{"id":90844,"date":"2022-11-14T11:34:23","date_gmt":"2022-11-14T09:34:23","guid":{"rendered":"https:\/\/www.evidian.com\/dokumente\/white-papers-iam-authentication-sso-web-sso-ha\/what-are-iam-cyber-security-tools-and-solutions\/"},"modified":"2023-04-09T09:49:40","modified_gmt":"2023-04-09T07:49:40","slug":"welche-iam-cybersecurity-tools-und-losungen","status":"publish","type":"page","link":"https:\/\/www.evidian.com\/de\/dokumente\/welche-iam-cybersecurity-tools-und-losungen\/","title":{"rendered":"Welche IAM-Cybersecurity-Tools und -L\u00f6sungen gibt es?"},"content":{"rendered":"<div id=\"pl-90844\"  class=\"panel-layout\" ><div id=\"pg-90844-0\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-90844-0\" ><div id=\"pgc-90844-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-90844-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-90844-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h1 style=\"color:white;\">Welche IAM-Cybersecurity-Tools und -L\u00f6sungen gibt es?<\/h1>\n<h2 style=\"color:white;\">91 IAM-Anbieter wurden in Bezug auf Schutz Ihres Unternehmens vor Cyberangriffen durch nicht autorisierte Anwender bewertet<\/h2>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-90844-1\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-90844-1\" ><div id=\"pgc-90844-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-90844-1-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div data-post-id=\"87965\" class=\"insert-page insert-page-87965 \"><div id=\"pl-87965\"  class=\"panel-layout\" ><div id=\"pg-87965-0\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-87965-0\" ><div id=\"pgc-87965-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-87965-0-0-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-87965\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/unternehmen\/kontakt-evidian\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tKontaktieren  &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-87965-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-87965-0-1-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-87965\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/www.evidian.com\/de\/unternehmen\/kostenlose-testversion\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tGratis-Testversion &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-87965-0-2\"  class=\"panel-grid-cell\" ><div id=\"panel-87965-0-2-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-87965\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/unternehmen\/demotermin-vereinbaren\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tDemotermin vereinbaren &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-87965-0-3\"  class=\"panel-grid-cell\" ><div id=\"panel-87965-0-3-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-87965\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/unternehmen\/ein-angebot-anfordern\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tEin Angebot anfordern &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-90844-2\"  class=\"panel-grid panel-has-style\" ><div class=\"product-title panel-row-style panel-row-style-for-90844-2\" ><div id=\"pgc-90844-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-90844-2-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-ed91a830b9d9-87965 so-widget-fittext-wrapper\"\n\t\t\t data-fit-text-compressor=\"1.5\"\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\tIAM (Identit\u00e4ts- und Zugriffsmanagement) ist ein wichtiges Instrument f\u00fcr die Cybersecurity\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"decoration\">\n\t\t\t\t\t\t<div class=\"decoration-inside\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-90844-3\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-90844-3\" ><div id=\"pgc-90844-3-0\"  class=\"panel-grid-cell\" ><div id=\"panel-90844-3-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3>Was sind IAM-Cybersicherheits-Tools?<\/h3>\n<p>IAM-Cybersicherheits-Tools m\u00fcssen Benutzer identifizieren, authentifizieren, autorisieren und gleichzeitig unbefugte Benutzer ausschlie\u00dfen.<\/p>\n<p>Da Benutzer h\u00e4ufig ihre Rolle in einem Unternehmen wechseln, m\u00fcssen diese Tools auch sicherstellen, dass die Benutzer die f\u00fcr ihre Aufgabe erforderlichen Zugriffsrechte haben und nicht mehr. Das Fehlen eines Anwenderlebenszyklusmanagements ( Anstellung, Rollenwechsel, Austritt) oder fehlende Genehmigungsworkflows tragen zu \u00fcberm\u00e4\u00dfigen Zugriffsrechten bei und setzen ein Unternehmen Angriffen durch interne Anwender aus.<\/p>\n<p>Mit der Einhaltung von Vorschriften wie <a href=\"https:\/\/www.soxlaw.com\/\" target=\"_blank\" rel=\"noopener\">SOX<\/a>, <a href=\"https:\/\/www.hhs.gov\/hipaa\/index.html\" target=\"_blank\" rel=\"noopener\">HIPAA<\/a>, <a href=\"https:\/\/www.bis.org\/bcbs\/basel3.htm\" target=\"_blank\" rel=\"noopener\">Basel III<\/a>, <a href=\"https:\/\/www.pcisecuritystandards.org\/\" target=\"_blank\" rel=\"noopener\">PCI<\/a>, und der <a href=\"https:\/\/gdpr.eu\/\" target=\"_blank\" rel=\"noopener\">DSGVO<\/a> sehen sich Unternehmen mit mehr Audits und Compliance-Pr\u00fcfungen konfrontiert. IAM-Cybersecurity-Tools sollten Daten f\u00fcr die obligatorische Berichterstattung sammeln und auch nicht normales Benutzerverhalten erkennen.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-90844-3-1\"  class=\"panel-grid-cell\" ><div id=\"panel-90844-3-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"4\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3>Was sind IAM-Cybersecurityl\u00f6sungen?<\/h3>\n<p><a href=\"https:\/\/isg-one.com\/who-we-are\" target=\"_blank\" rel=\"noopener\">ISG, ein f\u00fchrendes Beratungsunternehmen<\/a>, hat einen Forschungsbericht vorgelegt, in dem 91 Anbieter von IAM-Cybersicherheitsl\u00f6sungen und -dienstleistungen, ihre St\u00e4rken, Herausforderungen und Wettbewerbsvorteile verglichen werden.<\/p>\n<p>In diesem IAM-Cybersecurityquadranten haben sich von den 91 f\u00fcr diese Studie bewerteten Unternehmen 23 f\u00fcr diesen Quadranten qualifiziert, wobei 5 als Leader identifiziert wurden.<\/p>\n<p>IAM-Cybersicherheitsl\u00f6sungen sind sehr gefragt, da die Kunden einen <a href=\"\/pdf\/wp-iam-zero-trust.pdf\" target=\"_blank\" rel=\"noopener\">Zero-Trust-Ansatz<\/a> bei der Sicherheit verfolgen. Zero Trust ist nicht nur ein Schlagwort, sondern die neue Normalit\u00e4t: \"Never trust, always verify\".<\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-90844-4\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-90844-4\" ><div id=\"pgc-90844-4-0\"  class=\"panel-grid-cell\" ><div id=\"panel-90844-4-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"5\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div data-post-id=\"88263\" class=\"insert-page insert-page-88263 \"><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-90844-5\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-90844-5\" ><div id=\"pgc-90844-5-0\"  class=\"panel-grid-cell\" ><div id=\"panel-90844-5-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"6\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div data-post-id=\"89061\" class=\"insert-page insert-page-89061 \"><div id=\"pl-89061\"  class=\"panel-layout\" ><div id=\"pg-89061-0\"  class=\"panel-grid panel-has-style\" ><div class=\"product-title panel-row-style panel-row-style-for-89061-0\" ><div id=\"pgc-89061-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-89061-0-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-89832aaee75f-89061 so-widget-fittext-wrapper\"\n\t\t\t data-fit-text-compressor=\"1.5\"\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\t<a name=\"all-products\"><\/a>Mit Produkten von Evidian, Sch\u00fctzen Sie ihr Unternehmen vor Cyber Attacken durch nicht autorisierte Anwender\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"decoration\">\n\t\t\t\t\t\t<div class=\"decoration-inside\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-89061-1\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-89061-1\" ><div id=\"pgc-89061-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-89061-1-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"users-cloud\"><\/div>\n<h3 style=\"text-align: center; color: #ff5269;\"><a id=\"tous-produits\"><\/a><a href=\"https:\/\/www.evidian.com\/products\/idaas-identity-and-access-management-as-a-service-iam\/\" target=\"_blank\" rel=\"noopener\">Orbion<\/a><\/h3>\n<p style=\"text-align: center;\">Evidian k\u00fcmmert sich um alles was mit ihrem Identity und Access Management zu tun hat<\/p>\n<h4 style=\"text-align: center;\"><a href=\"https:\/\/www.evidian.com\/products\/idaas-identity-and-access-management-as-a-service-iam\/\" target=\"_blank\" rel=\"noopener\">Mehr erfahren\u00a0 \u00a0&gt;<\/a><\/h4>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89061-1-1\"  class=\"panel-grid-cell\" ><div id=\"panel-89061-1-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"users\"><\/div>\n<h3 style=\"text-align: center; color: #00a397;\"><strong><a href=\"https:\/\/www.evidian.com\/products\/identity-governance-and-administration-iga-10\/\" target=\"_blank\" rel=\"noopener\">Identity Governance and Administration<\/a><\/strong><\/h3>\n<p style=\"text-align: center;\">Verwaltet den Zugriff und die Autorisierung von allen Anwendern in ihrem Unternehmen<\/p>\n<h4 style=\"text-align: center;\"><a href=\"https:\/\/www.evidian.com\/products\/identity-governance-and-administration-iga-10\/\" target=\"_blank\" rel=\"noopener\">Mehr erfahren\u00a0 \u00a0&gt;<\/a><\/h4>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89061-1-2\"  class=\"panel-grid-cell\" ><div id=\"panel-89061-1-2-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"lock-web\"><\/div>\n<h3 style=\"text-align: center; color: #b88d00;\"><a href=\"https:\/\/www.evidian.com\/products\/web-sso\/\" target=\"_blank\" rel=\"noopener\">Web Access Manager<\/a><\/h3>\n<p style=\"text-align: center;\">Schnittstelle f\u00fcr Web- Anwendungen mit SSO, Mulitfaktor Authentifizierung und Identity Federation<\/p>\n<h4 style=\"text-align: center;\"><a href=\"https:\/\/www.evidian.com\/products\/web-sso\/\" target=\"_blank\" rel=\"noopener\">Mehr erfahren\u00a0 \u00a0&gt;<\/a><\/h4>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89061-1-3\"  class=\"panel-grid-cell\" ><div id=\"panel-89061-1-3-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"4\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"report\"><\/div>\n<h3 style=\"text-align: center; color: #a375ff;\"><a href=\"https:\/\/www.evidian.com\/products\/evidian-identity-analytics-and-intelligence\/\" target=\"_blank\" rel=\"noopener\">Analytics<\/a><\/h3>\n<p style=\"text-align: center;\">\u00dcberwachung und leistungsstarkes Reporting zur Einhaltung gesetzlicher Vorschriften<\/p>\n<h4 style=\"text-align: center;\"><a href=\"https:\/\/www.evidian.com\/products\/evidian-identity-analytics-and-intelligence\/\" target=\"_blank\" rel=\"noopener\">Mehr erfahren\u00a0 \u00a0&gt;<\/a><\/h4>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-89061-2\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-89061-2\" ><div id=\"pgc-89061-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-89061-2-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"5\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">Authentication Manager<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"lock-mfa\"><\/div>\n<h3 style=\"text-align: center; color: #ff5269;\"><a href=\"https:\/\/www.evidian.com\/products\/authentication-manager\/\" target=\"_blank\" rel=\"noopener\">Authentication Manager<\/a><\/h3>\n<p style=\"text-align: center;\">Unternehmensweite Multifaktor- und passwortfreie- Authentifizierung an Windows PCs<\/p>\n<h4 style=\"text-align: center;\"><a href=\"https:\/\/www.evidian.com\/products\/authentication-manager\/\" target=\"_blank\" rel=\"noopener\">Mehr erfahren\u00a0 \u00a0&gt;<\/a><\/h4>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89061-2-1\"  class=\"panel-grid-cell\" ><div id=\"panel-89061-2-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"6\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"sso\"><\/div>\n<h3 style=\"text-align: center; color: #00a397;\"><a href=\"https:\/\/www.evidian.com\/products\/enterprise-sso\/\" target=\"_blank\" rel=\"noopener\">Enterprise Single Sign-On (SSO)<\/a><\/h3>\n<p style=\"text-align: center;\">Sicherer Zugriff auf Legacy- und Web- Anwendungen auf PCs und mobilen Ger\u00e4ten mittels SSO<\/p>\n<h4 style=\"text-align: center;\"><a href=\"https:\/\/www.evidian.com\/products\/enterprise-sso\/\" target=\"_blank\" rel=\"noopener\">Mehr erfahren\u00a0 \u00a0&gt;<\/a><\/h4>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89061-2-2\"  class=\"panel-grid-cell\" ><div id=\"panel-89061-2-2-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"7\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"settings\"><\/div>\n<h3 style=\"text-align: center; color: #b88d00;\"><a href=\"https:\/\/www.evidian.com\/products\/self-service-password-reset-sspr-for-emergency-access\/\" target=\"_blank\" rel=\"noopener\">Self Service\u00a0Password Reset (SSPR)<\/a><\/h3>\n<p style=\"text-align: center;\">Zur\u00fccksetzen des Windows Passwortes Online und Offline<\/p>\n<h4 style=\"text-align: center;\"><a href=\"https:\/\/www.evidian.com\/products\/self-service-password-reset-sspr-for-emergency-access\/\" target=\"_blank\" rel=\"noopener\">Mehr erfahren\u00a0 \u00a0&gt;<\/a><\/h4>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-89061-2-3\"  class=\"panel-grid-cell\" ><div id=\"panel-89061-2-3-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"8\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"load-balancing\"><\/div>\n<h3 style=\"text-align: center; color: #a375ff;\"><a href=\"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/\" target=\"_blank\" rel=\"noopener\">SafeKit<\/a><\/h3>\n<p style=\"text-align: center;\">Hochverf\u00fcgbarkeitssoftware f\u00fcr kritische Anwendungen<\/p>\n<h4 style=\"text-align: center;\"><a href=\"https:\/\/www.evidian.com\/products\/high-availability-software-for-application-clustering\/\" target=\"_blank\" rel=\"noopener\">Mehr erfahren\u00a0 \u00a0&gt;<\/a><\/h4>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-89061-3\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-89061-3\" ><div id=\"pgc-89061-3-0\"  class=\"panel-grid-cell\" ><div id=\"panel-89061-3-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"9\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h4 style=\"text-align: center;\"><a href=\"https:\/\/eviden.com\/de-de\/loesungen\/digital-security\/\" target=\"_blank\" rel=\"noopener\">Erfahren Sie mehr \u00fcber Digital Security L\u00f6sungen &gt;<\/a><\/h4>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-90844-6\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-90844-6\" ><div id=\"pgc-90844-6-0\"  class=\"panel-grid-cell\" ><div id=\"panel-90844-6-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"7\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div data-post-id=\"88000\" class=\"insert-page insert-page-88000 \"><div id=\"pl-88000\"  class=\"panel-layout\" ><div id=\"pg-88000-0\"  class=\"panel-grid panel-has-style\" ><div class=\"product-title panel-row-style panel-row-style-for-88000-0\" ><div id=\"pgc-88000-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-88000-0-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-d4827573a77b-88000 so-widget-fittext-wrapper\"\n\t\t\t data-fit-text-compressor=\"1.5\"\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\tDokumente\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"decoration\">\n\t\t\t\t\t\t<div class=\"decoration-inside\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-0-1\" class=\"so-panel widget widget_sow-button\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-64053071d55b-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/documents\/flyers-iam-authentication-sso-web-sso-ha\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tBrosch\u00fcren &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-0-2\" class=\"so-panel widget widget_sow-button\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-64053071d55b-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/documents\/white-papers-iam-authentication-sso-web-sso-ha\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tWhite Paper &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-0-3\" class=\"so-panel widget widget_sow-button\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-64053071d55b-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/documents\/case-studies-iam-authentication-sso-web-sso-ha\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tFallstudien &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-0-4\" class=\"so-panel widget widget_sow-button\" data-index=\"4\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-64053071d55b-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/documents\/videos-iam-authentication-sso-web-sso\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tVideos &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-0-5\" class=\"so-panel widget widget_sow-button\" data-index=\"5\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-64053071d55b-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/documents\/tutorials\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tTutorials &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-0-6\" class=\"so-panel widget widget_sow-button panel-last-child\" data-index=\"6\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-18dcd7840989-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/documents\/white-papers-iam-authentication-sso-web-sso-ha\/#analysts\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tAnalysten &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-88000-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-88000-0-1-0\" class=\"so-panel widget widget_siteorigin-panels-builder panel-first-child\" data-index=\"7\" ><div id=\"pl-w6843031274ac3\"  class=\"panel-layout\" ><div id=\"pg-w6843031274ac3-0\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-w6843031274ac3-0\" ><div id=\"pgc-w6843031274ac3-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w6843031274ac3-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"video-container\"><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/ULOuwwAqsIM?cc_lang_pref=en&amp;cc_load_policy=1\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-w6843031274ac3-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-w6843031274ac3-0-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"video-container\"><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/znxPZIrTros?si=c5K6ezI0r_mGNTqG\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-w6843031274ac3-1\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-w6843031274ac3-1\" ><div id=\"pgc-w6843031274ac3-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w6843031274ac3-1-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"video-container\"><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/gCb34XsUe-8?cc_lang_pref=en&amp;cc_load_policy=1\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-w6843031274ac3-1-1\"  class=\"panel-grid-cell\" ><div id=\"panel-w6843031274ac3-1-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"video-container\"><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/Dx0viurJC4g\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"panel-88000-0-1-1\" class=\"so-panel widget widget_sow-button panel-last-child\" data-index=\"8\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-a4b98c5e5321-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/documents\/webinars-iam-sso-authentication-sspr-ha\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tWebinars &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-88000-0-2\"  class=\"panel-grid-cell\" ><div id=\"panel-88000-0-2-0\" class=\"so-panel widget widget_sow-headline panel-first-child\" data-index=\"9\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-eb0b4f3610f3-88000 so-widget-fittext-wrapper\"\n\t\t\t data-fit-text-compressor=\"1.5\"\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\tL\u00f6sungen\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"decoration\">\n\t\t\t\t\t\t<div class=\"decoration-inside\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-2-1\" class=\"so-panel widget widget_sow-button\" data-index=\"10\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-5814dc63a0e1-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/gesundheitswesen\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tGesundheitswesen &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-2-2\" class=\"so-panel widget widget_sow-button\" data-index=\"11\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-5814dc63a0e1-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/finanzen\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tFinanzinstitute &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-2-3\" class=\"so-panel widget widget_sow-button\" data-index=\"12\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-5814dc63a0e1-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/behorden\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tBeh\u00f6rden &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-2-4\" class=\"so-panel widget widget_sow-button\" data-index=\"13\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-5814dc63a0e1-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/industrie\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tIndustrie &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-2-5\" class=\"so-panel widget widget_sow-button\" data-index=\"14\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-5814dc63a0e1-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/telekommunication\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tTelekommunikation &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><div id=\"panel-88000-0-2-6\" class=\"so-panel widget widget_sow-button panel-last-child\" data-index=\"15\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-18dcd7840989-88000\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/solutions\/#app\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tAnwendungen &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-90844-7\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-90844-7\" ><div id=\"pgc-90844-7-0\"  class=\"panel-grid-cell\" ><div id=\"panel-90844-7-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"8\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div data-post-id=\"87965\" class=\"insert-page insert-page-87965 \"><div id=\"pl-87965\"  class=\"panel-layout\" ><div id=\"pg-87965-0\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-87965-0\" ><div id=\"pgc-87965-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-87965-0-0-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-87965\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/unternehmen\/kontakt-evidian\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tKontaktieren  &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-87965-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-87965-0-1-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-87965\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/www.evidian.com\/de\/unternehmen\/kostenlose-testversion\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tGratis-Testversion &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-87965-0-2\"  class=\"panel-grid-cell\" ><div id=\"panel-87965-0-2-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-87965\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/unternehmen\/demotermin-vereinbaren\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tDemotermin vereinbaren &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><div id=\"pgc-87965-0-3\"  class=\"panel-grid-cell\" ><div id=\"panel-87965-0-3-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-atom-22117c521b6b-87965\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"\/de\/unternehmen\/ein-angebot-anfordern\/\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tEin Angebot anfordern &gt;\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"Welche IAM-Cybersecurity-Tools und -L\u00f6sungen gibt es? 91 IAM-Anbieter wurden in Bezug auf Schutz Ihres Unternehmens vor Cyberangriffen durch nicht autorisierte Anwender bewertet","protected":false},"author":80,"featured_media":0,"parent":5617,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-full-screen.php","meta":{"_acf_changed":false,"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"class_list":["post-90844","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Welche IAM-Cybersecurity-Tools und -L\u00f6sungen gibt es? - Evidian<\/title>\n<meta name=\"description\" content=\"91 IAM-Anbieter wurden in Bezug auf Schutz Ihres Unternehmens vor Cyberangriffen durch nicht autorisierte Anwender bewertet.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.evidian.com\/de\/dokumente\/welche-iam-cybersecurity-tools-und-losungen\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Welche IAM-Cybersecurity-Tools und -L\u00f6sungen gibt es?\" \/>\n<meta property=\"og:description\" content=\"91 IAM-Anbieter wurden in Bezug auf Schutz Ihres Unternehmens vor Cyberangriffen durch nicht autorisierte Anwender bewertet.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.evidian.com\/de\/dokumente\/welche-iam-cybersecurity-tools-und-losungen\/\" \/>\n<meta property=\"og:site_name\" content=\"Evidian\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-09T07:49:40+00:00\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/dokumente\\\/welche-iam-cybersecurity-tools-und-losungen\\\/\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/dokumente\\\/welche-iam-cybersecurity-tools-und-losungen\\\/\",\"name\":\"Welche IAM-Cybersecurity-Tools und -L\u00f6sungen gibt es? - Evidian\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/#website\"},\"datePublished\":\"2022-11-14T09:34:23+00:00\",\"dateModified\":\"2023-04-09T07:49:40+00:00\",\"description\":\"91 IAM-Anbieter wurden in Bezug auf Schutz Ihres Unternehmens vor Cyberangriffen durch nicht autorisierte Anwender bewertet.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/dokumente\\\/welche-iam-cybersecurity-tools-und-losungen\\\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.evidian.com\\\/de\\\/dokumente\\\/welche-iam-cybersecurity-tools-und-losungen\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/dokumente\\\/welche-iam-cybersecurity-tools-und-losungen\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Evidian\",\"item\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dokumente\",\"item\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/documents\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Welche IAM-Cybersecurity-Tools und -L\u00f6sungen gibt es?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/\",\"name\":\"Evidian\",\"description\":\"Set in menu above: SEO\\\/SEO Settings\\\/Title &amp; Metas\\\/Home\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/#organization\",\"name\":\"Evidian\",\"alternateName\":\"Evidian\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.evidian.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/evidian-new-blue-1.png\",\"contentUrl\":\"https:\\\/\\\/www.evidian.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/evidian-new-blue-1.png\",\"width\":734,\"height\":200,\"caption\":\"Evidian\"},\"image\":{\"@id\":\"https:\\\/\\\/www.evidian.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/eviden-cybersecurity\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCJKPuw2SDVNYUjZEJyLbIAA\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Welche IAM-Cybersecurity-Tools und -L\u00f6sungen gibt es? - Evidian","description":"91 IAM-Anbieter wurden in Bezug auf Schutz Ihres Unternehmens vor Cyberangriffen durch nicht autorisierte Anwender bewertet.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.evidian.com\/de\/dokumente\/welche-iam-cybersecurity-tools-und-losungen\/","og_locale":"de_DE","og_type":"article","og_title":"Welche IAM-Cybersecurity-Tools und -L\u00f6sungen gibt es?","og_description":"91 IAM-Anbieter wurden in Bezug auf Schutz Ihres Unternehmens vor Cyberangriffen durch nicht autorisierte Anwender bewertet.","og_url":"https:\/\/www.evidian.com\/de\/dokumente\/welche-iam-cybersecurity-tools-und-losungen\/","og_site_name":"Evidian","article_modified_time":"2023-04-09T07:49:40+00:00","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.evidian.com\/de\/dokumente\/welche-iam-cybersecurity-tools-und-losungen\/","url":"https:\/\/www.evidian.com\/de\/dokumente\/welche-iam-cybersecurity-tools-und-losungen\/","name":"Welche IAM-Cybersecurity-Tools und -L\u00f6sungen gibt es? - Evidian","isPartOf":{"@id":"https:\/\/www.evidian.com\/de\/#website"},"datePublished":"2022-11-14T09:34:23+00:00","dateModified":"2023-04-09T07:49:40+00:00","description":"91 IAM-Anbieter wurden in Bezug auf Schutz Ihres Unternehmens vor Cyberangriffen durch nicht autorisierte Anwender bewertet.","breadcrumb":{"@id":"https:\/\/www.evidian.com\/de\/dokumente\/welche-iam-cybersecurity-tools-und-losungen\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.evidian.com\/de\/dokumente\/welche-iam-cybersecurity-tools-und-losungen\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.evidian.com\/de\/dokumente\/welche-iam-cybersecurity-tools-und-losungen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Evidian","item":"https:\/\/www.evidian.com\/de\/"},{"@type":"ListItem","position":2,"name":"Dokumente","item":"https:\/\/www.evidian.com\/de\/documents\/"},{"@type":"ListItem","position":3,"name":"Welche IAM-Cybersecurity-Tools und -L\u00f6sungen gibt es?"}]},{"@type":"WebSite","@id":"https:\/\/www.evidian.com\/de\/#website","url":"https:\/\/www.evidian.com\/de\/","name":"Evidian","description":"Set in menu above: SEO\/SEO Settings\/Title &amp; Metas\/Home","publisher":{"@id":"https:\/\/www.evidian.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.evidian.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.evidian.com\/de\/#organization","name":"Evidian","alternateName":"Evidian","url":"https:\/\/www.evidian.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.evidian.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.evidian.com\/wp-content\/uploads\/2024\/01\/evidian-new-blue-1.png","contentUrl":"https:\/\/www.evidian.com\/wp-content\/uploads\/2024\/01\/evidian-new-blue-1.png","width":734,"height":200,"caption":"Evidian"},"image":{"@id":"https:\/\/www.evidian.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/showcase\/eviden-cybersecurity\/","https:\/\/www.youtube.com\/channel\/UCJKPuw2SDVNYUjZEJyLbIAA"]}]}},"_links":{"self":[{"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/pages\/90844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/users\/80"}],"replies":[{"embeddable":true,"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/comments?post=90844"}],"version-history":[{"count":0,"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/pages\/90844\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/pages\/5617"}],"wp:attachment":[{"href":"https:\/\/www.evidian.com\/de\/wp-json\/wp\/v2\/media?parent=90844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}