{"id":20867,"date":"2022-04-08T11:51:00","date_gmt":"2022-04-08T09:51:00","guid":{"rendered":"https:\/\/www.sysbus.eu\/?p=20867"},"modified":"2022-04-04T10:57:44","modified_gmt":"2022-04-04T08:57:44","slug":"remote-access-sicherheit","status":"publish","type":"post","link":"https:\/\/www.sysbus.eu\/?p=20867","title":{"rendered":"Remote-Access-Sicherheit"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.sysbus.eu\/wp-content\/uploads\/2022\/04\/Sysbus-Trend_Mohamed-Ibbich-BeyondTrust.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"546\" src=\"https:\/\/www.sysbus.eu\/wp-content\/uploads\/2022\/04\/Sysbus-Trend_Mohamed-Ibbich-BeyondTrust-1024x546.jpg\" alt=\"\" class=\"wp-image-20868\" srcset=\"https:\/\/www.sysbus.eu\/wp-content\/uploads\/2022\/04\/Sysbus-Trend_Mohamed-Ibbich-BeyondTrust-1024x546.jpg 1024w, https:\/\/www.sysbus.eu\/wp-content\/uploads\/2022\/04\/Sysbus-Trend_Mohamed-Ibbich-BeyondTrust-300x160.jpg 300w, https:\/\/www.sysbus.eu\/wp-content\/uploads\/2022\/04\/Sysbus-Trend_Mohamed-Ibbich-BeyondTrust-768x409.jpg 768w, https:\/\/www.sysbus.eu\/wp-content\/uploads\/2022\/04\/Sysbus-Trend_Mohamed-Ibbich-BeyondTrust.jpg 1266w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption>Bild: Sysbus\/BeyondTrust<\/figcaption><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.beyondtrust.com\/de\/\">Mohamed Ibbich, Director Solutions Engineering bei BeyondTrust<\/a>: &#8222;In verteilten New-Work-Umgebungen gen\u00fcgen klassische Perimeterschutzkonzepte nicht mehr. Aus IT-Sicht m\u00fcssen alle Zugriffsanforderungen als potenziell gef\u00e4hrlich behandelt werden, da Hacker ganz gezielt externe Mitarbeiter angreifen und digitale Identit\u00e4ten samt Zugriffsrechten rauben. F\u00fcr den sicheren Zugriff auf Remote-Systeme bieten Zero Trust-Strategien einen besseren Schutz, da sie jeden Schritt nach Sicherheitskriterien \u00fcberpr\u00fcfen, Sitzungen \u00fcberwachen und protokollierte Daten zur Auswertung bereitstellen.&#8220;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mohamed Ibbich, Director Solutions Engineering bei BeyondTrust: &#8222;In verteilten New-Work-Umgebungen gen\u00fcgen klassische Perimeterschutzkonzepte nicht mehr. Aus IT-Sicht m\u00fcssen alle Zugriffsanforderungen als potenziell gef\u00e4hrlich behandelt werden, da Hacker ganz gezielt externe Mitarbeiter angreifen und digitale Identit\u00e4ten samt Zugriffsrechten rauben. F\u00fcr den sicheren Zugriff auf Remote-Systeme bieten Zero Trust-Strategien einen besseren Schutz, da sie jeden Schritt nach Sicherheitskriterien \u00fcberpr\u00fcfen, Sitzungen \u00fcberwachen und protokollierte Daten zur Auswertung bereitstellen.&#8220;<\/p>\n","protected":false},"author":3,"featured_media":20868,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10751,8931],"tags":[12411,14544,16338,16339,4873],"class_list":["post-20867","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-advertorials","category-trends","tag-beyondtrust","tag-mohamed-ibbich","tag-new-work-2","tag-perimeterschutz","tag-zero-trust"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.sysbus.eu\/index.php?rest_route=\/wp\/v2\/posts\/20867","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sysbus.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sysbus.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sysbus.eu\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sysbus.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=20867"}],"version-history":[{"count":1,"href":"https:\/\/www.sysbus.eu\/index.php?rest_route=\/wp\/v2\/posts\/20867\/revisions"}],"predecessor-version":[{"id":20869,"href":"https:\/\/www.sysbus.eu\/index.php?rest_route=\/wp\/v2\/posts\/20867\/revisions\/20869"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sysbus.eu\/index.php?rest_route=\/wp\/v2\/media\/20868"}],"wp:attachment":[{"href":"https:\/\/www.sysbus.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=20867"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sysbus.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=20867"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sysbus.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=20867"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}