{"id":10522,"date":"2015-04-26T13:30:07","date_gmt":"2015-04-26T13:30:07","guid":{"rendered":"https:\/\/dev.kogit.de\/home-2\/"},"modified":"2025-09-04T00:44:02","modified_gmt":"2025-09-03T22:44:02","slug":"home","status":"publish","type":"page","link":"https:\/\/www.kogit.de\/en\/home\/","title":{"rendered":"Home"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row top=&#8221;80px&#8221; bottom=&#8221;&#8221; bg_color=&#8221;#ffffff&#8221;][vc_column][rev_slider_vc alias=&#8221;home_en&#8221;][\/vc_column][\/vc_row][vc_row top=&#8221;5px&#8221; bottom=&#8221;5px&#8221; bg_color=&#8221;#ffffff&#8221;][vc_column][vc_heading h_size=&#8221;h-large&#8221; title=&#8221;IAM consulting and services at the highest level&#8221; title_tag=&#8221;h1&#8243; title_color=&#8221;#3e4b58&#8243; subtitle_tag=&#8221;h1&#8243; subtitle_color=&#8221;#3e4b58&#8243; css_animation=&#8221;bottom-to-top&#8221;][\/vc_column][\/vc_row][vc_row top=&#8221;5px&#8221; bottom=&#8221;10px&#8221; bg_color=&#8221;#ffffff&#8221;][vc_column][vc_row_inner top=&#8221;30px&#8221; bottom=&#8221;30px&#8221; bg_color=&#8221;#ffffff&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_service icon_fontawesome=&#8221;fa fa-users&#8221; title=&#8221;Identity Management&#8221; title_tag=&#8221;h6&#8243; icon_position=&#8221;sb_center&#8221; icon_name=&#8221;li_params&#8221; target=&#8221;_self&#8221; icon_color=&#8221;#94c11c&#8221; position=&#8221;sb_right&#8221; heading_color=&#8221;#4a4a4a&#8221; descr_color=&#8221;#4a4a4a&#8221; link=&#8221;url:https%3A%2F%2Fwww.kogit.de%2Fen%2Fservices%2Fidentity-master-data-management%2F|||&#8221;]The efficient management of digital identities is a central element in any IT security architecture. KOGIT advises customers with high competence in all questions concerning Identity Management (IdM) as well as in the selection and implementation of the right software.[\/vc_service][vc_empty_space height=&#8221;20px&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_service icon_fontawesome=&#8221;fa fa-lock&#8221; title=&#8221;Access Management&#8221; title_tag=&#8221;h6&#8243; icon_position=&#8221;sb_center&#8221; icon_name=&#8221;icon-pencil&#8221; target=&#8221;_self&#8221; position=&#8221;sb_right&#8221; href=&#8221;#&#8221; icon_color=&#8221;#94c11c&#8221; heading_color=&#8221;#4a4a4a&#8221; link=&#8221;url:https%3A%2F%2Fwww.kogit.de%2Fen%2Fservices%2Faccess-management%2F|||&#8221;]Access Management, as one of the main components of IAM (Identity &amp; Access Management), describes the process that assigns authorized users the rights to use a service and thus prevents unauthorized access at the same time.[\/vc_service][vc_empty_space height=&#8221;20px&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_service icon_fontawesome=&#8221;fas fa-balance-scale&#8221; title=&#8221;Compliance&#8221; title_tag=&#8221;h6&#8243; icon_position=&#8221;sb_center&#8221; icon_name=&#8221;li_news&#8221; target=&#8221;_self&#8221; icon_color=&#8221;#94c11c&#8221; position=&#8221;sb_right&#8221; heading_color=&#8221;#4a4a4a&#8221; descr_color=&#8221;#4a4a4a&#8221; link=&#8221;url:https%3A%2F%2Fwww.kogit.de%2Fen%2Fservices%2Faccess-compliance%2F|||&#8221;]The correct handling of authorizations within the framework of IAM is a complex and risky task. KOGIT supports its customers in implementing legally compliant and automated access compliance processes.[\/vc_service][vc_empty_space height=&#8221;20px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner top=&#8221;10px&#8221; bottom=&#8221;40px&#8221; bg_color=&#8221;#ffffff&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_service type=&#8221;entypo&#8221; icon_entypo=&#8221;entypo-icon entypo-icon-flow-tree&#8221; title=&#8221;Privileged Access Management&#8221; title_tag=&#8221;h6&#8243; icon_position=&#8221;sb_center&#8221; css_animation=&#8221;appear&#8221; css_animation_delay=&#8221;delay-200&#8243; icon_name=&#8221;icon-crop&#8221; target=&#8221;_self&#8221; icon_color=&#8221;#94c11c&#8221; heading_color=&#8221;#4a4a4a&#8221; descr_color=&#8221;#4a4a4a&#8221; link=&#8221;url:https%3A%2F%2Fwww.kogit.de%2Fen%2Fservices%2Fprivileged-access-management%2F|||&#8221;]The main cause of most modern cyber attacks is the misuse of privileged user accounts. KOGIT provides excellent know-how for the proactive protection of privileged accounts and access rights against external and internal attacks through efficient Privileged Account Security.[\/vc_service][vc_empty_space height=&#8221;10px&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_service icon_fontawesome=&#8221;fas fa-shield-alt&#8221; title=&#8221;SIEM&#8221; title_tag=&#8221;h6&#8243; icon_position=&#8221;sb_center&#8221; css_animation=&#8221;appear&#8221; css_animation_delay=&#8221;delay-200&#8243; icon_name=&#8221;icon-reload&#8221; target=&#8221;_self&#8221; icon_color=&#8221;#94c11c&#8221; heading_color=&#8221;#4a4a4a&#8221; descr_color=&#8221;#4a4a4a&#8221; link=&#8221;url:https%3A%2F%2Fwww.kogit.de%2Fen%2Fservices%2Fsecurity-information-event-management%2F|title:Security%20Information%20%26%20Event%20Management&#8221;]SIEM solutions primarily collect and analyse data from various security events, data from other IT events and information for further contextual evaluation. KOGIT supports companies in detecting threats at an early stage.[\/vc_service][vc_empty_space height=&#8221;10px&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_service icon_fontawesome=&#8221;fas fa-braille&#8221; title=&#8221;Advanced Analytics&#8221; title_tag=&#8221;h6&#8243; icon_position=&#8221;sb_center&#8221; css_animation=&#8221;appear&#8221; css_animation_delay=&#8221;delay-400&#8243; icon_name=&#8221;icon-speech&#8221; target=&#8221;_self&#8221; icon_color=&#8221;#94c11c&#8221; heading_color=&#8221;#4a4a4a&#8221; descr_color=&#8221;#4a4a4a&#8221; link=&#8221;url:https%3A%2F%2Fwww.kogit.de%2Fen%2Fservices%2Fadvanced-analytics%2F&#8221;]With predictive Identity and Advanced Analytics and Machine Learning, companies can bring high levels of transparency, efficiency and flexibility to their access governance. Thanks to KOGIT&#8217;s excellent support, customers derive maximum benefit from this investment.[\/vc_service][vc_empty_space height=&#8221;10px&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row top=&#8221;0px&#8221; bottom=&#8221;20px&#8221; bg_color=&#8221;#ffffff&#8221;][vc_column][vc_heading h_size=&#8221;h-large&#8221; title_color=&#8221;#3e4b58&#8243; subtitle=&#8221;A company with identity&#8221; subtitle_tag=&#8221;h2&#8243; subtitle_color=&#8221;#3e4b58&#8243; divider=&#8221;div-between&#8221; divider_color=&#8221;#eb8b2d&#8221; css_animation=&#8221;bottom-to-top&#8221;][\/vc_column][\/vc_row][vc_row full_content_width=&#8221;row-inner-full&#8221; top=&#8221;0&#8243; bottom=&#8221;0&#8243; row_separator=&#8221;row-line-separator&#8221; bg_type=&#8221;image&#8221; bg_cover=&#8221;cover&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_position=&#8221;&#8221; bg_color=&#8221;#ffffff&#8221; bg_image=&#8221;9043&#8243;][vc_column width=&#8221;1\/2&#8243;][\/vc_column][vc_column slope_left=&#8221;slope-left&#8221; slope_left_dir=&#8221;slope-left-bottom&#8221; width=&#8221;1\/2&#8243; css_animation=&#8221;right-to-left&#8221; css=&#8221;.vc_custom_1504874879117{padding-top: 60px !important;padding-right: 80px !important;padding-bottom: 60px !important;padding-left: 60px !important;background-color: #fc9a07 !important;}&#8221; slope_left_color=&#8221;#f39100&#8243; el_class=&#8221;verlauf-orange&#8221;][vc_heading title=&#8221;Our values&#8221; subtitle=&#8221;Independent and loyal&#8221; alignment=&#8221;align-left&#8221;][vc_empty_space height=&#8221;10px&#8221;][vc_column_text]We are an owner-managed, independent consulting firm. This makes us innovative, fast and flexible. We advise independent of products and manufacturers. This enables us to present our customers with the best solutions and relevant, forward-looking innovations.<\/p>\n<p>Our values are our employees and customers, to whom we feel particularly committed. Our corporate culture is characterized by responsibility and teamwork. The commitment of each individual, the market and industry knowledge as well as in-depth IT expertise are our capital and the benefit for our customers.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_button title=&#8221;About KOGIT&#8221; type=&#8221;fontawesome&#8221; icon_fontawesome=&#8221;fa fa-long-arrow-right&#8221; button_style=&#8221;minimal_style&#8221; color=&#8221;btn_black&#8221; link=&#8221;url:https%3A%2F%2Fwww.kogit.de%2Fen%2Fcompany%2F|||&#8221;][\/vc_column][\/vc_row][vc_row top=&#8221;40px&#8221; bottom=&#8221;30px&#8221; bg_color=&#8221;#ffffff&#8221;][vc_column][vc_heading h_size=&#8221;h-large&#8221; title_color=&#8221;#3e4b58&#8243; subtitle=&#8221;Customers&#8221; subtitle_tag=&#8221;h2&#8243; subtitle_color=&#8221;#3e4b58&#8243; divider=&#8221;div-between&#8221; divider_color=&#8221;#eb8b2d&#8221; css_animation=&#8221;bottom-to-top&#8221;][\/vc_column][\/vc_row][vc_row top=&#8221;20px&#8221; bottom=&#8221;20px&#8221; bg_color=&#8221;#e9e9e9&#8243;][vc_column][vc_carousel images=&#8221;6194,6232,9907,6230,9903,6197,6228,6227,6215,6224,9906,6212,6223,6222,6219,6218,6217,6210,6216,6231,6221,6229,6213,6211,6209,6208,6196,6195,8593,9905&#8243; items_row=&#8221;4&#8243; responsive=&#8221;true&#8221; items_tablet=&#8221;3&#8243; items_mobile=&#8221;2&#8243; custom_height=&#8221;150px&#8221; autoplay=&#8221;2000&#8243; pagination=&#8221;true&#8221; navigation_hide=&#8221;nav-hide&#8221; color=&#8221;carousel-dark&#8221; space=&#8221;100&#8243; img_link=&#8221;page_link&#8221; el_class=&#8221;kundenrefs&#8221; link=&#8221;\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/,\/en\/customers\/&#8221;][\/vc_column][\/vc_row][vc_row top=&#8221;40px&#8221; bottom=&#8221;10px&#8221; bg_color=&#8221;#ffffff&#8221;][vc_column][vc_heading h_size=&#8221;h-large&#8221; title_color=&#8221;#3e4b58&#8243; subtitle=&#8221;Strategic Partners&#8221; subtitle_tag=&#8221;h2&#8243; subtitle_color=&#8221;#3e4b58&#8243; divider=&#8221;div-between&#8221; divider_color=&#8221;#eb8b2d&#8221; css_animation=&#8221;bottom-to-top&#8221;][\/vc_column][\/vc_row][vc_row top=&#8221;20px&#8221; bg_color=&#8221;#ffffff&#8221;][vc_column][vc_row_inner top=&#8221;0&#8243; bottom=&#8221;0&#8243; bg_color=&#8221;#ffffff&#8221;][vc_column_inner width=&#8221;1\/4&#8243;][vc_image_box image=&#8221;12751&#8243; add_link=&#8221;link&#8221; link_image=&#8221;true&#8221; link_heading=&#8221;true&#8221; text=&#8221;The next generation Identity &amp; Access Management technology.&#8221; link=&#8221;url:https%3A%2F%2Fwww.kogit.de%2Fen%2Fsolutions%2Fsailpoint%2F|title:Mehr%20erfahren||&#8221; heading_color=&#8221;#4a4a4a&#8221; text_color=&#8221;#4a4a4a&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_image_box image=&#8221;12747&#8243; add_link=&#8221;link&#8221; link_image=&#8221;true&#8221; link_heading=&#8221;true&#8221; text=&#8221;Audit-compliant and efficient Identity &amp; Access Management.&#8221; link=&#8221;url:https%3A%2F%2Fwww.kogit.de%2Fen%2Fsolutions%2Fsap-identity-management%2F|title:Mehr%20erfahren||&#8221; heading_color=&#8221;#4a4a4a&#8221; text_color=&#8221;#4a4a4a&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_image_box image=&#8221;12802&#8243; add_link=&#8221;link&#8221; link_image=&#8221;true&#8221; link_heading=&#8221;true&#8221; text=&#8221;Future-proof and innovative Identity &amp; Access Management.&#8221; link=&#8221;url:https%3A%2F%2Fwww.kogit.de%2Fen%2Fsolutions%2Fnexis-controle%2F|title:Mehr%20erfahren&#8221; heading_color=&#8221;#4a4a4a&#8221; text_color=&#8221;#4a4a4a&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_image_box image=&#8221;12755&#8243; add_link=&#8221;link&#8221; link_image=&#8221;true&#8221; link_heading=&#8221;true&#8221; text=&#8221;midPoint: Open Source for Identinty Management and Governance.&#8221; link=&#8221;url:https%3A%2F%2Fwww.kogit.de%2Floesungen%2Fevolveum%2F|title:Mehr%20erfahren||&#8221; heading_color=&#8221;#4a4a4a&#8221; text_color=&#8221;#4a4a4a&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner top=&#8221;0px&#8221; bottom=&#8221;0&#8243; bg_color=&#8221;#ffffff&#8221;][vc_column_inner width=&#8221;1\/4&#8243;][vc_image_box image=&#8221;12849&#8243; add_link=&#8221;link&#8221; link_image=&#8221;true&#8221; link_heading=&#8221;true&#8221; text=&#8221;SIEM for end-to-end data collection, analysis and response.&#8221; link=&#8221;url:https%3A%2F%2Fwww.kogit.de%2Fen%2Fsolutions%2Fexabeam%2F|title:Mehr%20erfahren&#8221; heading_color=&#8221;#4a4a4a&#8221; text_color=&#8221;#4a4a4a&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_image_box image=&#8221;12760&#8243; add_link=&#8221;link&#8221; link_image=&#8221;true&#8221; link_heading=&#8221;true&#8221; text=&#8221;With privileged access management against internal and external IT threats.&#8221; link=&#8221;url:https%3A%2F%2Fwww.kogit.de%2Fen%2Fsolutions%2Fbeyondtrust%2F|title:Mehr%20erfahren||&#8221; heading_color=&#8221;#4a4a4a&#8221; text_color=&#8221;#4a4a4a&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_image_box image=&#8221;12753&#8243; add_link=&#8221;link&#8221; link_image=&#8221;true&#8221; link_heading=&#8221;true&#8221; text=&#8221;Targeted security solutions for privileged access management.&#8221; link=&#8221;url:https%3A%2F%2Fwww.kogit.de%2Fen%2Fsolutions%2Fcyberark%2F|title:Mehr%20erfahren||&#8221; heading_color=&#8221;#4a4a4a&#8221; text_color=&#8221;#4a4a4a&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_image_box image=&#8221;12741&#8243; add_link=&#8221;link&#8221; link_image=&#8221;true&#8221; link_heading=&#8221;true&#8221; text=&#8221;Security, agility and visibility with single-sign-on and identity management.&#8221; link=&#8221;url:https%3A%2F%2Fwww.kogit.de%2Fen%2Fsolutions%2Fokta-2%2F|title:Mehr%20erfahren||&#8221; heading_color=&#8221;#4a4a4a&#8221; text_color=&#8221;#4a4a4a&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner top=&#8221;0&#8243; bottom=&#8221;0&#8243; bg_color=&#8221;#ffffff&#8221;][vc_column_inner width=&#8221;1\/4&#8243;][vc_image_box image=&#8221;12828&#8243; add_link=&#8221;link&#8221; link_image=&#8221;true&#8221; link_heading=&#8221;true&#8221; text=&#8221;Security, agility and visibility with single sign-on and access management.&#8221; link=&#8221;url:https%3A%2F%2Fwww.kogit.de%2Fen%2Fsolutions%2Fping-identity%2F|title:Mehr%20erfahren&#8221; heading_color=&#8221;#4a4a4a&#8221; text_color=&#8221;#4a4a4a&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row top=&#8221;0px&#8221;][vc_column][vc_raw_js][\/vc_raw_js][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row top=&#8221;80px&#8221; bottom=&#8221;&#8221; bg_color=&#8221;#ffffff&#8221;][vc_column][rev_slider_vc alias=&#8221;home_en&#8221;][\/vc_column][\/vc_row][vc_row top=&#8221;5px&#8221; bottom=&#8221;5px&#8221; bg_color=&#8221;#ffffff&#8221;][vc_column][vc_heading h_size=&#8221;h-large&#8221; title=&#8221;IAM consulting and services at the highest level&#8221; title_tag=&#8221;h1&#8243; title_color=&#8221;#3e4b58&#8243; subtitle_tag=&#8221;h1&#8243; subtitle_color=&#8221;#3e4b58&#8243; css_animation=&#8221;bottom-to-top&#8221;][\/vc_column][\/vc_row][vc_row top=&#8221;5px&#8221; bottom=&#8221;10px&#8221; bg_color=&#8221;#ffffff&#8221;][vc_column][vc_row_inner top=&#8221;30px&#8221; bottom=&#8221;30px&#8221; bg_color=&#8221;#ffffff&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_service icon_fontawesome=&#8221;fa fa-users&#8221; title=&#8221;Identity Management&#8221; title_tag=&#8221;h6&#8243; icon_position=&#8221;sb_center&#8221; icon_name=&#8221;li_params&#8221; target=&#8221;_self&#8221; icon_color=&#8221;#94c11c&#8221; position=&#8221;sb_right&#8221; heading_color=&#8221;#4a4a4a&#8221; descr_color=&#8221;#4a4a4a&#8221; link=&#8221;url:https%3A%2F%2Fwww.kogit.de%2Fen%2Fservices%2Fidentity-master-data-management%2F|||&#8221;]The efficient management of digital identities is a central element in any IT security architecture. KOGIT advises customers with high competence in all questions concerning Identity Management (IdM) as well as in the selection&#8230;  <\/p>\n<div class=\"read-more\"><a class=\"excerpt-read-more\" href=\"https:\/\/www.kogit.de\/en\/home\/\" title=\"Continue reading Home\">Read more<i class=\"fa fa-angle-right\"><\/i><\/a><\/div>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"page-full-width.php","meta":{"footnotes":""},"class_list":["post-10522","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.kogit.de\/en\/wp-json\/wp\/v2\/pages\/10522","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kogit.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kogit.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kogit.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kogit.de\/en\/wp-json\/wp\/v2\/comments?post=10522"}],"version-history":[{"count":29,"href":"https:\/\/www.kogit.de\/en\/wp-json\/wp\/v2\/pages\/10522\/revisions"}],"predecessor-version":[{"id":16948,"href":"https:\/\/www.kogit.de\/en\/wp-json\/wp\/v2\/pages\/10522\/revisions\/16948"}],"wp:attachment":[{"href":"https:\/\/www.kogit.de\/en\/wp-json\/wp\/v2\/media?parent=10522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}