{"id":15477,"date":"2015-09-04T14:26:02","date_gmt":"2015-09-04T12:26:02","guid":{"rendered":"\/products\/identity-intelligence-analytics\/security-compliance-identity-intelligence-audit-security-security-reports\/"},"modified":"2022-12-24T06:08:07","modified_gmt":"2022-12-24T04:08:07","slug":"security-compliance-identity-intelligence-audit-security-security-reports","status":"publish","type":"page","link":"https:\/\/www.evidian.com\/de\/products\/security-compliance-identity-intelligence-audit-security-security-reports\/","title":{"rendered":"Security Compliance mit Identity Intelligence: Sicherheits-Audits mit Reports"},"content":{"rendered":"<div id=\"pl-15477\"  class=\"panel-layout\" ><div id=\"pg-15477-0\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-15477-0\" data-stretch-type=\"full-stretched\" ><div id=\"pgc-15477-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-15477-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-15477-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h1 style=\"text-align: left; color: white; font-size: 38px;\">Security Compliance mit Identity Intelligence: Sicherheits-Audits mit Reports<\/h1>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-15477-1\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-15477-1\" ><div id=\"pgc-15477-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-15477-1-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<br \/>\n<h2>Whitepaper zum Thema, wie Security Compliance mit Identity Intelligence implementiert und wie Sicherheit mit Reports auditiert werden kann.<\/h2>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-15477-2\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-15477-2\" ><div id=\"pgc-15477-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-15477-2-0-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-072d59bad7d9-15477\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/pdf\/wp-identity-intelligence-analytics-dirx-audit-de.pdf\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tWhite Paper &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-15477-3\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-15477-3\" ><div id=\"pgc-15477-3-0\"  class=\"panel-grid-cell\" ><div id=\"panel-15477-3-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t\n<p>DirX Audit bietet Auditoren, Sicherheitsbeauftragten und Audit-Administratoren analytischen Einblick und Transparenz in Identity und Access Management Prozesse. Basierend auf historischen Identit\u00e4tsdaten und aufgezeichneten Aktivit\u00e4ten aus den Identity und Access Management Prozessen erm\u00f6glicht DirX Audit die Beantwortung der \"Was, Wann, Wo, Wer und Warum\"-Fragen bei Benutzerzugriffen und -berechtigungen. DirX Audit bietet historische Ansichten und Reports f\u00fcr Identit\u00e4tsdaten, ein grafisches Dashboard mit Drill-Down zu einzelnen Ereignissen, einen Monitor zum Filtern, Analysieren, Korrelieren und \u00dcberpr\u00fcfen von Identit\u00e4ts-bezogenen Aktivit\u00e4ten und die Verwaltung von Jobs f\u00fcr die Reporterstellung. Mit seinen Analyse-Funktionen unterst\u00fctzt DirX Audit Unternehmen und Organisationen bei der nachhaltigen Einhaltung von Compliance-Anforderungen und stellt Business Intelligence f\u00fcr die Identity und Access Management Prozesse bereit.<\/p>\n<p>Entdecken Sie mit diesem Whitepaper die M\u00f6glichkeiten, wie Security Compliance mit Identity Intelligence implementiert und wie Sicherheit mit Reports auditiert werden kann.<\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-15477-4\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-15477-4\" ><div id=\"pgc-15477-4-0\"  class=\"panel-grid-cell\" ><div id=\"panel-15477-4-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"4\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div data-post-id=\"87965\" class=\"insert-page insert-page-87965 \"><div id=\"pl-87965\"  class=\"panel-layout\" ><div id=\"pg-87965-0\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-87965-0\" ><div id=\"pgc-87965-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-87965-0-0-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-87965\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/unternehmen\/kontakt-evidian\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tKontaktieren  &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-87965-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-87965-0-1-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-87965\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/www.evidian.com\/de\/unternehmen\/kostenlose-testversion\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tGratis-Testversion &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-87965-0-2\"  class=\"panel-grid-cell\" ><div id=\"panel-87965-0-2-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-87965\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/unternehmen\/demotermin-vereinbaren\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tDemotermin vereinbaren &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-87965-0-3\"  class=\"panel-grid-cell\" ><div id=\"panel-87965-0-3-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-87965\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/unternehmen\/ein-angebot-anfordern\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tEin Angebot anfordern &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"Security Compliance mit Identity Intelligence: Sicherheits-Audits mit Reports Whitepaper zum Thema, wie Security Compliance mit Identity Intelligence implementiert und wie Sicherheit mit Reports auditiert werden kann.","protected":false},"author":3,"featured_media":0,"parent":15460,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-full-screen.php","meta":{"_acf_changed":false,"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"class_list":["post-15477","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security Compliance mit Identity Intelligence: Sicherheits-Audits mit Reports - Evidian<\/title>\n<meta name=\"description\" content=\"Discover in this white paper how to implement security compliance with identity intelligence and how to audit security with security reports\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.evidian.com\/de\/products\/security-compliance-identity-intelligence-audit-security-security-reports\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Compliance mit Identity Intelligence: Sicherheits-Audits mit Reports\" \/>\n<meta property=\"og:description\" content=\"Discover in this white paper how to implement security compliance with identity intelligence and how to audit security with security reports\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.evidian.com\/de\/products\/security-compliance-identity-intelligence-audit-security-security-reports\/\" \/>\n<meta property=\"og:site_name\" content=\"Evidian\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-24T04:08:07+00:00\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/products\\\/security-compliance-identity-intelligence-audit-security-security-reports\\\/\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/products\\\/security-compliance-identity-intelligence-audit-security-security-reports\\\/\",\"name\":\"Security Compliance mit Identity Intelligence: Sicherheits-Audits mit Reports - Evidian\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/#website\"},\"datePublished\":\"2015-09-04T12:26:02+00:00\",\"dateModified\":\"2022-12-24T04:08:07+00:00\",\"description\":\"Discover in this white paper how to implement security compliance with identity intelligence and how to audit security with security reports\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/products\\\/security-compliance-identity-intelligence-audit-security-security-reports\\\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.evidian.com\\\/de\\\/products\\\/security-compliance-identity-intelligence-audit-security-security-reports\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/products\\\/security-compliance-identity-intelligence-audit-security-security-reports\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Evidian\",\"item\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Produkte\",\"item\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/products\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security Compliance mit Identity Intelligence: Sicherheits-Audits mit Reports\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/\",\"name\":\"Evidian\",\"description\":\"Set in menu above: SEO\\\/SEO Settings\\\/Title &amp; Metas\\\/Home\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/#organization\",\"name\":\"Evidian\",\"alternateName\":\"Evidian\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/evidian-new-blue-1.png\",\"contentUrl\":\"https:\\\/\\\/www.evidian.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/evidian-new-blue-1.png\",\"width\":734,\"height\":200,\"caption\":\"Evidian\"},\"image\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/eviden-cybersecurity\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCJKPuw2SDVNYUjZEJyLbIAA\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Compliance mit Identity Intelligence: Sicherheits-Audits mit Reports - Evidian","description":"Discover in this white paper how to implement security compliance with identity intelligence and how to audit security with security reports","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.evidian.com\/de\/products\/security-compliance-identity-intelligence-audit-security-security-reports\/","og_locale":"de_DE","og_type":"article","og_title":"Security Compliance mit Identity Intelligence: Sicherheits-Audits mit Reports","og_description":"Discover in this white paper how to implement security compliance with identity intelligence and how to audit security with security reports","og_url":"https:\/\/www.evidian.com\/de\/products\/security-compliance-identity-intelligence-audit-security-security-reports\/","og_site_name":"Evidian","article_modified_time":"2022-12-24T04:08:07+00:00","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.evidian.com\/de\/products\/security-compliance-identity-intelligence-audit-security-security-reports\/","url":"https:\/\/www.evidian.com\/de\/products\/security-compliance-identity-intelligence-audit-security-security-reports\/","name":"Security Compliance mit Identity Intelligence: Sicherheits-Audits mit Reports - Evidian","isPartOf":{"@id":"https:\/\/www.evidian.com\/de\/#website"},"datePublished":"2015-09-04T12:26:02+00:00","dateModified":"2022-12-24T04:08:07+00:00","description":"Discover in this white paper how to implement security compliance with identity intelligence and how to audit security with security reports","breadcrumb":{"@id":"https:\/\/www.evidian.com\/de\/products\/security-compliance-identity-intelligence-audit-security-security-reports\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.evidian.com\/de\/products\/security-compliance-identity-intelligence-audit-security-security-reports\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.evidian.com\/de\/products\/security-compliance-identity-intelligence-audit-security-security-reports\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Evidian","item":"https:\/\/www.evidian.com\/de\/"},{"@type":"ListItem","position":2,"name":"Produkte","item":"https:\/\/www.evidian.com\/de\/products\/"},{"@type":"ListItem","position":3,"name":"Security Compliance mit Identity Intelligence: Sicherheits-Audits mit Reports"}]},{"@type":"WebSite","@id":"https:\/\/www.evidian.com\/de\/#website","url":"https:\/\/www.evidian.com\/de\/","name":"Evidian","description":"Set in menu above: SEO\/SEO Settings\/Title &amp; Metas\/Home","publisher":{"@id":"https:\/\/www.evidian.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.evidian.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.evidian.com\/de\/#organization","name":"Evidian","alternateName":"Evidian","url":"https:\/\/www.evidian.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.evidian.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.evidian.com\/wp-content\/uploads\/2024\/01\/evidian-new-blue-1.png","contentUrl":"https:\/\/www.evidian.com\/wp-content\/uploads\/2024\/01\/evidian-new-blue-1.png","width":734,"height":200,"caption":"Evidian"},"image":{"@id":"https:\/\/www.evidian.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/showcase\/eviden-cybersecurity\/","https:\/\/www.youtube.com\/channel\/UCJKPuw2SDVNYUjZEJyLbIAA"]}]}},"_links":{"self":[{"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/pages\/15477","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/comments?post=15477"}],"version-history":[{"count":0,"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/pages\/15477\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/pages\/15460"}],"wp:attachment":[{"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/media?parent=15477"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}