{"id":81255,"date":"2025-05-23T12:02:09","date_gmt":"2025-05-23T11:02:09","guid":{"rendered":"https:\/\/www.wallix.com\/what-is-privileged-account-and-session-management-or-pasm\/"},"modified":"2025-12-09T10:59:05","modified_gmt":"2025-12-09T09:59:05","slug":"privileged-account-und-session-management-pasm","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/de\/blogpost\/privileged-account-und-session-management-pasm\/","title":{"rendered":"Privileged Account und Session Management (PASM)"},"content":{"rendered":"<div class='flex_column_table av-m4gycypq-fb9e468fe802133cd1178d4038e45437 sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4gycypq-fb9e468fe802133cd1178d4038e45437\">\n#top .flex_column_table.av-equal-height-column-flextable.av-m4gycypq-fb9e468fe802133cd1178d4038e45437{\nmargin-top:0px;\nmargin-bottom:0;\n}\n.flex_column.av-m4gycypq-fb9e468fe802133cd1178d4038e45437{\npadding:0 0 0 0;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-m4gycypq-fb9e468fe802133cd1178d4038e45437{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-m4gycypq-fb9e468fe802133cd1178d4038e45437 av_two_third  avia-builder-el-0  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m9v5gqsg-ae5bd1b09de2ab8c1e439698e80b66bd\">\n#top .av_textblock_section.av-m9v5gqsg-ae5bd1b09de2ab8c1e439698e80b66bd .avia_textblock{\nfont-size:34px;\ncolor:#172542;\n}\n<\/style>\n<section  class='av_textblock_section av-m9v5gqsg-ae5bd1b09de2ab8c1e439698e80b66bd '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><h1>Privileged Account and Session Management (PASM)<\/h1>\n<\/div><\/section><br \/>\n<div  class='av-post-metadata-container av-m9v5qd0r-27e2cf9a87be30e7bcab67594aaa1f78 av-metadata-container-align-left  avia-builder-el-2  el_after_av_textblock  el_before_av_hr  av-metadata-container-1'><div class='av-post-metadata-container-inner'><span class=\"av-post-metadata-content av-post-metadata-meta-content\"><span class=\"av-post-metadata-content av-post-metadata-author\"  itemprop=\"author\" ><span class=\"av-metadata-before av-metadata-before-author\">Verfasst von<\/span><span class=\"av-post-metadata-author-link\" ><a href=\"https:\/\/www.wallix.com\/de\/author\/dquezadawallix-com\/\"  rel=\"author\">Diana QUEZADA<\/a><\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\"><\/span><span class=\"av-post-metadata-content av-post-metadata-published\"><span class=\"av-metadata-before av-metadata-before-published\">der<\/span><span class=\"av-post-metadata-published-date\" >23. Mai 2025<\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\"><\/span><span class=\"av-post-metadata-content av-post-metadata-modified\"><span class=\"av-metadata-before av-metadata-before-modified\">- Zuletzt aktualisiert am<\/span><span class=\"av-post-metadata-modified-date\" >9. Dezember 2025<\/span><\/span><\/span><\/div><\/div><br \/>\n<div  class='hr av-p98hjw-c6c0f0438e7e475afac12af8cb336432 hr-default  avia-builder-el-3  el_after_av_post_metadata  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4gydqi6-87119aa0fcb443d60d83631d39900441\">\n#top .av_textblock_section.av-m4gydqi6-87119aa0fcb443d60d83631d39900441 .avia_textblock{\nfont-size:15px;\ncolor:#172542;\n}\n<\/style>\n<section  class='av_textblock_section av-m4gydqi6-87119aa0fcb443d60d83631d39900441 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><p>Der Schutz privilegierter Zugangsdaten geh\u00f6rt zu den grundlegenden Sicherheitszielen von Unternehmen weltweit. Privileged Account and Session Management (PASM) ist eine zentrale Sicherheitsma\u00dfnahme, die die besonders sensiblen Zugriffspunkte eines Unternehmens vor externen Angreifern und b\u00f6swilligen internen Aktivit\u00e4ten sch\u00fctzt.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-72955 size-large\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-1030x577.jpeg\" alt=\"pasm\" width=\"1030\" height=\"577\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-1030x577.jpeg 1030w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-300x168.jpeg 300w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-768x430.jpeg 768w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-1536x861.jpeg 1536w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-2048x1148.jpeg 2048w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-1500x841.jpeg 1500w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-705x395.jpeg 705w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-380x213.jpeg 380w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-760x426.jpeg 760w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-320x179.jpeg 320w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-640x359.jpeg 640w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-480x269.jpeg 480w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-960x538.jpeg 960w\" sizes=\"auto, (max-width: 1030px) 100vw, 1030px\" \/><\/p>\n<h2><strong>Was PASM f\u00fcr die Sicherheit bedeutet<\/strong><\/h2>\n<p>PASM ist ein zentraler Bestandteil des Privileged Access Management (PAM). Obwohl beide Begriffe h\u00e4ufig synonym verwendet werden, bezieht sich PASM ausdr\u00fccklich auf das Auffinden, Abspeichern, Rotieren und \u00dcberwachen privilegierter Zugangsdaten sowie auf die Kontrolle privilegierter Sitzungen. Diese Funktionen umfassen auch gemeinsam genutzte Konten und das Application-to-Application Password Management (AAPM).<\/p>\n<p>PASM bietet einen erheblichen Mehrwert, indem es vollst\u00e4ndige Transparenz und Kontrolle \u00fcber privilegierte Konten und Zugangsdaten schafft \u2013 jene Schl\u00fcssel, die Zugang zu den kritischsten Systemen und sensibelsten Daten eines Unternehmens gew\u00e4hren. Die L\u00f6sungen stellen sichere Passwort-Tresore bereit und erm\u00f6glichen gleichzeitig eine umfassende Sitzungsaufzeichnung und pr\u00e4zise Zugriffskontrollen.<\/p>\n<h2><strong>Warum Unternehmen Privileged Account and Session Management ben\u00f6tigen<\/strong><\/h2>\n<p>Privilegierte Zugangsdaten z\u00e4hlen zu den wertvollsten Angriffszielen. Werden sie kompromittiert, k\u00f6nnen sich Angreifer dauerhaft im Netzwerk festsetzen, sich seitlich bewegen und sensible Daten unbemerkt abziehen. Branchenberichte zeigen regelm\u00e4\u00dfig, dass die meisten schwerwiegenden Sicherheitsvorf\u00e4lle auf gestohlene oder missbrauchte privilegierte Zugangsdaten zur\u00fcckzuf\u00fchren sind.<\/p>\n<p>Unternehmen ohne geeignete PASM-Funktionen stehen vor mehreren Herausforderungen:<br \/>\nErstens fehlt ihnen die n\u00f6tige Transparenz \u00fcber die Nutzung privilegierter Konten. Zweitens erfolgt die Erkennung kompromittierter Zugangsdaten verz\u00f6gert. Drittens entstehen Compliance-L\u00fccken gegen\u00fcber regulatorischen Vorgaben. Viertens bleiben sie anf\u00e4llig f\u00fcr Angriffe durch Privilegienausweitung.<\/p>\n<p>Manuelle Verwaltung privilegierter Zugangsdaten ist nicht skalierbar. Solche Ans\u00e4tze f\u00fchren zu Inkonsistenzen, bieten keine ausreichenden Audit-Informationen und schaffen Sicherheitsl\u00fccken, die Angreifer schnell ausnutzen. Um diese Risiken wirksam zu adressieren, ben\u00f6tigen Sicherheitsverantwortliche automatisierte L\u00f6sungen.<\/p>\n<h2><strong>Zentrale Funktionen von PASM<\/strong><\/h2>\n<p><strong>Account Discovery:<\/strong> Erkennt privilegierte Konten in lokalen und Cloud-Umgebungen \u2013 einschlie\u00dflich vergessener oder verwaister Accounts, die ein Sicherheitsrisiko darstellen.<\/p>\n<p><strong>Credential Management:<\/strong> Rotiert privilegierte Passw\u00f6rter automatisch gem\u00e4\u00df festgelegten Richtlinien, entfernt statische Zugangsdaten und reduziert so die Angriffsfl\u00e4che.<\/p>\n<p><strong>Zeitlich begrenzter Zugriff:<\/strong> Vergibt tempor\u00e4re Berechtigungen \u00fcber Genehmigungs-Workflows und setzt so das Least-Privilege-Prinzip konsequent um.<\/p>\n<p><strong>Session Monitoring:<\/strong> Zeichnet privilegierte Sitzungen vollst\u00e4ndig auf, einschlie\u00dflich Tastatureingaben und Befehlen, um Sicherheits\u00fcberpr\u00fcfungen und Compliance-Nachweise zu unterst\u00fctzen.<\/p>\n<p><strong>Threat Detection:<\/strong> Erkennt ungew\u00f6hnliches Verhalten w\u00e4hrend privilegierter Sitzungen und kann verd\u00e4chtige Aktivit\u00e4ten bei Bedarf sofort unterbrechen.<\/p>\n<p>Erweiterte Implementierungen integrieren sich in Identity-Governance-Plattformen, Multi-Faktor-Authentifizierungssysteme und DevOps-Toolchains, um auch Entwicklungsprozesse abzusichern. Unternehmen, die auf umfassende Sicherheit setzen, sollten pr\u00fcfen, wie diese Funktionen mit ihrer bestehenden Infrastruktur und ihren Sicherheitsanforderungen zusammenspielen.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-nxhiu4-d539b8506bd989b32689b127320030f7\">\n#top .av_textblock_section.av-nxhiu4-d539b8506bd989b32689b127320030f7 .avia_textblock{\nfont-size:15px;\ncolor:#172542;\n}\n<\/style>\n<section  class='av_textblock_section av-nxhiu4-d539b8506bd989b32689b127320030f7 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><h2><strong>Compliance-Anforderungen<\/strong><\/h2>\n<p>PASM-L\u00f6sungen unterst\u00fctzen Unternehmen dabei, <a href=\"https:\/\/www.wallix.com\/de\/loesungen\/loesungen-nach-anwendungsfall\/audit-compliance\/\">Compliance-Vorgaben<\/a> aus PCI DSS, HIPAA, SOX, DSGVO und weiteren Regelwerken zu erf\u00fcllen. Sie erzeugen vollst\u00e4ndige Audit-Trails und Aktivit\u00e4tsprotokolle, die f\u00fcr Compliance-Pr\u00fcfungen und Sicherheitsaudits erforderlich sind.<\/p>\n<p>PCI DSS fordert ausdr\u00fccklich eine eindeutige Identifikation administrativer Nutzer und verlangt, dass alle Systemzugriffe einer bestimmten Person zugeordnet werden k\u00f6nnen \u2013 Anforderungen, die PASM direkt abdeckt. F\u00fcr Organisationen, die Kreditkartendaten verarbeiten, sind robuste PASM-Kontrollen daher nicht optional, sondern obligatorisch.<\/p>\n<h2><strong>Cloud-basiertes PASM<\/strong><\/h2>\n<p>Cloud-basierte PASM-Plattformen bieten deutliche Vorteile gegen\u00fcber klassischen On-Premises-L\u00f6sungen. Moderne Implementierungen erm\u00f6glichen eine schnelle Bereitstellung, automatische Updates, hohe Skalierbarkeit und einen geringen Betriebsaufwand.<\/p>\n<p>Unternehmen setzen Cloud-PASM in der Regel innerhalb weniger Stunden statt mehrerer Monate ein \u2013 und das bei minimalen Infrastrukturkosten. Diese L\u00f6sungen bieten Unternehmenszuverl\u00e4ssigkeit durch redundante Architekturen und integrierte Disaster-Recovery-Funktionen. Sicherheitsteams profitieren von kontinuierlichen Updates, die neue Bedrohungen adressieren, ohne manuelles Eingreifen.<\/p>\n<h2><strong>Integration in bestehende Sicherheitssysteme<\/strong><\/h2>\n<p>PASM entfaltet seinen vollen Nutzen, wenn es in andere Sicherheitsl\u00f6sungen eingebunden wird:<\/p>\n<ul>\n<li><strong>Identity-Governance-Plattformen:<\/strong> F\u00fcr umfassende \u00dcberpr\u00fcfungen und Zertifizierungen von Benutzerberechtigungen<\/li>\n<li><strong>SIEM-Systeme:<\/strong> Um Aktivit\u00e4ten privilegierter Konten mit anderen sicherheitsrelevanten Ereignissen zu korrelieren<\/li>\n<li><strong>SOAR-Plattformen:<\/strong> Zur automatisierten Reaktion auf verd\u00e4chtige Aktivit\u00e4ten privilegierter Konten<\/li>\n<li><strong>EDR-L\u00f6sungen:<\/strong> Zur \u00dcberwachung des Endpunktverhaltens w\u00e4hrend privilegierter Sitzungen<\/li>\n<\/ul>\n<p>Diese Integrationen erm\u00f6glichen durchg\u00e4ngige Sicherheitsprozesse, verbessern die Erkennung von Bedrohungen und beschleunigen die Reaktion auf Vorf\u00e4lle im Zusammenhang mit kompromittierten privilegierten Konten. Bei der Auswahl einer PASM-L\u00f6sung sollten die verf\u00fcgbaren Integrationsm\u00f6glichkeiten sorgf\u00e4ltig gepr\u00fcft werden.<\/p>\n<h2><strong>PASM und Zero Trust<\/strong><\/h2>\n<p>PASM st\u00e4rkt die Sicherheitsarchitektur deutlich, wird von erfahrenen Sicherheitsteams jedoch als ein Baustein innerhalb einer umfassenden Zero-Trust-Strategie betrachtet. In Kombination mit <a href=\"https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privilege-elevation-and-delegation-management-pedm\/\">Privilege Elevation and Delegation Management (PEDM)<\/a> unterst\u00fctzt PASM Unternehmen dabei, das Least-Privilege-Prinzip konsequent \u00fcber die gesamte Infrastruktur hinweg durchzusetzen.<\/p>\n<p>Ausgereifte PASM-Implementierungen \u00fcberpr\u00fcfen privilegierte Zugriffe kontinuierlich \u2013 unabh\u00e4ngig von Benutzeridentit\u00e4t, Ger\u00e4tetyp oder Netzwerkstandort. Dieser Ansatz entspricht modernen Sicherheitsmodellen, die grunds\u00e4tzlich von potenziellen Kompromittierungen ausgehen und jede Aktion eindeutig verifizieren.<\/p>\n<p>Teams, die PASM einf\u00fchren, sollten klare Messgr\u00f6\u00dfen definieren, detaillierte Privilegien-Audits durchf\u00fchren und gestaffelte Einf\u00fchrungspl\u00e4ne entwickeln, bei denen zun\u00e4chst gesch\u00e4ftskritische Systeme und sensible Daten abgesichert werden. Durch dieses strukturierte Vorgehen k\u00f6nnen Unternehmen schnell sp\u00fcrbare Sicherheitsverbesserungen erzielen und gleichzeitig die Grundlage f\u00fcr einen umfassenden Schutz privilegierter Konten schaffen.<\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409\">\n#top .flex_column_table.av-equal-height-column-flextable.av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409{\nmargin-top:0px;\nmargin-bottom:0;\n}\n.flex_column.av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409 av_one_third  avia-builder-el-6  el_after_av_two_third  el_before_av_two_third  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-eggfj0-32dc6ffff8c92de67afb98a43bc2d9f1 av-social-sharing-box-default  avia-builder-el-7  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Diesen Artikel teilen<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Teilen auf X\" href='https:\/\/twitter.com\/share?text=Privileged%20Account%20und%20Session%20Management%20%28PASM%29&#038;url=https:\/\/www.wallix.com\/de\/?p=81255' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Teilen auf X'><span class='avia_hidden_link_text'>Teilen auf X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Teilen auf LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Privileged%20Account%20und%20Session%20Management%20%28PASM%29&#038;url=https:\/\/www.wallix.com\/de\/blogpost\/privileged-account-und-session-management-pasm\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Teilen auf LinkedIn'><span class='avia_hidden_link_text'>Teilen auf LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Per E-Mail teilen\" href='mailto:?subject=Privileged%20Account%20und%20Session%20Management%20%28PASM%29&#038;body=https:\/\/www.wallix.com\/de\/blogpost\/privileged-account-und-session-management-pasm\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Per E-Mail teilen'><span class='avia_hidden_link_text'>Per E-Mail teilen<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3i1x7bw-f5b45a0f4afe1cd9bf86afe24c52a18a\">\n#top .hr.hr-invisible.av-3i1x7bw-f5b45a0f4afe1cd9bf86afe24c52a18a{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-3i1x7bw-f5b45a0f4afe1cd9bf86afe24c52a18a hr-invisible  avia-builder-el-8  el_after_av_social_share  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4gywq38-500db124898f0973bd3150d22d62c5a2\">\n#top .av_textblock_section.av-m4gywq38-500db124898f0973bd3150d22d62c5a2 .avia_textblock{\nfont-size:19px;\ncolor:#ec6707;\n}\n<\/style>\n<section  class='av_textblock_section av-m4gywq38-500db124898f0973bd3150d22d62c5a2 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><p>Verwandte Ressourcen<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2fklsyk-47345d08b4e405405f5336633191a3ed\">\n#top .hr.hr-invisible.av-2fklsyk-47345d08b4e405405f5336633191a3ed{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-2fklsyk-47345d08b4e405405f5336633191a3ed hr-invisible  avia-builder-el-10  el_after_av_textblock  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-1\"  class='av-magazine av-270hzek-e187254078c7a161a595fad6f3745f4a  avia-builder-el-11  el_after_av_hr  avia-builder-el-last   avia-builder-el-11  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-85543 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: WALLIX One Console \u2013 die zentrale Plattform f\u00fcr ein skalierbares PAM-Management\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-12T11:06:25+01:00\" >12. M\u00e4rz 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/wallix-one-console-die-zentrale-plattform-fuer-ein-skalierbares-pam-management\/' title='Link zu: WALLIX One Console \u2013 die zentrale Plattform f\u00fcr ein skalierbares PAM-Management'>WALLIX One Console \u2013 die zentrale Plattform f\u00fcr ein skalierbares PAM-Management<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-78237 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Webinar - 2. IT-Sicherheit Summit\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-09-17T10:23:17+01:00\" >17. September 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/webinar-2-it-sicherheit-summit\/' title='Link zu: Webinar &#8211; 2. IT-Sicherheit Summit'>Webinar &#8211; 2. IT-Sicherheit Summit<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-78229 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Webinar - Speed-Webkonferenz Zero Trust\/IAM\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-09-17T10:08:43+01:00\" >17. September 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/webinar-speed-webkonferenz-zero-trust-iam\/' title='Link zu: Webinar &#8211; Speed-Webkonferenz Zero Trust\/IAM'>Webinar &#8211; Speed-Webkonferenz Zero Trust\/IAM<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-78221 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Webinar - OT-Security Summit\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-09-17T10:01:24+01:00\" >17. September 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/webinar-ot-security-summit\/' title='Link zu: Webinar &#8211; OT-Security Summit'>Webinar &#8211; OT-Security Summit<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-78207 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Webinar - PAM - Schl\u00fcssel zur Absicherung von IT- und OT-Systemen im Transport- &amp; Logistiksektor\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-09-17T09:46:48+01:00\" >17. September 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/webinar-pam-schluessel-zur-absicherung-von-it-und-ot-systemen-im-transport-logistiksektor\/' title='Link zu: Webinar &#8211; PAM &#8211; Schl\u00fcssel zur Absicherung von IT- und OT-Systemen im Transport- &#038; Logistiksektor'>Webinar &#8211; PAM &#8211; Schl\u00fcssel zur Absicherung von IT- und OT-Systemen im Transport- &#038; Logistiksektor<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><div  class='flex_column av-nok0rg-0413bcf117d44f341a48260f58b5064a av_two_third  avia-builder-el-12  el_after_av_one_third  avia-builder-el-last  first flex_column_div  column-top-margin'     ><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":30,"featured_media":72957,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1641,1789],"tags":[],"class_list":["post-81255","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","category-privileged-access-management-de"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Privileged Account und Session Management (PASM) - WALLIX<\/title>\n<meta name=\"description\" content=\"Learn how Privileged Account and Session Management (PASM) protects organizations from cyber threats by securing privileged credentials, enabling compliance, and integrating with Zero Trust architecture.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/de\/blogpost\/privileged-account-und-session-management-pasm\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privileged Account und Session Management (PASM) - WALLIX\" \/>\n<meta property=\"og:description\" content=\"Learn how Privileged Account and Session Management (PASM) protects organizations from cyber threats by securing privileged credentials, enabling compliance, and integrating with Zero Trust architecture.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/de\/blogpost\/privileged-account-und-session-management-pasm\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-23T11:02:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-09T09:59:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Diana QUEZADA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Diana QUEZADA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/privileged-account-und-session-management-pasm\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/privileged-account-und-session-management-pasm\\\/\"},\"author\":{\"name\":\"Diana QUEZADA\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/person\\\/952c0daedff430f5869838263e5e2fc2\"},\"headline\":\"Privileged Account und Session Management (PASM)\",\"datePublished\":\"2025-05-23T11:02:09+00:00\",\"dateModified\":\"2025-12-09T09:59:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/privileged-account-und-session-management-pasm\\\/\"},\"wordCount\":2668,\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/privileged-account-und-session-management-pasm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/AdobeStock_1100958047-scaled.jpeg\",\"articleSection\":[\"BLOGPOST\",\"PRIVILEGED ACCESS MANAGEMENT\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/privileged-account-und-session-management-pasm\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/privileged-account-und-session-management-pasm\\\/\",\"name\":\"Privileged Account und Session Management (PASM) - WALLIX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/privileged-account-und-session-management-pasm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/privileged-account-und-session-management-pasm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/AdobeStock_1100958047-scaled.jpeg\",\"datePublished\":\"2025-05-23T11:02:09+00:00\",\"dateModified\":\"2025-12-09T09:59:05+00:00\",\"description\":\"Learn how Privileged Account and Session Management (PASM) protects organizations from cyber threats by securing privileged credentials, enabling compliance, and integrating with Zero Trust architecture.\",\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/privileged-account-und-session-management-pasm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/blogpost\\\/privileged-account-und-session-management-pasm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/AdobeStock_1100958047-scaled.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/AdobeStock_1100958047-scaled.jpeg\",\"width\":2560,\"height\":1435,\"caption\":\"Workers can access cloud-based mining data via tablets to remotely view progress on site.\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/wallixcom\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wallix\\\/\",\"https:\\\/\\\/www.youtube.com\\\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/person\\\/952c0daedff430f5869838263e5e2fc2\",\"name\":\"Diana QUEZADA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9758775515cb600b4f83db212b3c0b711ef645714725a3f76d6ab57f756ea576?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9758775515cb600b4f83db212b3c0b711ef645714725a3f76d6ab57f756ea576?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9758775515cb600b4f83db212b3c0b711ef645714725a3f76d6ab57f756ea576?s=96&d=mm&r=g\",\"caption\":\"Diana QUEZADA\"},\"description\":\"Diana Quezada is a Product Marketing Manager at WALLIX, specializing in making complex cybersecurity concepts accessible and valuable to business and technical audiences. Her focus spans IAM, IAG, and broader identity-centric security topics. She plays a key role in positioning WALLIX solutions to meet market needs, regulatory requirements, and user expectations.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/dianaquezadav\\\/\"],\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/author\\\/dquezadawallix-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Privileged Account und Session Management (PASM) - WALLIX","description":"Learn how Privileged Account and Session Management (PASM) protects organizations from cyber threats by securing privileged credentials, enabling compliance, and integrating with Zero Trust architecture.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/de\/blogpost\/privileged-account-und-session-management-pasm\/","og_locale":"de_DE","og_type":"article","og_title":"Privileged Account und Session Management (PASM) - WALLIX","og_description":"Learn how Privileged Account and Session Management (PASM) protects organizations from cyber threats by securing privileged credentials, enabling compliance, and integrating with Zero Trust architecture.","og_url":"https:\/\/www.wallix.com\/de\/blogpost\/privileged-account-und-session-management-pasm\/","og_site_name":"WALLIX","article_published_time":"2025-05-23T11:02:09+00:00","article_modified_time":"2025-12-09T09:59:05+00:00","og_image":[{"width":2560,"height":1435,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-scaled.jpeg","type":"image\/jpeg"}],"author":"Diana QUEZADA","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"Verfasst von":"Diana QUEZADA","Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/de\/blogpost\/privileged-account-und-session-management-pasm\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/privileged-account-und-session-management-pasm\/"},"author":{"name":"Diana QUEZADA","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/952c0daedff430f5869838263e5e2fc2"},"headline":"Privileged Account und Session Management (PASM)","datePublished":"2025-05-23T11:02:09+00:00","dateModified":"2025-12-09T09:59:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/privileged-account-und-session-management-pasm\/"},"wordCount":2668,"publisher":{"@id":"https:\/\/www.wallix.com\/de\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/privileged-account-und-session-management-pasm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-scaled.jpeg","articleSection":["BLOGPOST","PRIVILEGED ACCESS MANAGEMENT"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/de\/blogpost\/privileged-account-und-session-management-pasm\/","url":"https:\/\/www.wallix.com\/de\/blogpost\/privileged-account-und-session-management-pasm\/","name":"Privileged Account und Session Management (PASM) - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/privileged-account-und-session-management-pasm\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/de\/blogpost\/privileged-account-und-session-management-pasm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-scaled.jpeg","datePublished":"2025-05-23T11:02:09+00:00","dateModified":"2025-12-09T09:59:05+00:00","description":"Learn how Privileged Account and Session Management (PASM) protects organizations from cyber threats by securing privileged credentials, enabling compliance, and integrating with Zero Trust architecture.","inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/de\/blogpost\/privileged-account-und-session-management-pasm\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/blogpost\/privileged-account-und-session-management-pasm\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-scaled.jpeg","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/05\/AdobeStock_1100958047-scaled.jpeg","width":2560,"height":1435,"caption":"Workers can access cloud-based mining data via tablets to remotely view progress on site."},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/de\/#website","url":"https:\/\/www.wallix.com\/de\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/de\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/952c0daedff430f5869838263e5e2fc2","name":"Diana QUEZADA","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/9758775515cb600b4f83db212b3c0b711ef645714725a3f76d6ab57f756ea576?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9758775515cb600b4f83db212b3c0b711ef645714725a3f76d6ab57f756ea576?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9758775515cb600b4f83db212b3c0b711ef645714725a3f76d6ab57f756ea576?s=96&d=mm&r=g","caption":"Diana QUEZADA"},"description":"Diana Quezada is a Product Marketing Manager at WALLIX, specializing in making complex cybersecurity concepts accessible and valuable to business and technical audiences. Her focus spans IAM, IAG, and broader identity-centric security topics. She plays a key role in positioning WALLIX solutions to meet market needs, regulatory requirements, and user expectations.","sameAs":["https:\/\/www.linkedin.com\/in\/dianaquezadav\/"],"url":"https:\/\/www.wallix.com\/de\/author\/dquezadawallix-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/81255","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/comments?post=81255"}],"version-history":[{"count":4,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/81255\/revisions"}],"predecessor-version":[{"id":81590,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/81255\/revisions\/81590"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/media\/72957"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/media?parent=81255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/categories?post=81255"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/tags?post=81255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}