{"id":78700,"date":"2025-10-01T13:14:37","date_gmt":"2025-10-01T12:14:37","guid":{"rendered":"https:\/\/www.wallix.com\/what-is-privileged-account-management-pam\/"},"modified":"2025-11-18T09:18:11","modified_gmt":"2025-11-18T08:18:11","slug":"was-ist-privileged-account-management-pam","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/","title":{"rendered":"Was ist Privileged Account Management (PAM)?"},"content":{"rendered":"<div class='flex_column_table av-4obbici-51ab0e7b147ada27318248607444892c sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4obbici-51ab0e7b147ada27318248607444892c\">\n#top .flex_column_table.av-equal-height-column-flextable.av-4obbici-51ab0e7b147ada27318248607444892c{\nmargin-top:0;\nmargin-bottom:0px;\n}\n.flex_column.av-4obbici-51ab0e7b147ada27318248607444892c{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-4obbici-51ab0e7b147ada27318248607444892c{\nmargin-top:-200px;\n}\n}\n<\/style>\n<div  class='flex_column av-4obbici-51ab0e7b147ada27318248607444892c av_two_third  avia-builder-el-0  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><section  class='av_textblock_section av-mi4awpi5-e16bcb5c9fca7f3260592921e6f313b3 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h1><span class=\"TextRun SCXW13509713 BCX4\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW13509713 BCX4\">Was <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SpellingErrorHighlight SCXW13509713 BCX4\">ist<\/span><span class=\"NormalTextRun SCXW13509713 BCX4\"> Privileged Account Management (PAM)?<\/span><\/span><span class=\"EOP SCXW13509713 BCX4\" data-ccp-props=\"{\">\u00a0<\/span><\/h1>\n<\/div><\/section><br \/>\n<div  class='av-post-metadata-container av-av_post_metadata-36bcf33e90f22125c019c70beb35c7b9 av-metadata-container-align-left  avia-builder-el-2  el_after_av_textblock  el_before_av_hr  av-metadata-container-1'><div class='av-post-metadata-container-inner'><span class=\"av-post-metadata-content av-post-metadata-meta-content\"><span class=\"av-post-metadata-content av-post-metadata-author\"  itemprop=\"author\" ><span class=\"av-metadata-before av-metadata-before-author\">by<\/span><span class=\"av-post-metadata-author-link\" ><a href=\"https:\/\/www.wallix.com\/de\/author\/alex\/\"  rel=\"author\">WALLIX<\/a><\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-modified\"><span class=\"av-post-metadata-modified-date\" >November 18, 2025<\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-category\"><span class=\"av-metadata-before av-metadata-before-categories\">in<\/span><span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/de\/category\/blogpost\/\" >BLOGPOST<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/de\/category\/blogpost\/privileged-access-management-de\/\" >PRIVILEGED ACCESS MANAGEMENT<\/a><\/span><\/span><\/span><\/div><\/div><br \/>\n<div  class='hr av-av_hr-bca31578670ae9d408d6d6d291fc57a6 hr-default  avia-builder-el-3  el_after_av_post_metadata  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-llxvu5uu-634e7cbea199c226b00223b91a5988d4 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><strong><em><span class=\"TextRun SCXW145045040 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW13509713 BCX4\">Privileged<\/span><span class=\"NormalTextRun SCXW145045040 BCX4\"> Account Management beschreibt die Verwaltung und \u00dcberwachung von Benutzerkonten und Datenzugriffen durch privilegierte Nutzer.<\/span><\/span><span class=\"EOP SCXW145045040 BCX4\" data-ccp-props=\"{\">\u00a0<\/span><\/em><\/strong><\/p>\n<p><span data-contrast=\"auto\">Privileged Account Management beschreibt die Verwaltung und \u00dcberwachung von Benutzerkonten und Datenzugriffen durch privilegierte Nutzer.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Ein privilegierter Nutzer ist jemand, der administrative Rechte auf kritische Systeme hat. Zum Beispiel gilt jeder, der Benutzerkonten oder Rollen in einer Oracle-Datenbank anlegen oder l\u00f6schen kann, als privilegierter Nutzer.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Wie bei allen Privilegien sollten auch privilegierte Konten nur vertrauensw\u00fcrdigen Personen zugewiesen werden. Konten mit \u201eRoot\u201c-Rechten \u2013 etwa zur \u00c4nderung von Systemkonfigurationen, Installation von Software, Verwaltung von Benutzerkonten oder Zugriff auf vertrauliche Daten \u2013 sollten nur Personen erhalten, denen Sie vertrauen. Aber wie es so sch\u00f6n hei\u00dft: <\/span><i><span data-contrast=\"auto\">Vertrauen ist gut, Kontrolle ist besser.<\/span><\/i><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Selbst vertrauensw\u00fcrdige Zugriffe m\u00fcssen kontrolliert und \u00fcberwacht werden \u2013 genau daf\u00fcr ist Privileged Account Management da. Unternehmen m\u00fcssen jederzeit in der Lage sein, Zugriffsrechte zu entziehen. Idealerweise sollten die meisten Rechte entweder automatisch nach einer bestimmten Zeit entfallen oder regelm\u00e4\u00dfig \u00fcberpr\u00fcft werden. Die beste Praxis ist: Nur wer ein Privileg aktiv ben\u00f6tigt, sollte es auch erhalten.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Je nach Gr\u00f6\u00dfe und Komplexit\u00e4t einer Organisation ist es allerdings sehr zeitaufwendig \u2013 oder sogar unm\u00f6glich \u2013 all das manuell umzusetzen.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Die unbequeme Wahrheit ist: In nahezu allen komplexen Cyberangriffen ist <\/span><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/privileged-accounts-at-root-of\/\"><span data-contrast=\"none\">der Diebstahl und Missbrauch privilegierter Konten ein entscheidender Erfolgsfaktor<\/span><\/a><span data-contrast=\"auto\"> \u2013 unabh\u00e4ngig davon, woher der Angriff stammt. Privilegierte Konten sind im wahrsten Sinne des Wortes die Schl\u00fcssel zu Ihrem digitalen K\u00f6nigreich. Vergessen Sie all die Phrasen \u00e0 la <\/span><i><span data-contrast=\"auto\">\u201eUnsere Mitarbeitenden sind unser wichtigstes Kapital\u201c<\/span><\/i><span data-contrast=\"auto\"> \u2013 in Wirklichkeit sind es Ihre Daten.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Je gr\u00f6\u00dfer und komplexer die IT-Struktur eines Unternehmens ist, desto mehr privilegierte Nutzer gibt es. Diese Nutzer k\u00f6nnen interne Mitarbeitende sein, aber auch externe Dienstleister \u2013 vor Ort oder remote, menschlich oder automatisiert. Tats\u00e4chlich haben viele Unternehmen inzwischen mehr privilegierte Nutzer als Mitarbeitende! Kein Wunder also, dass der Markt f\u00fcr Privileged Account Management-L\u00f6sungen geradezu explodiert.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m2bqmd73-12cc69e99c9651026836fd038e7dc46d\">\n#top .av_textblock_section.av-m2bqmd73-12cc69e99c9651026836fd038e7dc46d .avia_textblock{\nfont-size:16px;\n}\n<\/style>\n<section  class='av_textblock_section av-m2bqmd73-12cc69e99c9651026836fd038e7dc46d '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h2><span style=\"color: #ec6707; font-size: 22px;\"><span class=\"TextRun SCXW146872613 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW146872613 BCX4\">Wie funktioniert <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SpellingErrorHighlight SCXW146872613 BCX4\">Privileged<\/span><span class=\"NormalTextRun SCXW146872613 BCX4\"> Account Management?<\/span><\/span><span class=\"EOP SCXW146872613 BCX4\" data-ccp-props=\"{\">\u00a0<\/span><\/span><\/h2>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-m2bqlz8u-5b9a8781afd4b48d75ae71f2eea68231 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><span data-contrast=\"auto\">Privileged Account Management (PAM) sch\u00fctzt Ihre Systeme vor der unbeabsichtigten oder vors\u00e4tzlichen Fehlverwendung privilegierter Konten, denn die L\u00f6sung bietet eine skalierbare und sichere M\u00f6glichkeit, alle privilegierten Konten \u00fcber s\u00e4mtliche Systeme hinweg zu autorisieren und zu \u00fcberwachen. <\/span><\/p>\n<p><span data-contrast=\"auto\">Es erm\u00f6glicht Ihnen:<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Privilegien nur f\u00fcr die Systeme zu vergeben, f\u00fcr die ein Nutzer autorisiert ist.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Zugriff nur bei Bedarf zu gew\u00e4hren und ihn sofort wieder zu entziehen, sobald dieser Bedarf entf\u00e4llt.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Lokale oder direkte Systempassw\u00f6rter f\u00fcr privilegierte Nutzer vollst\u00e4ndig zu eliminieren.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Zugriffe zentral \u00fcber eine Vielzahl heterogener Systeme zu steuern.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Einen unver\u00e4nderbaren Audit-Trail f\u00fcr alle privilegierten Aktionen zu erstellen.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<\/ul>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m2bqnv1c-58a047fa7b4a92a939516b8b8dccf018\">\n#top .av_textblock_section.av-m2bqnv1c-58a047fa7b4a92a939516b8b8dccf018 .avia_textblock{\nfont-size:16px;\n}\n<\/style>\n<section  class='av_textblock_section av-m2bqnv1c-58a047fa7b4a92a939516b8b8dccf018 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h2><span style=\"color: #ec6707; font-size: 22px;\"><span class=\"TextRun SCXW45501701 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW45501701 BCX4\">Bestandteile einer <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SpellingErrorHighlight SCXW45501701 BCX4\">Privileged<\/span><span class=\"NormalTextRun SCXW45501701 BCX4\"> Account Management-L\u00f6sung<\/span><\/span><span class=\"EOP SCXW45501701 BCX4\" data-ccp-props=\"{\">\u00a0<\/span><\/span><\/h2>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-m2bqoknc-507c8e1c9dd831e2bd852287fc4260aa '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><span data-contrast=\"auto\">PAM-L\u00f6sungen unterscheiden sich je nach Anbieter, aber die meisten enthalten folgende zentrale Komponenten:<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{\" data-aria-posinset=\"1\" data-aria-level=\"1\"><a href=\"https:\/\/www.wallix.com\/de\/produkte\/wallix-pam\/\"><b><span data-contrast=\"none\">Access Manager<\/span><\/b><\/a><span data-contrast=\"auto\"> \u2013 steuert den Zugriff auf privilegierte Konten. Er ist die zentrale Instanz zur Definition und Durchsetzung von Richtlinien f\u00fcr privilegierte Zugriffe. Ein privilegierter Nutzer beantragt den Zugriff auf ein System \u00fcber den Access Manager, der wiederum wei\u00df, auf welche Systeme der Nutzer zugreifen darf \u2013 und mit welchem Berechtigungsniveau. Ein Super-Admin kann \u00fcber das zentrale System privilegierte Konten anlegen, bearbeiten oder l\u00f6schen \u2013 das erh\u00f6ht sowohl die Effizienz als auch die Compliance.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{\" data-aria-posinset=\"2\" data-aria-level=\"1\"><a href=\"https:\/\/www.wallix.com\/de\/produkte\/enterprise-vault\/\"><b><span data-contrast=\"none\">Password Vault<\/span><\/b><\/a><span data-contrast=\"auto\"> \u2013 PAM-Systeme speichern Passw\u00f6rter in einem gesicherten Passwort-Tresor. Der gesamte Systemzugriff erfolgt \u00fcber diesen Tresor. Das bedeutet: Endnutzer haben niemals direkten Zugriff auf Root-Passw\u00f6rter.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{\" data-aria-posinset=\"3\" data-aria-level=\"1\"><a href=\"https:\/\/www.wallix.com\/de\/blogpost\/session-manager-was-er-ist-und-warum-sie-ihn-brauchen\/\"><b><span data-contrast=\"none\">Session Manager<\/span><\/b><\/a><span data-contrast=\"auto\"> \u2013 Session Manager zeichnen s\u00e4mtliche Aktionen auf, die w\u00e4hrend einer privilegierten Sitzung erfolgen \u2013 f\u00fcr sp\u00e4tere Analysen und Audits. Manche Systeme erkennen zudem verd\u00e4chtige oder nicht autorisierte Aktionen und k\u00f6nnen entweder Alarm schlagen oder diese Aktivit\u00e4ten direkt blockieren.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<\/ul>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m2bqpfy0-e3b8099b26985c482da0ffcd79879748\">\n#top .av_textblock_section.av-m2bqpfy0-e3b8099b26985c482da0ffcd79879748 .avia_textblock{\nfont-size:16px;\n}\n<\/style>\n<section  class='av_textblock_section av-m2bqpfy0-e3b8099b26985c482da0ffcd79879748 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h2><span style=\"color: #ec6707; font-size: 22px;\"><span class=\"TextRun SCXW23824500 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW23824500 BCX4\">Was ist der Unterschied?<\/span><\/span><span class=\"EOP SCXW23824500 BCX4\" data-ccp-props=\"{\">\u00a0<\/span><\/span><\/h2>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-m2bqqyhz-a69f84e133cae347f57ae00fb1094d74 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><strong>Privileged Account Management?\u00a0<\/strong><\/p>\n<p><strong>Privileged Access Management?\u00a0<\/strong><\/p>\n<p><strong>Privileged User Management?\u00a0<\/strong><\/p>\n<p><span class=\"TextRun SCXW7461658 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW7461658 BCX4\">Im Grunde ist es egal, welchen Begriff man verwendet \u2013 all diese Begriffe bezeichnen im Wesentlichen dasselbe Konzept. Oft h\u00f6rt man auch \u201e<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW7461658 BCX4\">Privileged<\/span><span class=\"NormalTextRun SCXW7461658 BCX4\"> Session Management\u201c, \u201ePSM\u201c oder \u201e<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW7461658 BCX4\">PxM<\/span><span class=\"NormalTextRun SCXW7461658 BCX4\">\u201c. Bei WALLIX halten wir es einfach und sprechen schlicht von PAM.<\/span><\/span><span class=\"EOP SCXW7461658 BCX4\" data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<h3><span style=\"font-size: 25px;\"><span class=\"TextRun SCXW265025725 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW265025725 BCX4\">Sie m\u00f6chten mehr \u00fcber <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SpellingErrorHighlight SCXW265025725 BCX4\">Privileged<\/span><span class=\"NormalTextRun SCXW265025725 BCX4\"> Account Management erfahren?<\/span><\/span><span class=\"EOP SCXW265025725 BCX4\" data-ccp-props=\"{\">\u00a0<\/span><\/span><\/h3>\n<p><span style=\"color: #f4813a;\"><strong><span class=\"TextRun SCXW132806807 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW132806807 BCX4\">Dann laden Sie sich unser <\/span><\/span><a class=\"Hyperlink SCXW132806807 BCX4\" href=\"https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/fernzugang\/grundlagen-der-zugriffssicherheit-ein-leitfaden-fuer-einsteiger\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW132806807 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW132806807 BCX4\" data-ccp-charstyle=\"Hyperlink\">kostenloses Whitepaper <\/span><\/span><span class=\"TextRun Underlined SCXW132806807 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW132806807 BCX4\" data-ccp-charstyle=\"Hyperlink\">\u201e<\/span><span class=\"NormalTextRun SCXW132806807 BCX4\" data-ccp-charstyle=\"Hyperlink\">Grundlagen de<\/span><span class=\"NormalTextRun SCXW132806807 BCX4\" data-ccp-charstyle=\"Hyperlink\">r Zugriffssicherheit<\/span><span class=\"NormalTextRun SCXW132806807 BCX4\" data-ccp-charstyle=\"Hyperlink\"> \u2013 ein Leitfaden f\u00fcr Einsteiger<\/span><span class=\"NormalTextRun SCXW132806807 BCX4\" data-ccp-charstyle=\"Hyperlink\">\u201c<\/span><\/span><span class=\"TextRun Underlined SCXW132806807 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW132806807 BCX4\" data-ccp-charstyle=\"Hyperlink\"> herunter<\/span><\/span><\/a><span class=\"TextRun SCXW132806807 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW132806807 BCX4\"> \u2013 mit allen Grundlagen zu PAM und weiteren Tools f\u00fcrs Access Management.<\/span><\/span><span class=\"EOP SCXW132806807 BCX4\" data-ccp-props=\"{\">\u00a0<\/span><br \/>\n<\/strong><br \/>\n<\/span>.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-m2br14mw-8e2dd5414e806049b6bb774c3eecd8f8-wrap avia-button-center  avia-builder-el-11  el_after_av_textblock  avia-builder-el-last '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m2br14mw-8e2dd5414e806049b6bb774c3eecd8f8\">\n#top #wrap_all .avia-button.av-m2br14mw-8e2dd5414e806049b6bb774c3eecd8f8{\nfont-size:18px;\ntransition:all 0.4s ease-in-out;\npadding:15px 15px 15px 15px;\n}\n<\/style>\n<a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/grundlagen-der-zugriffssicherheit-ein-leitfaden-fuer-einsteiger\/'  class='avia-button av-m2br14mw-8e2dd5414e806049b6bb774c3eecd8f8 av-link-btn avia-icon_select-no avia-size-large avia-position-center avia-color-theme-color'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Download : Guide to Access Security\"><span class='avia_iconbox_title' >Download : Guide to Access Security<\/span><\/a><\/div><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4cskyci-4d0cd9ea48c2f9dab16c7ee64eeba748\">\n#top .flex_column_table.av-equal-height-column-flextable.av-4cskyci-4d0cd9ea48c2f9dab16c7ee64eeba748{\nmargin-top:0;\nmargin-bottom:0px;\n}\n.flex_column.av-4cskyci-4d0cd9ea48c2f9dab16c7ee64eeba748{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-4cskyci-4d0cd9ea48c2f9dab16c7ee64eeba748{\nmargin-top:-200px;\n}\n}\n<\/style>\n<div  class='flex_column av-4cskyci-4d0cd9ea48c2f9dab16c7ee64eeba748 av_one_third  avia-builder-el-12  el_after_av_two_third  avia-builder-el-last  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-3t2jeaq-b95c96a59b9cc15461f96e4c47d62091 av-social-sharing-box-default  avia-builder-el-13  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Identifizieren, Authentifizieren, Autorisieren: Die drei entscheidenden Schritte in der Zugriffssicherheit<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Teilen auf X\" href='https:\/\/twitter.com\/share?text=Was%20ist%20Privileged%20Account%20Management%20%28PAM%29%3F&#038;url=https:\/\/www.wallix.com\/de\/?p=78700' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Teilen auf X'><span class='avia_hidden_link_text'>Teilen auf X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Teilen auf LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Was%20ist%20Privileged%20Account%20Management%20%28PAM%29%3F&#038;url=https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Teilen auf LinkedIn'><span class='avia_hidden_link_text'>Teilen auf LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Per E-Mail teilen\" href='mailto:?subject=Was%20ist%20Privileged%20Account%20Management%20%28PAM%29%3F&#038;body=https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Per E-Mail teilen'><span class='avia_hidden_link_text'>Per E-Mail teilen<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3kd0j4y-ab15a55635ede4873cd70de65b2fd9be\">\n#top .hr.hr-invisible.av-3kd0j4y-ab15a55635ede4873cd70de65b2fd9be{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-3kd0j4y-ab15a55635ede4873cd70de65b2fd9be hr-invisible  avia-builder-el-14  el_after_av_social_share  el_before_av_heading '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-306h9mq-a38ebe12b059d35c3883d3710f0b75c9\">\n#top .av-special-heading.av-306h9mq-a38ebe12b059d35c3883d3710f0b75c9{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-306h9mq-a38ebe12b059d35c3883d3710f0b75c9 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-306h9mq-a38ebe12b059d35c3883d3710f0b75c9 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-306h9mq-a38ebe12b059d35c3883d3710f0b75c9 av-special-heading-h3 blockquote modern-quote  avia-builder-el-15  el_after_av_hr  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Verwandte Inhalte<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2gff9uq-adbc6e90c821a18fbbdf12741a3d9a25\">\n#top .hr.hr-invisible.av-2gff9uq-adbc6e90c821a18fbbdf12741a3d9a25{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-2gff9uq-adbc6e90c821a18fbbdf12741a3d9a25 hr-invisible  avia-builder-el-16  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-1\"  class='av-magazine av-21eae4i-1a9ec168f4787f947c503912628e61c3  avia-builder-el-17  el_after_av_hr  el_before_av_heading   avia-builder-el-17  el_after_av_hr  el_before_av_heading ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-86675 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Der gef\u00e4hrlichste Teil des Angriffs begann Monate zuvor\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-30T10:24:20+01:00\" >M\u00e4rz 30, 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/der-gefaehrlichste-teil-des-angriffs-begann-monate-zuvor\/' title='Link zu: Der gef\u00e4hrlichste Teil des Angriffs begann Monate zuvor'>Der gef\u00e4hrlichste Teil des Angriffs begann Monate zuvor<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-81595 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Web Session Manager \u2013 PAM-Schutz auf Webanwendungen ausweiten\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-12-09T11:05:37+01:00\" >Dezember 9, 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/web-session-manager-pam-schutz-auf-webanwendungen-ausweiten-2\/' title='Link zu: Web Session Manager \u2013 PAM-Schutz auf Webanwendungen ausweiten'>Web Session Manager \u2013 PAM-Schutz auf Webanwendungen ausweiten<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-78967 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Was ist Zero Trust?\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-10-09T16:11:46+01:00\" >Oktober 9, 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/was-ist-zero-trust\/' title='Link zu: Was ist Zero Trust?'>Was ist Zero Trust?<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-78700 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Was ist Privileged Account Management (PAM)?\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-10-01T13:14:37+01:00\" >Oktober 1, 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/' title='Link zu: Was ist Privileged Account Management (PAM)?'>Was ist Privileged Account Management (PAM)?<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-78685 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: What is an Enterprise Password Vault?\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-10-01T09:49:16+01:00\" >Oktober 1, 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/what-is-an-enterprise-password-vault\/' title='Link zu: What is an Enterprise Password Vault?'>What is an Enterprise Password Vault?<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1n46l9e-7ce99aaa1197639b3625ff3e6e0ca9e6\">\n#top .av-special-heading.av-1n46l9e-7ce99aaa1197639b3625ff3e6e0ca9e6{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-1n46l9e-7ce99aaa1197639b3625ff3e6e0ca9e6 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-1n46l9e-7ce99aaa1197639b3625ff3e6e0ca9e6 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-1n46l9e-7ce99aaa1197639b3625ff3e6e0ca9e6 av-special-heading-h3 blockquote modern-quote  avia-builder-el-18  el_after_av_magazine  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Verwandte Ressourcen<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1bj2aua-159c498e0032507fb1c94614661cd6d9\">\n#top .hr.hr-invisible.av-1bj2aua-159c498e0032507fb1c94614661cd6d9{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-1bj2aua-159c498e0032507fb1c94614661cd6d9 hr-invisible  avia-builder-el-19  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-2\"  class='av-magazine av-sb6gqq-a83b978b4dcbd38783f5654adc030030  avia-builder-el-20  el_after_av_hr  avia-builder-el-last   avia-builder-el-20  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-67431 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Fertigungsindustrie | 3 Strategien f\u00fcr den sicheren Fernzugriff\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-12-30T11:55:34+01:00\" >Dezember 30, 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/3-strategien-fuer-den-sicheren-fernzugriff\/' title='Link zu: Fertigungsindustrie | 3 Strategien f\u00fcr den sicheren Fernzugriff'>Fertigungsindustrie | 3 Strategien f\u00fcr den sicheren Fernzugriff<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-66367 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Leitfaden f\u00fcr CISOs zur Einhaltung gesetzlicher Vorschriften\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-12-02T15:22:39+01:00\" >Dezember 2, 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/leitfaden-fuer-cisos-zur-einhaltung-gesetzlicher-vorschriften\/' title='Link zu: Leitfaden f\u00fcr CISOs zur Einhaltung gesetzlicher Vorschriften'>Leitfaden f\u00fcr CISOs zur Einhaltung gesetzlicher Vorschriften<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-65550 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: 10 zentrale Strategien f\u00fcr MSPs\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-11-13T16:23:28+01:00\" >November 13, 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/10-zentrale-strategien-fuer-msps\/' title='Link zu: 10 zentrale Strategien f\u00fcr MSPs'>10 zentrale Strategien f\u00fcr MSPs<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-65525 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Praktischer Leitfaden zur Passwortsicherheit mit WALLIX One Enterprise Vault\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-11-13T13:55:01+01:00\" >November 13, 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/praktischer-leitfaden-zur-passwortsicherheit-mit-wallix-one-enterprise-vault\/' title='Link zu: Praktischer Leitfaden zur Passwortsicherheit mit WALLIX One Enterprise Vault'>Praktischer Leitfaden zur Passwortsicherheit mit WALLIX One Enterprise Vault<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-46234 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: 9 gute Gr\u00fcnde f\u00fcr PAM as a Service\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-02-06T14:54:36+01:00\" >Februar 6, 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/9-gute-gruende-fuer-pam-as-a-service\/' title='Link zu: 9 gute Gr\u00fcnde f\u00fcr PAM as a Service'>9 gute Gr\u00fcnde f\u00fcr PAM as a Service<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":3005,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1641,1789],"tags":[],"class_list":["post-78700","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","category-privileged-access-management-de"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Was ist Privileged Account Management (PAM)? - WALLIX<\/title>\n<meta name=\"description\" content=\"Privileged account management can be defined as managing and auditing account and data access by privileged users.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Was ist Privileged Account Management (PAM)? - WALLIX\" \/>\n<meta property=\"og:description\" content=\"Privileged account management can be defined as managing and auditing account and data access by privileged users.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-01T12:14:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-18T08:18:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/07\/what-is-privileged-account-management.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"733\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"WALLIX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"WALLIX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/\"},\"author\":{\"name\":\"WALLIX\",\"@id\":\"https:\/\/www.wallix.com\/de\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd\"},\"headline\":\"Was ist Privileged Account Management (PAM)?\",\"datePublished\":\"2025-10-01T12:14:37+00:00\",\"dateModified\":\"2025-11-18T08:18:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/\"},\"wordCount\":3024,\"publisher\":{\"@id\":\"https:\/\/www.wallix.com\/de\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/07\/what-is-privileged-account-management.jpeg\",\"articleSection\":[\"BLOGPOST\",\"PRIVILEGED ACCESS MANAGEMENT\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/\",\"url\":\"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/\",\"name\":\"Was ist Privileged Account Management (PAM)? - WALLIX\",\"isPartOf\":{\"@id\":\"https:\/\/www.wallix.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/07\/what-is-privileged-account-management.jpeg\",\"datePublished\":\"2025-10-01T12:14:37+00:00\",\"dateModified\":\"2025-11-18T08:18:11+00:00\",\"description\":\"Privileged account management can be defined as managing and auditing account and data access by privileged users.\",\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/#primaryimage\",\"url\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/07\/what-is-privileged-account-management.jpeg\",\"contentUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/07\/what-is-privileged-account-management.jpeg\",\"width\":1100,\"height\":733},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.wallix.com\/de\/#website\",\"url\":\"https:\/\/www.wallix.com\/de\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\/\/www.wallix.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.wallix.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.wallix.com\/de\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\/\/www.wallix.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/wallixcom\",\"https:\/\/www.linkedin.com\/company\/wallix\/\",\"https:\/\/www.youtube.com\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.wallix.com\/de\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd\",\"name\":\"WALLIX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.wallix.com\/de\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"caption\":\"WALLIX\"},\"url\":\"https:\/\/www.wallix.com\/de\/author\/alex\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Was ist Privileged Account Management (PAM)? - WALLIX","description":"Privileged account management can be defined as managing and auditing account and data access by privileged users.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/","og_locale":"de_DE","og_type":"article","og_title":"Was ist Privileged Account Management (PAM)? - WALLIX","og_description":"Privileged account management can be defined as managing and auditing account and data access by privileged users.","og_url":"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/","og_site_name":"WALLIX","article_published_time":"2025-10-01T12:14:37+00:00","article_modified_time":"2025-11-18T08:18:11+00:00","og_image":[{"width":1100,"height":733,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/07\/what-is-privileged-account-management.jpeg","type":"image\/jpeg"}],"author":"WALLIX","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"Verfasst von":"WALLIX","Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/"},"author":{"name":"WALLIX","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd"},"headline":"Was ist Privileged Account Management (PAM)?","datePublished":"2025-10-01T12:14:37+00:00","dateModified":"2025-11-18T08:18:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/"},"wordCount":3024,"publisher":{"@id":"https:\/\/www.wallix.com\/de\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/07\/what-is-privileged-account-management.jpeg","articleSection":["BLOGPOST","PRIVILEGED ACCESS MANAGEMENT"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/","url":"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/","name":"Was ist Privileged Account Management (PAM)? - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/07\/what-is-privileged-account-management.jpeg","datePublished":"2025-10-01T12:14:37+00:00","dateModified":"2025-11-18T08:18:11+00:00","description":"Privileged account management can be defined as managing and auditing account and data access by privileged users.","inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/07\/what-is-privileged-account-management.jpeg","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/07\/what-is-privileged-account-management.jpeg","width":1100,"height":733},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/de\/#website","url":"https:\/\/www.wallix.com\/de\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/de\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd","name":"WALLIX","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","caption":"WALLIX"},"url":"https:\/\/www.wallix.com\/de\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/78700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/comments?post=78700"}],"version-history":[{"count":5,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/78700\/revisions"}],"predecessor-version":[{"id":80486,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/78700\/revisions\/80486"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/media\/3005"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/media?parent=78700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/categories?post=78700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/tags?post=78700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}