id\":\"https:\/\/www.wallix.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/08\/NIS2-COUV.png\",\"datePublished\":\"2024-02-06T13:45:36+00:00\",\"dateModified\":\"2024-02-07T16:27:14+00:00\",\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/#primaryimage\",\"url\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/08\/NIS2-COUV.png\",\"contentUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/08\/NIS2-COUV.png\",\"width\":1200,\"height\":627,\"caption\":\"Cover image illustrating the NIS2 cybersecurity directive on a WALLIX page, highlighting strengthened EU digital security requirements and WALLIX\u2019s guidance on achieving compliance through robust identity and access management solutions.\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.wallix.com\/de\/#website\",\"url\":\"https:\/\/www.wallix.com\/de\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\/\/www.wallix.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.wallix.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.wallix.com\/de\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\/\/www.wallix.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/wallixcom\",\"https:\/\/www.linkedin.com\/company\/wallix\/\",\"https:\/\/www.youtube.com\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.wallix.com\/de\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd\",\"name\":\"WALLIX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.wallix.com\/de\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"caption\":\"WALLIX\"},\"url\":\"https:\/\/www.wallix.com\/de\/author\/alex\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital Trust und die Rolle von Privileged Access Management - WALLIX","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/","og_locale":"de_DE","og_type":"article","og_title":"Digital Trust und die Rolle von Privileged Access Management - WALLIX","og_url":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/","og_site_name":"WALLIX","article_published_time":"2024-02-06T13:45:36+00:00","article_modified_time":"2024-02-07T16:27:14+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/08\/NIS2-COUV.png","type":"image\/png"}],"author":"WALLIX","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"Verfasst von":"WALLIX","Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/"},"author":{"name":"WALLIX","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd"},"headline":"Digital Trust und die Rolle von Privileged Access Management","datePublished":"2024-02-06T13:45:36+00:00","dateModified":"2024-02-07T16:27:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/"},"wordCount":2611,"publisher":{"@id":"https:\/\/www.wallix.com\/de\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/08\/NIS2-COUV.png","articleSection":["IDENTITY AND ACCESS GOVERNANCE","PRIVILEGE ACCESS MANAGEMENT","WHITEPAPER"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/","url":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/","name":"Digital Trust und die Rolle von Privileged Access Management - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/08\/NIS2-COUV.png","datePublished":"2024-02-06T13:45:36+00:00","dateModified":"2024-02-07T16:27:14+00:00","inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/digital-trust-und-die-rolle-von-privileged-access-management-wp\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/08\/NIS2-COUV.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/08\/NIS2-COUV.png","width":1200,"height":627,"caption":"Cover image illustrating the NIS2 cybersecurity directive on a WALLIX page, highlighting strengthened EU digital security requirements and WALLIX\u2019s guidance on achieving compliance through robust identity and access management solutions."},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/de\/#website","url":"https:\/\/www.wallix.com\/de\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/de\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd","name":"WALLIX","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","caption":"WALLIX"},"url":"https:\/\/www.wallix.com\/de\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/46213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/comments?post=46213"}],"version-history":[{"count":4,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/46213\/revisions"}],"predecessor-version":[{"id":58735,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/46213\/revisions\/58735"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/media\/34063"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/media?parent=46213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/categories?post=46213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/tags?post=46213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}