{"id":2101,"date":"2021-10-28T16:44:06","date_gmt":"2021-10-28T23:44:06","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2101"},"modified":"2023-11-07T16:37:09","modified_gmt":"2023-11-07T21:37:09","slug":"zero-trust-recommendations","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/de\/resources\/blog\/zero-trust\/zero-trust-recommendations\/","title":{"rendered":"Empfehlungen f\u00fcr Zero Trust"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>In Woche 4 des Cybersecurity Awareness Month konzentrieren wir uns darauf, Cybersicherheit an erste Stelle zu setzen \u2013 ein Thema, das in Zeiten hybrider Arbeitspl\u00e4tze und einer zunehmenden Verbreitung von Ger\u00e4ten noch mehr an Bedeutung gewinnt. Zero Trust ist ein pragmatischer Ansatz zur Authentifizierung, Autorisierung und Validierung aller Benutzer innerhalb und au\u00dferhalb Ihres Netzwerks. Erfahren Sie, wie SecurID Ihren Zero-Trust-Ansatz f\u00fcr Cybersicherheit unterst\u00fctzt.<\/p>","protected":false},"author":2,"featured_media":2102,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[63],"tags":[],"class_list":["post-2101","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zero-trust"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Recommendations for Zero Trust - RSA<\/title>\n<meta name=\"description\" content=\"Learn how SecurID empowers your zero-trust approach to cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/de\/resources\/blog\/zero-trust\/zero-trust-recommendations\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Recommendations for Zero Trust\" \/>\n<meta property=\"og:description\" content=\"Learn how SecurID empowers your zero-trust approach to cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/de\/resources\/blog\/zero-trust\/zero-trust-recommendations\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-28T23:44:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T21:37:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Melinda O&#039;Connor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Recommendations for Zero Trust\" \/>\n<meta name=\"twitter:description\" content=\"Learn how SecurID empowers your zero-trust approach to cybersecurity.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/\"},\"author\":{\"name\":\"Melinda O'Connor\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\"},\"headline\":\"Recommendations for Zero Trust\",\"datePublished\":\"2021-10-28T23:44:06+00:00\",\"dateModified\":\"2023-11-07T21:37:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/\"},\"wordCount\":4,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Zero-Trust-Cybersecurity.jpg\",\"articleSection\":[\"Zero Trust\"],\"inLanguage\":\"de-DE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/\",\"name\":\"Recommendations for Zero Trust - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Zero-Trust-Cybersecurity.jpg\",\"datePublished\":\"2021-10-28T23:44:06+00:00\",\"dateModified\":\"2023-11-07T21:37:09+00:00\",\"description\":\"Learn how SecurID empowers your zero-trust approach to cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Zero-Trust-Cybersecurity.jpg\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Zero-Trust-Cybersecurity.jpg\",\"width\":950,\"height\":497},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Recommendations for Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\",\"name\":\"Melinda O'Connor\",\"sameAs\":[\"http:\\\/\\\/logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Empfehlungen f\u00fcr Zero Trust - RSA","description":"Erfahren Sie, wie SecurID Ihren Zero-Trust-Ansatz f\u00fcr Cybersicherheit unterst\u00fctzt.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/de\/resources\/blog\/zero-trust\/zero-trust-recommendations\/","og_locale":"de_DE","og_type":"article","og_title":"Recommendations for Zero Trust","og_description":"Learn how SecurID empowers your zero-trust approach to cybersecurity.","og_url":"https:\/\/www.rsa.com\/de\/resources\/blog\/zero-trust\/zero-trust-recommendations\/","og_site_name":"RSA","article_published_time":"2021-10-28T23:44:06+00:00","article_modified_time":"2023-11-07T21:37:09+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Melinda O'Connor","twitter_card":"summary_large_image","twitter_title":"Recommendations for Zero Trust","twitter_description":"Learn how SecurID empowers your zero-trust approach to cybersecurity.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/"},"author":{"name":"Melinda O'Connor","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0"},"headline":"Recommendations for Zero Trust","datePublished":"2021-10-28T23:44:06+00:00","dateModified":"2023-11-07T21:37:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/"},"wordCount":4,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Zero-Trust-Cybersecurity.jpg","articleSection":["Zero Trust"],"inLanguage":"de-DE"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/","url":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/","name":"Empfehlungen f\u00fcr Zero Trust - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Zero-Trust-Cybersecurity.jpg","datePublished":"2021-10-28T23:44:06+00:00","dateModified":"2023-11-07T21:37:09+00:00","description":"Erfahren Sie, wie SecurID Ihren Zero-Trust-Ansatz f\u00fcr Cybersicherheit unterst\u00fctzt.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/Zero-Trust-Cybersecurity.jpg","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Zero-Trust-Cybersecurity.jpg","width":950,"height":497},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"Recommendations for Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"L\u00f6sungen f\u00fcr Cybersecurity und digitales Risikomanagement","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0","name":"Melinda O'Connor","sameAs":["http:\/\/logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/posts\/2101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/comments?post=2101"}],"version-history":[{"count":7,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/posts\/2101\/revisions"}],"predecessor-version":[{"id":27157,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/posts\/2101\/revisions\/27157"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/media\/2102"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/media?parent=2101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/categories?post=2101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/tags?post=2101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}