{"id":26811,"date":"2025-08-05T10:12:35","date_gmt":"2025-08-05T08:12:35","guid":{"rendered":"https:\/\/de.nexis-secure.com\/?p=26811"},"modified":"2025-08-29T12:43:18","modified_gmt":"2025-08-29T10:43:18","slug":"nexis-impulse-august","status":"publish","type":"post","link":"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/","title":{"rendered":"NEXIS Impulse August"},"content":{"rendered":"\n<p><strong>Welcome to the latest edition of NEXIS Impulse!<\/strong><\/p>\n\n\n\n<p><br>Each month, we keep you up to date on the latest developments at Nexis, share exciting insights into our software solutions NEXIS 4 and QSEC, and bring you news from the world of Identity Analytics &amp; Access Governance as well as GRC. Enjoy the read!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udee1\ufe0f From IAM to GRC &#8211; Integrated Enterprise Risk Management in Action<\/h2>\n\n\n\n<p id=\"ember53\">Don&#8217;t miss our upcoming webinar: Our CEO &amp; IAM expert Dr. Heiko Klarl as well as Product Manager Jonas Link discuss how Identity &amp; Access Management (IAM) and Governance, Risk &amp; Compliance (GRC) can work hand in hand.<\/p>\n\n\n\n<p>What&#8217;s in it for you?<\/p>\n\n\n\n<p>\u2705 How IAM Governance helps meet regulatory demands&nbsp;(z.B. DORA, ISO, SOX)<br>\u2705 How integrated IAM-GRC solutions proactively manage operational &amp; strategic risks<br>\u2705 How ERM enables transparency and holistic risk control<\/p>\n\n\n\n<p id=\"ember55\">\ud83d\udcc5 <strong>August 27 | 4 PM (CET)<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/CSS_Nexis_Case_Study_EN-1.pdf\"><\/a><a href=\"https:\/\/de.nexis-secure.com\/en\/services\/webinars\/from-iam-to-grc-integrated-risk-management-in-action\/\">Register now<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u2699\ufe0f Enhancing IAM Hygiene&nbsp; &#8211; With Structure, AI, and NEXIS 4<\/h2>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\">\n<p id=\"ember57\">Orphaned accounts, unclear authorization concepts, and time-consuming recertifications are among the biggest weaknesses in IAM.<br>Our whitepaper shows how NEXIS 4 helps you identify risks, automate processes, and create real value through AI-driven governance.<\/p>\n<\/div>\n\n\n\n<p>Discover how to:<\/p>\n\n\n\n<p>\ud83d\udd0d Identify and clean up orphaned accounts<br>\ud83d\udd10 Turn outdated authorization models into real governance<br>\ud83e\udd16 Use AI to enable explainable and scalable decisions<\/p>\n\n\n\n<p><a href=\"https:\/\/de.nexis-secure.com\/en\/nexis-iam-hygiene-whitepaper\/\" target=\"_blank\" rel=\"noreferrer noopener\">Download now<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\ude80 NEXIS recognized in the&nbsp;Gartner\u00ae Hype Cycle\u2122 for Digital Identity 2025<\/h2>\n\n\n\n<p id=\"ember62\">In his latest blog post, Dr. Heiko Klarl highlights common risks hidden in many IAM landscapes \u2013 from ghost accounts of As per Gartner, \u201cDigital identities are the cornerstone of cybersecurity, empowering secure access, threat detection, compliance and digital transformation.\u201d<\/p>\n\n\n\n<p>We&#8217;re to share that NEXIS is named in two key innovation areas, both recognized as high-impact in the Gartner report:<\/p>\n\n\n\n<p><strong>AI for Access Administration<br>Identity Visibility and Intelligence Platforms<\/strong><\/p>\n\n\n\n<p id=\"ember63\">In our view, these topics represent the future of identity and access management and we&#8217;re excited to be shaping that future with our technology.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.gartner.com\/en\/documents\/6718134\" target=\"_blank\" rel=\"noreferrer noopener\">More information<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udcca Rethinking Risk Management \u2013 Integrated Governance for NIS2, DORA &amp; AI<\/h2>\n\n\n\n<p>With DORA, NIS2, and the EU AI Act, 2025 is shaping up to be a year of far-reaching compliance demands. Organizations face the challenge of implementing these requirements efficiently while managing risks holistically.<\/p>\n\n\n\n<p>With QSEC, we offer the right solution: The new Enterprise Risk Governance feature combines strategic and operational risk management in a single platform \u2013 based on ISO 27005, NIS2, and MaRisk. This enables you to meet regulatory requirements, create transparency, and break down silos.<\/p>\n\n\n\n<p>New additions include best-practice templates for AI-relevant assets as well as for DORA and NIS2-specific risks. Thanks to extended interfaces \u2013 including LeanIX, Signavio, Jira, and Microsoft Entra ID \u2013 you can seamlessly integrate external data sources and enhance your reporting.<\/p>\n\n\n\n<p>QSEC becomes the central nervous system of your enterprise risk management \u2013 for clear portfolios, faster audits, and sustainable compliance.<\/p>\n\n\n\n<p>\ud83d\udc49 <a href=\"https:\/\/de.nexis-secure.com\/en\/qsec-functions\/#qsec-demo\" target=\"_blank\" rel=\"noreferrer noopener\">Book a demo now and learn more!<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u23f3The Countdown Is On: Just One&nbsp;Month to Go Until NEXIS INVOLVE 2025!<\/h2>\n\n\n\n<p id=\"ember69\">Our customer event in September is approaching! Expect exciting insights, interactive formats, and direct exchange with the It\u2019s almost time: NEXIS INVOLVE \u2013 our customer event dedicated to Identity &amp; Access Management, Access Governance, and Compliance \u2013 is just around the corner!<\/p>\n\n\n\n<p>Look forward to two&nbsp;inspiring days with live presentations from customers and partners, exciting insights into the next steps of NEXIS 4, real-world IAM project experiences, and personal exchange and networking with other experts and peers.<\/p>\n\n\n\n<p>On stage, you\u2019ll hear from renowned customers sharing their project experiences: AON, AVL, BENTELER, Deutsche B\u00f6rse, HCOB, M\u00fcnchener Verein, UNIQA.<\/p>\n\n\n\n<p>INVOLVE is the perfect place to gain fresh ideas for your IAM strategy, exchange ideas with experts, and see how other companies are tackling today\u2019s challenges.<\/p>\n\n\n\n<p>\ud83d\udc49 Find out more about the agenda on our <a href=\"https:\/\/de.nexis-secure.com\/nexis-involve-2025\/\">website<\/a> and register today!<\/p>\n\n\n\n<p>\ud83d\udcc5 September 3 &amp; 4, 2025 | \ud83d\udccd Jahnstadion Regensburg | Free participation for customers and interested parties | Event language: German<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83e\udd1dThank You to Our Sponsors<\/h2>\n\n\n\n<p>Once again this year, we\u2019re thrilled to have the support of strong partners at our customer event INVOLVE. A heartfelt thank you to our sponsors, who not only contribute to the success of the event but also provide valuable insights and inspiration!<\/p>\n\n\n\n<p>Our 2025 sponsors:<\/p>\n\n\n\n<p>Arcon, Axalon, cidaas, iC Consult, KOGIT, One Identity, SailPoint, Sonic Bee, Ventum<\/p>\n\n\n\n<p>Look forward to the following partner presentations:<\/p>\n\n\n\n<p>\ud83c\udfa4 cidaas, Sadrick Widmann: &#8220;Between Legacy and Platform Strategy \u2013 How Digital Sovereignty Becomes Possible&#8221;<br>\ud83c\udfa4 KOGIT, Dr. Sven H\u00fcbner: &#8220;Enhancing IT Resilience Through Next Gen IAM and a Digital Authorization Concept&#8221;<br>\ud83c\udfa4 SonicBee, Timo Copp &amp; Harro H\u00f6fliger, Kevin Borrmann: &#8220;NEXIS 4 continous integration and business improvement @ Harro H\u00f6fliger&#8221;&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"920\" height=\"320\" src=\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Newsletter-12.png\" alt=\"\" class=\"wp-image-26814\" style=\"width:651px;height:auto\" srcset=\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Newsletter-12.png 920w, https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Newsletter-12-300x104.png 300w, https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Newsletter-12-768x267.png 768w\" sizes=\"(max-width: 920px) 100vw, 920px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the latest edition of NEXIS Impulse! Each month, we keep you up to date on the latest developments at Nexis, share exciting insights into our software solutions NEXIS [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":27113,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[20],"tags":[],"class_list":["post-26811","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>NEXIS Impulse August - NEXIS - Enter a new level of Enterprise Authorization Governance<\/title>\n<meta name=\"description\" content=\"Don&#039;t miss our latest Newsletter NEXIS Impulse August. Insights on IAM, GRC and beyond.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/de.nexis-secure.com\/de\/nexis-impulse-august\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NEXIS Impulse August - NEXIS - Enter a new level of Enterprise Authorization Governance\" \/>\n<meta property=\"og:description\" content=\"Don&#039;t miss our latest Newsletter NEXIS Impulse August. Insights on IAM, GRC and beyond.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/\" \/>\n<meta property=\"og:site_name\" content=\"NEXIS - Enter a new level of Enterprise Authorization Governance\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-05T08:12:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-29T10:43:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Academy-Nexis-1-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Verena Steinberger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Verena Steinberger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/\"},\"author\":{\"name\":\"Verena Steinberger\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#\/schema\/person\/a7cab42401917182b17c64fee9a1bc40\"},\"headline\":\"NEXIS Impulse August\",\"datePublished\":\"2025-08-05T08:12:35+00:00\",\"dateModified\":\"2025-08-29T10:43:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/\"},\"wordCount\":757,\"publisher\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#organization\"},\"image\":{\"@id\":\"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/\",\"url\":\"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/\",\"name\":\"NEXIS Impulse August - NEXIS - Enter a new level of Enterprise Authorization Governance\",\"isPartOf\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png\",\"datePublished\":\"2025-08-05T08:12:35+00:00\",\"dateModified\":\"2025-08-29T10:43:18+00:00\",\"description\":\"Don't miss our latest Newsletter NEXIS Impulse August. Insights on IAM, GRC and beyond.\",\"breadcrumb\":{\"@id\":\"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/#primaryimage\",\"url\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png\",\"contentUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png\",\"width\":400,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/de.nexis-secure.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NEXIS Impulse August\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#website\",\"url\":\"https:\/\/de.nexis-secure.com\/de\/\",\"name\":\"NEXIS - Enter a new level of Enterprise Authorization Governance\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/de.nexis-secure.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#organization\",\"name\":\"NEXIS - Enter a new level of Enterprise Authorization Governance\",\"url\":\"https:\/\/de.nexis-secure.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg\",\"contentUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg\",\"width\":2820,\"height\":622,\"caption\":\"NEXIS - Enter a new level of Enterprise Authorization Governance\"},\"image\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#\/schema\/person\/a7cab42401917182b17c64fee9a1bc40\",\"name\":\"Verena Steinberger\",\"url\":\"https:\/\/de.nexis-secure.com\/de\/author\/nexis_steinberger\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NEXIS Impulse August - NEXIS - Enter a new level of Enterprise Authorization Governance","description":"Don't miss our latest Newsletter NEXIS Impulse August. Insights on IAM, GRC and beyond.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/de.nexis-secure.com\/de\/nexis-impulse-august\/","og_locale":"en_US","og_type":"article","og_title":"NEXIS Impulse August - NEXIS - Enter a new level of Enterprise Authorization Governance","og_description":"Don't miss our latest Newsletter NEXIS Impulse August. Insights on IAM, GRC and beyond.","og_url":"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/","og_site_name":"NEXIS - Enter a new level of Enterprise Authorization Governance","article_published_time":"2025-08-05T08:12:35+00:00","article_modified_time":"2025-08-29T10:43:18+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Academy-Nexis-1-scaled.jpg","type":"image\/jpeg"}],"author":"Verena Steinberger","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Verena Steinberger","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/#article","isPartOf":{"@id":"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/"},"author":{"name":"Verena Steinberger","@id":"https:\/\/de.nexis-secure.com\/de\/#\/schema\/person\/a7cab42401917182b17c64fee9a1bc40"},"headline":"NEXIS Impulse August","datePublished":"2025-08-05T08:12:35+00:00","dateModified":"2025-08-29T10:43:18+00:00","mainEntityOfPage":{"@id":"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/"},"wordCount":757,"publisher":{"@id":"https:\/\/de.nexis-secure.com\/de\/#organization"},"image":{"@id":"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/#primaryimage"},"thumbnailUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/","url":"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/","name":"NEXIS Impulse August - NEXIS - Enter a new level of Enterprise Authorization Governance","isPartOf":{"@id":"https:\/\/de.nexis-secure.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/#primaryimage"},"image":{"@id":"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/#primaryimage"},"thumbnailUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png","datePublished":"2025-08-05T08:12:35+00:00","dateModified":"2025-08-29T10:43:18+00:00","description":"Don't miss our latest Newsletter NEXIS Impulse August. Insights on IAM, GRC and beyond.","breadcrumb":{"@id":"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/de.nexis-secure.com\/nexis-impulse-august\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/#primaryimage","url":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png","contentUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png","width":400,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/de.nexis-secure.com\/nexis-impulse-august\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/de.nexis-secure.com\/"},{"@type":"ListItem","position":2,"name":"NEXIS Impulse August"}]},{"@type":"WebSite","@id":"https:\/\/de.nexis-secure.com\/de\/#website","url":"https:\/\/de.nexis-secure.com\/de\/","name":"NEXIS - Enter a new level of Enterprise Authorization Governance","description":"","publisher":{"@id":"https:\/\/de.nexis-secure.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/de.nexis-secure.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/de.nexis-secure.com\/de\/#organization","name":"NEXIS - Enter a new level of Enterprise Authorization Governance","url":"https:\/\/de.nexis-secure.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg","contentUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg","width":2820,"height":622,"caption":"NEXIS - Enter a new level of Enterprise Authorization Governance"},"image":{"@id":"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/de.nexis-secure.com\/de\/#\/schema\/person\/a7cab42401917182b17c64fee9a1bc40","name":"Verena Steinberger","url":"https:\/\/de.nexis-secure.com\/de\/author\/nexis_steinberger\/"}]}},"_links":{"self":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/posts\/26811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/comments?post=26811"}],"version-history":[{"count":3,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/posts\/26811\/revisions"}],"predecessor-version":[{"id":26819,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/posts\/26811\/revisions\/26819"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/media\/27113"}],"wp:attachment":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/media?parent=26811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/categories?post=26811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/tags?post=26811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}