{"id":2209,"date":"2021-04-13T12:06:58","date_gmt":"2021-04-13T19:06:58","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2209"},"modified":"2023-11-07T17:28:40","modified_gmt":"2023-11-07T22:28:40","slug":"identity-the-bedrock-for-all-security","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/","title":{"rendered":"Identit\u00e4t - der Grundstein f\u00fcr jede Sicherheit"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Identit\u00e4t ist die Kontrollebene f\u00fcr die sichere Verbindung von Benutzern und Daten. Aber es ist schwieriger denn je, Identit\u00e4t \u2018richtig\u2019 zu handhaben. Nehmen Sie am 15. April 2021 am Webinar von SecurID teil, um von Identit\u00e4tsexperten zu erfahren, wie Identit\u00e4t die Sicherheit und Ausfallsicherheit Ihres Betriebs verbessern kann.<\/p>","protected":false},"author":2,"featured_media":2210,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[61],"tags":[],"class_list":["post-2209","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-multi-factor-authentication"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identity \u2013 the Bedrock for All Security - RSA<\/title>\n<meta name=\"description\" content=\"Learn why identity is the ideal control plane for securing users and data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity \u2013 the Bedrock for All Security\" \/>\n<meta property=\"og:description\" content=\"Learn why identity is the ideal control plane for securing users and data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-13T19:06:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T22:28:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Melinda O&#039;Connor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Identity \u2013 the Bedrock for All Security\" \/>\n<meta name=\"twitter:description\" content=\"Learn why identity is the ideal control plane for securing users and data.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/\"},\"author\":{\"name\":\"Melinda O'Connor\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\"},\"headline\":\"Identity \u2013 the Bedrock for All Security\",\"datePublished\":\"2021-04-13T19:06:58+00:00\",\"dateModified\":\"2023-11-07T22:28:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/\"},\"wordCount\":6,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/blog-identity-the-bedrock-for-all-security.jpg\",\"articleSection\":[\"Multi-Factor Authentication\"],\"inLanguage\":\"de-DE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/\",\"name\":\"Identity \u2013 the Bedrock for All Security - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/blog-identity-the-bedrock-for-all-security.jpg\",\"datePublished\":\"2021-04-13T19:06:58+00:00\",\"dateModified\":\"2023-11-07T22:28:40+00:00\",\"description\":\"Learn why identity is the ideal control plane for securing users and data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/blog-identity-the-bedrock-for-all-security.jpg\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/blog-identity-the-bedrock-for-all-security.jpg\",\"width\":946,\"height\":526},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identity \u2013 the Bedrock for All Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\",\"name\":\"Melinda O'Connor\",\"sameAs\":[\"http:\\\/\\\/logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identit\u00e4t - die Grundlage f\u00fcr jede Sicherheit - RSA","description":"Erfahren Sie, warum Identit\u00e4t die ideale Kontrollebene zur Sicherung von Benutzern und Daten ist.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/","og_locale":"de_DE","og_type":"article","og_title":"Identity \u2013 the Bedrock for All Security","og_description":"Learn why identity is the ideal control plane for securing users and data.","og_url":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/","og_site_name":"RSA","article_published_time":"2021-04-13T19:06:58+00:00","article_modified_time":"2023-11-07T22:28:40+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Melinda O'Connor","twitter_card":"summary_large_image","twitter_title":"Identity \u2013 the Bedrock for All Security","twitter_description":"Learn why identity is the ideal control plane for securing users and data.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/"},"author":{"name":"Melinda O'Connor","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0"},"headline":"Identity \u2013 the Bedrock for All Security","datePublished":"2021-04-13T19:06:58+00:00","dateModified":"2023-11-07T22:28:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/"},"wordCount":6,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/blog-identity-the-bedrock-for-all-security.jpg","articleSection":["Multi-Factor Authentication"],"inLanguage":"de-DE"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/","url":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/","name":"Identit\u00e4t - die Grundlage f\u00fcr jede Sicherheit - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/blog-identity-the-bedrock-for-all-security.jpg","datePublished":"2021-04-13T19:06:58+00:00","dateModified":"2023-11-07T22:28:40+00:00","description":"Erfahren Sie, warum Identit\u00e4t die ideale Kontrollebene zur Sicherung von Benutzern und Daten ist.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/blog-identity-the-bedrock-for-all-security.jpg","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/blog-identity-the-bedrock-for-all-security.jpg","width":946,"height":526},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"Identity \u2013 the Bedrock for All Security"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"L\u00f6sungen f\u00fcr Cybersecurity und digitales Risikomanagement","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0","name":"Melinda O'Connor","sameAs":["http:\/\/logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/posts\/2209","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/comments?post=2209"}],"version-history":[{"count":4,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/posts\/2209\/revisions"}],"predecessor-version":[{"id":27167,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/posts\/2209\/revisions\/27167"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/media\/2210"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/media?parent=2209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/categories?post=2209"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/tags?post=2209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}