{"id":17122,"date":"2017-01-19T18:54:23","date_gmt":"2017-01-19T16:54:23","guid":{"rendered":"\/?page_id=17122"},"modified":"2022-12-30T09:48:19","modified_gmt":"2022-12-30T07:48:19","slug":"kritische-infrastrukturen-kritis-2","status":"publish","type":"page","link":"https:\/\/www.evidian.com\/de\/kampagnen\/kritische-infrastrukturen-kritis-2\/","title":{"rendered":"Kritische Infrastrukturen (KRITIS)"},"content":{"rendered":"<div id=\"pl-17122\"  class=\"panel-layout\" ><div id=\"pg-17122-0\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-17122-0\" data-stretch-type=\"full-stretched\" ><div id=\"pgc-17122-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-17122-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-17122-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h1 style=\"text-align: left; color: white; font-size: 38px;\">Kritische Infrastrukturen (KRITIS)<\/h1>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-17122-1\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-17122-1\" ><div id=\"pgc-17122-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-17122-1-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div data-post-id=\"87965\" class=\"insert-page insert-page-87965 \"><div id=\"pl-87965\"  class=\"panel-layout\" ><div id=\"pg-87965-0\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-87965-0\" ><div id=\"pgc-87965-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-87965-0-0-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-87965\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/unternehmen\/kontakt-evidian\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tKontaktieren  &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-87965-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-87965-0-1-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-87965\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/www.evidian.com\/de\/unternehmen\/kostenlose-testversion\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tGratis-Testversion &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-87965-0-2\"  class=\"panel-grid-cell\" ><div id=\"panel-87965-0-2-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-87965\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/unternehmen\/demotermin-vereinbaren\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tDemotermin vereinbaren &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-87965-0-3\"  class=\"panel-grid-cell\" ><div id=\"panel-87965-0-3-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-87965\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/unternehmen\/ein-angebot-anfordern\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tEin Angebot anfordern &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-17122-2\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-17122-2\" ><div id=\"pgc-17122-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-17122-2-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>Nach \u00a7\u00a08a BSI-Gesetz m\u00fcssen Betreiber Kritischer Infrastrukturen IT-Sicherheit nach dem \u201eStand der Technik\u201c umsetzen und deren Einhaltung regelm\u00e4\u00dfig gegen\u00fcber dem BSI nachweisen.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-17122-2-1\"  class=\"panel-grid-cell\" ><div id=\"panel-17122-2-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>Im IT-Sicherheitsgesetz ist zus\u00e4tzlich geregelt, dass die Betreiber verpflichtet sind die Netze vor Hacker-Angriffen oder (mutwilliger) Besch\u00e4digung zu sch\u00fctzen und Angriffe zwingend zu melden.<\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-17122-3\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-17122-3\" ><div id=\"pgc-17122-3-0\"  class=\"panel-grid-cell\" ><div id=\"panel-17122-3-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child panel-last-child\" data-index=\"4\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-d6db24c2db75-87965\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\tL\u00f6sung\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"decoration\">\n\t\t\t\t\t\t<div class=\"decoration-inside\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-17122-4\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-17122-4\" ><div id=\"pgc-17122-4-0\"  class=\"panel-grid-cell\" ><div id=\"panel-17122-4-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"5\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3>L\u00f6sung<\/h3>\n<p>Die Kernaussage zum Schutz Kritischer Infrastrukturen ist, diese vor unbefugtem Zugriff von au\u00dfen zu sch\u00fctzen und deren kontinuierliche Verf\u00fcgbarkeit sicherzustellen. Die betroffenen Unternehmen werden also verpflichtet, organisatorische und technische Vorkehrungen zur Vermeidung von St\u00f6rungen ihrer informationstechnischen Systeme, Komponenten oder Prozesse zu treffen.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-17122-4-1\"  class=\"panel-grid-cell\" ><div id=\"panel-17122-4-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"6\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3><b>Pflicht zur Umsetzung der IT-Sicherheit nach Stand der Technik (\u00a7\u00a08a Absatz\u00a01 BSIG)<\/b><\/h3>\n<p>Die Identity- und Accessmanagement L\u00f6sung von Evidian erm\u00f6glicht die Implementierung einer <a href=\"\/de\/products\/enterprise-sso\/\">zentral gesteuerten Zugangs- und Zugriffskontrolle<\/a> auf IT-Ressourcen, wie Systeme und Anwendungen in Abh\u00e4ngigkeit von Mitarbeiterfunktion und Aufgabengebiet.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-17122-4-2\"  class=\"panel-grid-cell\" ><div id=\"panel-17122-4-2-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"7\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3><b>Pflicht zur \u00dcberpr\u00fcfung der Absicherung (z.B. durch Audit)<\/b><\/h3>\n<p>Aus der Evidian L\u00f6sung lassen sich jederzeit Auswertungen erstellen, die z.B. unerw\u00fcnschte oder fehlgeschlagene Zugriffe auf Systeme und Anwendungen aufzeigen. Dadurch ist es leicht m\u00f6glich die Umsetzung einer umfassenden Zugriffskontrolle zu pr\u00fcfen und erforderliche <a href=\"\/de\/products\/identity-intelligence-analytics\/\">Nachweise f\u00fcr den Gesetzgeber<\/a> zu erstellen.<\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-17122-5\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-17122-5\" ><div id=\"pgc-17122-5-0\"  class=\"panel-grid-cell\" ><div id=\"panel-17122-5-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child panel-last-child\" data-index=\"8\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-d6db24c2db75-87965\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\tVorteile\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"decoration\">\n\t\t\t\t\t\t<div class=\"decoration-inside\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-17122-6\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-17122-6\" ><div id=\"pgc-17122-6-0\"  class=\"panel-grid-cell\" ><div id=\"panel-17122-6-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"9\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3><b>Schutz der IT Infrastruktur vor ungewolltem Zugriff<\/b><\/h3>\n<p><a href=\"\/de\/products\/enterprise-sso\/\">Evidian Access Management<\/a> unterst\u00fctzt umf\u00e4nglich bei der Zugriffskontrolle auf Systeme, Anwendungen und Daten. So werden eine gro\u00dfe Anzahl von Empfehlungen des BSI zum Schutz der IT-Infrastruktur erf\u00fcllt, wie der Schutz von unerlaubten Zugriffen auf IT-Systeme, ordnungsgem\u00e4\u00dfer Benutzerwechsel, personifizierter Zugriffsschutz f\u00fcr IT-Systeme, gesichertes Login, sperren nicht ben\u00f6tigter Accounts, \u2026<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-17122-6-1\"  class=\"panel-grid-cell\" ><div id=\"panel-17122-6-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"10\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3><b>Nachweise f\u00fcr den Gesetzgeber<\/b><\/h3>\n<p>Es lassen sich jederzeit dedizierte Auswertungen \u00fcber alle Vorkommnisse erstellen. Ungewollte oder fehlgeschlagene Zugriffe auf Systeme und Anwendungen lassen sich leicht identifizieren und auswerten. Somit ist es m\u00f6glich, jederzeit die Durchsetzung des implementierten Berechtigungskonzepts zu pr\u00fcfen, Anomalien aufzudecken und <a href=\"\/de\/products\/identity-intelligence-analytics\/\">Nachweise f\u00fcr den Gesetzgeber<\/a> zu erstellen.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-17122-6-2\"  class=\"panel-grid-cell\" ><div id=\"panel-17122-6-2-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"11\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3><b>Gesetzliche Auflagen erf\u00fcllen<\/b><\/h3>\n<p>Betreiber Kritischer Infrastrukturen sind verpflichtet, die f\u00fcr die Erbringung ihrer wichtigen Dienste erforderliche IT nach dem Stand der Technik angemessen abzusichern. Durch den Einsatz von <a href=\"\/de\/products\/identity-governance-and-administration-iga-10\/\">Evidian IGA<\/a>, einer modernen L\u00f6sung zur Verwaltung von Identit\u00e4ten und den daran gebundenen Zugriff auf die IT Infrastruktur erf\u00fcllen Sie diese geforderte gesetzliche Vorgabe.<\/p>\n<p>Ungewollte Zugriffe auf die IT Infrastruktur, also IT-Sicherheitsvorf\u00e4lle, die zwingerderma\u00dfen an das BSI gemeldet werden m\u00fcssen lassen sich leicht und zeitnah identifizieren und k\u00f6nnen wie gesetzlich vorgeschrieben gemeldet werden.<\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-17122-7\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-17122-7\" ><div id=\"pgc-17122-7-0\"  class=\"panel-grid-cell\" ><div id=\"panel-17122-7-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"12\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div data-post-id=\"78329\" class=\"insert-page insert-page-78329 \"><div id=\"pl-78329\"  class=\"panel-layout\" ><div id=\"pg-78329-0\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-78329-0\" ><div id=\"pgc-78329-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-78329-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div data-post-id=\"89061\" class=\"insert-page insert-page-89061 \"><div id=\"pl-89061\"  class=\"panel-layout\" ><div id=\"pg-89061-0\"  class=\"panel-grid panel-has-style\" ><div class=\"product-title panel-row-style panel-row-style-for-89061-0\" ><div id=\"pgc-89061-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-89061-0-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-89832aaee75f-89061 so-widget-fittext-wrapper\"\n\t\t\t data-fit-text-compressor=\"1.5\"\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\t<a name=\"all-products\"><\/a>Mit Produkten von Evidian, Sch\u00fctzen Sie ihr Unternehmen vor Cyber Attacken durch nicht autorisierte Anwender\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"decoration\">\n\t\t\t\t\t\t<div class=\"decoration-inside\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-89061-1\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-89061-1\" ><div id=\"pgc-89061-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-89061-1-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"users-cloud\"><\/div>\n<h3 style=\"text-align: center; color: #ff5269;\"><a id=\"tous-produits\"><\/a><a href=\"https:\/\/www.evidian.com\/products\/idaas-identity-and-access-management-as-a-service-iam\/\" target=\"_blank\" rel=\"noopener\">Orbion<\/a><\/h3>\n<p style=\"text-align: center;\">Evidian k\u00fcmmert sich um alles was mit ihrem Identity und Access Management zu tun hat<\/p>\n<h4 style=\"text-align: center;\"><a href=\"https:\/\/www.evidian.com\/products\/idaas-identity-and-access-management-as-a-service-iam\/\" target=\"_blank\" rel=\"noopener\">Mehr erfahren\u00a0 \u00a0&gt;<\/a><\/h4>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89061-1-1\"  class=\"panel-grid-cell\" ><div id=\"panel-89061-1-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"users\"><\/div>\n<h3 style=\"text-align: center; color: #00a397;\"><strong><a href=\"https:\/\/www.evidian.com\/products\/identity-governance-and-administration-iga-10\/\" target=\"_blank\" rel=\"noopener\">Identity Governance and Administration<\/a><\/strong><\/h3>\n<p style=\"text-align: center;\">Verwaltet den Zugriff und die Autorisierung von allen Anwendern in ihrem Unternehmen<\/p>\n<h4 style=\"text-align: center;\"><a href=\"https:\/\/www.evidian.com\/products\/identity-governance-and-administration-iga-10\/\" target=\"_blank\" rel=\"noopener\">Mehr erfahren\u00a0 \u00a0&gt;<\/a><\/h4>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89061-1-2\"  class=\"panel-grid-cell\" ><div id=\"panel-89061-1-2-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"lock-web\"><\/div>\n<h3 style=\"text-align: center; color: #b88d00;\"><a href=\"https:\/\/www.evidian.com\/products\/web-sso\/\" target=\"_blank\" rel=\"noopener\">Web Access Manager<\/a><\/h3>\n<p style=\"text-align: center;\">Schnittstelle f\u00fcr Web- Anwendungen mit SSO, Mulitfaktor Authentifizierung und Identity Federation<\/p>\n<h4 style=\"text-align: center;\"><a href=\"https:\/\/www.evidian.com\/products\/web-sso\/\" target=\"_blank\" rel=\"noopener\">Mehr erfahren\u00a0 \u00a0&gt;<\/a><\/h4>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89061-1-3\"  class=\"panel-grid-cell\" ><div id=\"panel-89061-1-3-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"4\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"report\"><\/div>\n<h3 style=\"text-align: center; color: #a375ff;\"><a href=\"https:\/\/www.evidian.com\/products\/evidian-identity-analytics-and-intelligence\/\" target=\"_blank\" rel=\"noopener\">Analytics<\/a><\/h3>\n<p style=\"text-align: center;\">\u00dcberwachung und leistungsstarkes Reporting zur Einhaltung gesetzlicher Vorschriften<\/p>\n<h4 style=\"text-align: center;\"><a href=\"https:\/\/www.evidian.com\/products\/evidian-identity-analytics-and-intelligence\/\" target=\"_blank\" rel=\"noopener\">Mehr erfahren\u00a0 \u00a0&gt;<\/a><\/h4>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-89061-2\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-89061-2\" ><div id=\"pgc-89061-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-89061-2-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"5\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">Authentication Manager<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"lock-mfa\"><\/div>\n<h3 style=\"text-align: center; color: #ff5269;\"><a href=\"https:\/\/www.evidian.com\/products\/authentication-manager\/\" target=\"_blank\" rel=\"noopener\">Authentication Manager<\/a><\/h3>\n<p style=\"text-align: center;\">Unternehmensweite Multifaktor- und passwortfreie- Authentifizierung an Windows PCs<\/p>\n<h4 style=\"text-align: center;\"><a href=\"https:\/\/www.evidian.com\/products\/authentication-manager\/\" target=\"_blank\" rel=\"noopener\">Mehr erfahren\u00a0 \u00a0&gt;<\/a><\/h4>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89061-2-1\"  class=\"panel-grid-cell\" ><div id=\"panel-89061-2-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"6\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"sso\"><\/div>\n<h3 style=\"text-align: center; color: #00a397;\"><a href=\"https:\/\/www.evidian.com\/products\/enterprise-sso\/\" target=\"_blank\" rel=\"noopener\">Enterprise Single Sign-On (SSO)<\/a><\/h3>\n<p style=\"text-align: center;\">Sicherer Zugriff auf Legacy- und Web- Anwendungen auf PCs und mobilen Ger\u00e4ten mittels SSO<\/p>\n<h4 style=\"text-align: center;\"><a href=\"https:\/\/www.evidian.com\/products\/enterprise-sso\/\" target=\"_blank\" rel=\"noopener\">Mehr erfahren\u00a0 \u00a0&gt;<\/a><\/h4>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89061-2-2\"  class=\"panel-grid-cell\" ><div id=\"panel-89061-2-2-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"7\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"settings\"><\/div>\n<h3 style=\"text-align: center; color: #b88d00;\"><a href=\"https:\/\/www.evidian.com\/products\/self-service-password-reset-sspr-for-emergency-access\/\" target=\"_blank\" rel=\"noopener\">Self Service\u00a0Password Reset (SSPR)<\/a><\/h3>\n<p style=\"text-align: center;\">Zur\u00fccksetzen des Windows Passwortes Online und Offline<\/p>\n<h4 style=\"text-align: center;\"><a href=\"https:\/\/www.evidian.com\/products\/self-service-password-reset-sspr-for-emergency-access\/\" target=\"_blank\" rel=\"noopener\">Mehr erfahren\u00a0 \u00a0&gt;<\/a><\/h4>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89061-2-3\"  class=\"panel-grid-cell\" ><div id=\"panel-89061-2-3-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"8\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"load-balancing\"><\/div>\n<h3 style=\"text-align: center; color: #a375ff;\"><a href=\"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/\" target=\"_blank\" rel=\"noopener\">SafeKit<\/a><\/h3>\n<p style=\"text-align: center;\">Hochverf\u00fcgbarkeitssoftware f\u00fcr kritische Anwendungen<\/p>\n<h4 style=\"text-align: center;\"><a href=\"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/\" target=\"_blank\" rel=\"noopener\">Mehr erfahren\u00a0 \u00a0&gt;<\/a><\/h4>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-89061-3\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-89061-3\" ><div id=\"pgc-89061-3-0\"  class=\"panel-grid-cell\" ><div id=\"panel-89061-3-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"9\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h4 style=\"text-align: center;\"><a href=\"https:\/\/eviden.com\/de-de\/loesungen\/digital-security\/\" target=\"_blank\" rel=\"noopener\">Erfahren Sie mehr \u00fcber Digital Security L\u00f6sungen &gt;<\/a><\/h4>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-78329-1\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-78329-1\" ><div id=\"pgc-78329-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-78329-1-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div data-post-id=\"88000\" class=\"insert-page insert-page-88000 \"><div id=\"pl-88000\"  class=\"panel-layout\" ><div id=\"pg-88000-0\"  class=\"panel-grid panel-has-style\" ><div class=\"product-title panel-row-style panel-row-style-for-88000-0\" ><div id=\"pgc-88000-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-88000-0-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-d4827573a77b-88000 so-widget-fittext-wrapper\"\n\t\t\t data-fit-text-compressor=\"1.5\"\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\tDokumente\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"decoration\">\n\t\t\t\t\t\t<div class=\"decoration-inside\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-0-1\" class=\"so-panel widget widget_sow-button\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-64053071d55b-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/documents\/flyers-iam-authentication-sso-web-sso-ha\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tBrosch\u00fcren &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-0-2\" class=\"so-panel widget widget_sow-button\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-64053071d55b-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/documents\/white-papers-iam-authentication-sso-web-sso-ha\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tWhite Paper &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-0-3\" class=\"so-panel widget widget_sow-button\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-64053071d55b-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/documents\/case-studies-iam-authentication-sso-web-sso-ha\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tFallstudien &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-0-4\" class=\"so-panel widget widget_sow-button\" data-index=\"4\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-64053071d55b-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/documents\/videos-iam-authentication-sso-web-sso\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tVideos &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-0-5\" class=\"so-panel widget widget_sow-button\" data-index=\"5\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-64053071d55b-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/documents\/tutorials\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tTutorials &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-0-6\" class=\"so-panel widget widget_sow-button panel-last-child\" data-index=\"6\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-18dcd7840989-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/documents\/white-papers-iam-authentication-sso-web-sso-ha\/#analysts\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tAnalysten &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-88000-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-88000-0-1-0\" class=\"so-panel widget widget_siteorigin-panels-builder panel-first-child\" data-index=\"7\" ><div id=\"pl-w6843031274ac3\"  class=\"panel-layout\" ><div id=\"pg-w6843031274ac3-0\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-w6843031274ac3-0\" ><div id=\"pgc-w6843031274ac3-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w6843031274ac3-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"video-container\"><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/ULOuwwAqsIM?cc_lang_pref=en&amp;cc_load_policy=1\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-w6843031274ac3-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-w6843031274ac3-0-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"video-container\"><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/znxPZIrTros?si=c5K6ezI0r_mGNTqG\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-w6843031274ac3-1\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-w6843031274ac3-1\" ><div id=\"pgc-w6843031274ac3-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w6843031274ac3-1-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"video-container\"><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/gCb34XsUe-8?cc_lang_pref=en&amp;cc_load_policy=1\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-w6843031274ac3-1-1\"  class=\"panel-grid-cell\" ><div id=\"panel-w6843031274ac3-1-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"video-container\"><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/Dx0viurJC4g\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"panel-88000-0-1-1\" class=\"so-panel widget widget_sow-button panel-last-child\" data-index=\"8\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-a4b98c5e5321-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/documents\/webinars-iam-sso-authentication-sspr-ha\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tWebinars &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-88000-0-2\"  class=\"panel-grid-cell\" ><div id=\"panel-88000-0-2-0\" class=\"so-panel widget widget_sow-headline panel-first-child\" data-index=\"9\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-eb0b4f3610f3-88000 so-widget-fittext-wrapper\"\n\t\t\t data-fit-text-compressor=\"1.5\"\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\tL\u00f6sungen\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"decoration\">\n\t\t\t\t\t\t<div class=\"decoration-inside\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-2-1\" class=\"so-panel widget widget_sow-button\" data-index=\"10\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-5814dc63a0e1-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/gesundheitswesen\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tGesundheitswesen &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-2-2\" class=\"so-panel widget widget_sow-button\" data-index=\"11\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-5814dc63a0e1-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/finanzen\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tFinanzinstitute &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-2-3\" class=\"so-panel widget widget_sow-button\" data-index=\"12\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-5814dc63a0e1-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/behorden\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tBeh\u00f6rden &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-2-4\" class=\"so-panel widget widget_sow-button\" data-index=\"13\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-5814dc63a0e1-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/industrie\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tIndustrie &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-2-5\" class=\"so-panel widget widget_sow-button\" data-index=\"14\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-5814dc63a0e1-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/telekommunication\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tTelekommunikation &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-2-6\" class=\"so-panel widget widget_sow-button panel-last-child\" data-index=\"15\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-18dcd7840989-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/solutions\/#app\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tAnwendungen &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-17122-8\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-17122-8\" ><div id=\"pgc-17122-8-0\"  class=\"panel-grid-cell\" ><div id=\"panel-17122-8-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"13\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div data-post-id=\"87965\" class=\"insert-page insert-page-87965 \"><div id=\"pl-87965\"  class=\"panel-layout\" ><div id=\"pg-87965-0\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-87965-0\" ><div id=\"pgc-87965-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-87965-0-0-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-87965\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/unternehmen\/kontakt-evidian\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tKontaktieren  &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-87965-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-87965-0-1-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-87965\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/www.evidian.com\/de\/unternehmen\/kostenlose-testversion\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tGratis-Testversion &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-87965-0-2\"  class=\"panel-grid-cell\" ><div id=\"panel-87965-0-2-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-87965\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/unternehmen\/demotermin-vereinbaren\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tDemotermin vereinbaren &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-87965-0-3\"  class=\"panel-grid-cell\" ><div id=\"panel-87965-0-3-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-87965\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/unternehmen\/ein-angebot-anfordern\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tEin Angebot anfordern &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"Kritische Infrastrukturen (KRITIS)","protected":false},"author":64,"featured_media":0,"parent":12508,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-full-screen.php","meta":{"_acf_changed":false,"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"class_list":["post-17122","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Kritische Infrastrukturen (KRITIS) - Evidian<\/title>\n<meta name=\"description\" content=\"Nach \u00a7 8a BSI-Gesetz m\u00fcssen Betreiber Kritischer Infrastrukturen IT-Sicherheit nach dem \u201eStand der Technik\u201c umsetzen und deren Einhaltung regelm\u00e4\u00dfig gegen\u00fcber dem BSI nachweisen. Im IT-Sicherheitsgesetz ist zus\u00e4tzlich geregelt, dass die Betreiber verpflichtet sind die Netze vor Hacker-Angriffen oder (mutwilliger) Besch\u00e4digung zu sch\u00fctzen und Angriffe zwingend zu melden.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.evidian.com\/de\/kampagnen\/kritische-infrastrukturen-kritis-2\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kritische Infrastrukturen (KRITIS)\" \/>\n<meta property=\"og:description\" content=\"Nach \u00a7 8a BSI-Gesetz m\u00fcssen Betreiber Kritischer Infrastrukturen IT-Sicherheit nach dem \u201eStand der Technik\u201c umsetzen und deren Einhaltung regelm\u00e4\u00dfig gegen\u00fcber dem BSI nachweisen. Im IT-Sicherheitsgesetz ist zus\u00e4tzlich geregelt, dass die Betreiber verpflichtet sind die Netze vor Hacker-Angriffen oder (mutwilliger) Besch\u00e4digung zu sch\u00fctzen und Angriffe zwingend zu melden.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.evidian.com\/de\/kampagnen\/kritische-infrastrukturen-kritis-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Evidian\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-30T07:48:19+00:00\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/kampagnen\\\/kritische-infrastrukturen-kritis-2\\\/\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/kampagnen\\\/kritische-infrastrukturen-kritis-2\\\/\",\"name\":\"Kritische Infrastrukturen (KRITIS) - Evidian\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/#website\"},\"datePublished\":\"2017-01-19T16:54:23+00:00\",\"dateModified\":\"2022-12-30T07:48:19+00:00\",\"description\":\"Nach \u00a7 8a BSI-Gesetz m\u00fcssen Betreiber Kritischer Infrastrukturen IT-Sicherheit nach dem \u201eStand der Technik\u201c umsetzen und deren Einhaltung regelm\u00e4\u00dfig gegen\u00fcber dem BSI nachweisen. Im IT-Sicherheitsgesetz ist zus\u00e4tzlich geregelt, dass die Betreiber verpflichtet sind die Netze vor Hacker-Angriffen oder (mutwilliger) Besch\u00e4digung zu sch\u00fctzen und Angriffe zwingend zu melden.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/kampagnen\\\/kritische-infrastrukturen-kritis-2\\\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.evidian.com\\\/de\\\/kampagnen\\\/kritische-infrastrukturen-kritis-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/kampagnen\\\/kritische-infrastrukturen-kritis-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Evidian\",\"item\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kampagnen\",\"item\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/kampagnen\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Kritische Infrastrukturen (KRITIS)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/\",\"name\":\"Evidian\",\"description\":\"Set in menu above: SEO\\\/SEO Settings\\\/Title &amp; Metas\\\/Home\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/#organization\",\"name\":\"Evidian\",\"alternateName\":\"Evidian\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/evidian-new-blue-1.png\",\"contentUrl\":\"https:\\\/\\\/www.evidian.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/evidian-new-blue-1.png\",\"width\":734,\"height\":200,\"caption\":\"Evidian\"},\"image\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/eviden-cybersecurity\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCJKPuw2SDVNYUjZEJyLbIAA\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Kritische Infrastrukturen (KRITIS) - Evidian","description":"Nach \u00a7 8a BSI-Gesetz m\u00fcssen Betreiber Kritischer Infrastrukturen IT-Sicherheit nach dem \u201eStand der Technik\u201c umsetzen und deren Einhaltung regelm\u00e4\u00dfig gegen\u00fcber dem BSI nachweisen. Im IT-Sicherheitsgesetz ist zus\u00e4tzlich geregelt, dass die Betreiber verpflichtet sind die Netze vor Hacker-Angriffen oder (mutwilliger) Besch\u00e4digung zu sch\u00fctzen und Angriffe zwingend zu melden.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.evidian.com\/de\/kampagnen\/kritische-infrastrukturen-kritis-2\/","og_locale":"de_DE","og_type":"article","og_title":"Kritische Infrastrukturen (KRITIS)","og_description":"Nach \u00a7 8a BSI-Gesetz m\u00fcssen Betreiber Kritischer Infrastrukturen IT-Sicherheit nach dem \u201eStand der Technik\u201c umsetzen und deren Einhaltung regelm\u00e4\u00dfig gegen\u00fcber dem BSI nachweisen. Im IT-Sicherheitsgesetz ist zus\u00e4tzlich geregelt, dass die Betreiber verpflichtet sind die Netze vor Hacker-Angriffen oder (mutwilliger) Besch\u00e4digung zu sch\u00fctzen und Angriffe zwingend zu melden.","og_url":"https:\/\/www.evidian.com\/de\/kampagnen\/kritische-infrastrukturen-kritis-2\/","og_site_name":"Evidian","article_modified_time":"2022-12-30T07:48:19+00:00","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.evidian.com\/de\/kampagnen\/kritische-infrastrukturen-kritis-2\/","url":"https:\/\/www.evidian.com\/de\/kampagnen\/kritische-infrastrukturen-kritis-2\/","name":"Kritische Infrastrukturen (KRITIS) - Evidian","isPartOf":{"@id":"https:\/\/www.evidian.com\/de\/#website"},"datePublished":"2017-01-19T16:54:23+00:00","dateModified":"2022-12-30T07:48:19+00:00","description":"Nach \u00a7 8a BSI-Gesetz m\u00fcssen Betreiber Kritischer Infrastrukturen IT-Sicherheit nach dem \u201eStand der Technik\u201c umsetzen und deren Einhaltung regelm\u00e4\u00dfig gegen\u00fcber dem BSI nachweisen. Im IT-Sicherheitsgesetz ist zus\u00e4tzlich geregelt, dass die Betreiber verpflichtet sind die Netze vor Hacker-Angriffen oder (mutwilliger) Besch\u00e4digung zu sch\u00fctzen und Angriffe zwingend zu melden.","breadcrumb":{"@id":"https:\/\/www.evidian.com\/de\/kampagnen\/kritische-infrastrukturen-kritis-2\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.evidian.com\/de\/kampagnen\/kritische-infrastrukturen-kritis-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.evidian.com\/de\/kampagnen\/kritische-infrastrukturen-kritis-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Evidian","item":"https:\/\/www.evidian.com\/de\/"},{"@type":"ListItem","position":2,"name":"Kampagnen","item":"https:\/\/www.evidian.com\/de\/kampagnen\/"},{"@type":"ListItem","position":3,"name":"Kritische Infrastrukturen (KRITIS)"}]},{"@type":"WebSite","@id":"https:\/\/www.evidian.com\/de\/#website","url":"https:\/\/www.evidian.com\/de\/","name":"Evidian","description":"Set in menu above: SEO\/SEO Settings\/Title &amp; Metas\/Home","publisher":{"@id":"https:\/\/www.evidian.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.evidian.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.evidian.com\/de\/#organization","name":"Evidian","alternateName":"Evidian","url":"https:\/\/www.evidian.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.evidian.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.evidian.com\/wp-content\/uploads\/2024\/01\/evidian-new-blue-1.png","contentUrl":"https:\/\/www.evidian.com\/wp-content\/uploads\/2024\/01\/evidian-new-blue-1.png","width":734,"height":200,"caption":"Evidian"},"image":{"@id":"https:\/\/www.evidian.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/showcase\/eviden-cybersecurity\/","https:\/\/www.youtube.com\/channel\/UCJKPuw2SDVNYUjZEJyLbIAA"]}]}},"_links":{"self":[{"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/pages\/17122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/users\/64"}],"replies":[{"embeddable":true,"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/comments?post=17122"}],"version-history":[{"count":0,"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/pages\/17122\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/pages\/12508"}],"wp:attachment":[{"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/media?parent=17122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}